Advertisement

Abstract

Governments require vast quantities of information for planning, regulatory compliance, and law enforcement. This chapter looks at the effect that this data collection, use, and storage has for privacy. In the exchange model of information used in this book, government surveillance is an involuntary exchange akin to taxation. The chapter first considers the ‘smart cities’ movement and the use of information for urban planning. It then considers how this sort of data use relates to the common claim that only people with information to hide from the state have anything to fear from surveillance. The chapter then looks at the concern of many law enforcement agencies that the privacy protections of device and end-to-end encryption mean that much human interaction is ‘going dark.’

Bibliography

  1. A.P. Møller—Mærsk A/S. “Interim Report 02 2017.” Denmark, 2017.Google Scholar
  2. Abelson, Hal, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, et al. “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption.” 1997.Google Scholar
  3. Abelson, Harold, Ross Anderson, Steven M. Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, et al. “Keys under Doormats: Mandating Insecurity by Requiring Government Access to All Data and Communications.” Journal of Cybersecurity 1, no. 1 (2015): 69–79.Google Scholar
  4. Advisory Committee on Automated Personal Data Systems. Records, Computers and the Rights of Citizens. United States Department of Health, Education & Welfare, 1973.Google Scholar
  5. Angwin, Julia, Jeff Larson, Surya Mattu, and Lauren Kirchner. “Machine Bias.” ProPublica, 26 May 2016.Google Scholar
  6. Berg, Alastair, Chris Berg, Sinclair Davidson, and Jason Potts. “The Institutional Economics of Identity.” SSRN, 21 November 2017.Google Scholar
  7. Bhargava, Rahul. “The Algorithms Aren’t Biased, We Are.” Medium, 4 January 2018.Google Scholar
  8. Bickers, Claire. “Twelve Australian Tax Office Officials Sacked over Access to Private Info, Tax Boss Reveals.” news.com.au, 30 May 2017.
  9. Blaze, Matt. “Protocol Failure in the Escrowed Encryption Standard.” 20 August 1994.Google Scholar
  10. Cerf, Vint. “Keynote Address.” In Federal Trade Commission Internet of Things Workshop. Washington, DC, 2013.Google Scholar
  11. Comey, James B. “Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?” Brookings Institution, Washington, DC, 2014.Google Scholar
  12. Constine, Josh. “Whatsapp Hits 1.5 Billion Monthly Users. $19b? Not So Bad.” TechCrunch, 1 February 2018.Google Scholar
  13. Cowan, Paris. “Qld Corruption Watchdog Calls out Internal Privacy Threat.” ITNews, 13 May 2016.Google Scholar
  14. Cranshaw, Justin, Raz Schwartz, Jason Hong, and Norman Sadeh. “About the Livehoods Project.” http://livehoods.org/about.
  15. Davies, A.F. Australian Democracy. Melbourne: Longmans, 1958.Google Scholar
  16. de Atley, Richard K. “San Bernardino Shooting: Apple Ordered Help Us Hack Killer’s Phone.” The Press-Enterprise, 16 February 2016.Google Scholar
  17. Dutton, Peter. “Address to the National Press Club of Australia.” Canberra, 2018.Google Scholar
  18. Farrell, Paul. “The Medicare Machine: Patient Details of ‘Any Australian’ for Sale on Darknet.” The Guardian, 4 July 2017a.Google Scholar
  19. ———. “Revealed: More Than 200,000 People Can Access Medicare Card Details.” The Guardian, 6 July 2017b.Google Scholar
  20. Finch, Kelsey, and Omer Tene. “Welcome to the Metropticon: Protecting Privacy in a Hyperconnected Town.” Fordham Urban Law Journal 41 (2013): 1581–615.Google Scholar
  21. Fischer, David Hackett. Champlain’s Dream. New York: Simon & Schuster, 2008.Google Scholar
  22. Fox-Brewster, Thomas. “The Feds Can Now (Probably) Unlock Every Iphone Model in Existence.” Forbes, 26 February 2018.Google Scholar
  23. Greenberg, Andy. “After 3 Years, Why Gmail’s End-to-End Encryption is Still Vapor.” Wired, 28 February 2017.Google Scholar
  24. Greenbie, Barrie B. Spaces: Dimensions of the Human Landscape. Westford, MA: Saybrook Press, 1981.Google Scholar
  25. Higgs, Edward. The Information State in England: The Central Collection of Information on Citizens since 1500. Macmillan Education UK, 2003.Google Scholar
  26. Kahn, David. The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet. New York: Scribner’s and Sons, 1996.Google Scholar
  27. Kaila, Jon. “Hundreds of Police Members Caught Abusing Confidential Information on Operational Intelligence Database.” Herald Sun, 8 May 2013.Google Scholar
  28. Kitchin, Rob. “The Ethics of Smart Cities and Urban Science.” Philosophical Transactions of the Royal Society A 374, no. 2083 (2016): 2–15.Google Scholar
  29. ———. “The Realtimeness of Smart Cities.” TECNOSCIENZA: Italian Journal of Science & Technology Studies 8, no. 2 (2018): 19–42.Google Scholar
  30. Knight, Will. “Biased Algorithms Are Everywhere, and No One Seems to Care.” MIT Technology Review, 12 July 2017.Google Scholar
  31. Laughland, Oliver, Paul Farrell, and Asher Wolf. “Immigration Department Data Lapse Reveals Asylum Seekers’ Personal Details.” The Guardian, 19 February 2014.Google Scholar
  32. Lindqvist, Ulf, and Peter G. Neumann. “Inside Risks: The Future of the Internet of Things.” Communications of the ACM 60, no. 2 (2017): 26–30.Google Scholar
  33. Luque-Ayala, Andrés, and Simon Marvin. “The Maintenance of Urban Circulation: An Operational Logic of Infrastructural Control.” Environment and Planning D: Society and Space 34, no. 2 (2016): 191–208.Google Scholar
  34. Morse, Jack. “Google Translate Might Have a Gender Problem.” Mashable, 1 December 2017.Google Scholar
  35. National Research Council. Cryptography’s Role in Securing the Information Society. Washington, DC: National Academy Press, 1996.Google Scholar
  36. Nicks, Denver. Private: Bradley Manning, Wikileaks, and the Biggest Exposure of Official Secrets in American History. Chicago and London: Chicago Review Press, 2012.Google Scholar
  37. Office of the Inspector General. “A Special Inquiry Regarding the Accuracy of Fbi Statements Concerning Its Capabilities to Exploit an Iphone Seized During the San Bernardino Terror Attack Investigation.” U.S. Department of Justice, 2018.Google Scholar
  38. Palmer, Danny. “Petya Ransomware: Cyberattack Costs Could Hit $300m for Shipping Giant Maersk.” ZDNet, 16 August 2017.Google Scholar
  39. Pierce, Jeremy. “Police Officer ‘Disciplined’ for Sharing Address of Domestic Violence Victim.” The Courier-Mail, 11 May 2017.Google Scholar
  40. Priest, Dana, and William M. Arkin. “A Hidden World, Growing Beyond Control.” Washington Post, 19 July 2010.Google Scholar
  41. Pym, Sheri. “Order Compelling Apple, Inc. To Assist Agents in Search.” United States District Court for the Central District of California, 2016.Google Scholar
  42. Rudd, Amber. “Amber Rudd’s Conservative Conference Speech, Full Text.” The Spectator, 3 October 2017.Google Scholar
  43. Schneier, Bruce. “The Eternal Value of Privacy.” Wired, 18 May 2006.Google Scholar
  44. Shergold, Peter. Final Report of the Independent Review of Health Providers’ Access to Medicare Card Numbers. Canberra: Commonwealth of Australia, 2017.Google Scholar
  45. Solove, Daniel J. Nothing to Hide: The False Tradeoff between Privacy and Security. New Haven and London: Yale University Press, 2011.Google Scholar
  46. Sparks, Philip. “The Route to a Trillion Devices: The Outlook for Iot Investment to 2035.” In White Paper. ARM, 2017.Google Scholar
  47. Swire, Peter. “Going Dark: Encryption, Technology, and the Balance Between Public Safety and Privacy.” Testimony to Senate Judiciary Committee Hearing, 8 July 2015.Google Scholar
  48. Townsend, Anthony M. Smart Cities: Big Data, Civic Hackers, and the Quest for a New Utopia. New York and London: W.W. Norton, 2013.Google Scholar
  49. Vallianatos, Mark. “Uncovering the Early History of “Big Data” and the “Smart City” in Los Angeles.” Boom California, 16 June 2015.Google Scholar
  50. Van Zoonen, Liesbet. “Privacy Concerns in Smart Cities.” Government Information Quarterly 33, no. 3 (2016): 472–80.Google Scholar
  51. Vincent, James. “Smartbins Use Devices’ Wi-Fi Connections to Log Their Mac Address and Track Customer Habits.” Independent, 9 August 2013.Google Scholar
  52. Wray, Christopher. “The Fbi and the Iacp: Bound Together by Partnership, Friendship, and Commitment.” In International Association of Chiefs of Police Annual Conference and Exposition. Philadelphia, PA, 2017.Google Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Chris Berg
    • 1
  1. 1.RMIT UniversityMelbourneAustralia

Personalised recommendations