Race and Surveillance Lecture Slides PDF

Summary

These lecture slides cover the history and methods of surveillance, examining the impact of race on various aspects of surveillance. They discuss concepts like slave patrols, internment, and drug laws as examples of historical and modern surveillance techniques. The slides also explore the concept of resistance to surveillance.

Full Transcript

LECTURE SLIDES 1. 10/21 Race and Surveillance Race and Surveillance History of race based surveillance a. Slave patrols i. Citizen based groups that surveilled slaves in the US South 1. Enforced curfews 2. Chec...

LECTURE SLIDES 1. 10/21 Race and Surveillance Race and Surveillance History of race based surveillance a. Slave patrols i. Citizen based groups that surveilled slaves in the US South 1. Enforced curfews 2. Checked permission passes 3. Stopping unauthorized gatherings 4. Stopping any plans of resistance against slave owners b. Lantern laws i. In NYC in the 18th century, laws mandated that Black, INdigenous, and mixed race people carry lanterns when walking the streets at night without a White escort c. Internment i. After Pearl Harbor, US interned 110,000 Japanese Americans ii. After 9/11, the US detained hundreds of Muslim and Arab immigrants using immigration loopholes iii. State of Exception creates new forms of racial surveillance and racialization 1. Describes a situation where a sovereign acts outside of the rule of law in order to protect the public good 2. Juridical order is suspended due to an emergency or a serious crisis threatening the state US Mexico Border d. Increased forms of surveillance and policing as ways to stop unauthorized movements between the US and Mexico e. Justification is the war on drugs, but these practices reflect racial hostility between White americans and Mexican immigrants Drugs and moral panics f. Most major drug panics in the US have used a group radicalized as non white to justify banning the drug i. Cocaine laws and fears of black men, opium laws and fear of chinese immigrants g. Drug laws and enforcement of them have aspects of racial surveillance h. Drug laws are used to target non white communities and especially black communities Surveillance has always been a function of managing and controlling populations i. Therefore, modern surveillance has always had a racial component: maintaining the racial order Surveillance produces and imposes race j. Norms and practices set up “normal” and “problematic” actions and behaviors from dominated racial and ethnic groups Racial surveillance recreates and helps justify practices that lead to racial inequality k. Examples include over policing communities of color 2. Resisting Racial surveillance a. Dark Sousveillance i. Tactics that critique, resists, and imagine alternatives against current racial surveillance techniques ii. Sousveillance as those with less power surveying those with more power 3. 10/23 Race and Surveillance a. Biometrics are trying to identify someone based on biological trait b. In development of tech, test subjects were white males i. Gives racial bias and makes them inaccurate due to lack of data ii. Can be used for things like policing 1. Exacerbate inequalities iii. Puts people under increased surveillance 1. Long Term effects of being misidentified Biometrics Physical or behavioral characteristics that can be used for automated recognition c. Fingerprint scanning, facial recognition, genetic information, etc Biometrics data is used for d. Security e. Law enforcement and intelligence i. Surveillance of targeted people and populations Concerns of biometric data f. Dehumanization g. Privacy h. Data storage and usage i. Discriminatory practices Institutional Discrimination j. How can seemingly neutral or objective individual actions create or maintain systems of inequality? i. Assumptions made in developments and practices surrounding biometrics can maintain inequalities throughout society k. Scientific studies relying upon biological understandings of gender and race represent some of the most egregious failures of biometric technologies i. Any technology that assumes bodies are stable entities that can be reliably quantified is problematic l. Biometrics are marked as able to eliminate systemic forms of of discrimination at the same time as they are produced in a context marked by the persistence of problematic assumptions about difference Racial Bias in Biometrics m. Datasets: one study found the image datasets for these biometric programs are on average 77% men and 83% white i. Smaller N = worse ability to correctly identity n. Flawed input and data creates flawed outcomes i. Less data and essentialist understandings of race create systems that perpetuate racial stereotypes ii. Couples with existing biases, can create unequal outcomes o. Policing example i. Police departments already disproportionately police black neighborhoods 1. Creates stronger justification for using things like facial recognition software in public 2. Flaws in datasets then lead to innocent people getting arrested and charged for crimes they didn’t commit 4. 10/25 Race and Surveillance Racial Divides in Surveillance a. What are the effects of regular surveillance on those racialized as black in the us? i. Racial segregation and gentrification 1. Most cities in the US have large amounts of De Facto racial residential segregation a. "de facto" means segregation which does in fact exist, as distinguished from segregation which is imposed by law or by public authority 2. Gentrifying neighborhoods are one of the few urban locations where there can be racial diversity a. Gentrification: process of redevelopment which tends to bring in wealthier, white residents and forces out poorer, non white residents b. Major class differences alongside racial differences c. Racial diversity lasts only so long as affordable housing remains 3. In 2014, a washington post survey found 75% of white respondents had no non white friends ii. Home surveillance systems 1. What happens to those racialized as black who live in predominantly white neighborhoods? a. Historically, they have faced increased surveillance and treated as if they didn’t actually live there i. EX. Henry Louis Gates Jr. was a black man who had to get his own door unlocked, and then was arrested because his neighbor thought someone was breaking in. he showed his license and harvard ID to the white cop, but the officer did not believe him b. Today, homeowners can easily surveil neighbords thanks to increase in cloud based home surveillance systems i. One (non scientific) survey showed that 25% of residents with cameras used them to spy on neighbors c. Racial stereotypes + lack of meaningful contact with non-white neighbors = greater surveillance of non white residents iii. Social media based surveillance 1. Apps like NextDoor connect neighbors for many purposes, including neighborhood safety a. These apps are rife with residents using racial profiling on neighbors b. Because all neighbors who are signed up can read any post, it increases networks of race based surveillance 5. 10/30 Social Class and Surveillance, Poverty and Big Data Welfare, poverty and surveillance a. People in need must engage more with the state in order to receive benefits i. In terms of botha accepting or rejecting welfare assistance b. If one wishes to receive government assistance (TANF, unemployment food stamps, disability, etc.), must disclose personal information including: i. Income, efforts to find work, medical history, address and living conditions, spending habits, personal relationships, visits to offices, social worker visits, etc c. While surveillance of the poor has always been part of the welfare state, increased distrust of the poor from the 1980s to today has increased the willingness of actors to surveil the poor d. Increased distrust spurred efforts to reduce amount of government assistance available to those in poverty e. Myths like the “welfare queen” used to demonize welfare recipients i. The "welfare queen" stereotype is driven by false and racist beliefs that place the blame of the circumstances of poor black single mothers as the result of their own individual issues while bringing forward racial tropes such as their promiscuity, lack of structure and morals, and avoidance of work. Policing f. The police surveil poor neighborhoods more than any other g. Justifications create cycles of finding crime and then more abilities for law enforcement to surveil these populations in greater detail i. Ex. public drug markets, stop and frisk policies, various court decisions that allow greater freedoms of police searches and stops h. Poor areas and homeless people already face increased surveillance and policing i. More likely to be arrested ii. Will have arrest on records and data 1. Sometimes even if public data is scrubbed because of no conviction Poverty and big data i. Algorithms and big data make lives relatively harder for those living in poverty i. Welfare services ii. Policing iii. Employment and finances Welfare services and surveillance j. To receive benefits, individuals must agree to increased surveillance i. Ex. drug testing, fingerprints, visitations, tracking spending, etc. k. This data may end up in larger databases used by law enforcement or employment services Employment and finance l. It is more difficult for the poor and those with arrests on their record to find good jobs or secure loans, etc. i. These companies use databases that have information on arrests, welfare, etc. ii. Algorithmic determinations then sort out these applicants Results: big data and poverty surveillance m. Poor people are surveilled and policed more and more likely to need government assistance programs, also to be arrested i. Programs and arrests enter into datasets used by various organizations: police, job hunters bank, etc. ii. Algorithms then “objectively” make it harder on their lives: denied loans, denied jobs, predictive policing, etc. iii. This traps people in cycles of poverty and surveillance as algorithms help justify decisions that make it difficult for the poor to improve their condition 6. 11/1 Social Class and Privacy Wealth and privacy a. While the ultra wealthy may have more fame and public disclosures of investments, etc., they still have many advantages in terms of privacy disclosures i. Wealthy individuals have more agency in determining when to protect privacy Privacy from the public b. Ex. the bohemian grove and country clubs i. The bohemian grove is perhaps the most famous of clubs for business and political leaders to meet and network ii. The public, media, and women were not allowed c. Elite spaces provide settings from which to network, discuss business, and become friends i. The power elite/elite theory 1. a select few individuals hold a majority of power and control over society. This elite group is often policymakers and leaders who control the political, economic, social, and cultural aspects of society. d. The media is the main form of surveillance on the wealth in political and economic settings i. Private clubs prevent media access, therby granting private conversation agreements, wtc. Surveillance capitalism e. The wealthy do not need to shop for themselves i. They have more options to maintain privacy if desired: 1. Personal assistants 2. In home visistations f. Wealthier individuals can avoid: i. Public surveillance technologies (street camera, cctv, etc.) ii. Less metadating tracking Political and economic privacy g. The wealthy go to extensive lengths to protect their wealth from taxation, from capital gains to inheritance taxes i. Financial industries and tax havens help Panama and pandora papers h. Leaked documents show the extent to which powerful people hide assets through trusts set up in shell companies in tax havens 7. 11/6 Gender, Sexuality and Surveillance Cisgender identities and patriarchy a. Sex: the biological differences that distinguish males, females, and those who may not fit either category b. Gender: socially constructed characteristics of women and men, such as norms, roles, and relationships of and between groups of women and men i. Our focus is on the latter c. Patriarchy:social system based on subordination of femininity to masculinity Gendered surveillance d. Women and girls have historically faced more surveillance in the West (and in other societies) compared to men. These practices recreate the patriarchy and affect daily behavior (and relationships to privacy) e. Early socialization girls face more surveillance compared to boys in locations like schools, family life, religious life, etc. i. Methods: gender norms and roles, objectification, family life, violence, online/social media f. Men facing increased surveillance, but not historically over surveilled i. Early age, policing/crime, work, family, women’s rights movements Resistance to surveillance g. Women fight back against many of these forms of surveillance i. protests 8. 11/8 Gender, Sexuality and Surveillance Gender norms, social media and privacy a. Gender norms relate to social media usage and differentially affect privacy i. People are sharing private information on various social media platforms b. Gender differences in terms of the extent women or men think about and protect their privacy on these platforms LGBTQ+ surveillance c. Since the 1950s, state surveillance of the community has been widespread d. Lavender Scare i. President Eisenhower argued gays and lesbians were threates to national security ii. Hoover and FBI used a “sex deviate” program to uncover and publicize gay people working in the government and other jobs - leaked info to media and employers e. Policing i. Law enforcement regularly raided and harassed LGBTQ+ friends venuses ii. Most famously one raid sparked the stonewall riots 1. Stonewall riots, a series of violent confrontations that began in the early hours of June 28, 1969, between police and gay rights activists outside the Stonewall Inn, a gay bar in the Greenwich Village section of New York City. As the riots progressed, an international gay rights movement was born. iii. There are still many accounts of these individuals experiencing harassment or violence at the hands of the police f. Networked surveillance i. Many lgtbq apps have little to no privacy protections ii. Someone is purchasing data harvested on these apps g. Netflix knew i was bi before i did i. Article that shows the power of predictive algorithm based on relatively private information 1. Raise privacy concerns? ii. Did the platform nudge someone towards considering bisexuality? 9. 11/11 Transgender Health and Privacy Health Inequalities and privacy a. Transgender people and cis bisexual women have the highest poverty rates compared to other gender and sexual identities b. One solutions for people who cannot afford medical bills is to crowdfund i. Related to an individuals privacy 1. Offers these pointers for people looking to crowdfund in relation to medical costs a. Don't be afraid to tell your story b. Tell your story through photos c. Share fundraiser on social media and beyond ii. Privacy calculus theory: individuals may disclose some private information for economic or social benefits 1. Accessibility privacy: control one's physical space 2. Informational privacy: control one’s data 3. Expressive privacy: maintain levels of intimacy by choosing one’s audience iii. In the case of trans individuals crowdfunding for gender reassignment operations, disclosing information has benefits and drawbacks 1. Publicly disclosing aspects of one's trans identity may lead to harassment 2. However, may individuals felt that it helped them tell unique narratives about their transitions as well as find larger support groups 10. 11/13 Health, Surveillance and Privacy Surveilling health: states a. Governments and affiliated NGOs track populations in realtion to various aspects of health i. Institutions: CDC, WHO, local health departments, etc. ii. Gather data on issues like: birth rates, death rates, infectious diseases, mental health Surveilling health: economic actors b. Insurance companies: why do these companies sometimes provide gym memberships, fitness trackers, etc as part of health plans? c. Workplaces: employers sometimes provide similar benefits, but may also survey employees on wellbeing, track, locations, sleep patterns, etc. why? Surveilling health: self surveillance d. How do you monitor your own health with products or subscriptions? i. Like fitbits and apps Health apps and privacy e. In the US we have laws that are supposed to protect our health privacy i. HIPAA: Health insurance portability and accountability act (1996) 1. Ensures level of health privacy by limiting what health companies can do with personally identifiable health information f. We use many apps and services online that deal with health issues i. Ex. amazon health and Hims ii. Many of these companies take advantage of HIPAA loopholes 1. Telehealth companies are not providing care - they are connecting users to health professionals 2. Data from health surveys can be linked to users’ email addresses or other identifiable things (like social media profiles, etc.) 3. Companies like google and facebook track users on telehealth websites 11. 11/15 Educational Surveillance Educational surveillance at UMD a. Surveilled at UMD i. classooms/elms ii. Public spaces - walking around campus, using gyms or dining halls iii. Social events - club events, sports, etc. b. Through elms, teachers can track multiple aspects of students’ engagement with the course Biopower and school surveillance c. Schools reflect the two aspects of biopower: individual training of bodies alongside population management i. Ex. anti woke and anti trans policies affecting schools and students in certain parts of the US. Surveillance in schools d. Since the late 2000s, technologies have emerged that allow schools to surveil students i. Biometrics ii. Location detection devices iii. Health screening iv. Video surveillance v. Dataveillance 1. The systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons vi. Predictive analytics e. This type of tracking relate to biopower f. Students can resists these forms of surveillance i. Sousveillance ii. Exhibitionism as resistance 12. 11/27 Resisting Surveillance a. Surveillance actors i. Police and states, businesses, other institutions (schools, healthcare, etc.) Individual resistance b. Resistance is usually at an individual level i. Vpn or router ii. Privileges the people with knowledge and resources to partake Privacy advocates and privacy moments c. Whole privacy advocates exist, they often lack coordination with other advocates d. There is little to no privacy social movement in the west Privacy movements e. Difficult to measure harm i. Weakens claims-making abilities in terms of remedies f. Privacy vs public good discourse i. Perceived needs of surveillance regarding public safety and health, equity, etc. weakens claims of privacy advocates g. Lack of coalitions i. Too much ideological differences between surveillance critics - affects claims and goals, proposed policy changes, organizing tactics, etc. h. The lack of collective action means: i. State institutions face less transparency surrounding surveillance and privacy practices ii. Businesses are less likely to face governmental regulations or boycotts over surveillance and privacy practices 13. 11/29 Sousveillance a. Sousveillance is when those without or with less power looking up on the practices with power i. Includes authorities, institutions/organizations, and individuals ii. Based in reflectionism, which asks those in power: “if i hold up this mirror, do you like what you see?” b. Potentials i. The authors point to two potentials of sousveillance 1. Uncovering the panopticon and undercutting its primacy and privilege 2. Relocating the relationship og the surveillance society within a more traditional commons notion of observability ii. Other potentials 1. Empowers individuals in relation to surveillance practices 2. Creates transparency in actions between actors 3. Can prompt efforts to fight injustice (dark sousveillance) c. Limitations i. Physical vs digital sousveillance: can you sousveil an algorithm? ii. contexts/settings of sousveillance: ever stop sousveilling? How to determine limits and bounds iii. Power of those who surveil: would they care if there was a mirror held up to their actions iv. Power in complex organizationL can you sous veil a place like walmart? Would there be an effect on the power relations between surveilled and surveiller? v. Privacy concerns: how to now know others are sousveilling or not surveilling others and what they do with that data d. Dark is sousveillance surrounding racial inequalities 14. 12/4 Privacy and Surveillance Policy, the right to forget Privacy as social good a. Problems with treating privacy as an individual right in relation to the other social institutions i. Can justify its intrusion in the name of national security, economic efficiency, public safety, etc. ii. How does shifting from individual to collective conception help this problem Forgetfulness b. Challenging living in a society where we face constant surveillance alongside pressures/desires to post personal information online c. Should employers or others be able to access our: i. Social media ii. Criminal record iii. Credit report? d. Can institutional forgetting be beneficial for individuals and society? Risks of forgetfulness e. Who decides what is forgotten and what is kept? f. Should some things never be forgotten? Privacy and democracy g. The authors argue that constant surveillance and a lack of forgetfulness is harmful for democracy h. Privacy grants us opportunities that allow us to be better citizens READINGS 1. Racial surveillance has a long history a. Injustice manifests against “dangerous classes” i. Minorities and the poor are treated as a persistent threat to the established social order b. In 18th century, fear of armed insurrection of slaves led to ordinances regulating the movements of blacks and native americans i. Lantern laws c. Surveillance mechanisms as a response to perceived public crises i. Disproportionately targeted minorities and the poor ii. Zero tolerance policing led to stop and frisk 1. Years of data show these programs don’t reduce crime rate d. Black mothers are at high risk than whites of being incarcerated and having their children removed from them i. Black children are 7.5 times more likely than white children to have a parent in prison 1. Children in foster care are at an increased risk of incarceration e. Buildup of prison and foster care system as a state response to social insecurity f. Processes through which social services are delivered fall within this system of structural surveillance i. Social programs turned disciplinary in the mid 20th century g. Due to increased perceptions among white voters of a crisis surrounding welfare, there was more welfare surveillance, which stripped benefiting recipients of their dignity, privacy, and their social safety net i. Asks for VERY personal information for assistance h. Racial patterns of poverty can be directly attributed to systems of slavery, jim crow, redlining, etc. i. Pervasive system of structural surveillance is a means of managing minority populations 2. Is surveillance tech widening america's racial divide? a. “Suspicious” Black woman playing with her nephew was shot by a white officer, now reverend brown no longer feels safe in case she too looks suspicious b. Residents of newly gentrified enclaves have started to use social platforms such as nextdoor, facebook community groups and neighbors to report on people who they feel don't belong c. In 2014 68% of black respondents say us justice system is biased against black people vs 25% of whites d. Crime rate has fallen, but incarceration has increased e. Police killings are racially dispersed f. 2014 story that says 75% of whites do not have any friends that arent white g. Racialized perceptions of what makes someone suspicious has become supercharged with the emergence of digital platforms h. Ring has partnered with over 500 police departments i. Digital panopticon ii. Platforms can increase the users’ perception of crime 1. Drove sales up 3. First They Came for the Poor: Surveillance of Welfare Recipients as an Uncontested Practice a. 12 pages 4. How Big Data Harms Poor Communities a. Big data has helped businesses cut costs, plan city developments, discover intelligence on terrorists, predict outbreaks, get ahead of crime, etc. b. Data gathered on poor people can obstruct their attempts to escape poverty c. Low Income communities are among most surveilled in america i. Public benefits programs, child welfare systems, and monitoring programs for domestic abuse offenders gather large amounts of data on their users, who are disproportionately poor d. Fingerprinting and drug testing for public benefits i. Then are regularly monitored e. Big data predictions can violate the legal principle of presumed innocence f. Arrests shared with private data brokers stay with people forever even if the arrest gets expunged g. Big data analysis can exclude certain groups i. Credit card company lowered some customers’ credit limits because other people who had shopped at the same stores had a history of late payments h. Big data can also help i. Get credit scores for those without one 5. Where the rich and powerful go to misbehave a. Super secret talks and rituals in california for two weeks b. Includes prominent business leaders, presidents, celebrities, workers, and more c. Once led to the creation of the atom bomb d. Most gloried in ritual is powerful men having the freedom to pee wherever they like e. High ranking officials speak about information not yet available to the public f. Protests every year 6. Check your VPN, abortion seekers. New 'Vagina Privacy Network' aims to keep data safe a. Campaign to offer people instructions on how to protect their digital privacy from being used against them after having an abortion b. Once in indiana, a woman was convicted of feticide in 2015 using evidence including private text messages and emails c. Women don't need to delete their period tracking apps d. Digital evidence from messenger platforms are used by prosecution e. People on parole or probation are more likely to be in the crosshairs of poliec and prosecutors i. Being used against people who are already targeted and criminalized f. An anti abortion group used location data to target women who visited planned parenthood via anti abortion advertisements g. Geofence warrants allow police to locate people's phones within 10 feet of accuracy i. Police are using these to solve cold cases h. HIPAA has been updated to prevent healthcare providers from disclosing sensitive information to conduct a criminal, civil investigation targeting someone seeking reproductive healthcare in a state where it remains legal i. Prevents geotracking at doctors or hospitals 7. Netflix knew I was bi before I did a. While questioning sexuality, got more recommendations for series with lesbian storylines or bi characters i. Said her friends were not being recommended these b. Spotify suggested a playlist with a word used to describe women who love women c. Tiktok gave videos of bisexual creators d. UK data privacy laws require that people can ask what is being tracked of them e. Other details make predictions about a user i. Whether they are always watching or if they watch past the credits f. This could put people in danger for people where homosexuality is illegal 8. A Wild Investigation of Transvestigators, the People Who Think Celebs Are All Trans a. This conspiracy theory involves internet trolls trying to ‘prove’ cisgender celebrities are actually trans i. Uses word “inverted” b. Traansvestigation groups introduce a whole new language c. AI is involved in generating illusions d. This is obviously ludicrous but still has some danger involved i. Factually baseless information becomes noramtive and reported on ii. Can durther promote hostile and dehumanising attitudes about the trans community e. Transphobia is a conspiracy based on the hypothetical belief that trans people are dangerous 9. Not the Normal Trans Story: Negotiating Trans Narratives While Crowdfunding at the Margins a. 20 pages 10. Facial Recognition Heads to Class. Will Students Benefit? a. Multiple cameras spread throughout the room will take attendance, monitor whether students are paying attention, and will detect when bored, distracted, or confused i. AI powered software b. Have to be careful of the stress that surveillance puts on students c. Civil rights advocates argue that when facial recognition tools are used on those who have not yet been accused of a crime, they exist within a perpetual police lineup d. Data sets of faces used in training the systemed come from security footage or the internet, without consent e. Educational technology companies typically collect individual or aggregate data about students who use their products f. Someone may skip class if they know they have to be checking their phone 11. App that times bathroom breaks stirs controversy at fresno high a. Students can only use bathroom if less than 25 students, only two of the bathrooms on the ground floor, and have a 7 minute countdown b. If go over limit, can lose bathroom privileges c. 5 star students app d. 2 7 minute bathroom breaks during the day i. Teachers think its effective but students generally dislike it e. Students got a one week notice i. Were left without answers f. Some teachers have different policies and have final say g. App serves as a tool to record the data 12. Tracked: How colleges use AI to monitor student protests a. Social sentinel offered to scan social media posts from students for harmful content i. Can also look for students discussing protests, misconduct, etc. ii. Can search using key words b. Police departments have used taxpayer dollars to purchase these services c. Moving towards monitoring school emails d. Is an AI tool e. Came out of the need for a digital ear to the social landscape f. Company continuously claims it cannot be used to monitor protests and that the word is not even in its database i. So many marketing tactics by the company including saying that they could monitor/track protests 1. Gathers intelligence to respond to crowds g. UNC was monitored for #feminist h. Social media posts are technically public information i. But increases the target on people previously not likely to be investigated i. The service offers to monitor emails but we do not know if anyone has taken them up on that offer j. Opposing company shows off saying they can monitor google things and facebook messages 13. Surveillance studies a. Policing’s new visibility i. Video camera made ordinary deeds now widely visible ii. Past two decades have witnessed an increase in public capacity to surveil the police and state capacity to observe the public iii. Synoptic age: situation where a large number o people focus on something in common which is condensed iv. The means of recording and disseminating images has become more widely held and commonly put into use v. Capacity to photograph and film policing activity became widely available in the hands of ordinary people vi. When information is insubstantial or maliciously skewed, it can serve to confirm pre existing prejudices or opinions vii. Effects include even greater public skepticism towards police investigating police and will increase demand for civilian oversight b. The privacy advocates i. Privacy always has to be balanced against a countervailing public interest that is typically more powerful 1. With few exceptions, there is always a justification for the capture and processing of personal information a. Marketing says they are making sure the right people get the right ads ii. People will have real issues like extra security screening and insurance refusal and not realize these are privacy issues iii. Individuals have a right to control the information that relates to them c. Sousveillance i. One way to challenge and problematize surveillance is to restitute these technologies of control on individuals, offering panoptic technologies to help them observe those in authority ii. Reflectionism is directed 1. Toward uncovering the panopticon and undercutting its primacy and privilege 2. Relocating the relationship of the surveillance society within a more traditional commons notion of observability iii. Detournement 1. The tactic of appropriating rolls of social controllers and resituating these tools in a disorienting manner iv. Reflectionism becomes sousveillance when it is applied to individuals using tools to observe the organizational observers 1. Focuses on enhancing the ability of people to access and collect data about their surveillance and to neutralize surveillance v. Sousveillance performances show how certain kinds of rule violation can be deliberately used to engender a new kind of balance vi. Surveillance cameras threaten autonomy 1. We accept it so we can participate in public activities vii. Sousveillance disrupts the power relationship of surveillance when it restores a traditional balance that the institutionalization of the panopticon itself disrupted 1. Model of reflective awareness d. The right to die i. Recent surge in anti surveillance tactics 1. Software for anonymous internet browsing all the way to detoxification supplement for fooling drug tests 2. To conceal oneself from ambient surveillance in public spaces ii. Visuality 1. About the normalization of state control through techniques of classification, separation, and aestheticization, which enforce a kind of reductive, exclusionary legibility iii. A host of surveillance functions are reserved for those who threaten the status quo iv. Dazzle is a camouflage makeup that disorients algorithms v. It is the relatively privileged and white who ride the waves of voluntary mobility and whose state verified identity markers buoy them in their pursuits vi. Aestheticization of resistance enacted by anti surveillance camouflage and fashion 14. Data Retention and the panoptic society a. Control over personal information also has to do with who gets to retain or discard it b. Social implications of a lack of institutional forgetfulness c. Democracy is squelched when individuals live in fear of repercussions for nonconforming d. Privacy is good for society insofar as it promotes the development of the kinds of individuals who are essential for democracy e. Bankruptcy law surrounds recognizing forgetfulness as a social good f. When policy debates are frames as tension between individual interests and social good, individual interests do not win g. The liberal view is that the state is the protector of juveniles h. Juvenile delinquents are allowed to move on beyond their juvenile criminal records not because it is good for them, but also because society has an interest in turning juvenile offenders into law abiding adults i. Social forgetfulness serves individual and social interests i. Credit bureaus are paid to look for past blemishes j. Social forgetfulness is an important social value that is quietly slipping away because of the increasing use of increasingly sophisticated personal data together with a neglect of data retention policies k. We will gradually move to a panoptic society in which there is little social forgetfulness and little opportunity to move on and start afresh 15. Is momentum shifting toward a ban on behavioral advertising a. Behavioral advertising potentially offers only certain groups of people economic opportunities i. Can leave people vulnerable to scams b. Bill included a ban on targeted advertising to minors and tracking sensitive categories i. And endless clicks to get out of cookies c. Digital rights are real d. Hoarding of people's personal data abuses privacy and also drives the spread of misinformation and division 16. What is the GDPR, the EU’s new data protection law? a. Toughest privacy and security law in the world b. Imposes obligations onto all organizations that target or collect data related to people in the EU c. Right to privacy is from 1950 european convention on human rights d. Fines of violating GDPR max out at 20 mil or 4% of global revenue i. Whichever is higher ii. Plus compensation e. Personal data i. Any information that relates to an individual who can be directly or indirectly identified f. Data processing i. Any action performed on data, automated or manual g. Data subject i. Person whose data is processed h. Data controller i. Person who decides why and how personal data is processed i. Data processor i. Third party that processes personal data on behalf of a data controller j. If you process data you have to do so in according to seven protection and accountability principles k. Data is required to be handled securely by implementing appropriate technical measures i. Like two factor authentication l. Can't even think about touching somebody’s personal data without being able to justify it i. Unambiguous consent ii. To enter a contract iii. To comply with a legal obligation iv. To save somebody's life v. Perform a task in the public interest vi. Legitimate interest m. Needs to be consent n. Below is a rundown of data subjects’ privacy rights: i. The right to be informed ii. The right of access iii. The right to rectification iv. The right to erasure v. The right to restrict processing vi. The right to data portability vii. The right to object viii. Rights in relation to automated decision making and profiling.

Use Quizgecko on...
Browser
Browser