Friday, 23 October 2009

privacy in searches on google, yahoo and bing

Cybernet article on privacy for searches using various browser add ons and tricks. Found it thought

Wednesday, 21 October 2009

Friday, 16 October 2009

privacy as social rather than technological problem

I would have thought this postion was fairly obvious, but then, social scientist....

the freedom to tinker blog is hosted by princeton's Centre for Information Technology Policy. Who seem to be starting to do some interesting work. Not a lot of material on the centre page, but more on the blog itself.

Thursday, 15 October 2009

National Identity Fraud prevention week

Can't believe that I missed this one. It's National Identity Fraud prevention week again! And it's Thursday! I could have lost my identity several times this week already.

campaign website at but take with a pinch of salt, then take a look at the partners page to see who is paying for this helpful advice. It includes Fellowes, who manufacture shredders to destroy all that potentially deadly personal information, collected by Experian, Equifax and Call Credit, and used to send you junk mail (sorry targeted advertising) delivered to your house by the Royal Mail.

still, at least they're not calling it Identity Theft any more.

Thursday, 8 October 2009

'The Uses of Intelligence' Surveillance Society - arts exhibition

Arts Centre Washington, in Sunderland is putting on an exhibition with the above title, between the 15th October and 21st November.

Arts Centre Washington hosts a unique array of gadgets (old and new) in a playful exploration of the world of espionage and surveillance illuminating their omnipresence and influence on our lives. The centerpiece of the exhibition is an original WWII Enigma machine used for the encryption and decryption of secret messages. The exhibition also includes an interactive CCTV Treasure Hunt, hidden cameras and designs for our imagined futures. Artifacts in the exhibition are drawn from a diverse range – private collectors, artists, designers and even the James Bond Museum!

Sunday, 4 October 2009

IdentiNet Conference, day two

Here's the second part of my notes from the IdentiNet conference in Oxford last weekend.

Khaled Fahmy gave an interesting talk about population, governmentality and individual identity in nineteenth century Egypt. He argued that the impetus for individual identification was the army, attempting to account for the population of Egypt for conscription. Borrowing Simon Cole's terminology from the previous day, the poster criminal was the deserter. He drew upon Foucault's work on governmentality (although mainly upon the single governmentality lecture, rather than the broader lecture series published as Security, Territory, Population). Earlier Egyption forms of identification, mandated by the Ottoman empire were mainly focussed upon identifying the dead in order to uphold sharia in terms of inheritance. This was latter transformed from a pecuniary investigation to something closer to what we might consider a post mortem. Khaled identified this as a symbold of the tranformation of the nature of the problem of population. The figure of Mehmed Ali Pasha loomed large in this account, as he attempted to put together his own power base independent from the Ottoman Empire. As part of this, a census was conducted in 1848 which essentially used force to hold village heads accountable (in contract) for the accuracy of information provided. There was also coercion of midwives, surgeons etc to keep this database updated. Khaled tied this account of governmentality with the aspect of care of population through an extensive public health system, and medical schools (primarily intended to produce military physicians). Khaled attempted to tie together a permanent militarisation of Egyptian society with the birth of modern Egypt and it's structures of government. Khaled has kindly sent me the full copy of his paper, because I'm really quite interested in reading it in depth given that I drew upon governmentality (although largely filtered through Mitchell Dean) for some of the theoretical core of my thesis.

Simon Szreter gave a highly reflexive talk, in which he spoke about wrestling with ways of thinking about motivations for the introduction of Parish registers in England. He posed two questions, firstly, why the introduction, and secondly, why such registers succeed or fail. He was critical of the generally accepted idea, from historian Geoffry Elton, that is an motivation is stated by government, then it must be false (the 'Paxman principle'). Szreter gave Thomas Cromwell's stated motivation for the introduction (solving inheritance and other civil disputes), and contrasted it against Elton's belief that it was largely for tax purposes. This was then compared with colonial Englishmen in New England who set up similar registers on their own account, suggesting some level of social need the register was meeting (or inertia). However, these did not sustain for any length of time, a fact Szreter attributes to the non-existence of Poor Law welfare models in New England, which the register has become core to maintaining. It is interesting to think about state motivations, because a state (even early modern) is made up of multiple elements, it is feasible to believe that it has multiple motivations for any given act it takes. Therefore, the mistake that might be made here is an attempt to identify one single motivations - this does seem to be a common model of thought used by historians in isolating the state out from society, and assuming it to be homogeneous - it's motivations are higly likely to be overdetermined.

The final panel of the conference focused upon the advent and spread of house numbering practices, something I'd never even thought of before, and a symbol of the use of this conference in destabilising simple accounts of contemporary vs historical surveillance. House numbers are taken for granted, and have a multiplicity of uses both for individuals (where am I going? please send that letter to me, etc) and for the state (the suspect lives at number 9). The panelists, Vincent Denis, Karl Jakob Krogness and Anton Tantner spoke about house numbering in 19th century France, household registration schemes in Japan and house numbering in Europe respectively. House numbering again seems to have a military dimension, at least in France following on from previous temporary chalk numbers on houses to assist with military billeting, then being pulled in to everyday bureaucratic procedures (this is something we can see happening today with technologies such as GPS, initially military, now spreading out across a wide range of social activities). Krogness' talk showed how the choices made about an identification system (in this case focussing upon the household rather than the individual) can have massive social implications (although presumably, the choice is in some sense determined by existing social norms). In this case, heads of households became 'the terminal bureaucrat'. Tantner showed the range of alternate ways of numbering houses, which could easily seem trainspotterish, but, shows how even simple 'technologies' such as this are in some sense chosen, not on the basis of scientific merit, but for social reasons. He ended with a vignette of a social movement in Germany, that set up office in a shipping container in a public park. This movement gave this container a house and street number, inserting itself into bureaucratic mechanisms - it is unofficial, but it still gets post delivered to it. This shows how systems and structures can be contested and exploited regardless of their creators intention. I really wanted to hear if anybody could draw any connections between house addresses and email/IP addresses today.

I found the conference useful for the following reasons
  1. expanding historical knowledge of identification practices
  2. showing the contested nature of such processes, their resistances and their subversions
  3. showing that such practices arise for multiple reasons, often in responses to some social need (or perception of a social need) or governmental problem.
  4. making me think about the relationship between writing and policing.
  5. countering the technological domination of this field.

Friday, 2 October 2009

IdentiNet Conference, Oxford - 26-27th September 2009

Last weekend, I headed over to St Antony's college, Oxford for a two day conference - 'Identifying the Person: Past, Present & Future'. It mainly focused upon historical accounts of identification, and the disciplinary background was largely historians, but there were some other perspectives too. I wasn't giving a paper, so was able to just sit back and listen, and take a few notes. Full programme here

Panel One - Biometrics

Simon Cole (author of Suspect Identities, a history of fingerprinting) set out a theory of 'poster criminals' associatied with the promotion of particular regimes of identification. He aims to contradict the 'wiggish' history of inevitable technological development and show the contested history of technology development. The poster criminal represents the links between criminality and the identification problem. The poster criminal for fingerprinting was the burglar, whilst Cole argues the poster criminal for DNA technology is the sex criminal. Crime is seen as a problem to be solved through knowledge and science. As well as identification of individual criminals, Cole drew links between DNA fingerprinting technologies and wider attempts to find 'crime genes', and explored the use of other information technologies in dealing with sexual crime (community notification, iPhone apps that make use of sex offender registers to show you were nearby sex offenders live). He raised the prospect that the information overload available (about various forms of risk) meant that it was difficult to know what to do with that information. However, this problem itself is seen as being solveable by gaining further knowledge. I really like Cole's work, however, I'm sceptical that there is a single type of criminal that is the 'essence' of the argument. In my work on debates around ID cards in the UK, there's a whole chain of negatively evaluated roles that are mobilised in support of identification. The idea of information itself having an innate protective value emerges in the politics of terrorism too.

Mercedes Garcia Ferrari spoke about identification in Argentina, the role of police files in the 19th to early 20th century. She raised the role of the medical profession in allaying suspiscion, but that photography in ID really attracted resistance due to social stigma. She echoed Coles work by showing that in Argentina as well, scientific considerations were not the sole determinant in the development of identification technologies. An insight arising from this presentation was that if you wanted to use a technology for widespread social control, it would probably generate less resistance if you used a 'clean' technology rather than one with a history of being used in crime control, as this would be less likely to carry a stigma.

Pierre Piassa spoke about contemporary resistance to biometrics in France. He presented three case studies - the DNA sampling refusal movement, opposition to the use of biometrics in schools (primarily by parents rather than by the children subject to the system), and resistance to the national DNA database (INES?). This resistance has include unions, and has made use of websites etc to co-ordinate campaigns. The reistance to biometrics in school was said to have elements of 19th century luddism, fearing the mastery of the machine and involved sabotage. It is thought to subvert the role of the school system, conditioning pupils to accept control and punishment rather than critical and creative thinking. Pierre was cautious about drawing firm conclusions due to the relatively small number of activists about how representive they were of the French population as a whole in their attitudes towards identification and surveillance. Observations were made about the impact that France's Vichy regime had on attitudes towards identification.

The panel commentator, Pamela Sanker highlighted the importance of cateloging resistance as it happens, as when technologies become widely accepted previous resistance is elided. She pointed to the need to examine the back end of the database. Historical accidents are very important in how technologies occur, as are cultural beliefs.

Panel 2 - Intensive Documentary Surveillance

Ross Anderson spoke about the Database State, drawing upon the contents of the recent report by the Joseph Rowntree Reform Foundation into government databases. He positioned identity cards as political theatre and overengineered, but part of a wider project of transformational government. There are 40 different identifiers used by the UK state, and there is an attempt to join them up. He spoke about the I vs Finland case, recently determined in Strasburg that establishes a legal right to restrict medical records to those directly involved in personal care, and that this would, if followed would prevent this transformative agenda. He also identified hard science issues about the dependability of large complex systems such as those the government is trying to build. Problems increase if users of complex systems are effectively competitors. There are also questions of how security scales and how universal names can be sorted across legacy systems. He is clearly in favour of the way that the private sector handles IT projects, and is scathingly critical of government IT in general.
I had a chat with Ross in the pub afterwards, and he sent me reference to an article I should read. In questions, Ross also discussed the disconnect between IT project lengths (often around 7 years) and ministerial or fast track civil service postings (typically 2 years) leading to project leaders being disengaged. He also highlighted the absence of an in-house technical staff in the UK civil service.

James Brown, one of the conference organisers read out a paper by Iris Braverman who was unable to attend. The paper looked at the Israeli border, and it's new crossing administration - an attempt to move away from capricious and unrealiable ad hoc border crossings manned by the army towards a smaller number of modern, professional, permanent 'international terminals' manned by a dedicated agency. Previously checkpoints were seen as blocking movement, these new crossings are to facilitate certain types of movement. The crossings are highly textual, in that there are signs everywhere, showing what is considered to be appropriate behaviour and how to orientate oneself to the crossing. The crossings also physically regulate conduct - it is impossible to approach them other than in single file, with no way of turning back due to systems of turnstiles and fenced queues. The images that were displayed of these were a little unsettling. Braverman described the system as a neoliberal netork of admin actors, with new forms of surveillance requring an intensive network of identification, carried out in modernised neo-liberal manner (efficiency, consumers, globalisation). An interesting paper, although I would take issue with the description of borders as 'capricious', although perhaps in a Kafka-esque sense of the word.

Jane Caplan (one of the conference organisers, and co-author of Documenting Individual Identity) spoke about identification documents and registers in Nazi Germany. There was quite a lot of historical detail to this presentation, which showed how identification practices involving local police registers and civil status systems were coupled to the primary political priority of waging war. It seemed to be a highly complex and elaborate set of processes, that seemed highly resistant to any attempt by the subject of records to alter or correct those records. This included changes to names, which became highly politicised (and vital) with the race laws the nazi regime brought in. Identification systems were used to achieve political ends, and to shore up cultural 'reforms' such as 'proper' German spellings of names (Clara to Klara for example) and restricting jewish people to a list of official jewish names. Caplan pointed out that these political changes might have been facilitated by how well they fitted with an already potnetially authoritarian system, and the acceptance of state interference in legal names. Nazi practice cannot be treated simply as an abberation from previously existing legal identification regimes. In questions, the UK was positioned as the other extreme of this, in that the state has traditionally had little jurisdiction over whatever one wanted to call oneself - as the change from David Wills to David Barnard-Wills has shown, it's a minefild of strange bits of archaic law, butting up against modern information practices.

In the question session that followed, there were remarks about what had happened to the traditional pessimistic british civil service with regard to IT projects, and also about the way that colonial practices were exported (often from the UK) and became rooted elsewhere - with Israel serving as a modern exporter of security practices that other governments explicitly 'learn from' (David Lyon) - this is something that Ces Moore and I have been writing about recently. Edward Higgs brought up Hardian's wall as an example of an attempt to control access rather than a complete barrier. One thing that came up here that REALLY threw me was the idea of illiterate police men. Now, rationally this makes sense, but I think I so strongly associate police work with some form of recording or attempting to make the criminal world legible and documented, that is seems oddly off kilter. That in itself is worth further thoughts.

Panel 3 - Mobilities

Edward Higgs argued that looking at mobility as a cause of identification regimes (as in the traditional 'modernity brings anonimity argument') isn't very productive. He pointed out that most identification was commerical rather than state based, and that when states did identify, they did it with commerical technology. He provided the two basic models through which historians make sense of the state in terms of motives and intentions.
The first is the 'statist' model in which the state exerts a will to power, and aims to control the people (James C. Scott - Seeing like a state is included here). The second is the 'social functionalist' camp in which state actions are explained in terms of the needs of society. The historical side of this presentation was good, showing how people in early modern England were highly mobile (Edward did a similar thing at the Identity in the Information Society Conference a few months back) - however, I was less happy with the second part in which this was used to draw lessons for contemporary identity cards. As a political scientists, I felt that the two models of the state offered were both simplistic and rather uncontested (the state was a relatively homogenous thing with obvious borders and end points, clear seperated from society) and contemporary government intentions were read off as if they were obvious, without much in the way of empirical evidence for the assertions made here. Edward argued that the state is attempting to turn itself in a shop with loyalty cards with the modern consumer trick of treating it's customers as individuals rather than as a mass.

Uma Dhuphelia-Mesthine spoke about Indians in the Cape and state permits system between 1906 and the 1920s - this focused upon the various evasion moves used to circumvent tight (and fairly racist) immigration requirements.

David Lyon spoke about Identifying the North American Person, theSecurity and Prosperity Agreement. This draws upon his newly released book, and had some overlap with the talk I heard him give at the LSE earlier in the week (which you can watch in full here). He drew attention to market volatily, political confusion and technology, in making it hard to predict what would stabilise out of current ID developments. He spoke about the idea of the 'card cartel' the combination of the government and private sector interests, and how the card symbolises the citizen-consumer (symbolised by the very shape of the modern card - like a credit card rather than papers, with a ready space in the wallet ready to accept it). The Security and Prosperity agreement is a north american treaty brought about by business interests post 9/11 to make sure that increased security would not trump economic mobility. David also spoke about opposition to the REAL ID act and attempts to standardise driving licenses across the US. He ended with some thoughts about the possibility of using the idea of human security as a corrective to the concerns of national security that seemed to predominate, and advocated for forms of active citizenship.

Panel 4 - Mobilities (2)

Keith Breckenridge spoke about Ghandi's involvement in identification of Indian workers in South Africa and the vulnerability of being sucked into an administrative order. This was a highly detailed presentation, which drilled down to look at the individuals involved in a pivotal political moment.

Adam Mckeown spoke about identification practices across the pacific, drawing upon his book 'Melancholy Order' he engaged with distinctions of east and west in terms of mobile, globalised classes from 1880s onwards, and contrasted the assumption that mobility and the ability to travel was an important element of human freedom with it's driver in capitalist labour practices. He argued that strengthening the external border was seen as a necessary part of allowing free movement within that border.

(day two of the conference and some conclusions to follow