Copyright 1987-2009 1 Asimov's Laws of Robotics. Copyright 1987-2009 2 Human-Artefact Hybridisation (Cyborgisation)

Slides:



Advertisements
Similar presentations
Numbers Treasure Hunt Following each question, click on the answer. If correct, the next page will load with a graphic first – these can be used to check.
Advertisements

Repaso: Unidad 1 Lección 2
Steps to Success with Team National
Copyright Roger Clarke Xamax Consultancy, Canberra Visiting Professor – Cyberspace Law & Policy UNSW and at the ANU and the Uni. of.
1
Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Computer Science, ANU and in Cyberspace Law & Policy, UNSW
Copyright © 2003 Pearson Education, Inc. Slide 1 Computer Systems Organization & Architecture Chapters 8-12 John D. Carpinelli.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 6 Author: Julia Richards and R. Scott Hawley.
Author: Julia Richards and R. Scott Hawley
Properties Use, share, or modify this drill on mathematic properties. There is too much material for a single class, so you’ll have to select for your.
UNITED NATIONS Shipment Details Report – January 2006.
David Burdett May 11, 2004 Package Binding for WS CDL.
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination. Introduction to the Business.
1 RA I Sub-Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Casablanca, Morocco, 20 – 22 December 2005 Status of observing programmes in RA I.
Properties of Real Numbers CommutativeAssociativeDistributive Identity + × Inverse + ×
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt BlendsDigraphsShort.
LIBRARY WEBSITE, CATALOG, DATABASES AND FREE WEB RESOURCES.
Mike Scott University of Texas at Austin
1 Click here to End Presentation Software: Installation and Updates Internet Download CD release NACIS Updates.
1. Bryan Dreiling Main Contact for Three Year Plans
Lost in Translation Measuring and Managing GOOD Web Intentions Marilyn Harmacek. 1.
REVIEW: Arthropod ID. 1. Name the subphylum. 2. Name the subphylum. 3. Name the order.
Computer Literacy BASICS
Break Time Remaining 10:00.
Turing Machines.
Chiu Choi, Ph.D., P.E. Technical Consultant OIML workshop on the metrology of vehicle speed measurement devices NIST Headquarters, Gaithersburg, MD July.
PP Test Review Sections 6-1 to 6-6
EU market situation for eggs and poultry Management Committee 20 October 2011.
EU Market Situation for Eggs and Poultry Management Committee 21 June 2012.
Bright Futures Guidelines Priorities and Screening Tables
EIS Bridge Tool and Staging Tables September 1, 2009 Instructor: Way Poteat Slide: 1.
Insert the title of your presentation here Presented by Name Here Job Title - Date A reduction in fatal casualties Who, why and what does this mean? Louise.
Bellwork Do the following problem on a ½ sheet of paper and turn in.
CS 6143 COMPUTER ARCHITECTURE II SPRING 2014 ACM Principles and Practice of Parallel Programming, PPoPP, 2006 Panel Presentations Parallel Processing is.
Operating Systems Operating Systems - Winter 2011 Dr. Melanie Rieback Design and Implementation.
Exarte Bezoek aan de Mediacampus Bachelor in de grafische en digitale media April 2014.
Copyright © 2012, Elsevier Inc. All rights Reserved. 1 Chapter 7 Modeling Structure with Blocks.
1 RA III - Regional Training Seminar on CLIMAT&CLIMAT TEMP Reporting Buenos Aires, Argentina, 25 – 27 October 2006 Status of observing programmes in RA.
Factor P 16 8(8-5ab) 4(d² + 4) 3rs(2r – s) 15cd(1 + 2cd) 8(4a² + 3b²)
Basel-ICU-Journal Challenge18/20/ Basel-ICU-Journal Challenge8/20/2014.
1..
CONTROL VISION Set-up. Step 1 Step 2 Step 3 Step 5 Step 4.
1 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt 10 pt 15 pt 20 pt 25 pt 5 pt Synthetic.
By CA. Pankaj Deshpande B.Com, FCA, D.I.S.A. (ICA) 1.
Note to the teacher: Was 28. A. to B. you C. said D. on Note to the teacher: Make this slide correct answer be C and sound to be “said”. to said you on.
2004 EBSCO Publishing Presentation on EBSCOadmin.
1 Using one or more of your senses to gather information.
Prof.ir. Klaas H.J. Robers, January 16, 2013 Supervising a graduating student 1.
1 hi at no doifpi me be go we of at be do go hi if me no of pi we Inorder Traversal Inorder traversal. n Visit the left subtree. n Visit the node. n Visit.
Analyzing Genes and Genomes
Prof.ir. Klaas H.J. Robers, 14 July Graduation: a process organised by YOU.
1 Let’s Recapitulate. 2 Regular Languages DFAs NFAs Regular Expressions Regular Grammars.
DIKLA GRUTMAN 2014 Databases- presentation and training.
Speak Up for Safety Dr. Susan Strauss Harassment & Bullying Consultant November 9, 2012.
©Brooks/Cole, 2001 Chapter 12 Derived Types-- Enumerated, Structure and Union.
Essential Cell Biology
Clock will move after 1 minute
Intracellular Compartments and Transport
PSSA Preparation.
Essential Cell Biology
Immunobiology: The Immune System in Health & Disease Sixth Edition
Physics for Scientists & Engineers, 3rd Edition
Energy Generation in Mitochondria and Chlorplasts
Murach’s OS/390 and z/OS JCLChapter 16, Slide 1 © 2002, Mike Murach & Associates, Inc.
Profile. 1.Open an Internet web browser and type into the web browser address bar. 2.You will see a web page similar to the one on.
1 DIGITAL INTERACTIVE MEDIA Wednesday, October 28, 2009.
User Security for e-Post Applications Dr Chandana Gamage University of Moratuwa.
Presentation transcript:

Copyright Asimov's Laws of Robotics

Copyright Human-Artefact Hybridisation (Cyborgisation)

Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation Access and Privacy Workshop Toronto – October {.html,.ppt}

Copyright Roger Clarke, Xamax Consultancy, Canberra Visiting Professor in Cyberspace Law & Policy, UNSW and in Computer Science, ANU Chair, Australian Privacy Foundation Access and Privacy Workshop Toronto – October {.html,.ppt} Surveillance in Speculative Fiction

Copyright Surveillance in Speculative Fiction AGENDA Surveillance Speculative Fiction Genres Surveillance in Speculative Fiction and in Reality Aural Visual Person Id, Location and Tracking Counterveillance Sousveillance Is Privacy Really Dead?

Copyright Surveillance The systematic monitoring or investigation of the actions or communications of one or more persons, directly, or through the monitoring of space or objects Personal Surveillance Focus on an identified person: because of suspicion about that individual for activity deterrence / behaviour repression Mass Surveillance Focus on groups or spaces: to generate suspects for activity deterrence / behaviour repression

Copyright PHYSICAL Surveillance Localised Listening, Observation At Distance (Enhanced Listening, Observation) Sound-Amplification Devices (directional microphones) Image-Amplification Devices (field glasses, infrared binoculars, light amplifiers, satellite cameras) Auto (i.e. by means of the Self) Devices that are attached to the person: loosely but reliably ('mil dog-tags', mobile phone) tightly (anklet) implanted

Copyright 'ELECTRONIC' Surveillance 'Speech Surveillance' Mail Covers, Telephone Interception, Interception: connections monitoring / traffic analysis (who is talking with whom) communications surveillance (who is saying what to whom) 'Experience Surveillance' / 'Behaviour Surveillance' The Web enables surveillance of: pages visited (to support selective advertising) books bought books and articles read at home or in the library Metered Road Usage; Identified Public Transport Tickets

Copyright What were once Ephemera Observed Are Now Events Recorded and Analysed What was 'NOW OR NEVER' is now 'SOONER OR LATER' ENABLERS: Sound-Recording Speech-Traffic-Recording Image-Recording Transaction-Recording FACILITATORS : Trail-Generation Trail-Correlation NEW CAPABILITIES: Retrospective Analysis Real-Time Location Real-Time Tracking Anticipatory Tracking

Copyright Dataveillance The systematic use of personal data systems in the monitoring or investigation of the actions or communications of one or more persons

Copyright Dataveillance The systematic use of personal data systems in the monitoring or investigation of the actions or communications of one or more persons Term first published in Commun. ACM in ,200 / 14,000 hits on Google in 2007 / / 1,230 hits on Google Scholar in 2007 / 2009 (at least 166 / 425 of which do not contain 'Clarke')

Copyright Categorisation of Surveillance (1)Of What? Person, Object, Space (2)For Whom? Person, Involved Party, Third Party (3) By Whom? Person, Involved Party, Third Party (4) Why? Wellbeing, Evidence, Deterrence (5) How? Physical (visual, aural, at distance, auto-surveillance); Dataveillance (retrospective, real-time, predictive); Communications / Experience; Personal / Mass Surveillance (6) Where? Physical, Virtual, Intellectual (7) When? Once, Recurrent, Scattered, Continuous

Copyright Genres Anti-Utopia / Dystopia We (Zamyatin) Human-as-Cockroach The Shockwave Rider (Brunner) Cyberpunk Neuromancer (Gibson) Cyberprep

Copyright Anti-Utopia / Dystopia – 1

Copyright Anti-Utopia / Dystopia – 2

Copyright Human as Cockroach

Copyright Cyberpunk

Copyright Aural Surveillance

Copyright Visual Surveillance

Copyright Identification, Location and Tracking Identification (who?) Location (where?) Tracking (from where to where?) Retrospective Real-Time Prospective Artefacts as Proxies Motor Vehicles Mobile Phones Iris Scanning Attachments Implantation

Copyright Identification, Location and Tracking Vehicles as Proxies The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed

Copyright Identification, Location and Tracking Vehicles as Proxies The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed John Jacob Astor IV

Copyright Identification, Location and Tracking Vehicles as Proxies The policemen on duty have instantaneous kodaks mounted on tripods, which show the position of any vehicle at quarter-second intervals, by which it is easy to ascertain the exact speed; so there is no danger of a vehicle's speed exceeding that allowed John Jacob Astor IV Died on the Titanic, 1912

Copyright Identification, Location and Tracking Vehicles as Proxies Vehicle Id She fumbled in the storage compartment on the instrument board, apparently purposelessly. But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered

Copyright Identification, Location and Tracking Vehicles as Proxies Vehicle Id She fumbled in the storage compartment on the instrument board, apparently purposelessly. But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered Robert Heinlein, 1941

Copyright Identification, Location and Tracking Vehicles as Proxies Vehicle Id She fumbled in the storage compartment on the instrument board, apparently purposelessly. But the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered Robert Heinlein, 1941 ANPR Invented in 1976, Deployed in 1979

Copyright Iris Scanning 'Minority Report', Stephen Spielberg, Dreamworks, Released 12 June 2002

Copyright Iris Scanning 'Minority Report', Stephen Spielberg, Dreamworks, Released 12 June 2002 Abu Dhabi Illegal Immigrant scheme Deployed October

Copyright Attachments for Felons (and Remandees, and...) Tattletales "...But if we do let you go, you must agree to carry tattletales with you at all times. Inquire of your attorney Mr. Sharp if that will be acceptable." "What the hell is a tattletale?" Joe Schilling asked. "A tracing device," Hawthorne said. "It will inform us where each of you are at all times" – Philip K. Dick, 1963

Copyright Attachments for Felons (and Remandees, and...) Tattletales "...But if we do let you go, you must agree to carry tattletales with you at all times. Inquire of your attorney Mr. Sharp if that will be acceptable." "What the hell is a tattletale?" Joe Schilling asked. "A tracing device," Hawthorne said. "It will inform us where each of you are at all times" – Philip K. Dick, 1963 Ankle Monitors / Electronic Tagging of Humans First officially sanctioned use, in New Mexico, 1983

Copyright Human Implantation Radiant – a substance injected into the shoulder, providing positioning, information – Jack Vance, 1954 The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed... ' – Piers Anthony and Robert Margroff, 1968Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974

Copyright Human Implantation Radiant – a substance injected into the shoulder, providing positioning, information – Jack Vance, 1954 The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed... ' – Piers Anthony and Robert Margroff, 1968Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974 Resistance from a journal editor about the idea – 1992

Copyright Human Implantation Radiant – a substance injected into the shoulder, providing positioning, information – Jack Vance, 1954 The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed... ' – Piers Anthony and Robert Margroff, 1968Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974 Resistance from a journal editor about the idea – 1992 First chip implantation in animals – 1991

Copyright Human Implantation First voluntary chip implantation in humans – 1998

Copyright Human Implantation Radiant – a substance injected into the shoulder, providing positioning, information – Jack Vance, 1954 The Ring – 'A surgically implanted electronic monitor that caused agony when a convict strayed... ' – Piers Anthony and Robert Margroff, 1968Skull Bug – Electronic device implanted in the cranium at birth, for monitoring and control – Alfred Bester, 1974 Resistance from a journal editor about the idea – 1992 First chip implantation in animals – 1991 First voluntary chip implantation in humans – 1998 First imposed chip implantation in humans – 2000? 2004?

Copyright Countersurveillance Spoofing of Traffic-Monitoring Camera – "... the registration number which the traffic control automatically photographed as she left the controlway was not the number in which the car was registered" – Robert Heinlein, 1941 Spy-Proof Office – montors received a conversation constructed at random out of a vast stock of innocuous phrases in various tone and voices. And undetectably so' – Isaac Asimov, 1951 Radiant Shield – A pad of woven metal around the shoulder and chest – Jack Vance, 1954 Probe Screen Hood – A device that blocks attempts to see into the contents of the brain mind – Philip K. Dick, 1955 Eavesdropper – an object that will detect if a is microphone is close enough to pick up conversation – James Blish, 1957

Copyright Sousveillance The Unsleeping Eye – substituted for a human eye D.G. Compton, 1973, filmed as La mort en direct, 1980 Wearcam – Steve Mann, c True-Vu Lenses – 'Oldsters used electronic sun hats and True-Vu goggles to surveil young people and any other trouble makers. The goggles would record whatever the wearer was watching, and then upload it to a secure location (in case anything happened)' – David Brin, 1990 Sousveillance – Steven Mann, coined c for the use of optic technologies to observe those in authority Alibi Archive – A recording of transmissions from a personal implant, storing everything that happened to that individual – Robert J. Sawyer, 2003

Copyright The Blurring of Speculative Fiction and Reality

Copyright Interpretations You have zero privacy anyway, get over it Privacy is for people with something to hide Privacy through secrecy is dead Newgens have a completely different approach Privacy is bruised but unbowed Privacy is essential for humanity to survive

Copyright Surveillance in Speculative Fiction AGENDA Surveillance Speculative Fiction Genres Surveillance in Speculative Fiction and in Reality Aural Visual Person Id, Location and Tracking Counterveillance Sousveillance Is Privacy Really Dead?

Copyright Conclusions Surveillance offers fiction-writers a lot of scope Authors' imaginations have mostly run only a few, short decades ahead of technology

Copyright Conclusions Surveillance offers fiction-writers a lot of scope Authors' imaginations have mostly run only a few, short decades ahead of technology Surveillance is increasing privacy concerns Active opposition is imminent, as surveillance goes beyond the levels of acceptability

Copyright Conclusions Surveillance offers fiction-writers a lot of scope Authors' imaginations have mostly run only a few, short decades ahead of technology Surveillance is increasing privacy concerns Active opposition is imminent, as surveillance goes beyond the levels of acceptability 'We must teach our technologies to forget' Maybe we must also teach our technologies to forego data collection, except with consent or where reasonable grounds for suspicion exist