Mass Surveillance in Cyberspace and the Lost Art of Keeping a Secret - Policy Lessons for Government After the Snowden Leaks

Global security concerns, acts of terrorism and organised crime activity have motivated nation states to delve into implementing measures of mass surveillance in cyberspace, the breadth of which was partly revealed by the whistleblower Edward Snowden. But are modern nation states fighting a battle in the wrong space? Is mass surveillance of cyberspace effective and are the conventional metaphors of technology control appropriate for it? Can algorithms detect, classify and decide effectively on what constitutes suspicious activity? We argue that as cyberspace is a construct that has only recently been viewed strategically, let alone indoctrinated (the UKs cyber-security strategy is only four years old), the societal impact of such bulk measures is yet much unclear – as are the assumptions about the fitness of state organisations that are charged with their oversight and the potential for unintended consequences. Recent experiences highlight the role of multiple forms of intelligence inputs, especially human- and community-based, and the need for application of such intrusive measures in a targeted manner. We believe that intrusive measures, where necessary, must be used decoupled from the seductive promises of advanced technology and ought to go hand-in-hand with means that strengthen the affected communities to identify, report and battle extremism and organised crime, in ways that safeguard the fundamental principles of our contemporary democratic Western states.

[1]  Jason Ditton,et al.  Crime and the City , 2000 .

[2]  K. Schwalm National Strategy to Secure Cyberspace , 2006 .

[3]  M. Kuefer The Constitution Of Society Outline Of The Theory Of Structuration , 2016 .

[4]  Valerie Verdoodt,et al.  From social media service to advertising network: a critical analysis of Facebook’s Revised Policies and Terms , 2015 .

[5]  Glenn Greenwald,et al.  No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State , 2014 .

[6]  Madeline Carr,et al.  Public–private partnerships in national cyber-security strategies , 2016 .

[7]  Samuel D. Gosling,et al.  Snoop: What Your Stuff Says About You , 2008 .

[8]  Thomas C. Hales,et al.  The NSA back door to NIST , 2014 .

[9]  G. Lakoff Metaphors of Terror , 2001 .

[10]  Jeremy A. Hansen,et al.  Human Aspects of Information Security, Privacy, and Trust , 2013, Lecture Notes in Computer Science.

[11]  Theodore Tryfonas,et al.  Strategic Interaction Analysis of Privacy-Sensitive End-Users of Cloud-Based Mobile Apps , 2013, HCI.

[12]  Andra Giurgiu,et al.  No Place to Hide – Edward Snowden, the NSA and the Surveillance State , 2015 .

[13]  A. Kellerman,et al.  The Constitution of Society : Outline of the Theory of Structuration , 2015 .

[14]  Professor Surya P. Subedi Report of the Special Rapporteur on the Situation of Human Rights in Cambodia , 2010 .

[15]  Kirstie Ball,et al.  Organization, Surveillance and the Body: Towards a Politics of Resistance , 2005 .

[16]  H. Tsoukas The Missing Link: A Transformational View of Metaphors in Organizational Science , 1991 .

[17]  Theo Tryfonas,et al.  On Security Metaphors and how they Shape the Emerging Practice of Secure Information Systems Development , 2007 .

[18]  Jennifer Granick,et al.  We Kill People Based on Metadata , 2017 .

[19]  Tom Crick,et al.  Changing Faces: Identifying Complex Behavioural Profiles , 2014, HCI.