Equiveillance

Last updated

Equiveillance is a state of equilibrium, or a desire to attain a state of equilibrium, between surveillance and sousveillance. [1] [2] [3] [4] [5] [6] [7] It is sometimes confused with transparency. The balance (equilibrium) provided by equiveillance allows individuals to construct their own cases from evidence they gather themselves, [8] rather than merely having access to surveillance data that could possibly incriminate them.

Contents

The Dutch perspective on equiveillance puts it in a sociopolitical context in regards to a balance between individuals and the state. [9] [10]

Equiveillance uses sousveillance, in addition to transparency, to preserve the contextual integrity of surveillance data. For example, lifelong capture of personal experiences provides alternative viewpoints in addition to external surveillance data, to prevent the surveillance-only data from being taken out-of-context.

Ubiquitous computing

Equiveillance represents a situation where all parties of a society or economy are empowered to be able to use the tools of accountability to make beneficial decisions. The increasing trend to record information from our environment, and of ourselves creates the need to delineate the relationships between privacy, surveillance, and sousveillance. [11]

Equiveillance addresses the balance between ubiquitous computing (computing installed throughout our environment) and wearable computing (computing installed upon our own bodies). As personal cell phones store more information and have the capacity to share it, wearable and mobile computing makes manifest the ability for an individual, or small group of individuals, to monitor larger institutional systems with a goal of developing systems of transparency and accountability. In the same way that large institutions, such as governments or corporations, store information about the buying habits of the public through integrated surveillance practice and ubiquitous computing infrastructure, individuals can act as consumer activists though a system of inverse surveillance that is based upon a wearable computing infrastructure that assists in maximizing personal privacy and alerting one of information being recorded about the self. Such actions lead to an equiveillant state, as power and respect are shared in a more balanced way. [12]

Panoptic surveillance was described by Michel Foucault in the context of a prison in which prisoners were isolated from each other but visible at all times by guards. Surveillance isolates individuals from one another by setting forth a one-way visibility to authority figures, leading to social fragmentation. [13]

Sousveillance has a community-based origin, such as a personal electronic diary (or weblog), made public on the World Wide Web. Sousveillance brings together individuals, by influencing a large city to function with the social connectivity of a small town, with the pitfalls of gossip, but also the benefits of a sense of community participation, where the sousveillance environment generates a greater sense of responsibility. [14]

Ubiquitous computing ("ubicomp"), also known as pervasive computing ("pervcomp"), is the integration of computers with the environment. Ubiquitous computing tends to rely on cooperation of the immediate infrastructure in the environment, but also has a tendency to centralize information, and hence, centralize authority structures. It also creates segregation, and has implications for social rights such as education and healthcare. Individuals are sorted and classified within a ubiquitous computing environment, leading to a new form of segregation. Ubiquitous computing also places emphasis on copyright law and undermines creative environments due to the controlling tendencies of authority. [15]

Wearable computing ("wearcomp") refers to portable, wearable computing technologies. Wearcomp doesn't require any special infrastructure in the environment, as the computer is self-contained and self-reliant. With sousveillant computing, it is possible for the focus of control to be more distributed rather than centralized. [16]

A free society is one which places emphasis on respect and the balance of power: in a democratic society, respect and power are shared and well distributed, whereas in a despotic community, respect and power are not shared and are restricted to the few. Increasingly, our society is confronted with the realization of a ubiquitous computing environment, with the infrastructure predicated upon sensor and surveillance systems to function despite efforts to stop such expansions. How we participate in sharing respect and power will converge with how our society conducts surveillance of its citizens, and how citizens conduct sousveillance. Equiveillance represents a harmonious balance that maximizes human freedom, individual rights as well as communal democracy. The field of personal cybernetics will converge with the fields of personal imaging and glogging (CyborgLogging), as individuals store and archive information for personal use and as a form of self-defense. [17]


Equiveillance table

Equiveillance establishes a social balance between surveillance and sousveillance, as outlined in a general series of comparisons that is known in the published literature as the "equiveillance table". [18] There are two kinds of situations that occur when this social balance does not exist: inequiveillance, in which there is a one-sided nature to surveillance (this is the most common situation), and disequiveillance, which is when the balance is not provably one-sided, but, rather, is unequal but not clearly in one or the other direction.

Inequiveillance (disequiveillance)

Equiveillance represents a balance of the power relationships that surveillance and sousveillance touch upon. When there is an imbalance, social consequences can range from loss of privacy, to social reactions that in the aggregate lead to unrest and political instability. The idea of disequiveillance is described by Paul Virilio in his treatise on Dromology and the possibility of freedom loss as an accident of our modern world and how it relates to terrorism and war. In this context, the lack of equiveillance (disequiveillance) refers to the anthropological consequences of a world filled with continuous recording devices that encourage a despotic form of government with a tendency to intrude upon the lives of its citizens. [19]

The evolving field of sousveillance, stems in part from recent research on the topic of surveillance and inverse-surveillance, shedding light on how media technology is changing our sense of privacy and human freedom. Privacy becomes increasingly a measure of freedom and its control central to personal autonomy.

Increasingly, remembering is influenced by both personal and public search engines, as computing is becoming increasingly dependent upon the human–computer interaction. The issue of being able to control the amount of personal information that escapes and is recorded in the many machines that make up evolving ubiquitous computing world stresses the importance of equiveillance. The impact of surveillance will be increasingly related to the impact of increasing computer storage space and data mining processing speed.

A 2005 article by Margaret Papandreou entitled "Is nothing Sacred" [20] also highlights the issue of disequiveillance and how the theft of personal communications with her son undermined her freedom of thought. Mrs Papandreou's personal computer was entered by hackers with malicious intent, with multiple emails, and personal information downloaded and eventually published in book form. The issue of freedom of the press, vs theft of personal property and electronic trespassing, developed into a subsequent legal action against the journalist and member of the Greek Parliament, Liana Kanelli. The issue of public vs. private space comes into the debate. The practice of spying as a political technique creates a flashback to how previous Greek politicians where undermined via covert eavesdropping and a subsequent outcome from the previous decades of the Greek Civil War. The complexity of this case becomes twofold when the person surveillanced is a concerned citizen, and not a politician. Furthermore, the issue of taking personal electronic communication out of context for political and financial gain creates the issue of disequiveillance. This can happen on a personal level, or on a larger social, or institutional level.

"The correspondence, which included e-mails, was published in late 2000 and early 2001, in the Nemesis magazine, which was run by journalist and MP Liana Kanelli. It was unclear how Kanelli laid hands on the letters, in which the US-born Papandreou advised the FM on his political career, urging him to make use of non-governmental organizations such as the Andreas Papandreou Foundation [21] [22] [23] and the Andreas Papandreou Institute for Strategic and Development Studies (ISTAME). [24] [25] Nemesis claimed Papandreou had been trying to influence Greek politics." [26]

The foundations of human freedom also are rooted in the idea of social contract. Biased comments from the conclusion of documents obtained without a search warrant, and against the principles of legal procedure create an unfair forum for judging and condemnation and expose some of the problems of how electronic freedom can be misused towards a systemic persecution and misrepresentation. It also exposes how social instability can rapidly cause a society to evolve into a prison state. Order is maintained in systematic dissolution of freedom towards a government that operates more like a prison rather than a body of persons made up of "free individuals" with an overemphasis of everyone watching everyone, with anyone becoming an informant for whatever side that may be competing for power.

Unbalanced surveillance, and disequiveillance can rapidly devolve society towards the en-masse phenomena such as racism, scapegoating and even mob reactions towards an individual. [27] It is also of importance to realize that justice is not rooted in vengeance, but rather, the law.

The Margaret Papandreou case highlights the issue of victimization through use of the media as a form of propaganda. The social emphasis of a big brother society is rapidly transitioning Balkan nations via the prevalence of [28] [29] media support of such systems with an increasingly legal disregard for individual privacy.

The issue of privacy as part of freedom is in conflict with an absolutely transparent society where all things become recorded and available. The ability to mediate one's visibility increasingly intersects with the concept of wearable computing, as a form of sheltering the individual from a world filled with recorders and sensors. The ability to control one's personal information is increasingly part of how one is to maintain one's personal and free space. Hence protecting one's privacy also intersects with the concept of sousveillance.

Related Research Articles

<span class="mw-page-title-main">Privacy</span> Seclusion from unwanted attention

Privacy is the ability of an individual or group to seclude themselves or information about themselves, and thereby express themselves selectively.

Ubiquitous computing is a concept in software engineering, hardware engineering and computer science where computing is made to appear anytime and everywhere. In contrast to desktop computing, ubiquitous computing can occur using any device, in any location, and in any format. A user interacts with the computer, which can exist in many different forms, including laptop computers, tablets, smart phones and terminals in everyday objects such as a refrigerator or a pair of glasses. The underlying technologies to support ubiquitous computing include Internet, advanced middleware, operating system, mobile code, sensors, microprocessors, new I/O and user interfaces, computer networks, mobile protocols, location and positioning, and new materials.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

<span class="mw-page-title-main">Steve Mann (inventor)</span> Professor and wearable computing researcher

William Stephen George Mann is a Canadian engineer, professor, and inventor who works in augmented reality, computational photography, particularly wearable computing, and high-dynamic-range imaging. Mann is sometimes labeled the "Father of Wearable Computing" for early inventions and continuing contributions to the field. He cofounded InteraXon, makers of the Muse brain-sensing headband, and is also a founding member of the IEEE Council on Extended Intelligence (CXI). Mann is currently CTO and cofounder at Blueberry X Technologies and Chairman of MannLab. Mann was born in Canada, and currently lives in Toronto, Canada, with his wife and two children. In 2023, Mann unsuccessfully ran for mayor of Toronto.

<i>The Transparent Society</i>

The Transparent Society (1998) is a non-fiction book by the science-fiction author David Brin in which he forecasts social transparency and some degree of erosion of privacy, as it is overtaken by low-cost surveillance, communication and database technology, and proposes new institutions and practices that he believes would provide benefits that would more than compensate for lost privacy. The work first appeared as a magazine article by Brin in Wired in late 1996. In 2008, security expert Bruce Schneier called the transparent society concept a "myth", claiming it ignores wide differences in the relative power of those who access information.

The right to privacy is an element of various legal traditions that intends to restrain governmental and private actions that threaten the privacy of individuals. Over 150 national constitutions mention the right to privacy. On 10 December 1948, the United Nations General Assembly adopted the Universal Declaration of Human Rights (UDHR), originally written to guarantee individual rights of everyone everywhere; while right to privacy does not appear in the document, many interpret this through Article 12, which states: "No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, nor to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks."

<span class="mw-page-title-main">Sousveillance</span> Recording of an activity by a participant

Sousveillance is the recording of an activity by a member of the public, rather than a person or organisation in authority, typically by way of small wearable or portable personal technologies. The term, coined by Steve Mann, stems from the contrasting French words sur, meaning "above", and sous, meaning "below", i.e. "surveillance" denotes the "eye-in-the-sky" watching from above, whereas "sousveillance" denotes bringing the means of observation down to human level, either physically or hierarchically.

The ethics of technology is a sub-field of ethics addressing the ethical questions specific to the Technology Age, the transitional shift in society wherein personal computers and subsequent devices provide for the quick and easy transfer of information. Technology ethics is the application of ethical thinking to the growing concerns of technology as new technologies continue to rise in prominence.

Computer ethics is a part of practical philosophy concerned with how computing professionals should make decisions regarding professional and social conduct.

Human-centered computing (HCC) studies the design, development, and deployment of mixed-initiative human-computer systems. It is emerged from the convergence of multiple disciplines that are concerned both with understanding human beings and with the design of computational artifacts. Human-centered computing is closely related to human-computer interaction and information science. Human-centered computing is usually concerned with systems and practices of technology use while human-computer interaction is more focused on ergonomics and the usability of computing artifacts and information science is focused on practices surrounding the collection, manipulation, and use of information.

<i>Rainbows End</i> (novel) 2006 novel by Vernor Vinge

Rainbows End is a 2006 science fiction novel by Vernor Vinge. It was awarded the 2007 Hugo Award for Best Novel. The book is set in San Diego, California, in 2025, in a variation of the fictional world Vinge explored in his 2002 Hugo-winning novella "Fast Times at Fairmont High" and 2004's "Synthetic Serendipity". Vinge has tentative plans for a sequel, picking up some of the loose threads left at the end of the novel. The many technological advances depicted in the novel suggest that the world is undergoing ever-increasing change, following the technological singularity, a recurring subject in Vinge's fiction and nonfiction writing.

<span class="mw-page-title-main">Computers, Freedom and Privacy Conference</span>

The Computers, Freedom and Privacy Conference is an annual academic conference held in the United States or Canada about the intersection of computer technology, freedom, and privacy issues. The conference was founded in 1991, and since at least 1999, it has been organized under the aegis of the Association for Computing Machinery. It was originally sponsored by CPSR.

<span class="mw-page-title-main">Anind Dey</span> Canadian academic (born 1970)

Anind Dey is a computer scientist. He is the Dean of the University of Washington Information School. Dey is formerly the director of the Human-Computer Interaction Institute at Carnegie Mellon University. His research interests lie at the intersection of human–computer interaction and ubiquitous computing, focusing on how to make novel technologies more usable and useful. In particular, he builds tools that make it easier to build useful ubiquitous computing applications and supporting end users in controlling their ubiquitous computing systems.

<span class="mw-page-title-main">Cyberethics</span>

Cyber ethics is the philosophic study of ethics pertaining to computers, encompassing user behavior and what computers are programmed to do, and how this affects individuals and society. For years, various governments have enacted regulations while organizations have defined policies about cyberethics.

<span class="mw-page-title-main">Lifelog</span> Personal record of ones daily life

A lifelog is a personal record of one's daily life in a varying amount of detail, for a variety of purposes. The record contains a comprehensive dataset of a human's activities. The data could be used to increase knowledge about how people live their lives. In recent years, some lifelog data has been automatically captured by wearable technology or mobile devices. People who keep lifelogs about themselves are known as lifeloggers.

Visual privacy is the relationship between collection and dissemination of visual information, the expectation of privacy, and the legal issues surrounding them. These days digital cameras are ubiquitous. They are one of the most common sensors found in electronic devices, ranging from smartphones to tablets, and laptops to surveillance cams. However, privacy and trust implications surrounding it limit its ability to seamlessly blend into computing environment. In particular, large-scale camera networks have created increasing interest in understanding the advantages and disadvantages of such deployments. It is estimated that over 4 million CCTV cameras deployed in the UK. Due to increasing security concerns, camera networks have continued to proliferate across other countries such as the United States. While the impact of such systems continues to be evaluated, in parallel, tools for controlling how these camera networks are used and modifications to the images and video sent to end-users have been explored.

<span class="mw-page-title-main">Digital privacy</span>

Digital privacy is often used in contexts that promote advocacy on behalf of individual and consumer privacy rights in e-services and is typically used in opposition to the business practices of many e-marketers, businesses, and companies to collect and use such information and data. Digital privacy can be defined under three sub-related categories: information privacy, communication privacy, and individual privacy.

Technoself studies, commonly referred to as TSS, is an emerging, interdisciplinary domain of scholarly research dealing with all aspects of human identity in a technological society focusing on the changing nature of relationships between the human and technology. As new and constantly changing experiences of human identity emerge due to constant technological change, technoself studies seeks to map and analyze these mutually influential developments with a focus on identity, rather than technical developments. Therefore, the self is a key concept of TSS. The term "technoself", advanced by Luppicini (2013), broadly denotes evolving human identity as a result of the adoption of new technology, while avoiding ideological or philosophical biases inherent in other related terms including cyborg, posthuman, transhuman, techno-human, beman, digital identity, avatar, and homotechnicus though Luppicini acknowledges that these categories "capture important aspects of human identity". Technoself is further elaborated and explored in Luppicini's "Handbook of Research on Technoself: Identity in a Technological Environment".

Cross-device tracking is technology that enables the tracking of users across multiple devices such as smartphones, television sets, smart TVs, and personal computers.

Cyborg data mining is the practice of collecting data produced by an implantable device that monitors bodily processes for commercial interests. As an android is a human-like robot, a cyborg, on the other hand, is an organism whose physiological functioning is aided by or dependent upon a mechanical/electronic device that relies on some sort of feedback.

References

  1. Manders, C. (2013, June). Moving surveillance techniques to sousveillance: Towards equiveillance using wearable computing. In Technology and Society (ISTAS), 2013 IEEE International Symposium on (pp. 19-19). IEEE.
  2. Weber, Karsten, Surveillance, Sousveillance, Equiveillance: Google Glasses (June 30, 2012). Available at SSRN: doi : 10.2139/ssrn.2095355
  3. Mann, S., Fung, J., & Lo, R. (2006, October). Cyborglogging with camera phones: Steps toward equiveillance. In Proceedings of the 14th annual ACM international conference on Multimedia (pp. 177-180). ACM.
  4. Weber, K. (2010). Mobile Devices and a New Understanding of Presence. In Workshop paper from SISSI2010 at the 12th annual ACM international conference on ubiquitous computing (p. 101).
  5. Zedner, L. (2008). The inescapable insecurity of security technologies?. Technologies of InSecurity: The Surveillance of Everyday Life, 257-270.
  6. Fernback, J (2013). "Sousveillance: Communities of resistance to the surveillance environment". Telematics and Informatics. 30 (1): 11–21. doi: 10.1016/j.tele.2012.03.003 .
  7. Hadjiyanni, T., Papanikolopoulos, N., Gopinath, A., & Willow, D. (2010, June). Socializing Surveillance: An interdisciplinary educational model. In Control & Automation (MED), 2010 18th Mediterranean Conference on (pp. 179-184). IEEE.
  8. "Exporing Equiveillance". Wearcam.org. 2003-07-17. Retrieved 2013-11-26.
  9. Houwing, Lotte, and Gerard Jan Ritsema van Eck. "Police Bodycams as Equiveillance Tools?: Reflections on the Debate in the Netherlands." Surveillance & Society 18.2 (2020): 284-287.
  10. Inverse Surveillance AI, The Asimov Institute, 2021.
  11. Gray, Chris Hables, Heidi Figueroa-Sarriera, and Steven Mentor, eds. Modified: Living as a Cyborg. Routledge, 2020.
  12. Michael, M. G., ed. Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies: Emerging Technologies. IGI Global, 2013.
  13. Bakir, Vian. "Spaces of Surveillance: States and Selves Afterword." Spaces of Surveillance: States and Selves (2017): 245-259.
  14. Spinner, Melissa. "The Effects of Social Media on Democratization." (2012).
  15. Mayer-Schönberger, Viktor. "Useful void: The art of forgetting in the age of ubiquitous computing." (2007).
  16. Fernback, Jan. "Sousveillance: Communities of resistance to the surveillance environment." Telematics and Informatics 30.1 (2013): 11-21.
  17. Ferenbok, Joseph, Steve Mann, and Katina Michael. "The changing ethics of mediated looking: Wearables, veillances, and power." IEEE Consumer Electronics Magazine 5.2 (2016): 94-102.
  18. "Proceedings of the Association for Computing Machinery Multimedia (MM) 2004, page 620-627". Eyetap.org. Retrieved 2013-11-26.
  19. Bronitt, Simon; Michael, Katina (2012). "Human rights, regulation, and national security". IEEE Technology and Society Magazine. 31 (1): 15–16. doi:10.1109/mts.2012.2188704. hdl: 10072/49280 .
  20. "Sousveillance Blog: IS NOTHING SACRED? By Margarita Papandreou". Archived from the original on March 17, 2006. Retrieved December 26, 2005.
  21. "/ Andreas G. Papandreou Foundation \". Agp.gr. 2005-04-28. Archived from the original on 2012-07-17. Retrieved 2013-11-26.
  22. "/ Andreas G. Papandreou Foundation \". Agp.gr. Archived from the original on 2012-07-17. Retrieved 2013-11-26.
  23. "/ Andreas G. Papandreou Foundation \". Agp.gr. 2005-04-22. Archived from the original on 2012-07-17. Retrieved 2013-11-26.
  24. Archived December 18, 2005, at the Wayback Machine
  25. Archived December 13, 2004, at the Wayback Machine
  26. "[Neolea] Article from Hellas". Archived from the original on 2004-03-10. Retrieved 2005-12-26.
  27. "The Mobbing Encyclopaedia". Leymann.se. Archived from the original on 2013-09-27. Retrieved 2013-11-26.
  28. "TV AND RADIO | Ban on Greek Big Brother overturned". BBC News. 2002-03-22. Retrieved 2013-11-26.
  29. "Athens News Agency: Daily News Bulletin in English, 01-03-03". Hri.org. 2001-03-05. Retrieved 2013-11-26.