Is Technology Undermining Democracy?

Is technology undermining democracy? Do we ever really know how we arrive at our political views?

The pixelated vision of the near future offered in Jamie Bartlett’s new book would suggest that, as we continue to submerge into evermore complex and determinate technological systems, knowing the answer to such questions will become even more difficult.

As well as our concepts and theories, our democratic structures were, Bartlett points out, just not built for the types of technological shifts we are experiencing. Algorithms, cryptocurrency, data targeting, techno monopolies and the like, have changed the game. The result, he argues here, is that technology has now come to undermine a number of the ‘fundamental components of a functioning political system’. The tension between technology and democracy is reaching a new boiling point.

Where his previous book Radicals was about the extremes of politics, and how they sometimes worked their way into mainstream thought, this book by-passes the margins and deals directly with the center field. Following the recent debates around the use of social media data, it’s hard to imagine a timelier book. It zips along, covering the six pillars of democracy, as it is described, and imagining the tensions arising in each. Following a conclusion, the epilogue of the book moves from diagnosis to prescription, offering some potential ways of addressing the problems democracy faces.

The magnitude and severity of the challenges outlined in the earlier chapters mean that the solutions have quite a hill to climb.

The potential solutions are welcome and act as an antidote to the rising fear that the chapters provoke, yet despite their intended hopefulness they seem to underline the magnitude of the problems themselves. The suggestion around policing the algorithms seems to understate the problem and the suggestions around the taxation of robots seems unenforable. There remain though a number of ideas that seem to cut through; the ‘Universal Training Income’ is innovative, the focus on capital seems viable, and the more human and individual actions suggested are where the book offers its richest guide to the future.

In all of this Bartlett’s central concern is with growing inequality. By the end, you can see exactly why he is worried. The growing elite of techno capitalists are gaining unforeseen powers to determine online encounters and more. As Bartlett argues, when we consider these growing tech monopolies we should worry about the assumptions, ideas and futures upon which their victories are based. The destruction of jobs and of alternatives social structures leaves a field in which, as Bartlett notes, the few will achieve whatever they want and everyone else will be left to flounder. This power is couched in a more progressive type of rhetoric.

As Bartlett adds, ‘the worse these companies behave and the richer they become, the more they spend on looking cool and talking about fairness and community’.

This is why Bartlett turns to the classic concepts of hegemony and the panopticon in his book — they capture the advancing dominance of certain ideologies and the self-regulating surveillance that work in tandem in these power dynamics. Gramsci and Foucault don’t fully rear their heads, but there is enough to give some sense of the features that cut-across these platforms. Alongside this, the rise of what he calls ‘re-tribalistion’, where we are drawn towards those like us in online spaces, means that collective resistance to this power becomes difficult — we are too dispersed and distanced across these distributed networks.

Arriving at this volume, we could wonder what is really left to be said about technology and democracy.

The combination of the changing ways in which technology is being used to intervene in democracy, which has found a new purpose with the increases in data, and the way that Bartlett is able to navigate through some wide ranging terrain, mean that this book still brings a freshness of perspective.

Mixing together broader and sometimes familiar shifts in technologies with interviews and behind-the-curtain observations — made from visits to data campaign teams, silicon valley locations, venture capitalists and even Cambridge Analytica — the book offers plenty of moments of intrigue and insight.

The way Bartlett weaves blockchain into the discussion of political disruption, for example, is typical of the type of unusual perspective that the book brings.

From these provocations it becomes clear that there is still much more to be said about these long evolving relations. There is also a pressing need to reflect on the possible solutions.

The People Vs Tech by Jamie Bartlett (Ebury Press, Penguin ISBN: 978-1785039065)

David Beer is Reader in Sociology at the University of York

You Might Also Read:

The Cambridge Analytica Row Shows Politics Are Moving In A Disturbing Direction:

 

« Senior IT Execs Admit Cyber Threats Are Out Of Control
GDPR: It’s A Marathon, Not A Sprint »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Duane Morris LLP

Duane Morris LLP

Duane Morris is a global law firm with offices in the USA, UK and Asia. Practice areas include Cybersecurity.

WatchGuard

WatchGuard

WatchGuard is a leader in network security, secure Wi-Fi, and network intelligence products and services for SMBs and Enterprises worldwide.

Agenci

Agenci

Agenci are specialists in cyber security and information security and deliver ISO 27001 Certification.

CONCERT

CONCERT

CONCERT is a Computer Emergency Response Team and cyber security information sharing network for companies, institutes and government in Korea.

PETRAS IoT Hub

PETRAS IoT Hub

PETRAS is a consortium of 12 research institutions and the world’s largest socio-technical research centre focused on the future implementation of the IoT.

Zettaset

Zettaset

Zettaset’s XCrypt Data Encryption Platform delivers proven protection for Object, Relational/SQL, NoSQL, and Hadoop data stores…in the cloud and on-premises.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Wise-Mon

Wise-Mon

Wise-Mon is expert in its field of network monitoring and control. We give solutions to huge organizations with tens of thousands of ports, as well as small companies with one switch.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

WhiteHawk

WhiteHawk

WhiteHawk is the first online Cyber Security Exchange. We help you understand your cyber risk and match you to tailored and affordable solutions.

CyberLab

CyberLab

CyberLab (formerly Chess) is a specialist cyber security company that provides a wide range of security solutions and services.

Nitrokey

Nitrokey

Nitrokey is the world-leading company in open source security hardware. Nitrokey develops IT security hardware for data encryption, key management and user authentication.

Open Quantum Safe (OQS)

Open Quantum Safe (OQS)

The Open Quantum Safe (OQS) project is an open-source project that aims to support the development and prototyping of quantum-resistant cryptography.

Winmill Software

Winmill Software

Winmill is a technology services company that provides expert consulting services in Application Development, Application Security and Cyber Security.

Mirai Security

Mirai Security

Mirai Security are a cyber security company that specializes in Governance, Risk Management and Compliance, Cloud Security and Application Security.

Stack Identity

Stack Identity

Stack Identity protects access to cloud data by prioritizing identity and access vulnerabilities via a live data attack map.