Why windows? What kinds of windows? Which classrooms, whose classrooms have sunlight? Which doors have locks? Who has the key? Which schools have metal detectors? Which schools have surveillance cameras? When were these technologies installed, and why?
Tag: Surveillance
Social credit will be affected by more than just internet browsing and shopping decisions.
Who your friends and family are will affect your score. If your best friend or your dad says something negative about the government, you’ll lose points too.
Who you date and ultimately partner with will also affect social credit.
via Audrey Watters
These technologies provide amazing opportunities to provide real services to our lives. I experienced this first hand as we enjoyed our time in this road race, and will look forward to the next one together. I was impressed by the use of technology as I was interacting with these sources and signals. At the same time, I was still plagued by a number of questions as I was thinking about these tools, and other possible uses. In our current and future societies, we need to examine these uses and think about how or why we use these solutions.
Facebook is working to spread its face-matching tools even as it faces heightened scrutiny from regulators and legislators in Europe and North America.
A system that could detect consumers within stores and match those shoppers’ faces with their social networking profiles. Then it could analyze the characteristics of their friends, and other details, using the information to determine a “trust level” for each shopper.
And:
Cameras near checkout counters could capture shoppers’ faces, match them with their social networking profiles and then send purchase confirmation messages to their phones.
This made me wonder how many patents actually come to fruition and how many are a form of indirect marketing?
China is reversing the commonly held vision of technology as a great democratizer, bringing people more freedom and connecting them to the world. In China, it has brought control.

I am reminded of the discussion of a big data tax mentioned in Sabeel Rahman’s post The New Octopus. James Bridle also talks about the ‘Age of the Image’ in the New Dark Age:
As digital culture becomes faster, higher bandwidth, and more image-based, it also becomes more costly and destructive – both literally and figuratively. It requires more input and energy, and affirms the supremacy of the image – the visual representation of data – as the representation of the world.
There are three points about the risks of what ISTE deployed at their conference to know: (1) the ‘smart badge’ is a really effective locator beacon, transmitting signals that are trivial to intercept and read, (2) you can’t turn it off, and (3) most people I spoke to had no idea how it worked. (I freaked out more than a few people by telling them what their badge number was by reading it from my phone. Most of those incidents ended up with ‘smart badges’ being removed and destroyed.)
Downloading a free mobile app, as I did, an attacker could easily track a specific badge and be notified when it goes out of or comes into range. With little technical skill, an attacker could use it to approach someone outside of the convention center (at a bar or restaurant or tourist attraction) and by employing social engineering techniques attempt to gain their trust. I myself was able to identify that there were over a dozen ISTE conference participants on my train platform on Wednesday morning bound for Chicago O’Hare. When one ISTE participant entered my train car at a later stop, that was trivial to identify. While there were no other ISTE participants on my flight back to the DC area, I located two badges in the baggage claim area (likely packed in someone’s luggage or carry-on).
Audrey Watters suggests that, “ISTE has helped here to normalize surveillance as part of the ed-tech experience. She suggests that it is only time that this results in abuse. Mike Crowley wonders why in a post-GDPR world attendees are not asked for consent? If this is the future, then maybe Levin’s ‘must-have’ guide will be an important read for everyone.
In reality, Facebook is designed to allow its partners to violate its users’ privacy, so the fact that Cambridge Analytica got caught with its hand in 80 million of our cookie-jars is an indication of how incompetent they were (they were the easiest to detect, in part because of their public boasting about their wrongdoing), and that means there are much worse scammers who are using Facebook to steal our data in ways that makes CA look like the petty grifters they are.
Moments like the one we’re in don’t come often. While advocacy groups who deeply understand the intricacies of online data-collection wait and see what happens with privacy regulation, the news environment is going to move on. They’ll miss their chance. Maybe that’s what they want.
This style of technology isn’t new, but the method of its use – and the kinds of people wielding it – is.
Counter-surveillance
The only way to challenge surveillance is through counter-surveillance Source
It is interesting to juxtapose this with a comment that Mark Burden recently made that it is the Internet of Data Collection Instruments.
In terms of the device collectors, in some ways they are delighted about this passivity because it reveals behaviours that we wouldn’t necessarily reveal if we knew data about us was being recorded. So in that sense when you think about what is now called the internet of things, the very label ‘the internet of things’ is a misleading label, in fact it’s a label that I think should be put in a wastepaper basket. What we are really talking about is the internet of data collection instruments. And these instruments rely on our passive behaviours in order to collect the data from the environment and about us in relation to what we do in those environments. And what we are now starting to see is that the smart home, or what is becoming increasingly the smart home, is being packed with these devices.Source