Internet of Things: A Mass Surveillance Infrastructure

paxtechnica.jpg

The Internet of Things may set us free of lock us up, according to Philip Howard

The word “thing”, in Old English, means a meeting or assembly. In the epic poem Beowulf, the eponymous hero declares he’ll “alone hold a thing” with the monster Grendel, who is terrorising the Danes in the great hall of Heorot. Beowulf uses “thing” euphemistically – it is a meeting that immediately descends into a fight.

The Icelandic parliament is still called Althing (Alþingi). But over the ages, “things” have gradually evolved from meetings to matter. Today, we primarily use the term “thing” to refer to objects. Even in this sense, however, things are still core to our political and social lives.

An appreciation that things have always been about community and politics, whether literally, or through the creation and respect of systems of private property, provides a useful backdrop to the recent book, Pax Technica: How the Internet of Things May Set Us Free or Lock Us Up, by writer and professor of communication, Philip N Howard.
Howard’s thesis is that the much-hyped Internet of things - the expanding network of connected devices throughout our homes, bodies, streets and communities - heralds a new political age he calls “Pax Technica”.

This Pax will not be dominated by any one state, Howard argues, but by “a special kind of stability in global politics, revealing a pact between big technology firms and government”. The categories of democracy and dictatorship will fall. In their place, he claims, will be data-driven socio-technocracies, built on the intensive reporting of our behaviours, habits, tastes and beliefs, seamlessly transmitted by the devices we use, carry and interact with. We won’t need to express our political preferences and needs: our white goods and driverless cars will express them for us.
‘The most powerful political tool ever created’
Howard is excited by this vision; excited by two decades of work with communities empowered by social media; excited by the possibility to reinsert what he sees as civic counter power into device networks. I am not excited by it – I am terrified, and let me explain why.
The arc of Howard’s argument is that an open, interoperable, global network means that “every dictator will face embarrassing videos he cannot block and outrage he cannot respond to”, and every region in crisis or transition will involve “people using digital media to try to improve their conditions, to build new organisations, and to craft new institutional arrangements”.
The consequence, he submits, is “the most powerful political tool ever created”.
Howard adopts a playbook that is indistinguishable from the freedom-to-connect narrative fronted by US big tech and government – the valorisation of openness, interoperability, and disruptive innovation by private companies; the demonisation of repressive regimes; and a superficial view of political economy, international relations, and institutional corruption.
The argument is bolstered with an impressive array of case studies of citizen-led activism and coordination through mobile phones and social media. Inspiring stuff, certainly, but far from fully-worked examples of stable, enduring, empowering governance.

Howard fails to get out of the gates on the Internet of things. Apart from general hand waving to big data-enabled improvements in health, energy, environment and finance, he provides no convincing argument for the huge corporate and governmental data heist that will be enabled by networking everything in our physical environment, from our toasters to our coffee machines to our town squares. He claims that device networks will solve collective action problems, but there is little to show how this connectivity will empower the citizenry, as opposed to creating the greatest mass surveillance infrastructure ever conceived.

Howard acknowledges the dangers of surveillance, but he offers no opt-out. His solution to nefarious parties obtaining data is to just give out more data - to civic groups that he blithely assumes will organise and operate in the public good.
In this, he appears a convert to the church of big data; the computational theocracy. “Data will help us track good trends, monitor bad behaviour, and make reasoned decisions”, Howard claims. The world’s problems are all soluble, in other words, if only we have ever-more data and handfuls of networked citizen-analysts, thrown in amongst the vast machine of corporate and governmental data-miners.
Worryingly, Howard offers no challenge to the proposition that networked things will all communicate, seemingly by default, with “the original manufacturer, the information services we subscribe to, national security agencies, contractors, cloud computing services, and anyone else who has broken into, or been allowed into, the data stream”.
A nebulous trade-off
And the reason we ought to accept this unpalatable, feudal state of affairs? The lures of big data, and the venerated openness of the network. Your toaster is hackable, yes (as may be the rest of these smoking guns in your city), but at the same time, in a nebulous trade-off, with “dictators dying off and the data trail of bad behaviour growing, the biggest dirty networks are on the brink of collapse”. And when the “modern state fails, the internet of things will provide governance”, Howard asserts, unconvincingly.

By tracking us in intensive and intrusive ways – not only in our homes, but in our vehicles and bodies – data-driven devices can nudge, manipulate and mould our behaviours, habits and preferences, limit our autonomy, and bring quantification, segregation and discrimination to what is currently a political economy held together by social fuzziness.
This fuzziness assists us individually – because we have control over who has, and importantly who does not have, personal information about us. But it is also important socially, unless we want to turn into an intensely individualistic, segmented, micro-financialised network of semi-autonomous, tethered beings.
We deserve a smarter solution that offers more than empty marketing rhetoric for “open”, “inclusive” monopolistic big tech business models.

At worst, it’s a terrifying blueprint for the end of politics, depoliticising our engagement with “things”, characterising the objects and relations that furnish our lives as “loss leaders for data flows” – data flows that offer nothing for us, and everything for a staggering, uncontrolled array of corporate and governmental actors.
Guardian: http://bit.ly/1KtDA3x

« Avoid Hiring a Cybercriminal: understand motivations & thoroughly vet employees
US vs Hackers: Still Losing »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Bromium

Bromium

Bromium deliver a new technology called micro-virtualization to address the enterprise security problem and provide protection for end users against advanced malware.

Cast Software

Cast Software

CAST is a pioneer in Software Analysis and Measurement (SAM) to capture and quantify the reliability and security of business applications.

Gatewatcher

Gatewatcher

Gatewatcher is a digital breach detection platform targeting crafted attacks and protecting organizations against advanced cyber threats.

Cybernetica

Cybernetica

Cybernetica is an ICT company with activities in e-government, marine comms, data analysis and research in information security technologies.

Greenbone Networks

Greenbone Networks

Greenbone Networks delivers a vulnerability analysis solution for enterprise IT which includes reporting and security change management.

Raytheon Technologies

Raytheon Technologies

Raytheon Intelligence & Space delivers solutions that protect every side of cyber for government agencies, businesses and nations.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

BigWeb Technologies

BigWeb Technologies

BigWeb Technologies is dedicated to provide its clients with ICT related services including Infrastructure Solutions, Consultancy and Security.

Red Alert Labs

Red Alert Labs

Red Alert Labs is an IoT security provider. We created an independent security lab with a disruptive business offer to solve the technical and commercial challenges in IoT.

Space ISAC

Space ISAC

Space ISAC is the only all-threats security information source for the public and private space sector.

Elisity

Elisity

Elisity Cognitive Trust is a new security paradigm that combines Zero Trust Network Access and an AI-enabled Software Defined Perimeter.

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity

Rocky Mountain Cybersecurity's mission is to provide value by dramatically improving the cybersecurity posture of our clients and business partners.

Lansweeper

Lansweeper

Lansweeper is an IT Asset Management platform provider helping businesses better understand, manage and protect their IT devices and network.

Sunnic

Sunnic

Sunnic is a leading provider of comprehensive digital data security technology.

AppSOC

AppSOC

AppSOC is a leader in Application Security Posture Management (ASPM) and Code-to-Cloud Vulnerability Management.

Decent Cybersecurity

Decent Cybersecurity

Decent Cybersecurity is a forerunner and proven partner in the field of cybersecurity, utilizing AI, post-quantum cryptography and quantum resistant blockchain for data protection enhancement.