Escolar Documentos
Profissional Documentos
Cultura Documentos
Abstract
This study examines the role of Google Glass in relation to a possible contribution to network
surveillance. Our privacy has become increasingly limited throughout the past decades due to the
rapid rise of technology and social media. From the Fourth Amendment to George Orwells Nineteen
Eighty-Four, society is full of warnings in regards to technology and surveillances collaboration. This
paper will investigate the possible newest link in this collaboration, Google Glass, as well as provide
a current status on network surveillance and the subsequent effects. To answer whether Glass is
here to improve our everyday life or simply to improve Googles database, selected theories are
applied to analyze and interpret Glass possibilities and potentials in regards to network surveillance.
Distrust towards Glass is determined and Google CEO Vice Presidents arguments pave the way for
discussion. His viewpoint is compared to the hypothetical scenario in Orwells Nineteen Eighty-Four,
it is then discussed whether the possible outcome of Glass will move us closer to the ideas
presented in Orwells dystopian novel. Through the use of before mentioned theories and analysis, it
is concluded that Glass has a feasible viability to contribute to network surveillance.
Page 1 of 60
Table of Contents
2. Introduction
2.1 Techniques of project work
2.2 Problem Statement
2.3 Methodology
2.4 Methods
2.4.1 Hypothetical-deductive method
2.4.2 Semiotics
2.5 Theoretical Framework
2.6 Delimitation
2.7 Communication in mediated life
2.8 The Surveillance State of America
2.8.1 The Presidents Surveillance Program/The Program
2.8.2 Shared and tracked Information
2.8.3 The Convergence of NSA Spying with the Digital Era
3
3
4
4
5
5
6
7
7
8
9
9
11
12
3. Case
3.1 What is Google Glass?
15
15
4. Theory
4.1 The Filter Bubble
4.2 Little brothers society
4.3 The theories of ethics
4.4. Foucaults Discipline and Punishment
4.4.1 Foucault and Jeremy Benthams Panopticon
17
17
20
21
22
23
5. Analysis
5.1 Application of Foucault on the United States
5.1.1 Googles Panopticon
5.2 The interest collar
5.3 Social Semiotics on Glass
5.4 Ethical theory of Glass
5.4.1 Mann versus McDonalds
5.4.2 Glass with Class
24
25
28
30
34
36
36
40
6. Discussion
6.1 The product of surveillance
6.1.2 Sousveillance?
6.1.3 The next step
6.2 Privacy - an anomaly
6.3 The 1984 scenario
41
41
44
45
46
48
7. List of References
7.1 Books
7.2 Webpages
7.3 Articles
7.4 Movies
51
51
51
53
56
8. Appendix
8.1 Appendix 1
8.2 Appendix 2
8.3 Appendix 3
57
57
57
58
Page 2 of 60
2. Introduction
2.1 Techniques of project work
During our introduction to the progression course, Techniques of Project Work, we were instructed
in how to create a proper problem-formulation, how to use the RUB-library, how to use the search
engines to find research materials, and the necessary tools for executing them.
Within the seminar we gained some great advice in how to handle internal conflicts within the group,
and additionally some comprehension on how to deal with these conflicts when unknown factors
could interfere with the overall focus of our work.
Like any project group that spends most of their days together in front of their computer screens, we
sometimes felt frustrated and annoyed with each other. It was here that it became helpful to apply
the knowledge acquired from the lecture we had on October 11th. We were told to remember one of
our first group sessions, where we found out how important it is to discuss and determine the
strength and weaknesses within the group at an early state, and furthermore, how it is possible to
apply them to bring forth the most productive features of the individual group members; and assign
them a suitable role according to their abilities.
Additionally, problem-oriented project work aims to investigate something the group did not already
know. In turn we discovered a lack of knowledge in regards to the project and decided to gather
empirical data so that we could get started with our project. At the core of our project we had to
formulate our project statement. It was formed by the combined diverse knowledge we had
accumulated individually, and used to agree upon the direction we wanted the project to take. As
described in Problem-Oriented Project Work a work book (p. 18) there is a certain methodology
that works with the problem-formulation phase, which is the search for methods, theory, and data
where texts and articles are disposed and discovered for their relevance, and by doing so, the
project can move forward.
During the midterm seminar we received a lot of helpful advice, and at an opportune timing, where
our friendship-group and their supervisor helped us realize the necessary changes we had to make
to our former problem-formulation; and that we needed to narrow the focus of our project. At the
given time we were in a severe case of writer's block due to chewing of a bite too big to swallow
Page 3 of 60
and the seminar gave us the needed perspective, to easily move forward with a renewed and
focused outlook on things.
In our final course, we were given the tools to best prepare for our oral examination and which
things to keep in mind when striving to get a high grade. This course was much needed since all of
us were quite unsure of how the oral group examinations are done at RUC. Furthermore, it was also
very helpful to know what a supervisor values during the examination, since we only have a set
amount of time to show what we have learned. All in all the Techniques of Project Work was a welltaught course with a lot of useful information to guide us, to make it easier for us, as a group, to
progress comfortably in the desired direction.
2.3 Methodology
Due to the technological aspect of our project, we started by mainly researching how Google Glass
works and how we are surveilled every day without being aware or cautious about it. After acquiring
books, articles, and videos demonstrating the Google Glass and from these gather an
understanding of how the technology works, we started looking at reactions to Google Glass. How
was the reception of Google Glass? This product is not yet available to the public, still it has caused
outrage and is already banned from several places.
Page 4 of 60
We looked into the problems and solutions that comes with having a life online, and we took a
philosophical approach to it. We have an analysis based on cases, combined to the theories we
found relevant. Since we have not been able to test the Google Glasses ourselves, we had to rely
on articles from people who have had the opportunity to try the device. For this reason we have
maintained a critical view in the analysis on the origin of our sources. Furthermore we have had to
deal with a lot of speculations, which fits well with our philosophical angle.
2.4 Methods
The following chapter will deal with a few select methods, which we found very relevant to this
project when looking at the problem definition. We have decided to incorporate a method for each of
the dimension, in order to answer the questions in the problem statement. This is due to the vast
amount of information we have found on the subject.
1
2
3
http://videnskabsteori.wikispaces.com/Hypotetisk-deduktiv+metode
Watkins, J. Obituary of Karl Popper, 19021994.Proceedings of the British Academy, 94, pp. 645684
William W. Bartley: Rationality versus the Theory of Rationality, In Mario Bunge: The Critical Approach to Science and Philosophy (The
Free Press of Glencoe, 1964), section IX.
Page 5 of 60
4: Empirical verification: Confirmation of the assumption put the theory to a test. Look for any
evidence that can conflict with the predictions in order to disprove it (Godfrey-Smith, 2003: 236).
Karl Popper was an enthusiast of Einsteins relativity theory, because Einstein had very precise
theories. He believed that to make a good scientific theory, it must be critically verified; if a theory
were not critically falsified he would not consider it a scientific theory. By using this method, a theory
can never be 100% verified, the method can only be falsified. Einstein highlighted the way of the
theory when he said: "No amount of experimentation can ever prove me right; a single experiment
can prove me wrong." (Calaprice, 2005: 291)
This project works with the hypothesis that Glass has a connection to direct and indirect surveillance,
much like many social networks and via our use of smartphones. With the new Glass it is said that
Google can monitor everything the user sees and does with the glasses. We see this very likely to
be true, since we through our research can see how much online surveillance is going on nowadays.
Because Glass is very new and not yet available for the public, we are not able to test it ourselves,
our answers will therefore be based on articles and the knowledge of people who have tested it, and
the likeliness of our hypothesis.
2.4.2 Semiotics
Since we are working with a Text and Sign dimension in our project, we will be using semiotics.
We will incorporate Saussure and his way of working with signs, saying that it consists of a signifier
and a signified. The signifier is the signs image, as we perceive it. It is the basic physical existence
of the sign. The signified is then the mental concept to which the signifier refers. This mental
concept can be different for different cultures, but is common for people from the same culture as
they share the same language and thereby understanding. The relation between these two things
has the term signification, and the signifier plus the signified does via signification turn out as the
external reality or meaning (John, 1982: 47-56). Social semiotic is relevant to our project, as we will
focus on how the human signifying habit is shaped and influenced by the cultural surrounding and
social circumstances.
Exploring the human habits, this method also tries to make meaning out of the human behaviour
given a certain social condition.
This method allows us to investigate the impact of surveillance and especially Glass to society, and
how the symbols that comes with it, are decoded in a social context. The method delivers an
Page 6 of 60
analytic view on how surveillance and Glass may be changing the way society, and we as
individuals, function in a future virtual world.
2.6 Delimitation
Although the project has many objectives, it sets its focus on surveillance as a consequence of the
mediated technology. In context we have chosen to deal with Google Glass as our main case and
involve it as much as possible in our project as it is a valid example of how we all contribute to the
surveillance society. Google Glass is relevant because it is one of the newest and amongst the most
innovative products of mediated society, and it contains endless possibilities as well as risks. Google
Glass has, however, not yet been released to the majority of the public.
Our project will mainly concern the United States, where the culture is very affected by mediated life
and engaged with a variety of surveillance capabilities, however, our focus will be on network
surveillance.
Page 7 of 60
more time looking each other up online, instead of physical quality time. Our primary focus will be
what the mediated technology has done to the way we communicate with each other, this
phenomenon is also known as CMC (Computer-Mediated-Communication).
CMC has been exploding over the last few years; take an obvious example like Facebook, which
grew from having one million active users in 2004,5 where it started as an American college social
network, to being spread worldwide used by all age-groups, with the newest results showing 1.19
billion active users in October 2013.6 This is a clear example on how the world has gradually
accepted the change of how we communicate and the evolution of communication. We cannot stay
focused anymore when we are physically socializing with friends and family. We keep checking our
phones and updating our social network sites, to see if anyone has virtually poked7 us. But it is
hard to define whether or not this makes us more social or asocial. People are now expected to
answer to chats and texts right when they are received, update their Facebook and re-tweet
something of minor importance, which does not necessarily make us rude or asocial if we are
maintaining our online social profile while spending time with our friends. Maybe we are not present
4
5
6
7
http://www.drgarysmall.com/gary-and-gigi/
http://www.insidefacebook.com/2008/08/19/mapping-facebooks-growth-over-time/
http://expandedramblings.com/index.php/resource-how-many-people-use-the-top-social-media/#.UqDIuo3l3Ks
To Poke: When poking on Facebook it is to say Hey, you! What is going on?, but some people have wrong understanding that poke
at Facebook is symbol of disturbing. More details:
7
https://www.facebook.com/media/set/?set=a.398027696875053.103987.220435901300901&type=3
Page 8 of 60
in the current situation and socializing with the one person we are physically next to, but we are
present on so many sites and socializing with thousands of people. It is becoming more of a
common agreement that it is okay to not really be present while we are uploading our life to World
Wide Web for everyone to see.
We post self-chosen information about ourselves online. It can be anything from photos of loved
ones, relationship status or even photos of what we eat. CMC has really brought this noteworthy
phenomenon to our attention. It is on one hand a one-way communication to document how our life
is going and on the other hand a public communication starter. Say if someone is in the same
situation as yourself and can relate to it with a much appreciated like. Though the receiver is not
chosen or specified from the sender (i.e. the person leaking it), the information is self-chosen, and
the sender is aware that the leaked updates are public.
But what are the consequences of this vast development? We forget to think about them and what
effects they might have. What are we actually agreeing to when we click agree to terms? And how
much privacy does our private setting really ensure you?
http://www.nsa.gov/
Page 9 of 60
database of every call ever made" (Cauley, 2006). All of this was done without a warrant or any
judicial supervision.
A few weeks later, former AT&T technician Mark Klein revealed to the New York Times that those
same telecommunications companies also had agreed to install complex communication
surveillance equipment in secret locations at strategic telecommunication facilities around the
country. The order came from the NSA. (Margoff, 2006) This technology enabled the NSA to gain
autonomous and free access to large streams of local and international communication to be
http://www.nsa.gov/about/_files/CoreValues.pdf
10
11
http://edition.cnn.com/2005/POLITICS/12/17/bush.nsa/
http://www.nationaljournal.com/nationalsecurity/nsa-spying-scandal-2006-or-2013-20130606
Page 10 of 60
more specific, the NSA was now able to collect at least 1.7 billion emails a day due to this
surveillance equipment, according to The Washington Post. Again, all of this was done without a
warrant in violation of federal law and the Constitution (Priest, 2010).
The Program was first criticised by the New York Times in 2005. President Bush then admitted to
a small aspect of the program; he concluded that the NSA, without warrants, monitored the
communications of 500-1000 people in the US with suspected connections to Al Qaeda. He
called this the Terrorist Surveillance Program (Priest, 2010). But what about those people not
connected to terror why collect and keep billions of emails from innocent, non-suspicious
citizens? To prevent a potential threat? And what happens with the collected data?
astounding, and the lack of government oversight is highly disturbing. One would expect Big
Brother was wrought from a similar beginning.
It is, however, not just the Government and the NSA that ends up with our information. It is no
secret that the NSA shares their collected data with the FBI, CIA, and the DEA. Major companies
also play a vital part when it comes to collecting and using data - with more than 950 million users,
Facebook obviously has great opportunity to track and store data on millions of people around the
world. (Schneier, 2013) As Bruce Schneier, technologist and author, said:
The Internet is a surveillance state. Whether we admit it to ourselves or not, and whether we
like it or not, we are being tracked all the time. Google tracks us, both on its pages and on
other pages it has access to. Facebook does the same; it even tracks non-Facebook users.
Apple tracks us on our iPhones and iPads. One reporter used a tool called Collusion to track
who was tracking him; 105 companies tracked his Internet use during one 36-hour period.
(Schneier, 2013)
The electronic footprints we leave are rapidly increasing as the technological development
expands, making it easy for anyone interested to track down our every move. Movements that
can be cross-indexed, correlated, and used for secondary purposes; information about us has
value. Not only to the police, but to corporations as well. The Justice Department uses details
from Google searches to look for patterns that could help determine child pornographers and
potential criminals. Google uses that same information to deliver context-sensitive advertising
messages (Schneier, 2013). The majority of us have gladly given out personal information in
exchange for social media and specific services. What we object to is the surreptitious collection
of personal information, and the secondary use of information once it is collected: the buying and
selling of our information behind our back.
Page 12 of 60
latest from the German Chancellor, Angela Merkel12. Why had the invasions of privacy committed
by the NSA scaled up so dramatically, despite all the protest in 2006?
The answer to this question requires a consideration of the changes in the technological
landscape that occurred in the 21st century, best represented by the search engine Google.
Google requires that we agree to terms and conditions that allow Google to use our search
information. Over the years Google has changed its terms and conditions to allow the government
access to users search results. Prior to September 11th, users were completely anonymous
under terms and conditions. Googles privacy policy in December 2000 stated:
Google may also choose to use cookies to store user preferences. A cookie can tell us,
This is the same computer that visited Google two days ago, but it cannot tell us, This
person is Joe Smith or even, This person lived in the United States (10:43 in Terms and
Conditions May Apply, 2013).
Only one year later, in December 2001, Googles privacy policy had changed to:
Google does this by storing user preferences in cookies and by tracking user trends and
patterns of how people search. Google will not disclose its cookies to third parties except as
required by a valid legal process such as a search warrant, subpoena, statute, or court
order. (11:06 in Terms and Conditions May Apply, 2013)
This piece of text, from Googles own website, state that when necessary, we are not anonymous.
In December 2001 Google would not deliver user information such as cookies, identification or
user preferences to a third party without a valid legal process such as a court order or search
warrant. It is necessary to keep in mind that Google has economic motives for tracking users.
12
http://www.theguardian.com/world/2013/oct/24/angela-merkel-nsa-spying-allies-not-on
Page 13 of 60
Googles business model is dependent upon using user information to target advertising, rather
than having users pay for the service. People exchange their level of privacy for the free service.
Other companies picked up on this trend, which has made Twitter, Facebook, etc. which are such
valuable companies. All of these companies also have similar terms and conditions policy, with
far too much legal fine print to read in a reasonable amount of time.
What is so interesting about this story is not really that they changed their privacy policy but that
they claim, on their website, that their privacy policy from 2000 is the one from 2001. A non-profit
internet website called Wayback Machine takes snapshots of what websites used to look like and
save the photos in its own archive. It has been taking photos since the 1990s. On Googles own
official webpage they list their history of Privacy Policy. They list every single Privacy Policy that
Google has ever had since the start of Google. But what Google shows as their original Privacy
Policy does not match the one from Wayback Machine. Instead it shows the one from December
2001; the one that says, that when necessary we will not remain anonymous.
In January of 2012, Google changed their privacy policy once again, so that all user information
could be combined into one personal profile. Detailed histories of every user can be accessed in
the database for the purpose of market research or background checks (18:04 Terms and
Conditions May Apply 2013). The current terms and conditions, when compared to those before
This metadata or Big Data as it has come to be known, in reference to Orwells Big Brother in
1984, is what the NSA claims is necessary for protecting the future of the USA. General Keith
Alexander told Congress, on December 11th, 2013, Threats are growing and explained that
metadata collection is like a traditional library index card system. Metadata is our way of knowing
where those books are in the libraryand where the bad books are (McCarthy, 2013).
Page 14 of 60
It is certainly true, that the NSA is tasked with a very difficult mission. In the post 9/11 world,
Americas enemies are not entire nations, but cells of terrorists. The terrorists hide and plot
against America, so a level of surveillance is necessary. But where is that level of surveillance
that is permissible? It is an endless debate, most likely without a right answer. The intersection of
security and freedom is not a simple matter, and perhaps what is most important is that people
and governments keep the surveillance state in check.
3. Case
3.1 What is Google Glass?
The next section will present our main case: Google Glass. Throughout the project we will refer to
Google Glass simply as Glass.
Glass is amongst the newest device within communication technology. It is a platform that enables
the user to experience augmented reality; the concept of images overlaying and emerging in what
the user sees in their reality. In its basic form Glass is a computer that one can wear on ones head.
Within the product exists a see-through screen in the top right corner of the eye where data
manifests. The product enables one to be always on, always available with the power to stream
live video from the users point of view, advanced voice recognition software, and access to the
worldwide web on the spot. Because the device is hands-free, the Glass functions, as mentioned,
via voice recognition. A command is started by simply saying: OK Glass.. then the given command,
e.g. take a picture to take a picture, record a video, browse the Internet, even speak the message
you want to send. Glass can also translate any sign; for example if travelling in China, a street sign
can be directly translated to English right in front of you. 13 Not all commands are able to be
controlled by voice. Glass therefore has a touchpad to give additional control. This touchpad is
placed in the right side of the frame next to where the camera is. This is also where the Glasses can
be turned on and off with a tap on the pad.
With Glass, the user is integrated to a higher level of connectivity. It is essentially a smartphone in
another packaging. Though having many of the identical parts of a smartphone, Glass depends on
an actual app 14 in order to have all the functions working. Apps are essential for Glass, as it
13
14
http://www.google.com/glass/start/
a self-contained program or piece of software designed to fulfill a particular purpose; an application, especially as downloaded by a user
to a mobile device.
Page 15 of 60
depends on developers to help Google invent new apps to use with Glass. The development of new
apps create an opportunity to widen the usage of Glass and thereby extent the possible outcome of
creativity.
Glass also gives the user an ability to interact in a new social and cultural way. This ability to be
connected wherever we find ourselves to be is considered a tech-revolution. The new technology
gives the user another dimension to his or hers own reality and impacts on the way we live our life.
Google as a company is a major player in the tech-revolution and offers many services of their own
to Glass, including: maps, calendar, Gmail, Google+ and Google Places, all of which enables us to
simplify our lifestyle in a organized and convenient way that most people find appealing. When
combining all of Googles services, they offer the online user a neat and ergonomic package to
include in one's lifestyle with Glass.
Google has already released two versions of Glass to be tested by selected people; version 1, the
first version, and version 2, called Glass Explorer Edition. The differences between the two are
very little. The newer version only has a slightly updated hardware, which does not make any
remarkable change performance wise for the device. These changes will at best be a ten percent
increase in the overall performance, which is shown with slightly smoother animations. The most
noticeable difference is the mono ear bud that has been included in the product and how specific
prescription lenses can be applied.15
By purchasing Glass, the Explorer Edition, Google stated the following in their Terms of Sale:
You must be 18 years or older, a resident of the United States, and authorized by Google as
part of the Glass Explorer program in order to purchase or use Glass Explorer Edition. Unless
otherwise authorized by Google, you may only purchase one Device, and you may not resell,
rent, or lease your Device to any other person. If you resell, rent, or lease your Device to any
other person without Googles authorization, Google reserves the right to deactivate the
Device, and neither you nor the unauthorized person using the Device will be entitled to any
refund, product support, or product warranty. 16
Google is hereby the first company to claim ownership of a product even after it has been sold.
15
16
http://www.itproportal.com/2013/11/05/google-glass-2-whats-new-compared-to-the-original-model
http://www.google.com/glass/terms/
Page 16 of 60
Glass is a phenomenon of simplicity and it is slowly entering our daily lives. It is a technology based
on existing technology, which most of us is already carrying around. The big difference is that this
product is situated in something as old fashioned as a pair of glasses, which has been designed to
be new and hip. The aim of the product is to introduce a new way of gaining access to the content
you want: faster, quicker, trouble less, all in a slick design.
4. Theory
4.1 The Filter Bubble
The human lifestyle has changed radically over the past decades. This change is conjointly related
to the exponential growth in the numerous mediated technologies and the online connectivity we find
ourselves with today. There is no doubt that being online is a vital part of living in the 21th century.
In December 2009, the world saw the beginning of something new. The search result from Google
started to customize to each user a new era had begun for personalization (Pariser, 2011: 1). When
it comes to consuming information, this was a revolution (Pariser, 2011: 3). It can shape which new
things we learn, how we learn, it could even affect how democracy works. By collecting as much
data as possible, our online experience can be tailored. Our personal information are tracked by
data companies and the result/consequence of this will be that each of us will live more and more in
our own unique universe of information - a personal bubble. Eli Pariser calls this the The filter
bubble. He says that from this personalization, most of the news we will receive is known, pleasant,
and something familiar but it will not be possible to know what is hidden from us. Our interest from
the past will decide what we are exposed to in the future, and learning from unpredicted encounters
will be minimized (Pariser, 2011, 1st edition: 1st page).
According to Pariser, search results are customized and personalized for everyone, this means we
are tracked and the Internet can get all your information and learn everything about you.
The filter bubble basically alters the way we come across ideas and information (Pariser, 2011: 2).
Pariser tells that we from the filter bubble are introduced to three new dynamics:
1. You are alone in it - The bubble does not reach out and let you be familiarized with new
things outside of a comfort zone. Since it is personalized, it becomes a universe, where you
are the center it revolves around, thus becoming more and more distant from other people
and new things.
Page 17 of 60
2. The filter is invisible - the user is unaware of the filter. There is no warning or sign of
getting into this bubble. Each time a user is online, the filter bubble gets bigger and the user
is increasingly being trapped in their own little universe. The Internet becomes like a bottle,
with the filter being the bottle head. The further you go, meaning the more you are captured
by the Internet, the more narrow and recognizable the world online becomes and you are
thereby learning less from the world.
3. You do not choose to enter the bubble - the bubble consumes you when you do not
realize it. You are not actively choosing the filter. When turning on the TV to hear the news,
or reading a newspaper, you make the decision to hear and see, what you want. You choose
your filter, you are actively getting new information. With personalized filters, you are not
entirely able to choose what you want to see. Instead of you making a choice to learn about
something, they are coming to you, and they are becoming harder and harder to avoid
(Pariser, 2011: 9-10).
Pariser also tells about some positive things that come with the filter bubble. The bubble keeps our
interests organized. A user is never bored, never annoyed it has an appealing prospect, it makes a
return to a Ptolemaic universe17 in which we are the centre and the world and everything else
revolves around us. But as often, everything comes with a cost, and if it is made more personal we
are at risk of losing some of the qualities and traits which are the reasons the Internet was so
appealing to begin with (Pariser, 2011: 12). As Pariser says:
In the filter bubble there is less room for the chance encounters that bring insight, and
learning serendipity is at risk. We get a lot of bonding but very little bridging.
(Pariser, 2011: 17)
The first idea of personalization came from Nicholas Negroponte. He talked about it in the midnineties, but at the time people were not ready for personalization (Pariser, 2011: 21). In order for
companies to personalize, they needed a lot of data from the users. As a result Google came up
with an innovative strategy in 2004. By providing other services, which would require users to login,
such as Gmail, the users themselves would provide Google with a huge sum of data (Pariser, 2011:
17
The astronomical system of Ptolemy, in which the earth is at the center of the universe with the sun, moon, planets, and stars revolving
about it in circular orbits.
Page 18 of 60
33). Pariser further explains how important personalized data is for companies, e.g. how up to 60%
of Netflixs18 rentals are based on the personalized data of their users (Pariser, 2011: 8).
In recent years, big companies like Google and Facebook has been collecting more and more
information about their users. The recent decade have shown a vast development in companies
willing to pay for information concerning their demography in order to improve business-marketing
(Lace, 2005: 99). With these data comes an opportunity to know a customer on another level.
From the users point of view, the personalized data exists because it makes it easy for them to
move around in the online universe. It specializes for one's particular needs and in the process
makes it easy to interact. To have the ability to get to the needed content as fast as possible is a key
factor for the online user, which the companies takes advantage of.
Pariser explains how it is of most importance for big companies to know how to choose the right
content for their consumers. The three-step process of creating a personalized filter for the user
(Pariser, 2011: 112) works because the users identity shapes the media. However, Pariser argues
that the media also shapes the identity. So by shaping our media through our identity, our identity is
also being shaped by the media we experience. This is a self-empowering concept, which seems to
have no ending. Pariser talks about the consequences of these services and how they can in fact
create a good fit between the individual and his media by changing him. In other words; to choose
our own destiny is not an option here. Pariser believes that the destiny is already chosen for us
(Pariser, 2011: 112).
The Filter Bubble makes the individuals online choices easier by reflecting their own personality
upon the relevant material that they wants to see, but the consequence is that they do not get a
chance to decide what that material should be. It is already decided for them. As Pariser describes:
Personalized filtering can even affect your ability to choose your own destiny. In Of Sirens
and Amish Children, a much- cited tract, information law theorist Yochai Benkler describes
how more-diverse information sources make us freer. Auton-omy, Benkler points out, is a
tricky concept: To be free, you have to be able not only to do what you want, but to know
whats possible to do. (Pariser, 2011: 112)
Since Google are able to follow every step a user makes with Glass, it will make it easy for a user to
get a filter bubble via the glasses too. Glass is an extension of our mobile phone and through
personalization, Google can use all the information they receive from Glass to create a bigger filter
18
Page 19 of 60
since the they, just like a phone, will likely be used most of the time. Nowadays people are
practically addicted to laptops. We could escape the filter by not being on our computer all the time,
but now since all smartphones have network access, they are practically small laptops we always
carry around with us wherever we are. The same goes for Glass, but with the glasses it is barely
even necessary to do anything else but talk to them and therefore makes it easier to be consumed
by the filter. Glass is not just thought of as an extension of the smartphone, but as an extension of
our individual identities. With Glass we are moving even closer to a society where we watch each
other.
In the last theory by Tony Chalkley, that is strongly connected to the Little Brother theory, it is also
questioned why we accept so much surveillance in our society. Here he argues that first of all, it
makes us feel safe. Even though we might be watched, there is a security in the fact that the bad
Page 20 of 60
guys who are also observed, can therefore be stopped by the watching authorities. Taking up the
Little Brother theory, it might be more a question of acceptance than security. Secondly we accept
surveillance because of what he refers to as the normalization of surveillance. We have become so
used to surveillance, that it has now become a part of our everyday life. We cannot even imagine
our lives without our smartphones and the daily use of Internet. Most people are exceedingly
dependent on the Internet; we might be surveilled on a daily basis, but we cannot stop using the
Internet, because we need it for important research, work, practical information, as well as the
argumentally less necessary things such as socializing and entertaining (Chalkley et al, 2012: 213).
Page 21 of 60
happiness for the largest amount of people), it is hard to tell if the benefit is greater than the costs;
thus the theory is a hypothetical one that cannot always be applied with a direct outcome.
Deontological framework is the opposite theory of teleological and obviously utilitarianism. Here it
is about always choosing right over good, cause thereby the right is chosen over any wrong-doing at
all; it is simply a duty-based theory. Immanuel Kants (1724 1804) moral philosophy is a great
example of deontological theory. It is completely opposed to utilitarianism; what he wants is the law
of moral to be rational, just like all other laws of physics are. There will never be doubt about what is
a moral decision, if you have first decided that you believe in the deontological definition of morality.
It is easier to tell right from wrong than to tell what is actually good as just mentioned; defining
happiness and good is a serious struggle on the utilitaristic field. What can be a flaw in Kants
deontological theory, is how sometimes the duty is truly more hurtful than for example a so called
white-lie. Take an extreme example where you have to lie to someone in order to save them from a
cold blooded murder. Here there is no doubt that most people would find it more ethically right to tell
a lie, than to let an innocent victim get murdered.
William David Ross (1877 1971) therefore came up with a more flexible extension of Kants dutybased theory, where he includes prima facie duties. These are basically duties that are superseded
by higher obligation. In other words he makes space for exceptions to the normally preferable duties
(Spinello, 1995: 14-32).
19
We will be using a translated version of Surveiller et Punir, Discipline and Punishment by Alan Sheridan. Important to
note that some understanding may have gone lost in the translation.
Page 22 of 60
power was at the time considered radical and complex, as it; ... instead of a simple relationship
between the oppressed and the oppressor, power involves a much more multifaceted chain of
relations weaved throughout society (Sheridan, 1977: 196) According to Foucault, power is not
exclusive between two parts, but works on a higher level where a great part of society is included
due to the consequences of power relations. Foucault additionally argues that power therefore
shapes the behaviours and actions of all individuals. This is explained in part one, along with a
notion on how knowledge and power goes hand in hand; one cannot exert power without knowledge,
while at the same time knowledge always provokes power. Foucault termed this concept
"power/knowledge (Sheridan, 1977).
20
http://www.ucl.ac.uk/Bentham-Project/who/panopticon_folder
Page 23 of 60
prisoners every move, without the prisoners knowing. Bentham saw this reform as a perfect society;
to maintain authorization in a democratic and capitalist society, the public needs to believe that any
person could be surveilled at any time. As described by Foucault;
"In order to be exercised, this power had to be given the instrument of permanent, exhaustive,
omnipresent surveillance, capable of making all visible, as long as it could itself remain
invisible (Sheridan, 1977: 201).
Benthams hope was that, with time, people would adopt to this kind of structuralism and as a result
internalize the panoptic tower and eventually police themselves:
"He who is subjected to a field of visibility, and who knows it, assumes responsibility for the
constraints of power; he makes them play spontaneously upon himself; he inscribes in himself
the power relation in which he simultaneously plays both roles; he becomes the principle of his
own subjection" (Sheridan, 1977: 202-203).
This change in power relations provoked Foucault as he claimed privacy to be a basic human right.
His main point is how the surveillance constructs inequality and gives a huge power advantage to
the watcher, whereas the watched is becoming a victim. He compares the prison surveillance and
how it gives the guards an almost unlimited power over the convicts to how the government is
watching the citizens, and will thereby always be updated on information that benefits them in
keeping their supreme control and power (Chalkley et al, 2012: 203-204).
One can argue that this form of control has been aided in our own society by new technological
advancements that allow the government and big corporations to track any movement and behavior.
5. Analysis
The purpose of the analytic section is to provide an understanding for the problem statement: What
are the possible effects between communication technology and the surveillance state? We will
apply the above-mentioned theories to selected cases in order to give a satisfactory perspective on
the mediated life and technology that comes with it.
Page 24 of 60
21
22
http://digitalcommons.iwu.edu/cgi/viewcontent.cgi?article=1022&context=socanth_honproj
http://www.networkcameranews.com/united-states-and-britain-lead-the-world-with-the-highest-number-of-surveillance-cameras-percapital/
Page 25 of 60
23
http://www.jstor.org/discover/10.2307/4146130?uid=3737880&uid=2129&uid=2&uid=70&uid=4&sid=21103117010797
Page 26 of 60
He continues:
It bears a striking resemblance because managers have such complete control over their
subordinates. Virtually all of their activities can be checked to make sure they are performing
their duties correctly. (Sewell, 2006)
Is it important to emphasize that of course, not every single move of the employees are monitored,
but the possibility alone could have a great influence on the employees behaviour. Hypothetically,
and according to Foucault, these people would have adopted the fear of potential negative
consequences due to the fact that they know they are being observed. Therefore, there is no actual
need for surveillance since they act as if they are always being watched. A direct connection to the
arguments made in Discipline and Punishment.
So far, several arguments presented in Foucaults theory concerning surveillance have been
validated. But modern American society does not completely comply with Foucault's hypothesis. The
problem is not in any specific detail, but is more found in an all-encompassing theme. In Discipline
and Punishment, Foucault predicts that essentially all of society will function like the Panopticon.
This is, to say the least, a bold claim. We can of course not reject the idea that society as Foucault
describes it is yet to come, and that the Panopticon is indeed our future. But so far, at this point one
cannot possibly argue that the United States has become the new Panopticon.
Foucault's book argues that prisoners in a Panopticon are constantly aware that someone may be
watching them. This awareness triggers them to modify their behaviour, ultimately becoming dead,
passive bodies. However, CCTV is an obvious example on how Foucault's theory fails. Walby
claims that these CCTV cameras have become so common and discreet that Americans no longer
register that someone might be watching them. He explains:
The prevalence of discrete and mundane surveillance practices does not create the automatic
functioning of power that Foucault had envisioned. For instance, CCTV cameras are not
noticed by the people who fall under the optical gaze. The presence of cameras does not
directly alter people's behaviour. (Walby, 2005)
American citizens do not change their behaviour in response to the cameras, an explanation could
be that technology has become so refined and such a big part of the culture that Americans have, to
Page 27 of 60
an extent, forgotten about CCTV. For CCTV to function as it would in a panoptic society, it would
have to be much more obvious, and exert much more power over individuals.
Another reason why Foucault's concepts of surveillance are inconsistent in today's world comes
from another reflection by Walby. In the Panopticon, the guards simply cast a stare on the inmates.
The inmates, on the other hand, must adjust their behaviour to avoid punishment. Yet in a society in
which CCTV is discreet and Americans do not constantly think about its presence, it is actually those
that do the gazing who alter their own actions. Walby elaborates:
"... it is the CCTV operators' watching behaviour which is normalized along institutional lines by
being behind the camera at Suburban Mall, not the shoppers' behaviour by being pored over
by the all-seeing eye. (Walby, 2005)
This is a twist to the Panopticon model. It is supposed to be the shoppers, not the guards, who
change. Yet it is the guards who change regarding their view on specific people as they see them
with greater suspicion than before they began their employment. The application of the Panopticon
to American society has therefore not been completely efficient since it is actually those that are
observing that have been influenced so much by surveillance that they change their approaches and
behaviours. This is a strong contrast to Foucault's visualization - a complete reverse in power
relations.
before, publicists and corporations have been data mining as long as it was an option, and we as
consumers already give most of the information through the use of CMC, apps, GPS devices etc.
Glass does not essentially do anything new, but by wearing Glass, we are basically offering our
personal data on a silver platter. As a consequence, we are not only inviting companies not to
forget the government to view our thoughts, patterns, and consumer habits. When using Glass, we
are unavoidably inviting everyone into our private lives even further, literally placing them directly in
front of our faces 24/7. Knowing this, Foucaults vision of a passive bodies-society may not sound
so far away. We would all be monitoring each other, ultimately doing fieldwork for Google.
This has raised numerous alarming questions concerning privacy. The Australian privacy
commissioner and 36 other data protection authorities has written an open letter to CEO Larry Page,
raising a concern towards Glass privacy settings. (Essers, 2013)
Jennifer Stoddart, Canada's privacy commissioner, signed the letter. One of their main worries in the
letter is that people can use Glass to film and record others;
"We are writing to you as data protection authorities to raise questions from a privacy
perspective about the development of Google Glass. () Fears of ubiquitous surveillance of
individuals by other individuals, whether through such recordings or through other applications
currently being developed, have been raised. Questions about Google's collection of such data
and what it means in terms of Google's revamped privacy policy have also started to appear.
() The details of how Google Glass operates, how it could be used and how Google might
use the data the technology collects have so far largely come from media reports that contain
a great deal of speculation (Essers, 2013)
In addition, the authorities strongly urged Page to "engage in a real dialogue with data protection
authorities about Glass." The letter also questioned Google on how the gathered information is
shared with third parties (see Appendix 3), if Google had done a privacy risk assessment, and if they
would share the outcomes. Googles vice president of public policy and government relations, Susan
Molinari, replied on behalf of Google on June 7th. Several questions raised in the Congresss letter
were not answered in Google's response, including a request for examples on what Google would
do in order to secure the privacy of non-Glass users.
"Use of Google Glass will be governed by the terms of the Google Privacy Policy. No changes
to the Google Privacy Policy are planned for Glass," the letter states. In response to the
Congresss question: "What proactive steps is Google taking to protect the privacy of non-
Page 29 of 60
users when Google Glass is in use?" Google responded, "We have built some social signals
into the way Glass is used. These signals help people understand what users are doing, and
give Glass users means for employing etiquette in any given situation." (Essers, 2013)
Google's response letter generally highlights the device's positive features and evaluates the
existing regulations as sufficient. Congressman Joe Barton later commented:
"I am disappointed in the responses we received from Google. There were questions that
were not adequately answered and some not answered at all. Glass has the potential to
change the way people communicate and interact. When new technology like this is
introduced that could change societal norms, I believe it is important that peoples rights be
protected and vital that privacy is built into the device..." (Essers, 2013)
Google has tried to convince Barton by demonstrating Glass to him in person, but with no greater
impact.
Page 30 of 60
It has become a major factor to personalize through the web in the mediated society. Glass is the
ultimate product of this evolution. This next step in the evolution of technology has the potential to
become the direct channel in which the online users activities is summoned. Glass will be the
frontier for many companies that wants to advertise and get their consumers attention through
Google, which of all big internet companies, is well known for making their bread and butter through
vast amount of advertisement. Thus there is no doubt that Google will take advantage of their new
products abilities and incorporate ads within the products interface. It is logical to think that Google
will merge the personalized data into Glass, as they have done with all of their other products. As it
is described in the Filter Bubble theory: You are getting a free ser-vice, and the cost is information
about you. (Pariser, 2011: 6). The fact that Google is most likely to deliver ads through Glass is also
emphasized in the user agreements of the product, where it is clearly stated that some features
require the user to have a Google account.24
Pariser believes the personalization of the user data is both an advantage and a disadvantage. It
can often happen that we get a friend invitation from a program on Facebook that is not relevant for
us. Regardless we are still going to get the invitation because the user data that we provided by
being online, has generated an demographic stamp on our person; a stamp that tells the program
that we should get this invitation (Pariser, 2011: 187-188). Likewise it is also plausible that a Glass
user will keep getting ads about computers if that is what they are searching for when online. The
user do not have a saying whether or not they will be getting ads about computers. The automatic
software algorithmics has already decided this because it has analyzed the personalized data and
found the user relevant enough to receive ads about computers. Pariser describes these automated
programs as advertars (Pariser 2011: 190). The advertar has only been created for the greater
purpose of commercial use. The advertar is a direct product of the personalized data, and a lot of
companies are making a huge effort in trying to de-anonymizing the Web (Pariser, 2011: 111).
Whatever the individual does online will be reflected in Glass.
When we look at their website, Glass is presented as a new and smart technical object which makes
life more enriching and ergonomic for the user. The process of gaining access to information has
never been easier than now. When we wear Glass, we wear our information. The process of
physically going to a computer, to retrieve the information, is over. Now the user only has to ask the
Glass for the information and it is given. It seems that Glass could very well function as an extension
of the human body. It gives us a new way of interacting online, as well as on the social levels.
24
Page 31 of 60
The new possibilities Glass represents is revolutionary for the modern age, but are we free? Is it
possible to use this technology without losing one's identity? This is a very important question in
Parisers Filter Bubble theory. Are we in fact taking over the identity that is given to us by the
Internet, and just neglecting the original blueprints of our personality?
Does Glass hold the potential to arrange a new identity for its users? When having to maintain a
working Google account in order for Glass to properly function, then there is no doubt about the fact
that the content and ads presented on the users computer will also be presented on Glass on the
background of the users personal data. It is, however, clear that Pariser wants more transparency
with companies holding vast amounts of personal data. The big online companies functions as
relevance-seeking machines, which is fuelled with vulnerable personal data (Pariser 2011: 229). They
must begin to realize that they have a much more important role in the society, other than what they
initially intended. It may be that Googles motto is Dont be evil, but what if they unintendedly
happened to be? As Pariser explains:
I once explained to a Google search engineer that while I did not think the company was
currently evil, it seemed to have at its fingertips everything it needed to do evil if it wished. He
smiled broadly. Right, he said. We are not evil. We try really hard not to be evil. But if we
wanted to, man, could we ever! (Pariser, 2011: 147)
Pariser is definitely trying to send a message to his readers; it may be that the individual find their
online life easier with the help of the personalization of his data. Though however easy it may seem,
there is no guarantee that their personal data will not be used in a bad consensus. If Google wants
too, they can do whatever they want with the individuals data, and they cannot do anything about it.
If an individual is using Google, that person has agreed to their terms and conditions, and if Google
wants to use this personal data, they will have the right to do so, without the person having any say
to it.
The Internet has changed radically from being a free source of information flow, with a decent
amount of anonymity for its users, to becoming a possible surveillance and marketing tool for big
organisations. This is a general concern for Pariser. He mentions that although he likes the
shortcuts from Google, he cannot ignore the fact that this new era of personalization is completely
invisible to the general user. Thus it becomes harder to know what information the Internet has on
Page 32 of 60
us as individuals, as well as how and where it applies that personal information. How are we able to
trust those companies that has access to all this information?:
While the Internet has the potential to decentralize knowledge and control, in practice it is
concentrating control over what we see and what opportunities we are offered in the hands of
fewer people than ever before. (Pariser, 2011: 218)
As Pariser says:
The Internet may know who we are, but we do not know who it thinks we are or how it is using
that information. Technology designed to give us more control over our lives is actually taking
control away. (Pariser 2011: 218-219)
To cast some more light on the consequences of the personalization of data we have chosen to deal
with a story about a pregnant teenage daughter. She had an account at Target25 where she was
searching for, and buying, specific articles that women are most likely to buy whilst pregnant. What
she did not know, however, was that by each search she did online, she was actually revealing
information about herself being pregnant. As a consequence of her online behaviour, she began to
receive baby-related commercials from Target in the shape of coupons and online ads. Eventually
her dad got angry and called Target to ask why they sent all this baby-related material to his
daughter, when she is still a kid, attending high school. Meanwhile he then discovered that his
daughter was actually pregnant, and he had to apologize to the Target employee a few days later.
So Target actually predicted the daughters pregnancy before her father found out about it. They
were able to do it because they used exactly the same system as Google. Demanded the users to
have an account at their company, and then looked at what they were searching for when they were
online. In this case the pregnant daughter were looking at certain products related to pregnant
women. If a woman bought more of these products, then surely there was a great chance that she
would be pregnant, and the system would automatically kick in (Hill 2012).
The case of the pregnant daughter is an excellent example of the positive and negative sides of
personalized data. It is nice that she can get all the relevant products that she would need as
pregnant, but on the other hand she is also receiving a mark that says she is in that category. Her
search results has been collected and transformed into a personal data pattern, which Target uses.
One might say that Target has targeted her. When looking at Targets logo it looks remarkable as an
25
American supermarket
Page 33 of 60
actual Target (See appendix 1). Speaking in a symbolic manner we could say that all the online
companies, including Target, has an aim on their users - a target. All individuals risks being targeted,
but we are rarely conscious about it; therefore not very cautious about it. Whatever ones activities
online are, these activities set us as a target for the major Internet companies. This way we make
ourselves targets by searching and leaking personal data, simply by being ourselves online.
26
http://eyetap.blogspot.dk/2012/07/physical-assault-by-mcdonalds-for.html
Page 34 of 60
This case is interesting on many levels, but using social semiotics we can actually try to see it from
the perpetrators points of view. Why would they insult a man because of the glasses he is wearing?
It must have been an honest mistake that they thought he was spying on them with his Eyetap
camera, but why would they assume that? Why did it offend them so much? And why did they not
believe Manns medical papers that proved he was just wearing Eyetap? This all might have to do
with the modern society that we live in, where surveillance has become a factor that people
apparently worry about. Especially when it is not just on a workplace, where it is somehow more
reasonable to have cameras installed to spy on the assistants as well as the customers, but to be
surveilled when eating at McDonalds, that is an invasion of privacy.
According to Saussures semiotic theory a sign (sign being everything that communicates - it can be
a picture, a word etc.) is consuming a signifier, which is the physical existence of the sign, and a
signified, which is the mental concept; the way people read the sign based on their personal
background. The collaboration between the signifier and the signified is called signification, and its
turnout, is then the external meaning (Fiske, 1982: 42-49). Applying Saussures theory on this case, it
shows how the society that we live in, with increasing technological devices and surveillance all over,
have caused these perpetrators to be completely certain about Dr. Manns glasses to be some sort
of spying ware, possibly Glass. Though this case took place in France, and our main focus in this
project is the United States of America, it has to be demarcated that the technological revolution has
had a huge impact on all of the world, and especially the western part of the world; meaning Europe
and North America. Manns incident at McDonalds illustrates how these perpetrators felt so
threatened by those digital glasses that they got aggressive, when really it was all because of their
prejudices. If we, as Saussure proposed with his signification, see, read, and experience the world
around us based on our background knowledge and previous experiences, this would be a plausible
explanation for why the perpetrators reacted so strongly to Dr. Manns Eyetap.
This leaves us speculating about what consequences can be once people start wearing Glass
wherever they go. Is there going to be a group of anti-Glass people who assault all the Glass users,
or is it going to be forbidden to wear them in most restaurants, shops, workplaces, clubs etc.? Will
there be signs on the doors saying: No Glass Allowed, just like there is a No Smoking sign? Would
it not ethically be right to keep some sort of privacy? Though we live in a society where most people
are leaking all kinds of information about themselves, it is at least up for ourselves to choose what
we share. If Glass does not get controlled at all, we will have no idea of when we are, not just being
watched, but actually filmed, who is filming and more importantly; what they are going to do with it.
Page 35 of 60
In order to avoid loose speculations, we will after a brief optimize of ethics, apply the different ethical
theories to put a more philosophical angle on this case.
27
(http://legal-dictionary.thefreedictionary.com/Fourth+Amendment)
Page 36 of 60
benefits and the costs for which party is causing the greatest deal of benefit, and the least
amount of cost with the actions, before the theory can conclude anything.
To begin with, we take a look at the McDonalds fast food franchise and its employees, in which
they have a professional obligation to act in the best interest of the company they are employed
in (Spinello, 1995: 17). One could argue that the reason for the action taken towards Dr. Mann is
because of the digital age, which in its current state, have not developed social norms for using
new devices such as smartphones and Glass. In the act of Manns device being touched, or
attempted to be forcibly removed, the device will take pictures as a means of self defense as
quoted from Manns blog by damaging the Eye Glass, Perpetrator 1 photographed himself
and others within McDonalds. 28 With the self-defense mechanism from Manns Eyetap, it
provided him in this case with the benefit of proof, which was only possible from the actions
taken towards Manns device. Additionally, a place that deals with perishable food and sanitary
standards to uphold, are in the constant risk of having random checkups on the hygienic aspects
of that location, have the reason to be concerned about being monitored or recorded since they,
as a franchise, do not know for what purpose that action is being executed towards them. The
cost in this case, is the thought of Mann filming and reporting possible below-standard evidence
to the necessary health authorities, damaging the reputation of McDonalds. Furthermore, the
physical force used against Mann, has most likely startled his wife, children, and the additional
guests in the McDonalds at the given time, when this episode took place. On the other hand, the
benefit gained from the action taken by the McDonalds staff towards Mann, have been a
preemptive strike against a could-have-been greater amount of costs which would have affected
McDonalds reputation. In turn this could have caused a substantial measure of cost towards the
name of the chain, and in turn, all of the staff of McDonalds as a whole. An important view to take
on this, is the one of the bystanders that might have felt violated from the misinterpreted device,
which is in fact only there to provide good for Mann on a healthy level. The rest of the guests
present on the location might not even have paid any attention to the gadget, had the episode not
escalated. The employees that took action towards Mann are in charge of their own choice, and
as Bentham says There are no rules to shoulder you responsibility (Spinello 1995:17), meaning
that despite acting as agents of McDonalds, they each acted by their own conscious choice.
Having looked at McDonalds side of this episode, we take our look at Mann and how cost and
benefit is measured from his point of view in the case.
28
http://eyetap.blogspot.dk/2012/07/physical-assault-by-mcdonalds-for.html
Page 37 of 60
First of all, the cost that Mann experienced is not just that of his own assault, his family
witnessing the act, or the bystanders in the McDonalds having to see the episode unfold in front
of their eyes while enjoying their meal, but the assault of a person wearing a gadget to help
improve his sight, and overall wellbeing as a human being. Additionally, one might argue that this
strike upon a renowned individual like Mann, can be seen as a direct attack on anyone wearing
life enhancing gadgets such as pacemakers, insulin pumps etc. Furthermore, the post he made
on his blog after this episode have spread the incident, beyond the confines of the people that
were on location when the episode occurred, to the Internet, reposted by various blogs, and is
still being discussed (Mann, 2012). In turn, this has caused an ethical cost towards the McDonalds
franchises name. Mann states on his blog that as this technology becomes mainstream,
McDonalds might need to get used to it. (Mann, 2012). This puts McDonalds further in a spotlight
in which they do not want to be; causing additional cost for the franchise.
Self-empowerment is a vital thing to state in this matter29 since with the use of Manns online
presence as a Professor, and an individual with proof of what happened to him in this incident,
the tables on the regular company-versus-civilian have turned, and in turn have caused
McDonalds a regrettable amount of cost.
Given these arguments for both sides in this case, it is time we take a look at the side that causes
the greatest happiness for the greatest number. (Spinello, 1995: 19), and the amount of people
that could have been caused most cost, meaning the largest loss of benefit. To do so, we have
to take two alternatives, and look at which one of them that will provide the largest amount of
benefit.
Alternative one: the French McDonalds safeguards its name and longevity by disposing of
possible implications of hidden check-ups on the state of the restaurant, by kicking Mann out of
the restaurant. Bystanders might be shocked, Mann will blog and fight towards what he finds to
be a unruly treatment, but in turn the cost of having hidden documentation of bad standards
could hurt everyone employed in the McDonalds franchise.
Alternative two: Mann represents a section of people that need devices to have a better life; the
pain he experiences is in the name of everyone that is in need of such gadgets, and also as a
McDonalds guests, although present guests might have felt that their private life was
compromised by the misinterpreted Eyetap device of Mann. The benefit Mann could cause in this
sense is that of everyone wearing such gadgets, as it is a direct assault upon these cyborgs.
Having put these two alternatives up against each other, the verdict is that the greatest amount of
people that receive benefit in the McDonalds versus Mann incident is the one that favours
29
http://www.surveillance-and-society.org/articles1(3)/sousveillance.pdf
Page 38 of 60
McDonalds and its employees. This is due to the action being looked upon as it unfolded, but if
utilitarianism looked at the following cost towards McDonalds, then one could argue that the more
beneficial side would have been deemed to be Mann.
Furthermore, issues arise when objective theories need to be applied to a case where one side
have to aim to be professional and save its reputation, and the other is a regular individual, which
acts on self-serving and moral reasoning. One might says that the treatment of Mann is unfair,
undemocratic, and that the world will be fueled with another source of cost, but taking a look at
the bigger picture one could say that what might have worked out for the larger amount of people
at the very moment of the episode, is now taking its toll in the aftermath on the online platform,
where other people living with gadgets and people that feel that it goes against their ethical
opinions. This has spawned a whole new wave of cost from the actions taken against a single
individual and his family. To sum it up, one could argue that the possibility of acting on behalf of
sparing people cost, is overwhelming and most likely not possible if you belong to a corporation
or a niche.
To broaden the ethical theory spectrum of the analysis we will now apply the oppositional
adaption of Kants deontological theory, from Ross, to the Mann versus McDonalds case.
Firstly, Ross theory is rooted in the belief that each and every one of us should live by the prima
facie (moral imperatives), which should be applicable under normal circumstances, in regards to
the prima facie hierarchy of obligation (Spinello, 1995: 27).
The seven basic moral duties in the Mann case are binding when evaluating which party carries
the greatest balance of prima facie rightness, and prima facie wrongness.
The moral duties which Mann qualify under is that of fidelity, in which Mann stays true to his
permission from the Doctor use of his device, and that of the seventh, noninjury, in which he is a
direct victim of. The McDonalds employees break these two basic moral duties, and since they
do not abide by a higher prima facie obligation such as gratitude, in relation to appreciate
gratitude when Mann uses his funds at their restaurant, or the direct opposition of reparation, in
which the damage done towards Mann and his device have not yet been done right by.
Additionally, to further prove that Mann carries the greater prima facie rightness, one can also
ask both of these questions: Is my action universally acceptable even to those who are directly
affected by it? (Spinello, 1995: 28), and Would others accept what I have done if it were to
become public knowledge? (Spinello, 1995: 29). In regards to these two questions, one can
conclude that since McDonalds does not want to have their customer experience to include
Page 39 of 60
assault, and in addition to that, it is not in McDonalds best interest to have this episode out in
public due to the prima facie duties being broken.
In summary, Bentham values McDonalds as being right due to the action taken towards Mann
causes the greatest benefit to them, and Ross deems Mann the one in possession of the greater
amount of prima facie rightness. Both of these ethical theories provide us with a view on how
right and wrong can be portrayed when using different theories.
30
31
http://www.bizjournals.com/sanjose/news/2013/04/29/google-glass-how-they-worked-for-me.html?page=all
http://www.lawyersweekly.ca/index.php?section=article&articleid=1987
Page 40 of 60
view of how he performs his surgeries both to help his students, but also with the belief that helping
in advanced surgical procedures with the use of Glass is not impossible to see in a not so distant
future.32
Taking a look at the individuals not wearing Glass, their cost lies in the loss of privacy, risk of
obtaining valuable information such as credit card pin-codes or identity theft, and additionally, the
risk of appearing on the online mediums without wanting to. On the other hand, the benefits of the
non-Glass wearers could be the ability to watch news, incidents, and recordings from Glass wearers
that might not be shown on television, thus giving a more realistic view of the world by looking
through the eyes of the people, instead of watching what is being introduced to them only through
official channels. Individuals gain access to more sources of information, and due to the hierarchy of
benefits in regards to being good in an intellectual sense, one can argue that the loss of privacy,
over the ability to provide evidence for people doing wrong, reporting information to the world, is
seen as being a higher benefit than the cost for the regular man.
To summarize, the larger amount of individuals lose a sense of their privacy, but gain the fresh
stream of information and use of the devices ability from the Glass wearers; this is alternative
number one. The Glass wearers misuse Glass to their own benefit, and the individuals in turn feel
abused by the Glass wearers, and feel uneasy about the lack of knowledge of being surveyed. The
Glass users, albeit few, do not use the device for good, but instead use it as a hidden eye to obtain
information about their fellow man; this is alternative number two. With the emphasis on intellectual
benefit being favored over sensual benefit, the verdict is that alternative one is the utilitarian ethical
right since it brings the greater benefit, at the lowest cost, despite the larger section of the population
not owning the Glass product.
Having looked upon these two examples involving the core idea of how Glass video recording might
be looked upon with an ethical theoretical point of view, we now dive into the final part of our thesis.
6. Discussion
6.1 The product of surveillance
In the next section we are going to use the before mentioned Filter Bubble theory in aspect to
Glass, whilst discussing the view on mediated technology (i.e. Glass) and life, with the help of two
articles. The first article is written by Michael Rosenblum who is testing Glass. The second article is
written by Jaron Lanier who talks about the trade-off between mediated technology and freedom.
32
http://blogs.wsj.com/indiarealtime/2013/09/20/google-glass-could-help-doctors-in-rural-india/
Page 41 of 60
Michael Rosenblum is a tv-producer who has a blog on the Huffington Posts webpage. He had the
honour of testing a pair of Glass in January 2013. Even after testing it for just two days, it really
stands out how fascinated and amazed he is by the product, and how difficult it is to leave once you
have tried it out. As he says: Resistance is futile (Rosenblum, 2013).
The fascination and advancement of technology has always been a major factor for humans. We
have strived for the opportunity to get better, stronger and smarter - this goes for technology as well.
We invent technology because it - amongst many things - offers the benefit of enabling an easier
lifestyle. Through many centuries the technology has evolved into what we find ourselves with today;
smartphones, computers, tablets and so on. It has become no less than a revolution that we are
now able to be mobile and online at any given moment.
The potential for humanity to benefit from this revelation is huge, and no prior technology
parallels it. Data are entering our thought stream so intimately that the way we engage with the
physical world is being significantly enhanced. Every facet of the society we know today will
transform as a growing population plugs into the always-on lifestyle. (Chen, 2011: 47)
We have adapted our lives around the stream of data that being online has to offer. We welcome
this data without looking back because of the fact that it benefits us, but are we actually becoming
more dependent on modern technology? The positive standpoint tells us that it simplifies our
everyday life. It helps us on the professional field of studying, researching, as well as private and
practical matters like banking, shopping, finding cooking recipes, stream or download movies, music
etc., whilst also having the communication capabilities of the future. It has become so much easier
to get in touch with people since the mobile phone was invented, and with smartphones, we can
access the Internet wherever we go. The always-available, always-online phenomenon is, however,
something that raises negative concerns as well, when looking at our dependency on the technology
and everybody else. Being familiarized with the online connectivity in the mediated society holds the
downside of impatientness. We want people to reply right back to us instantaneously, but it is not
always the case that it goes that way. Additionally we also experience a loss whenever our devices
are broken or for some reason not with us.
Rosenblum believes Glass is a big step in the technological advancement and he is generally
positive about the imminent changes. On the other hand, Lanier believes that we cannot really set
aside the fact that we have been too passive on guarding our digital privacy (Lanier, 2013).
Page 42 of 60
The mediated life is very affected by the increasing internationalization and addiction to the
technologies. We are beginning to see an evolution of peoples mobility, where the fact of not always
having our smartphones close to us, is an impossible scenario. He further explains how the
concepts of Apps are decentralizing the power to the individual in favour to big companies. When
using e.g. an iPad we can only control it by the built-in - as well as add-on - apps. We cannot,
however, enter data in the apps, as one would be able to do with a computer, the data is entered by
someone else (Lanier, 2013: 5th paragraph).
Our addiction of being mobile is a fact of the 21th century, where our lifestyle is built around
mobility. But is the mobility taking over? We cannot go anywhere without leaving a digital trace.
Whether we are working on a computer, smartphone, or tablet, all will leave some sort of digital
trace that will let others know our personal activity. What if we have become a product of
surveillance?
Our devotion to the mediated technology has led to the fact that, even though we know the negative
consequences of mediated technology (i.e. surveillance), we are still using it because the negative
sides are offset by the positive sides. What Lanier is pointing out is that maybe we have been too
unconscious about the reality of taking use of mediated technology. As Lanier mentions:
I wish I could separate the two big trends of the year in computing the cool gadgets and
the revelations of digital spying but I cannot. (Lanier, 2013)
Have we been sleeping during the mediated-technology hurricane, and just do not care whether or
not we are under surveillance? It would be pleasant to believe that the network surveillance is for the
greater good of the public, that we can have a society with less crime and terror, and truly benefit
from the collected data, which also makes decisions easier when e.g. shopping online, but we do
not really know where our personal data ends up. We tend to trust certain authorities to deal with the
data in a secure way, but we cannot really be sure whether or not the data is in safe hands, however,
many people trust that it is. One thing is certain; the individual is the greatest source to collect data
from, and we as individuals collect data without even knowing it. We all have a little fruit basket in
the shape of a smartphone, computer, tablet and so on, which automatically stores data of
everyone's whereabouts. It seems that we are giving away our freedom and privacy, one small piece
at a time. But does privacy even matter anymore?
With the rise of social networking websites and smartphone apps, people are willingly giving
away all sorts of personal information everywhere they go. (Chen, 2011: 187)
Page 43 of 60
We see a valid argument from both Rosenblum and Lanier. On one hand, there is a lot of positive
effects coming with mediated technology (i.e. Glass), but on the other hand it comes at a cost,
Rosenblum says, while quoting the movie Inherit The Wind:
Progress has never been a bargain. You have to pay for it. Sometimes I think there's a man
who sits behind a counter and says, "All right, you can have a telephone but you lose privacy
and the charm of distance. (Rosenblum, 2013)
In order to achieve progress there must be a sacrifice. If we want to take advantages of the online
connectivity and mediated technology, we must accept the consequences and enter the filter
bubble. Rosenblum is however still positive regardless of the consequence of laying down our
guards towards privacy. He believes that we will see a fundamental change in the way we live our
lives with the arrival of Glass (Rosenblum, 2013).
6.1.2 Sousveillance?
In todays mediated society a new concept has seen the light; Sousveillance. Sousveillance is the
concept of person-to-person surveillance, which can also be referred to as omnopticon, where
people survey each other without the interference of any authority (Mann et al., 2003: 332-334). This is
very similar to Chalkleys Little Brother theory where we are all watching each other.
It seems doubtful that people would agree to spy on others on purpose, but with todays CMC,
people are becoming more and more fixated on knowing who other people are, as well as letting
other people know who we are. By creating profiles we stage ourselves and thus becoming more
accessible to others. Staging ourselves is interesting because we are putting ourselves out there,
and in turn letting everybody know private things about us. Besides what we ourselves choose to
share, people have a tendency to forget about the various online privacy policies policies, which
may not have gotten as much attention as it should have. So what happens, when we put ourselves
online? Who could essentially be watching when we act and communicate through CMC?
The tools we stage ourselves with (i.e. Facebook, Twitter, Google) are often associated with the
personalized data. As the Filter Bubble theory mentions, the personalized data has a major impact
on the user interface and how specific content are presented separately from person to person. This
might, in a near future, be applied to Glass as well. The new platform unquestionably presents a
possibility to widen the reach of surveillance capabilities, as we can now take all our content from
Page 44 of 60
being online at Google, and access it on a head-mounted device, all of which represent mobile
technologies as more integrated with the human body than ever before. Hereby the personal filter
bubble is complete. Once we integrate with Glass, the final frontier is removed and we will have
direct access to our data instantaneously. A major difference we see in Glass are the fact that a
camera is situated in the head-mount, so when wearing Glass the camera is always pointed at the
users direction of view. Of course this has been done for ergonomic reasons as well as logical. It
makes perfect sense that the camera should be placed right next to the users eye. The problem,
however, is who would be able to say whether or not the Glass user is filming the surroundings? If
someone took an actual video camera and pointed it at us, we would know that we were being
filmed, we would know this because we interpret the sign of a person facing a camera towards us,
as if the person is filming us. With Glass we do not necessarily see the camera; we see a pair of
glasses. Nonetheless, within the glasses is a camera, and the camera is always pointing at us, we
just do not notice it - making it easier for the camera to potentially be used as a tool for collecting
personal information.
recover stolen vehicles, by letting CCTV-cameras scan the vehicles number plates over freeways.
This has been proven very effective, and helped officers to get to the stolen vehicles immediately.33
What if that concept could apply to Glass as well? It is a possibility, since there is a camera in the
head-mount. When having ones smartphone surveilled, what can stop companies or governments
from surveilling Glass as well, and taking use of the camera that is built into them? Though this is
just a thought, it can very easily be achieved.
33
http://www.cctv-information.co.uk/i/An_Introduction_to_ANPR
Page 45 of 60
When looking at the fast growing popularity of e.g. iPhones we see that an increasing amount of
people are buying the product, even though it is more costly than comparable models (Curwen et. al
2010: 115-126). People buy the iPhone because it is more than a smartphone - it is a symbol of
status. Apple found the way to merge design and technology, which initially people did not need,
and made them believe that they needed it. Comparing Glass to the iPhone we find very similar
concepts: it is designed in a neat and smart way, it is easy to operate, and it allows access to all the
content one would need. Glass is, however, additionally also more integrated with the user than the
iPhone.
We believe people will find Glass at least as attractive, and addicting, as the iPhone - if not even
more. When the final Glass product launches and the popularity increase, the possibility of a future
surveillance scenario will increase too - a scenario that may even resemble the one in George
Orwells 1984.
and Material Life in the Early American City. As a professor in early American housing, Herman
discovered that the average home was about 1610 ft. Numerous families would be living together
under the same rooftop. In addition most houses had few or no internal walls up until the 19th
century (Ferenstein, 2013). The origin of the Bed Chamber did not become accepted and
widespread amongst the wealthy European until around the 1600s, and even then, those who could
afford a bed still chose to sleep with houseguests and servants on bigger mattresses (Ronnes, 2006).
Bathrooms were public as well; proof indicates that citizens would chitchat while relieving
themselves in open multi-toilet rooms. Finding privacy inside the home would seem difficult. The rich
people who had the option to build houses with internal walls still preferred to have their private lives
on display. This suggests that grand exhibitions of ones wealth in the form of an open house were
simply a status symbol (Angela, 2009: 236). One exception to this rule may apply: excavations of
ancient Greek houses uncover buildings with divided areas and windows that made it rather
impossible to look inside. But mainly, privacy did not properly exist in ancient cities (Burke, 2000).
Perhaps the real concern is with information privacy? This is a fairly new term as well. The right to
privacy was not invented until 1890 by future Chief of Justice, Louis Brandeis. The Supreme Court
however refused to recognize the right to privacy until the 1967 case, usually referred to as Katz V.
The activist, Katz, used a public telephone booth to spread what was considered risky information
from Los Angeles to Boston and Miami in violation of federal law. After wide-ranging observations,
the FBI placed a listening device in the telephone booth and recorded all of Katzs telephone
conversations. This material was later used as evidence against Katz at his trial. Back then, the
Fourth Amendment in the United States Constitution would not allow any organization to participate
in unlawful searches and captures of American citizens. The case got a lot of attention in 1967 causing US citizens to become more aware of NSAs methods.34
Regardless of the law, Cerfs point was that transparency is something we are going to have to live
through. Im not saying that we shouldnt be interested in privacy, but I am suggesting to you that
it is an accident, in some respect, of the urban revolution, he concludes (Ferenstein, 2013). Cerfs
remarks have gotten great attention due to the increased discussion of Googles use of ad targeting
and the Glass project. Cerfs comments should be seen as a reply to the criticism that Google has
received from Governments all around the world (hence the open privacy letter from Privacy and
Data Protection Commissioners) in relation to Googles privacy policies. Many are especially
concerned about their privacy in regards to Glass. It is difficult to find technological solutions to
34
http://www.uscourts.gov/educational-resources/get-involved/constitution-activities/fourth-amendment/wiretaps-cell-phonesurveillance/facts-case-summary.aspx
Page 47 of 60
privacy, especially with a product like Glass. Data scientists are increasingly getting more clever at
identifying individuals from anonymous datasets. Even if an individual chooses to keep information
private, it is getting easier to ID someones interests, gender and sexual orientation from the public
activity of their social media friends. "Our social behaviour is also quite damaging with regard to
privacy," Cerf says (Ferenstein, 2013). He paints a picture of how a person could be caught doing
something that they wanted to keep a secret by being tagged in the background of a stranger's
photo a photo they never expected to be caught in.
"The technology that we use today has far outraced our social intuition, our headlights. ...
[There is a] need to develop social conventions that are more respectful of peoples privacy.
We are going to have to live through situations where some people get embarrassed, some
people end up going to jail, some other people have other problems as a consequence of
some of these experiences."
More respectful privacy conventions will likely develop as we move forward, Cerf says, but for now,
"This is something we are going to have to live through. I do not think it is easy to dictate this"
(Ferenstein, 2013).
But is it safe to sit back and let things run its course? When looking at recent revelations from
various whistleblowers, have we not done that enough? Regardless of whether technology created
the sense of privacy or not, it certainly killed it. The consequences are already remarkable - and
Glass is yet to come.
35
http://www.ragingchickenpress.org/2013/09/21/war-is-peace-freedom-is-slavery-ignorance-is-strength-privacy-is-surveillance/
Page 48 of 60
for decades, a practise that has only been intensified throughout the years. While Cerf believes that
the feeling of privacy is a product of the improved technology, several journalists, bloggers,
professors etc. argues otherwise.
With NSA engaged in warrantless wiretapping, maintaining a call database and also in data mining
(PRISM), one could wonder if Big Brother is still just a fictional character. The telescreens installed
in every home in Orwells 1984 is of course not the case in real life or is it? These telescreens
could easily be compared to every single self-acquired smartphone, laptop or Glass, giving out
information about our every move to the great Big Brother or, as it is the case with Glass; Google.
Google has an unofficial mantra; dont be evil this mantra has given opportunity to many puns
and wordplays amongst journalists, bloggers etc. at times when Google has not lived up to this
catchphrase (Wright, 2012). Several Google scandals have gotten much attention throughout time,
e.g. when they were caught collecting private data info using their Google StreetView cars, or when
they managed to avoid Apples privacy protections in Safari to serve ads to iOS users (Wright, 2012).
However, these examples will all faint compared to the scandal Glass can create if it as planned
becomes a consumer product. Glass will make us a product; to help empathize the importance of
this message, George Orwell provides a provoking thought:
It was terribly dangerous to let your thoughts wander when you were in any public place or
within range of a telescreen. The smallest thing could give you away. A nervous tic, an
unconscious look of anxiety, a habit of muttering to yourself anything that carried with it the
suggestion of abnormality, of having something to hide an improper expression on your face
was itself a punishable offence. There was even a word for it in Newspeak: facecrime
(Orweillan, 1949: 30)
With the before mentioned theoretical analysis and opposing article statements, it is safe to argue
that with Glass we are one step closer to facecrime one step closer to Big Brother. There is no
doubt that Google has plenty of opportunity and material to monitor and, to some extent, manipulate
us with personalized advertisements (as explained in Parisers Filter Bubble), but they also have
the power to sell our data to any third party interested as they own the data you produce through
Glass. As previously mentioned, this basically means that a Glass user is doing fieldwork for Google.
Glass enables us to give Google what they need. From the moment we accept the terms and
conditions, we become an extension of Google even though we may feel like we own the Glass, in
reality, Glass owns us. We are unwillingly maybe even unknowingly an unsuspecting little
brother/sister in todays modern society. Of course, one can choose not to be a part of collecting
data by not buying Glass. This, however, does not mean that we are protected from ending up in
Page 49 of 60
Googles database. As long as we are near a person wearing Glass, we are at risk. Google may say
that face recognition will not be installed, but hackers already know how to make their way around
it.36 All this information on us is kept and up for sale by third parties behind our back it may seem
innocent, but this makes us guilty until proven otherwise. To quote Gus Hunt, the chief technological
officer of Central Intelligence Agency, once again:
The value of any piece of information is only known when you can connect it with something
else which arrives at a future point in time. ... Since you cannot connect dots you do not have,
it drives us into this mode of: We fundamentally try to collect everything and hang on to it
forever. (Sledge, 2013)
We are all suspects. It may be 2013, but it sure feels a lot like 1984.
36
http://neatocode.tumblr.com/post/50292349091/face-rec-on-glass
Page 50 of 60
7. List of References
7.1 Books
- Angela, Alberto, A Day in the Life Of Ancient Rome, 2009
- Calaprice, Alice, The New Quotable Einstein, 2005
- Chalkley, Tony, Brown, Adam, Cinque, Toija, Warren, Brad, Hobbs, Mitchell, Finn, Mark,
Communication, New Media and Everyday Life, Oxford University Press, 2012
- Curwen, Peter; Whalley, Jason, Mobile Telecommunications in a High-Speed World, 2010
- Dreyfus, Hubert L., On the Internet, Routledge, 2001
- Fiske, John, Introduction to Communication Studies, Routledge, 1982
- Hamelink, Cees J., The Ethics of Cyberspace, Sage Publications, 2000
- Joinson, Adam, McKenna, Katelyn, Postmes, Tom, Reips Ulf-Dietrich, Oxford Handbook of
Internet Psychology, Oxford, 2007
- Lace, Susanne, The Glass Consumer - Life in a surveillance society, 2005
- Pariser, Eli, The Filter Bubble, VIKING an imprint of Penguin Books, 2011
- Ronnes, Hanneke, Architecture and Elite Culture in the United Provinces, England and
Ireland, 2006
- Sheridan, Alan, Discipline and Punish: the Birth of the Prison, New York: Vintage, 1977
- Small, Gary & Vorgan, Gigi, iBrain, HarperCollins, 2008
- Spinello, Richard A. Ethical Aspects of Information Technology, 1995
7.2 Webpages
CNN Politics (2005), Bush Says He Signed NSA Wiretap Order, last visit: 13-12-2013
http://edition.cnn.com/2005/POLITICS/12/17/bush.nsa/
Page 51 of 60
Page 52 of 60
Smith, Justin (2008): Mapping Facebooks Growth Over Time, last visit: 13-12-2013
http://www.insidefacebook.com/2008/08/19/mapping-facebooks-growth-over-time/
Thoppil, Dhanya Ann (2013): Google Glass Could Help Rural Surgeons, last visit: 13-12-2013
http://blogs.wsj.com/indiarealtime/2013/09/20/google-glass-could-help-doctors-in-rural-india/
University College London Faculty of Laws, Benthams Panopticon (2013), last visit: 13-12-2013
http://www.ucl.ac.uk/Bentham-Project/who/panopticon_folder
US National Securicy Agency (2013), last visit: 13-12-2013
http://www.nsa.gov/
US National Security Agency (2013), last visit: 13-12-2013
http://www.nsa.gov/about/_files/CoreValues.pdf
Vasilogambros, Matt (2013), NSA Spying Scandal: 2006 or 2013?, last visit: 13-12-2013
http://www.nationaljournal.com/nationalsecurity/nsa-spying-scandal-2006-or-2013-20130606
Walby, Kevin (2005): How Close-Circuit Television Surveillance Organizes the Social: An
Institutional Ethnography, last visit: 13-12-2013
http://www.jstor.org/discover/10.2307/4146130?uid=3737880&uid=2129&uid=2&uid=70&uid=4&sid=
21103117010797
7.3 Articles
- Alyssa Rhrict, (2013): An Orweillan Looking Glass
http://thecrashculture.wordpress.com/2013/02/20/an-orwellian-looking-glass/
- Andrejevic, Mark (2002): The Work of Being Watched.
http://www.csun.edu/~pr4027/coms454/454Supp/workofbeingwatched-csmc.pdf
- Andrejevic, Mark (2002): The Work of Watching One Another.
http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/viewFile/3359/3322
Page 53 of 60
- Benedict, Michael (2013): Through a Google Glass, darkly - New technology sparks privacy,
ownership concerns.
http://www.lawyersweekly.ca/index.php?section=article&articleid=1987
- Bruce Schneier, (2013): The Internet is a Surveillance State
http://edition.cnn.com/2013/03/16/opinion/schneier-internet-surveillance/
- Dana Priest, (2010): A Hidden World, Growing Beyond Control
http://projects.washingtonpost.com/top-secret-america/articles/a-hidden-world-growing-beyondcontrol/3/
- Essers, Loek (2013): Google Glass privacy concerns raised by international data protection
authorities
http://www.cso.com.au/article/465221/google_glass_privacy_concerns_raised_by_international_dat
a_protection_authorities/
- Glenn Greenwald, (2013): The top secret rules that allow NSA to use US data without a warrant
http://www.theguardian.com/world/2013/jun/20/fisa-court-nsa-without-warrant
- Hill, Kashmir (2012): How Target Figured Out A Teen Girl Was Pregnant Before Her Father Did
http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnantbefore-her-father-did/
- Holly, Russel (2013): Whats New Compared to the Original Model?
http://www.itproportal.com/2013/11/05/google-glass-2-whats-new-compared-to-the-original-model/
- John Markoff (2006): Documents Show Link Between AT&T and Agency in Eavesdropping Case
http://www.nytimes.com/2006/04/13/us/nationalspecial3/13nsa.html?pagewanted=all&_r=0
- Kevin Walby (2005): How Closed-Circuit Television Surveillance Organizes the Social: An
Institutional Ethnography
http://www.jstor.org/discover/10.2307/4146130?uid=3737880&uid=2129&uid=2&uid=70&uid=4&sid=
21103117010797
Page 54 of 60
- Kopstein, Joshua (2013): Leaked documents reveal NSA can keep 'inadvertently acquired' data on
American citizens for years
http://www.theverge.com/2013/6/20/4449738/leaked-documents-reveal-the-nsas-top-secret-rulesfor-warrantless-surveillance
- Mann, Steve et al. (2003): Sousveillance: Inventing and Using Wearable Computing Devices for
Data Collection in Surveillance Environments
http://www.surveillance-and-society.org/articles1(3)/sousveillance.pdf
- Matt Sledge (2013): CIA's Gus Hunt On Big Data: We 'Try To Collect Everything And Hang On To
It Forever'
http://www.huffingtonpost.com/2013/03/20/cia-gus-hunt-big-data_n_2917842.html
- Lanier, Jaron (2013): Digital Passivity
http://www.nytimes.com/2013/11/28/opinion/digital-passivity.html?_r=1&
- Lesley Cauleuy (2005): NSA has massive database of Americans' phone calls
http://usatoday30.usatoday.com/news/washington/2006-05-10-nsa_x.htm
- Lynch, Shana (2013): Google Glass review: Stop worrying about secret recording.
http://www.bizjournals.com/sanjose/news/2013/04/29/google-glass-how-they-worked-forme.html?page=all
- McCarthy, Tom (2013): NSA awards itself A+ for accountability as it happened.
http://www.theguardian.com/world/2013/dec/11/nsa-chief-keith-alexander-senate-committee-liveupdates
- Rosenblum, Michael (2013): Goggle Glass
http://www.huffingtonpost.com/michael-rosenblum/google-glass_b_4367971.html
- Shawki, 2009, Surveillance and Foucault: Examining the Validity of Foucault's Notions Concerning
Surveillance through a Study of the United States and the United Kingdom
http://digitalcommons.iwu.edu/cgi/viewcontent.cgi?article=1022&context=socanth_honproj
Page 55 of 60
- Smith, Craig (2013): How Many People Use 340 of the Top Social Media, Apps & Tools?
http://expandedramblings.com/index.php/resource-how-many-people-use-the-top-socialmedia/#.UqDIuo3l3Ks
7.4 Movies
- Hoback, Cullen - Terms and Conditions May Apply (2013)
- Spielberg, Steven - Minority Report (2002)
Page 56 of 60
8. Appendix
8.1 Appendix 1
8.2 Appendix 2
Page 57 of 60
8.3 Appendix 3
Page 58 of 60
that such a product entails. To date, however, most of the data protection authorities listed below
have not been approached by your company to discuss any of these issues in detail.
For our part, we would strongly urge Google to engage in a real dialogue with data protection
authorities about Glass.
The questions we would like to raise include:
How does Google Glass comply with data protection laws?
What are the privacy safeguards Google and application developers are putting in place?
What information does Google collect via Glass and what information is shared with third
parties, including application developers?
How does Google intend to use this information?
While we understand that Google has decided not to include facial recognition in Glass, how
does Google intend to address the specific issues around facial recognition in the future?
Is Google doing anything about the broader social and ethical issues raised by such a product,
for example, the surreptitious collection of information about other individuals?
Has Google undertaken any privacy risk assessment the outcomes of which it would be
willing to share?
Would Google be willing to demonstrate the device to our offices and allow any interested
data protection authorities to test it?
We are aware that these questions relate to issues that fall squarely within our purview as data
protection commissioners, as well as to other broader, ethical issues that arise from wearable
computing. Nevertheless, we feel it is important for us to raise all of these concerns. We would be
very interested in hearing about the privacy implications of this new product and the steps you are
taking to ensure that, as you move forward with Google Glass, individuals privacy rights are
respected around the world. We look forward to responses to these questions and to a meeting to
discuss the privacy issues raised by Google Glass.
Sincerely,
Original signed by
Jennifer Stoddart Privacy Commissioner of Canada
Jacob Kohnstamm Chairman of the Article 29 Working Party, on behalf of the members of the Article
29 Working Party
Timothy Pilgrim Privacy Commissioner of Australia
Marie Shroff Privacy Commissioner, New Zealand
Page 59 of 60
Alfonso Orate Laborde Secretary for Data Protection, Federal Institute for Access to Information
and Data Protection, Mexico
Rivki Dvash Head of the Israeli Law, Information and Technology Authority
Hanspeter Thr Swiss Federal Data Protection and Information Commissioner
Jill Clayton Information and Privacy Commissioner of Alberta
Jean Chartier President, Commission daccs linformation du Qubec
Elizabeth Denham Information and Privacy Commissioner of British Columbia
[1] Google Glass includes an embedded camera, microphone and GPS, with access to the Internet.
The Android Operating System powers Google Glass, and third-party applications are currently
being built for Glass. To access Glass, a user needs a Google account.
[2] https://developers.google.com/glass/overview
Page 60 of 60