Freedom Under Surveillance
By Kenny Sage
()
About this ebook
We live in an observation society and consistently have. Different associations track our day-to-day exercises, and frequently with the assistance of geospatial advancements including cell phones, satellite remote detecting, and complex planning frameworks.
The act of following populaces isn't new. Legislatures specifically have long led reconnaissance of people and gatherings for a long time, even though they have been joined by a large group of organisations and different gatherings. For the majority of mankind's set of experiences, be that as it may, reconnaissance was restricted in scope since it required a great deal of HR. The approach of PCs and registering networks has tremendously extended the capacity of government organisations, business firms, and different associations to screen a huge number of individuals.
Kenny Sage
Kenny Sage is a poet, an educator, and the author of 6 books, Blockchain Legacy, Path to Freedom, Two Ways to Heaven, The Path of True Leadership and The Birth & Rise Of Technological Singularity. When he is not writing on his kitchen table, Kenny spends most of his time reading, self development, and researches in science and technology.
Related to Freedom Under Surveillance
Related ebooks
Agency: The Four Point Plan (F.R.E.E.) for ALL Children to Overcome the Victimhood Narrative and Discover Their Pathway to Power Rating: 5 out of 5 stars5/5Quantum Leap Thinking: An Owner's Guide to the Mind Rating: 4 out of 5 stars4/5Bridge Makers: Becoming a Citizen Futurist Rating: 0 out of 5 stars0 ratingsGeneration Hope: How Inclusive Economics Can Help Us All Thrive Rating: 0 out of 5 stars0 ratingsVoice and Agency: Empowering Women and Girls for Shared Prosperity Rating: 1 out of 5 stars1/5Wealth Watchers: A Simple Program to Help You Spend Less and Save More Rating: 3 out of 5 stars3/5Winning Practices of a Free, Fit, and Prosperous People Rating: 0 out of 5 stars0 ratingsPenetration Tester's Open Source Toolkit Rating: 0 out of 5 stars0 ratingsBreach: How the Next Generation Are Consciously Disrupting the World Rating: 0 out of 5 stars0 ratingsHustle Kulcha: From Street Smarts to Boardroom Strategies summary Rating: 0 out of 5 stars0 ratingsA Time for Wisdom: Knowledge, Detachment, Tranquility, Transcendence Rating: 1 out of 5 stars1/5How Oneness Changes Everything: Empowering Business Through 9 Universal Laws Rating: 0 out of 5 stars0 ratingsStrategies for Protecting National Critical Infrastructure Assets: A Focus on Problem-Solving Rating: 0 out of 5 stars0 ratingsDisconnect to Connect: Tap into the Power within You to Create the Life You Desire Rating: 0 out of 5 stars0 ratingsUnshaken: Navigating Jealousy in the Social Media Age Rating: 0 out of 5 stars0 ratingsCashSmart for Life: Every Parent's Guide To Raising Financially Successful Kids: Every Parent's Guide: Every Parent's Rating: 0 out of 5 stars0 ratingsA Long, Dark Shadow: Minor-Attracted People and Their Pursuit of Dignity Rating: 3 out of 5 stars3/5The CEO's Digital Survival Guide: A Practical Handbook to Navigating the Future Rating: 0 out of 5 stars0 ratingsOver The Hill But Not Under It - Essays On Aging and Caregiving Rating: 0 out of 5 stars0 ratingsEssays in Criminology Rating: 0 out of 5 stars0 ratingsCurrent Affairs January 2023 to June2023: 1 Rating: 0 out of 5 stars0 ratingsGlobal Matters: Inspirational stories from leaders influencing the future of business, culture and education Rating: 0 out of 5 stars0 ratingsDisinformation and You: Identify Propaganda and Manipulation Rating: 0 out of 5 stars0 ratingsGenre et fondamentalismes/Gender and Fundamentalisms Rating: 0 out of 5 stars0 ratingsMorals in Trade and Commerce Rating: 0 out of 5 stars0 ratingsThe Lessons of History: Observed: Change Your Context - Change Your Life Rating: 0 out of 5 stars0 ratingsFreedom’s Pursuit: The Fundamentals Rating: 0 out of 5 stars0 ratingsThe Stone Mover: Awakening and Empowering the Advocate in All of Us Rating: 0 out of 5 stars0 ratingsThe Journey: The Start of a Conversation and a Guide Toward Our Future Prosperity Rating: 0 out of 5 stars0 ratingsTime for Harvest: Women and Constitution Making in Kenya Rating: 0 out of 5 stars0 ratings
Teaching Methods & Materials For You
Speed Reading: How to Read a Book a Day - Simple Tricks to Explode Your Reading Speed and Comprehension Rating: 4 out of 5 stars4/5LSAT For Dummies (with Free Online Practice Tests) Rating: 4 out of 5 stars4/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5Speed Reading: Learn to Read a 200+ Page Book in 1 Hour: Mind Hack, #1 Rating: 5 out of 5 stars5/5How to Take Smart Notes. One Simple Technique to Boost Writing, Learning and Thinking Rating: 4 out of 5 stars4/5Fluent in 3 Months: How Anyone at Any Age Can Learn to Speak Any Language from Anywhere in the World Rating: 3 out of 5 stars3/5Weapons of Mass Instruction: A Schoolteacher's Journey Through the Dark World of Compulsory Schooling Rating: 4 out of 5 stars4/5Jack Reacher Reading Order: The Complete Lee Child’s Reading List Of Jack Reacher Series Rating: 4 out of 5 stars4/5The Success Principles(TM) - 10th Anniversary Edition: How to Get from Where You Are to Where You Want to Be Rating: 4 out of 5 stars4/5Personal Finance for Beginners - A Simple Guide to Take Control of Your Financial Situation Rating: 5 out of 5 stars5/5How to Think Like a Lawyer--and Why: A Common-Sense Guide to Everyday Dilemmas Rating: 3 out of 5 stars3/5Better Grammar in 30 Minutes a Day Rating: 3 out of 5 stars3/5The 5 Love Languages of Teenagers: The Secret to Loving Teens Effectively Rating: 4 out of 5 stars4/5The 5 Love Languages of Children: The Secret to Loving Children Effectively Rating: 4 out of 5 stars4/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5Grit: The Power of Passion and Perseverance Rating: 4 out of 5 stars4/5Financial Feminist: Overcome the Patriarchy's Bullsh*t to Master Your Money and Build a Life You Love Rating: 5 out of 5 stars5/5How To Do Motivational Interviewing: A guidebook for beginners Rating: 5 out of 5 stars5/5How You Learn Is How You Live: Using Nine Ways of Learning to Transform Your Life Rating: 4 out of 5 stars4/5Everything You Need to Know About Personal Finance in 1000 Words Rating: 5 out of 5 stars5/5Principles: Life and Work Rating: 4 out of 5 stars4/5The Chicago Guide to Grammar, Usage, and Punctuation Rating: 5 out of 5 stars5/5Good to Great: Why Some Companies Make the Leap...And Others Don't Rating: 4 out of 5 stars4/5The Lost Tools of Learning Rating: 5 out of 5 stars5/5The Science of Making Friends: Helping Socially Challenged Teens and Young Adults Rating: 5 out of 5 stars5/5Lies My Teacher Told Me: Everything Your American History Textbook Got Wrong Rating: 4 out of 5 stars4/5From 150 to 179 on the LSAT Rating: 4 out of 5 stars4/5
Reviews for Freedom Under Surveillance
0 ratings0 reviews
Book preview
Freedom Under Surveillance - Kenny Sage
Freedom is the right to live as we wish
-Epictetus-
Acknowledgment
I would like to express my heartfelt gratitude to my late grandmother, Mrs. Kamara. Though she is no longer with us, she has been the guiding light throughout my journey. Since I was a child, she always encouraged me to speak my mind and never remain silent about matters of importance. Her wisdom and support continue to inspire me.
I am also immensely grateful to my loving wife, Ann Fonseka. Her unwavering commitment and loyalty to me and my dreams have been a constant source of strength over the years. Her belief in me has propelled me forward in pursuing my goals.
I would also like to acknowledge my father, Sam, whose influence has been instrumental in shaping my educational journey. His emphasis on continuous learning and his perspective on life have instilled in me the courage to persevere.
To all of them, I offer my deepest appreciation for their unwavering support and belief in me.
I am also thankful to my wife's mother, Mary Sajeewani Fernando , who has been a pillar of love and encouragement in our lives. Her unwavering support and belief in my abilities have been invaluable. She has always pushed me to strive for excellence and has been my biggest cheerleader. I am grateful to my friends who have stood by my side throughout this journey. Their encouragement, advice, and companionship have made this experience more meaningful and enjoyable. Their belief in my capabilities has motivated me to push beyond my limits.
I would also like to acknowledge the guidance and mentorship provided by my teachers, professors, and academic advisors. Their knowledge and expertise have shaped my intellectual growth and played a crucial role in my development as a researcher and scholar.
Lastly, I express my gratitude to all the participants and individuals who have contributed to my research. Their willingness to share their experiences and insights has been invaluable in advancing my understanding and generating meaningful findings.
To all those mentioned and the countless others who have supported me along the way, I offer my heartfelt thanks. Your belief in me and your unwavering support have been instrumental in my journey, and I am forever grateful.
Content
Introduction: Body, Soul, and Credit Card............................................................................6
Surveillance in Modern Society ................................................................................8
The Social Impact of Technology ...............................................................................9
Technology and Totalitarianism ...............................................................................11
The Problem of Privacy .....................................................................................12
Personhood and Postmodernity................................................................................14
Chapter 2: Surveillance in Modern Society ..........................................................................17
A Prehistory of Surveillance..................................................................................17
Surveillance and Modernity...................................................................................18
The Military, War and Modern Surveillance.......................................................................20
The Nation-State and Modern Surveillance........................................................................22
Capitalism and Modern Surveillance............................................................................25
Surveillance, Modernity and Beyond ............................................................................28
Chapter 3: New Surveillance Technologies...........................................................................30
The Difference Technology Makes..............................................................................31
What Do Computers Do?....................................................................................33
New Technology and Surveillance Capacity........................................................................37
New Technologies: New Surveillance?............................................................................38
New Surveillance: Evidence and Debate .........................................................................40
Chapter 4: Challenging Surveillance...............................................................................41
The Challenge of Surveillance.................................................................................42
The Challenge to Surveillance: I Privacy Law....................................................................47
The Challenge to Surveillance: Il Social Movements .....................................50
Beyond the Watershed......................................................................................52
Chapter 5: The Transparent Worker...............................................................................54
The Watched Workplace.....................................................................................55
Taylorism and Technology ...................................................................................57
Towards Disorganized Surveillance?............................................................................59
The Transparent Worker....................................................................................61
Computer-Intensified Surveillance..............................................................................62
Post-Fordism, Disorganized Surveillance and Beyond ...................................................64
Chapter 6: The Targeted Consumer................................................................................67
Junk Mail Marketing.......................................................................................67
Taylorism Transposed?......................................................................................68
The Domestic Threshold.....................................................................................70
New Skills for Surveillance?: Caller ID and Smart Cards .................................75
Data Entrepreneurs and Strategic Information.....................................................................77
Commercial Surveillance Capacities.............................................................................79
Consumerism and Surveillance Theory...........................................................................80
Chapter 7: Government Surveillance of Citizens ..................................................83
List of the Pros of Government Surveillance ......................................................................83
List of the Cons of Government Surveillance ..................................................................84
RIGHT TO PRIVACY AND FREEDOM FROM SURVEILLANCE ...................86
Freedom VersusSecurity ......................................................................................
The Exploration of Human Existence: Bodies, Souls, and the Digital Age
In the realm of human existence, the multifaceted aspects of our being, encompassing bodies, souls, and the increasingly influential passport aspect,
demand attention. This work delves into the social dimensions that underpin our relationships and transactions, excluding only the most intimate and familial connections. Passports allow us to traverse borders, while driver's licenses serve as proof of identity. In the modern era, our lives are intertwined with interactions with strangers, necessitating the production of documentation to validate our reliability and identity. It is as if the Russian proverb has evolved to describe humans as body, soul, and credit card.
However, there is a flip side to this interconnectedness. Many organizations perceive us merely as encoded sequences of numbers and letters. In the past, this information was recorded on paper, organized in files, and stored in cabinets. Now, these tasks, once unimaginable to a Victorian clerk, are effortlessly executed by computers. The vast databases maintained by corporations and government entities house intricate details about our lives that are accessible, storable, retrievable, and processable. This pervasive phenomenon is what defines surveillance society.
While it may not entail actual spying, the comprehensive nature of the information amassed about individuals can leave many with a sense of being scrutinized. We find ourselves unaware of what is known about us, the reasons behind it, and the extent of its dissemination. What implications does this have for our sense of identity, opportunities in life, and privacy? How does it impact democracy, political power, freedom, and social control? These profound questions serve as the focal point of this book.
In a limited sense, the electronic component of surveillance is not entirely new. Monitoring and various forms of covert data acquisition have long been the currency of intelligence services and espionage. Yet, this book directs attention to the fact that ordinary people now find themselves perpetually under surveillance
in their day-to-day existence. What was once considered exceptional has become the norm. Highly specialized agencies employ increasingly sophisticated methods to routinely collect personal data, rendering us all subjects of surveillance and potential suspects.
Surveillance has permeated our routine activities, woven into the fabric of everyday life. Withdrawing money from an automated teller machine, making phone calls, applying for medical benefits, or driving a car all fall within this realm. Even seemingly innocuous acts like receiving junk mail, borrowing books from the library, embarking on international journeys, or conducting credit card transactions leave behind a trace of our actions. Computers record these transactions, cross-referencing them with other details to ensure accuracy in billing and payment. They store fragments of our personal information, assessing our legal, financial, and national standing.
The mediation of these relationships by computers and their associated communication systems has become an integral part of modern society, where participation necessitates acceptance of electronic surveillance.
This gradual transformation did not occur overnight; it is essential to trace the historical trajectory of the surveillance society. Understanding the present situation requires a deep examination of the long-term context. Governments began registering births, deaths, and marriages, while businesses started maintaining meticulous records of employee progress and compensation. Surveillance has expanded alongside these developments. What is unfolding today goes beyond mere bureaucracy; it reflects a complex web of information management by bureaucratic agencies, keeping track of diverse groups and populations. Surveillance intertwines with our compliance with the prevailing social order, serving as a potent tool of social control.
Surveillance systems also serve to ensure that we receive the appropriate welfare benefits and timely compensation. They are designed to combat terrorism and drug trafficking, safeguard our health, facilitate accessible elections, and enable the convenience of cashless transactions through plastic cards. These achievements contribute to the enhanced quality of life in modern society. However, surveillance is not a dichotomy of good or bad. Consequently, numerous concerns arise regarding the storage and processing of personal data within computer databases.
The exploration of human existence in the digital age demands an examination of the intricate interplay between bodies, souls, and the ever-present credit card. It necessitates a comprehensive understanding of the ramifications of surveillance on our lives, society, and the broader human experience.
The Subtle Expansion of Surveillance: Unseen, Yet Pervasive
Surveillance has a knack for gradually expanding its reach through processes and decisions aimed at achieving goals such as efficiency and productivity. Its electronic nature further amplifies its subtlety, as the majority of surveillance occurs in the realm of unseen digital signals. Everyday activities like shopping, voting, and driving serve as the backdrop for surveillance, without individuals being aware of being monitored or having a comprehensive understanding of the extent of knowledge about them.
While modern surveillance initially took root within institutions like the military, corporations, and government departments, it has now seeped into every aspect of our lives. I personally experienced this when I traveled from the UK to Singapore. I couldn't fully integrate into Singaporean society without our information being transferred to multiple electronic databases. The process began upon my arrival at Changi Airport, where we underwent Employment and Immigration Control, entering my details into the computer before proceeding to Singapore. Once settled in Singapore, while myself and my ex partner enjoy cycling, navigating without a car is challenging, so we acquired a pass that once again linked our records through computer systems. Surprisingly, shortly after our arrival, we began receiving personalized
advertising mail, indicating that other computers held information about us. This data was sourced from the phone company, which compiles and sells vital facts about individuals. Similar practices extend beyond the telecommunications sector to various other agencies.
Even during the process of traveling to Indonesia, electronic verification became a requirement. Ferry ship companies demanded details associated with our passport numbers. This verification enabled them to ascertain our citizenship status, whether we were permanent residents or temporary workers. Participation in modern life hinges on our relationship with computer databases. The processing of our personal information relies not only on professional experts or bureaucratic systems that have become integral to this century's way of life but also on electronic storage and communication devices. How does this impact our social, political, and cultural existence? This fundamental question leads us to engage in various significant debates, often spanning disciplinary boundaries that are typically distinct. The following debates will be explored in this book, demonstrating how they converge to provide a comprehensive understanding of the implications and dimensions of the surveillance society. Sociology's brilliance and utility lie in its ability to situate specific trends and events within a broader historical and structural context. This enables us to discern short-term deviations from norms and long-term shifts in existing conditions. It helps us distinguish between socially significant matters and trivial or transient ones. The aim of this book is to contextualize electronic surveillance, in a broad sense rather than just limiting it to security and intelligence,
within such a communal and historical framework. We will delve into its origins, assess what, if anything, is genuinely novel about it, explore its forecasts and broader implications, and consider suitable responses to its development. This approach becomes evident as we explore the multitude of debates surrounding electronic surveillance.
Surveillance in Modern Society
The Evolution of Surveillance in Sociological Discourse
Surveillance was not a prominent topic in sociological discourse until about a decade ago. While James Rule's seminal study, Private Lives and Public Surveillance,
published in the early 1970s, quickly became a standard text in the field, it was the work of Michel Foucault that truly propelled surveillance into the realm of serious consideration among mainstream sociologists. Foucault's celebrated and controversial historical study of surveillance and discipline sheds new light on its significance. In contrast to viewing surveillance as solely a reflection of capitalism (monitoring workers in factories) or the nation-state (keeping tabs on citizens), scholars like Anthony Giddens emphasize its role as a generator of power.
Within the sociological canon, numerous studies have dealt with processes closely linked to surveillance, drawing from two primary traditions: the Marxian and the Weberian. Karl Marx's emphasis on leadership as part of the struggle between capital and labor reveals how managerial control over finances perpetuates surveillance. Max Weber, on the other hand, focuses on how modern organizations store and retrieve data in the form of files, which aligns with his pursuit of efficient bureaucratic practices. These files often contain personal information, enabling organizations, particularly government administrators, to monitor populations.
Foucault's contributions to surveillance theory further expand our understanding. He argued that modern societies have developed rational mechanisms for ordering organizations, replacing brutal public punishments. Contemporary social institutions rely on a range of disciplinary practices to ensure a consistent and patterned existence, minimizing reliance on external constraints and controls. This can be observed in various contexts, from military drills and school uniforms to social welfare casework and the tightly regulated tasks of factory workers. Others have extended Foucault's analysis to explore how women dress to conform to societal expectations in male-dominated environments, illustrating the ways individuals collaborate and conspire with those in positions of control.
Each modern institution is strengthened by specialized knowledge, which gradually colonizes larger areas of private life. Foucault argues that the categories and classifications imposed on people—such as the time taken to perform a task, raise a rifle, or calculate crime or health risks—create sharper distinctions between acceptable and unacceptable behavior. This establishes a social order by defining the normal
human being, shaping individuals as subjects or objects.
Foucault's involvement in surveillance research is intriguing and paradoxical. Despite Rule's meticulous empirical studies on surveillance, it was Foucault, known for his disregard of data, who sparked the debate. Notably, he remained silent on the computer, the pinnacle of rational classification, which accelerates monitoring of everyday routines and objectifies people.
However, it is possible to apply Foucault's analysis to the social role of information technology, leading to a wide range of plausible interpretations that have sparked further controversy.
Many commentators have eagerly associated Foucault's concept of the Panopticon prison with electronic surveillance. While some apply it to specific social milieus, such as industrial organizations, others see the potential contours of a new social formation as akin to Marx's description of the mode of production. Some even entertain the notion that computers can process all human data, a view I find absurd. Even milder interpretations raise questions about resistance and what forms of organization can be mobilized in the face