Internet of Things: A Mass Surveillance Infrastructure

paxtechnica.jpg

The Internet of Things may set us free of lock us up, according to Philip Howard

The word “thing”, in Old English, means a meeting or assembly. In the epic poem Beowulf, the eponymous hero declares he’ll “alone hold a thing” with the monster Grendel, who is terrorising the Danes in the great hall of Heorot. Beowulf uses “thing” euphemistically – it is a meeting that immediately descends into a fight.

The Icelandic parliament is still called Althing (Alþingi). But over the ages, “things” have gradually evolved from meetings to matter. Today, we primarily use the term “thing” to refer to objects. Even in this sense, however, things are still core to our political and social lives.

An appreciation that things have always been about community and politics, whether literally, or through the creation and respect of systems of private property, provides a useful backdrop to the recent book, Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up, by writer and professor of communication, Philip N Howard.
Howard’s thesis is that the much-hyped Internet of things - the expanding network of connected devices throughout our homes, bodies, streets and communities - heralds a new political age he calls “Pax Technica”.

This Pax will not be dominated by any one state, Howard argues, but by “a special kind of stability in global politics, revealing a pact between big technology firms and government”. The categories of democracy and dictatorship will fall. In their place, he claims, will be data-driven socio-technocracies, built on the intensive reporting of our behaviours, habits, tastes and beliefs, seamlessly transmitted by the devices we use, carry and interact with. We won’t need to express our political preferences and needs: our white goods and driverless cars will express them for us.
‘The most powerful political tool ever created’
Howard is excited by this vision; excited by two decades of work with communities empowered by social media; excited by the possibility to reinsert what he sees as civic counter power into device networks. I am not excited by it – I am terrified, and let me explain why.
The arc of Howard’s argument is that an open, interoperable, global network means that “every dictator will face embarrassing videos he cannot block and outrage he cannot respond to”, and every region in crisis or transition will involve “people using digital media to try to improve their conditions, to build new organisations, and to craft new institutional arrangements”.
The consequence, he submits, is “the most powerful political tool ever created”.
Howard adopts a playbook that is indistinguishable from the freedom-to-connect narrative fronted by US big tech and government – the valorisation of openness, interoperability, and disruptive innovation by private companies; the demonisation of repressive regimes; and a superficial view of political economy, international relations, and institutional corruption.
The argument is bolstered with an impressive array of case studies of citizen-led activism and coordination through mobile phones and social media. Inspiring stuff, certainly, but far from fully-worked examples of stable, enduring, empowering governance.

Howard fails to get out of the gates on the Internet of things. Apart from general hand waving to big data-enabled improvements in health, energy, environment and finance, he provides no convincing argument for the huge corporate and governmental data heist that will be enabled by networking everything in our physical environment, from our toasters to our coffee machines to our town squares. He claims that device networks will solve collective action problems, but there is little to show how this connectivity will empower the citizenry, as opposed to creating the greatest mass surveillance infrastructure ever conceived.

Howard acknowledges the dangers of surveillance, but he offers no opt-out. His solution to nefarious parties obtaining data is to just give out more data - to civic groups that he blithely assumes will organise and operate in the public good.
In this, he appears a convert to the church of big data; the computational theocracy. “Data will help us track good trends, monitor bad behaviour, and make reasoned decisions”, Howard claims. The world’s problems are all soluble, in other words, if only we have ever-more data and handfuls of networked citizen-analysts, thrown in amongst the vast machine of corporate and governmental data-miners.
Worryingly, Howard offers no challenge to the proposition that networked things will all communicate, seemingly by default, with “the original manufacturer, the information services we subscribe to, national security agencies, contractors, cloud computing services, and anyone else who has broken into, or been allowed into, the data stream”.
A nebulous trade-off
And the reason we ought to accept this unpalatable, feudal state of affairs? The lures of big data, and the venerated openness of the network. Your toaster is hackable, yes (as may be the rest of these smoking guns in your city), but at the same time, in a nebulous trade-off, with “dictators dying off and the data trail of bad behaviour growing, the biggest dirty networks are on the brink of collapse”. And when the “modern state fails, the internet of things will provide governance”, Howard asserts, unconvincingly.

By tracking us in intensive and intrusive ways – not only in our homes, but in our vehicles and bodies – data-driven devices can nudge, manipulate and mould our behaviours, habits and preferences, limit our autonomy, and bring quantification, segregation and discrimination to what is currently a political economy held together by social fuzziness.
This fuzziness assists us individually – because we have control over who has, and importantly who does not have, personal information about us. But it is also important socially, unless we want to turn into an intensely individualistic, segmented, micro-financialised network of semi-autonomous, tethered beings.
We deserve a smarter solution that offers more than empty marketing rhetoric for “open”, “inclusive” monopolistic big tech business models.

At worst, it’s a terrifying blueprint for the end of politics, depoliticising our engagement with “things”, characterising the objects and relations that furnish our lives as “loss leaders for data flows” – data flows that offer nothing for us, and everything for a staggering, uncontrolled array of corporate and governmental actors.
Guardian: http://bit.ly/1KtDA3x

« Avoid Hiring a Cybercriminal: understand motivations & thoroughly vet employees
US vs Hackers: Still Losing »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

SecureWorks

SecureWorks

SecureWorks provides intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer Institute for Secure Information Technology (SIT)

Fraunhofer SIT is a research centre specialising in all areas of IT security.

Military Cyber Professionals Association (MCPA)

Military Cyber Professionals Association (MCPA)

MCPA are a team of Soldiers, Sailors, Airmen, Marines, Veterans and others interested in the development of the American military cyber profession.

SITA

SITA

SITA is a multinational information technology company providing IT and telecommunication services to the air transport industry including vulnerability assessments and managed security services.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

GAVS Technologies

GAVS Technologies

GAVS is a global IT services provider with focus on AI-led Managed Services and Digital Transformation.

Consistec Engineering & Consulting

Consistec Engineering & Consulting

Consistec Engineering & Consulting GmbH is an information technology and services company offering solutions for monitoring the security of IT and OT infrastructure.

RNTrust

RNTrust

RNTrust provide solutions to meet today’s digital challenges utilizing digital technologies and services to make you more secured in digitally connected environment.

GeoEdge

GeoEdge

GeoEdge is the premier provider of ad security and quality solutions for the online and mobile advertising ecosystem.

CSIR Information & Cybersecurity Research Centre

CSIR Information & Cybersecurity Research Centre

The CSIR Information & Cybersecurity Research Centre focuses on research, development, and innovation of home-grown cyber and information security.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

Index Engines

Index Engines

Index Engines is the world’s leading AI-powered analytics engine to detect data corruption due to ransomware.

Baselime

Baselime

Baselime, the cloud-native observability platform. Resolve issues in your cloud application before they become problems.

Odaseva

Odaseva

Odaseva delivers the strongest data security solution for enterprises running on Salesforce, safeguarding confidentiality and integrity of critical business information.

Pango

Pango

Pango is a leading provider of digital consumer security solutions.