The document discusses Edward Snowden's views on mass surveillance by the NSA. It quotes Snowden as saying that the NSA has built an infrastructure that allows it to intercept almost all communications and that the vast majority of human communications are automatically ingested without targeting. Snowden expresses his unwillingness to live in a society where everything he does and says is recorded.
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Impact of Surveillance on Democracy
1.
2. "The NSA has built an infrastructure that allows it to
intercept almost everything. With this capability, the
vast majority of human communications are
automatically ingested without targeting. If I wanted to
see your emails or your wife's phone, all I have to do is
use intercepts. I can get your emails, passwords, phone
records, credit cards.
"I don't want to live in a society that does these sort of
things … I do not want to live in a world where
everything I do and say is recorded. That is not
something I am willing to support or live under."
Edward Snowden, The Guardian, 10 June 2013
http://www.theguardian.com/world/2013/jun/09/nsa-whistleblower-edward-snowden-why
4. “...the focused, systematic and routine
attention to personal details for
purposes of influence, management,
protection or direction.”
Lyon, D. (2007). Surveillance studies : an overview. Cambridge UK: Polity.
5. bored | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/bhikku/55921364/
Author: Duca di Spinaci https://creativecommons.org/licenses/by-nc/2.0/
6. “...to induce in the inmate a state of conscious and
permanent visibility that assures the automatic
functioning of power. So to arrange things that the
surveillance is permanent in its effects, even if it is
discontinuous in its action; that the perfection of
power should tend to render its actual exercise
unnecessary.”
Foucault, M. (1977) Discipline and Punish: the birth of the prison.
7. Control is an Option to Command | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/fredcintra/2671822805/
Author: Frederico Cintra https://creativecommons.org/licenses/by/2.0/
9. Demonstrations, Strikes, Marches, Processions: suffrage parade, c.1908. | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/lselibrary/22678375507/
Author: LSE Library https://www.flickr.com/commons/usage/
In September 1913 the Home Office had
ordered that the photographs of all the
suffragette prisoners be taken without their
knowledge.
Detectives compiled photographic lists of key suspects, the
aim being to stop arson attacks, window-smashings or the
dramatic scenes of women chaining themselves to Parliament's
railings.
10. In 1967, the President ordered the U.S.
Army to engage in surveillance of domestic
dissident groups, fearing civil disorder in
the aftermath of the
assassination of Martin Luther King, Jr.
Dr. Martin Luther King Jr., 13 November 1964 | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/dukeyearlook/4476299675/
Author: Duke University Archives https://creativecommons.org/licenses/by-nc-sa/2.0/
11. “In a democratic society privacy of communication is
essential if citizens are to think and act creatively
and constructively. Fear or suspicion that one’s
speech is being monitored by a stranger, even
without the reality of such activity, can have a
seriously inhibiting effect upon the willingness to
voice critical and constructive ideas.”
President’s Commission on Law Enforcement and Administration of Justice. (1967). The Challenge of Crime in a Free Society, (February), 1–342.
Retrieved from https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=42
12. “In a democratic society privacy of communication is
essential if citizens are to think and act creatively
and constructively. Fear or suspicion that one’s
speech is being monitored by a stranger, even
without the reality of such activity, can have a
seriously inhibiting effect upon the willingness to
voice critical and constructive ideas.”
President’s Commission on Law Enforcement and Administration of Justice. (1967).
President’s Commission on Law Enforcement and Administration of Justice. (1967). The Challenge of Crime in a Free Society, (February), 1–342.
Retrieved from https://www.ncjrs.gov/App/Publications/abstract.aspx?ID=42
13. “[W]hen we engage in democratic
argument, the point of the activity is
critically to reflect on our preferences,
to question them, to challenge them,
to enlarge them, to improve them.”
- Michael Sandel
Source: http://www.bbc.co.uk/programmes/b00lb6bt
14. “When human beings are scared
and feel everything is exposed to
the government, we will censor
ourselves from free thinking. That's
dangerous for human
development.”
- Ai Weiwei
theguardian.com/commentisfree/2013/jun/11/nsa-surveillance-us-behaving-like-china
15. That is, there are no dangerous
thoughts for the simple reason that
thinking itself is such a dangerous
enterprise. . . . nonthinking is even
more dangerous.
- Hannah Arendt
Arendt, H. (2013). Hannah Arendt: The Last Interview. Melville House.
16. “Democracy expresses itself in a continuous and
relentless critique of institutions; democracy is
an anarchic, disruptive element inside the
political system: essentially, a force for dissent
and change. One can best recognize a
democratic society by its constant
complaints that it is not democratic enough.”
- Zygmunt Bauman
Zygmunt Bauman (2001), The Individualized Society. London: Polity Press.
17. Voting | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/kcivey/480629716/
Author: Keith Ivey https://creativecommons.org/licenses/by-nc/2.0/
18. The Protest | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/croma/7400822350/ Author: Robert Croma https://creativecommons.org/licenses/by-nc-sa/2.0/
21. Deserted Piccadilly Circus with Fast Bus | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/jacobsurland/19240618813/
Author: Jacob Surland https://creativecommons.org/licenses/by-nc/2.0/
22.
23.
24. Harvest | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/digimist/20432517610/
Author: Richard Clark (Digimist) https://creativecommons.org/licenses/by-nc/2.0/
25. We are always looking for more ways to
deliver you the most useful and relevant
ads - for example, we may use your
Google search queries on the Web, the
sites you visit, Google Profile, +1’s and
other Google Account information to show
you more relevant ads in Gmail.
https://support.google.com/mail/answer/6603?hl=en
26. It might seem curious to think of information gathering by
private entities as "surveillance." Notions of surveillance have
traditionally been concerned with the watchful gaze of
government actors like police and prison officials rather than
companies and individuals. But in a postmodern age of "liquid
surveillance," the two phenomena are deeply intertwined.
Government and nongovernment surveillance support each
other in a complex manner that is often impossible to
disentangle.
Richards, N. M. (2013). The dangers of surveillance.
Harvard Law Review, 126(7), 1934–1965.
27.
28. “The Department of Defense (DOD) has been
interested in Disney Amusement Parks for
decades. Known as Operation Mickey Mouse,
the DOD has been studying Disney’s use of
technology and coercion techniques. The DOD
has also been working in conjunction with
Disney to collect information on Beta testing
operations that the popular theme park uses on
their customers.”
Posel, S. (2013). Disney Biometrics and the Department of Defense.
Retrieved from occupycorporatism.com/disney-biometrics-and-the-department-of-defense
30. Foggy Evening | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/btf5/19377137838/
Author: Barbara Friedman https://creativecommons.org/licenses/by-nc/2.0/
31. Pednvounder Beach | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/uglyold/8927411895/
Author: Paul Lester https://creativecommons.org/licenses/by-nc-sa/2.0/
32.
33.
34.
35. 190 Subsection (9)(f) provides for the retention of internet
connection records. Internet connection records are a record of
the internet services that a specific device connects to – such
as a website or instant messaging application – captured by
the company providing access to the internet. They could be
used, for example, to demonstrate a certain device had
accessed an online communications service but they would not
be able to be used to identify what the individual did on that
service. Clause 47 provides certain restrictions on the
acquisition of internet connection records. Clause 193 provides
that in the particular context of web browsing anything beyond
data which identifies the telecommunication service (e.g.
bbc.co.uk) is content.
Home Office (2015). Draft Investigatory Powers Bill. Retrieved from https://www.gov.uk/government/publications/draft-investigatory-powers-bill
37. But the question is are we
going to allow a means of
communications which it
simply isn’t possible to read.
My answer to that question
is: no, we must not.
Special Address: David Cameron gestures | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/worldeconomicforum/8410102641/
Author: World Economic Forum https://creativecommons.org/licenses/by-nc-sa/2.0/
Hope, C. (2015) Spies should be able to monitor all online messaging, says David Cameron. Daily Telegraph
http://www.telegraph.co.uk/technology/internet-security/11340621/Spies-should-be-able-to-monitor-all-online-messaging-
says-David-Cameron.html
38. “It seems like the media was just
led around by the nose by law
enforcement. [They are] taking
advantage of a crisis where
encryption hasn’t proven to have
a role. It’s leading us in a less safe
direction at a time when the world
needs systems that are more
secure.”
Fung, B. (2015). If government surveillance expands after Paris, the media will be partly to blame. The Washington Post.
Retrieved from: washingtonpost.com/news/the-switch/wp/2015/11/19/if-government-surveillance-expands-after-paris-
the-press-will-be-partly-to-blame/
Paris | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/gwpfae/13326359683
Author: MacPepper https://creativecommons.org/licenses/by-nc-sa/2.0/
39. The underlying public encryption methods employed by online
jihadists do not appear to have significantly changed since the
emergence of Edward Snowden. Major recent technological
advancements have focused primarily on expanding the use of
encryption to instant messenger and mobile communications
mediums.
Well prior to Edward Snowden, online jihadists were already
aware that law enforcement and intelligence agencies were
attempting to monitor them. As a result, the Snowden revelations
likely merely confirmed the suspicions of many of these actors,
the more advanced of which were already making use of – and
developing – secure communications software.
Flashpoint (2014). Measuring the Impact of the Snowden Leaks on the Use of Encryption by Online Jihadists.
Retrieved from: https://fpjintel.com/portal/assets/File/Flashpoint_Jihadi_Encryption_Software_Sept2014.pdf
bokeh candle | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/27352608@N06/2987820313/
Author: Ethan Doerr https://creativecommons.org/licenses/by-nc-sa/2.0/
42. Figure in the Fog | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/mtsofan/8180428397/
Author: John https://creativecommons.org/licenses/by-nc-sa/2.0/
43. Spotlight | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/alvaronovo/10733673893/
Author: Alvaro A. Novo https://creativecommons.org/licenses/by-nc-sa/2.0/
44. “If you have nothing to hide you have
nothing to fear...”
45. “Everyone is guilty of something
or has something to conceal. All
one has to do is look hard
enough to find what it is.”
- Solzhenitsyn, A. (1968). Cancer Ward. The Bodley Head.
46. "Arguing that you don't care about the
right to privacy because you have
nothing to hide is no different than saying
you don't care about free speech
because you have nothing to say.”
- Edward Snowden
Source: reddit.com/r/IAmA/comments/36ru89/just_days_left_to_kill_mass_surveillance_under/crglgh2
47. Newspaper Review | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/southbankcentre/13034106905/
Author: Southbank Centre https://creativecommons.org/licenses/by/2.0/
“...undercover officer Peter Francis
said he was instructed in 1993 to
find information that could
discredit the Lawrence family. He
claims that he posed as an anti-
racism campaigner in a hunt for
‘disinformation’ to use against
those criticising the police.”
Source: http://www.theguardian.com/uk-
news/2014/feb/28/doreen-lawrence-police-spying-inquiry
48. P1060939 | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/helen61/5716717759/Author: helen.2006 https://creativecommons.org/licenses/by-nc-sa/2.0/
“Many disabled people are in fear of losing benefits through
the various cuts or the new flawed assessments, but it is also
unfair that some are now worrying about being reported
because of being seen being active and having a nice time on
a good day.”
Source: http://www.theguardian.com/commentisfree/2011/dec/06/disabled-people-benefits-dla
49. Old Westminster | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/demonsub/8362410222/
Author: Darren Harmon https://creativecommons.org/licenses/by-nc-sa/2.0/
50. “I want to protect myself, but I don’t know how...”
51. onion | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/postbear/8638719643
Author: postbear eater of worlds https://creativecommons.org/licenses/by-nc-sa/2.0/
52.
53.
54.
55.
56. Keyboard 2 | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/arrqh/4035827701/
Author: Arrqh https://creativecommons.org/licenses/by-nc-sa/2.0/
57. Danger, No Smoking | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/karlsbad/17920476198/
Author: Karl Schultz https://creativecommons.org/licenses/by-nc-sa/2.0/
58. Good morning:) | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/124374841@N05/21263365286/
Author: Amber inhim https://creativecommons.org/licenses/by-nc-sa/2.0/
59. ...some people do not use E2E encrypted
email on the basis that “they are not
aware, or do not understand, the
protection techniques that are available”.
Renaud, K., Volkamer, M., & Renkema-Padmos, A. (2014). Why doesn’t Jane protect her
privacy? Lecture Notes in Computer Science (including Subseries Lecture Notes in
Artificial Intelligence and Lecture Notes in Bioinformatics), 8555 LNCS, 244–262.
http://doi.org/10.1007/978-3-319-08506-7_13
60. San Gabriel Mountains | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/steveberardi/9181257258/
Author: Steve Berardi https://creativecommons.org/licenses/by-nc-sa/2.0/
61. Pew Research Centre (2015) Americans’ Privacy Strategies Post-Snowden. Available from: http://www.pewinternet.org/files/2015/03/PI_AmericansPrivacyStrategies_0316151.pdf
62. The Right Tool | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/ebarney/3348965007/
Author: Emily https://creativecommons.org/licenses/by-nc/2.0/
63. Good morning:) | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/124374841@N05/21263365286/
Author: Amber inhim https://creativecommons.org/licenses/by-nc-sa/2.0/
[Source: http://www.theguardian.com/technology/2015/nov/24/google-can-
unlock-android-devices-remotely-if-phone-unencrypted]
64. Retro Robot | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/kaptainkobold/9164005127/
Author: Alan https://creativecommons.org/licenses/by-nc-sa/2.0/
Source: http://www.theguardian.com/technology/2015/nov/24/google-
can-unlock-android-devices-remotely-if-phone-unencrypted
65. * Off contract figures as of Feb 2015. Source: http://appleinsider.com/articles/15/02/02/while-
apples-average-iphone-price-surges-to-687-android-devices-flounder-at-254
66. Untitled | Flickr - Photo Sharing! : taken from -
https://www.flickr.com/photos/matthiaswerner1984/5381521256/
Author: Matthias Werner https://creativecommons.org/licenses/by-nc-sa/2.0/
71. Internet Access - Households and Individuals, 2015 - http://www.ons.gov.uk/ons/rel/rdit2/internet-access---households-and-individuals/2015/index.html
72.
73. BBC (2014). BBC Basic Online Skills May 2014 research. Retrieved from http://downloads.bbc.co.uk/aboutthebbc/insidethebbc/whatwedo/learning/audienceresearch/basic-online-skills-nov-2014.pdf
74. Ofcom. (2015). Adults’ media use and attitudes report. http://stakeholders.ofcom.org.uk/market-data-research/other/research-publications/adults/media-lit-10years
76. Barclays bicycles 1 | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/michoch/6385744165/
Author: Michał Ochman https://creativecommons.org/licenses/by-nc-sa/2.0/
77. We are always looking for more ways to deliver
you the most useful and relevant ads - for
example, we may use your Google search
queries on the Web, the sites you visit, Google
Profile, +1’s and other Google Account
information to show you more relevant ads in
Gmail.
https://support.google.com/mail/answer/6603?hl=en
78.
79. “commitment to the defence, and the
advancement, of access to information,
ideas and works of the imagination”
CILIP. (2012). Ethical Principles for Library and Information Professionals, 2004.
Retrieved from http://www.cilip.org.uk/get-involved/policy/ethics/Documents/Ethical principles for library and information professionals October 2012.pdf
- CILIP’s Ethical principles for library and information professionals
80. Individuals must “decide for themselves
what they should, or should not, access”
and those providing the service must
“respect the privacy of users and treat
knowledge of what they have accessed
or wish to access as confidential”
- Council of Europe statement (endorsed by CILIP)
Council of Europe. (2000). New information technologies: public access and freedom of expression in cultural institutions.
Retrieved from http://www.coe.int/t/dg4/cultureheritage/culture/Resources/DECS_CULT_NTI_libex(2000)2_EN.pdf
81. Libraries and information professionals have a
responsibility to “reject electronic surveillance”,
provide training on “tools to use to protect their
privacy” and “respect and advance privacy at
the level of practices and as a principle”...
- IFLA’s Statement on Privacy in the Library Environment
IFLA. (2015). IFLA Publishes a Statement on Privacy in the Library Environment.
Retrieved November 8, 2015, from http://www.ifla.org/node/9803
82.
83. The Library Freedom Project is a partnership
among librarians, technologists, attorneys, and
privacy advocates which aims to make real the
promise of intellectual freedom in libraries. By
teaching librarians about surveillance threats,
privacy rights and responsibilities, and digital
tools to stop surveillance, we hope to create a
privacy-centric paradigm shift in libraries and
the local communities they serve.
- Library Freedom Project
84.
85.
86.
87. Reach | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/jannemei/409158758/
Author: jannemei https://creativecommons.org/licenses/by-nc-sa/2.0/
88. Coustick-Deal, R. (2015). Responding to "Nothing to hide, Nothing to fear"
openrightsgroup.org/blog/2015/responding-to-nothing-to-hide-nothing-to-fear.
@thegrugq. Short guide to better information security.
gist.github.com/grugq/353b6fc9b094d5700c70
Library Freedom Project. Privacy toolkit for librarians.
libraryfreedomproject.org/resources/privacytoolkit/
Let’s Encrypt.
letsencrypt.org
Electronic Frontier Foundation.
eff.org
Digital Citizenship and Surveillance Society.
dcssproject.net
Surveillance & Society (OA journal).
library.queensu.ca/ojs/index.php/surveillance-and-society
The Digital Divide in the post-Snowden era
surveillance.infoism.co.uk
89. Murray, A. (2015). Finding Proportionality in Surveillance Laws.
Paul Bernal’s Blog. Retrieved from:
http://wp.me/p1CGOs-HI
Shubber, K. (2013). A simple guide to GCHQ's internet surveillance
programme Tempora. Wired. Retrieved from:
wired.co.uk/news/archive/2013-06/24/gchq-tempora-101
Gallagher, R. (2015). From Radio to Porn, British Spies Track Web
Users’ Online Identities. The Intercept. Retrieved from:
theintercept.com/2015/09/25/gchq-radio-porn-spies-track-web-users-online-identities/.
@thegrugq (2015). Operational Telegram. Retrieved from:
medium.com/@thegrugq/operational-telegram-cbbaadb9013a
Richards, N. M., (2008). Intellectual Privacy. Texas Law Review,
Vol. 87. Retrieved from:
ssrn.com/abstract=1108268
Whitten, A. & Tygar, J.D. (1999). Why Johnny Can’t Encrypt: A Usability
Evaluation of PGP 5.0.
gaudior.net/alma/johnny.pdf
91. ian clark
t: @ijclark | @infoism
e: ijclark@infoism.co.uk
w: infoism.co.uk
Blue Flow | Flickr - Photo Sharing! : taken from - https://www.flickr.com/photos/dennisholzberg/6622878345/Author: Dennis
Holzberg https://creativecommons.org/licenses/by-nc-sa/2.0/