19.01.2014 Views

Navigating the Dataverse: Privacy, Technology ... - The ICHRP

Navigating the Dataverse: Privacy, Technology ... - The ICHRP

Navigating the Dataverse: Privacy, Technology ... - The ICHRP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

▪<br />

▪<br />

A recurrent threat of resistance (including armed resistance) to <strong>the</strong> global and<br />

national successors of colonial powers;<br />

Highly efficient mechanisms for exerting <strong>the</strong> influence of <strong>the</strong> “international community”<br />

on postcolonial governments (mechanisms that are in turn increasingly centred on<br />

data-collection and analysis).<br />

<strong>Technology</strong><br />

For better or worse, <strong>the</strong> world’s great technological centres continue to lie mainly in <strong>the</strong><br />

North, though this is changing. Technological production is increasingly centred in India and<br />

China, and much first hand technological innovation is occurring <strong>the</strong>re and elsewhere in what<br />

is sometimes called <strong>the</strong> global South. But very much of <strong>the</strong> rest of <strong>the</strong> world are consumers<br />

ra<strong>the</strong>r than producers of technology, and limited, even <strong>the</strong>n, by resource constraints.<br />

In particular, <strong>the</strong> technology of security remains a Nor<strong>the</strong>rn domain. This includes<br />

military hardware and <strong>the</strong> surveillance networks of satellites that largely cover <strong>the</strong> world’s<br />

landmasses. Most of <strong>the</strong> capacity to eavesdrop efficiently on <strong>the</strong> world’s internet traffic is<br />

also housed in <strong>the</strong> West, though this too will presumably change (albeit not dramatically).<br />

In short, individuals in much of <strong>the</strong> world may be spied upon by very distant o<strong>the</strong>rs. <strong>The</strong> US<br />

drone campaigns currently underway in some 12 countries symbolise this contemporary<br />

surveillance asymmetry very well, as well as <strong>the</strong> potency of evolving technology. 118<br />

<strong>The</strong> technology of security remains a Nor<strong>the</strong>rn domain. This includes military<br />

hardware and <strong>the</strong> surveillance networks of satellites that largely cover <strong>the</strong><br />

world’s landmasses.<br />

Ownership and control of data-ga<strong>the</strong>ring technologies are only two of many asymmetries.<br />

Access to information technologies and to <strong>the</strong> knowledge and know-how that goes with<br />

<strong>the</strong>m is equally uneven. To pick a schematic hypo<strong>the</strong>tical, a farmer in Mali may be identified<br />

via a satellite that can compile data on <strong>the</strong> size of his herds and <strong>the</strong> state of his crops. Such<br />

data may be strategically useful to commercial and public actors. But it is a rare Malian<br />

farmer who can access information about those who are monitoring him, or who possesses<br />

<strong>the</strong> networks, knowledge, and resources to take advantage of such knowledge.<br />

<strong>The</strong> point here is not <strong>the</strong> familiar claim that <strong>the</strong> internet is empowering, but that technological<br />

asymmetry structures relationships (in this case one between a Malian farmer and a Nor<strong>the</strong>rn<br />

data harvester), and has real-world effects. <strong>The</strong> very imbalance of <strong>the</strong> relationship, however,<br />

can make such a relationship appear unreal and remote when, in fact, it is immediate and<br />

consequential. Again, this immediacy and consequence is well illustrated in <strong>the</strong> case of<br />

drone strikes, where decisions are made on <strong>the</strong> basis of information about activities on <strong>the</strong><br />

ground, harvested from multiple sources, including particularly satellite imagery.<br />

Personal data held in private hands also exhibits similar informational asymmetries. <strong>The</strong><br />

giant servers carrying <strong>the</strong> world’s email and social networking information are located in<br />

a handful of countries and are generally subject to those countries’ laws and accessible<br />

to those countries’ governments (should <strong>the</strong> need arise). 119 This means that, for <strong>the</strong><br />

118 See Scott Shane, Mark Mazzetti and Robert F. Worth, “Secret Assault on Terrorism Widens on Two<br />

Continents”, <strong>The</strong> New York Times August 14, 2010.<br />

119 Saudi Arabia and some o<strong>the</strong>r countries moved to ban Blackberries in mid-2010, because all information<br />

is routed through servers based in North America. For <strong>the</strong> same reason, <strong>the</strong> French government decided<br />

40 <strong>Navigating</strong> <strong>the</strong> <strong>Dataverse</strong>: <strong>Privacy</strong>, <strong>Technology</strong>, Human Rights

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!