Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Finance
Security
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.

Opinion: I want to live in a surveillance society

Big Brother is always watching you. But who's watching Big Brother?
 

Sign up to receive Security Resource Alerts

January 03, 2008 (Computerworld) -- In my first year as a reporter for a local newspaper back in the year (mumble, mumble), I sat down to interview three candidates for city council who were running as a "slate." I pulled out my tape recorder, and one of them said, "I'm sorry, but we're not willing to do the interview if you're going to record it." When I asked why, he said, "Because we don't want to be misquoted."

The candidates didn't trust me because the editorial page of the newspaper I worked for had endorsed their opponents. But the encounter always bothered me. How can a verbatim record of a conversation increase the chance of being misquoted?

At the time, I hesitated for a moment and considered walking away from the interview. But I changed my mind and put the tape recorder away. In hindsight, I should have said, "Look, I can't take notes as fast as my tape recorder can. Why don't you go grab a tape recorder, too. We'll both tape it. If I misquote you, you can prove it."

The problem they had -- and one problem with surveillance in general -- is that it upsets the balance of power. Whoever has the tape has the power to use, not use, selectively use or misuse the information or proof or evidence recorded.

The opposite of privacy

Privacy advocates warn of a wide range of new assaults on our freedoms facilitated by new technologies. Among these, the growing ubiquity of surveillance cameras -- especially in the U.K. and the U.S., which now have "endemic surveillance," according to a new report. Our freedoms are threatened because technology dramatically improves the efficiency with which they can monitor us, yet we often have no counterbalancing way to monitor them.

Privacy advocates fight hard to oppose secret phone taps, surveillance cameras and other intrusions based on the idea that some things are private and Big Brother has no business always watching you.

I support those who fight for our right to privacy. But I think they're fighting only half the battle. In addition to the right to keep private what should be private, we also need to fight for our right to make public what should be public.

Reverse police surveillance

A teen murder suspect named Erik Crespo complained during his recent trial that he was inappropriately interrogated by New York City Police Detective Christopher Perino. The teen claimed that during the interrogation, the detective told him that he wouldn't be allowed to see a judge unless he signed a confession. He also claimed that the detective tried to talk him out of speaking with a lawyer.

But the detective claimed -- under oath -- that he never even interrogated Crespo.

Conflicts like this happen in court all the time. People lie to spin events in their favor. Sometimes the best liar wins. Sometimes the most credible source wins. An experienced police detective, for example, might be considered by a jury as more credible than some 17-year-old kid.

Continued...
1 | 2 | 3 | NEXT  



Print this Story Send Us Feedback E-mail this Story Digg! Digg this Story Slashdot this Story
"Virtual machines can be great, but they open new cans of worms inside the data center. Here are two more...." Read more...
"Bloody Vikings! It's IT Blogwatch: in which alleged spammer Alan Ralsky is indicted by a grand jury. Not to mention..." Read more...
Read more Security posts or See all Blogs
CA's Web site hacked by malware authors
After criticism, Sears plugs Web site's privacy hole
Microsoft pencils in two patches for next week
More top stories...
GPS devices: Road tested and reviewed
Facebook reinstates tech blogger, but debate goes on
CEOs on Facebook easy to dupe, says researcher
Learn about the technical, environmental and entertainment challenges of running the coldest, darkest, most isolated IT operation on earth. Don't miss our photo gallery!
The care and feeding of end users is a delicate business. Herewith, some tips for keeping everyone happy in their cages, er, cubicles.
Our reviewer finds 6 annoying things (and 3 great ones) about the Linux-based ultraportable.
Find recommendations for more than 50 hot products, including digital cameras, HDTVs, family games, wacky tech gifts for the office and much more.
Reviews, analyses, how-tos, visual tours, hot issues and predictions about Microsoft's new OS.
Four years from now, the IT field will be a vastly different place. Will you be ready?
All Zones
Customer Experience Management Zone
Desktop Virtualization Learning Zone
Diversified Performance Zone
Grid Computing on Windows Zone
ITIL Best Practices Zone
The SAS Zone

Ads by TechWords

See your link here
Spyware: A Clear and Present Danger
Download this Technology Briefing now!
(Source: Computerworld) Computer viruses for the most part are nuisances today. Spyware on the other hand can prove utterly devastating if not crippling to a business. Spyware was at the root of the massive TJX case last year in which personal data on millions of people was compromised. And often if you think you are protected, in fact you are not.
Download this executive briefing download
Insider Threat: Defend Your Enterprise
Insider Threat: Defend Your Enterprise
Download this webcast, compliments of Imprivata.
Go to the webcast 
Symantec Endpoint Protection - A Unified, proactive approach to endpoint security
Get this white paper now!
(Source: Symantec) To combat the sophisticated, stealthy, and targeted attacks of today's threat landscape, organizations can no longer rely on traditional antivirus and antispyware solutions. It is necessary to implement additional layers of security to proactively protect against zero-day threats. Symantec Endpoint Protection combines essential best-in-breed technologies to deliver advanced threat prevention from known and unknown threats. Download this white paper to learn more.
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
Does collaboration drive business success?
Get your Free Live Meeting Success Kit today!
Outlasting the Competition: Why High Availability is Critical to Midsize Businesses
View more whitepapers 
Symantec Endpoint Security

Join Symantec's Kevin Murray for a look at the latest advances in endpoint security from Symantec. IT professionals with an interest in endpoint security and compliance will learn about a new product from Symantec that provides layered security, including: antivirus, firewall, intrusion prevention, device control & behavior blocking.

Learn how this breakthrough product, which combines best of breed technologies from Symantec, Sygate and Whole Security in a single agent, managed by a single management console, will help secure the endpoints on your network and ensure compliance with security policies.

Download this webcast 
Symantec Endpoint Protection - A Unified, proactive approach to endpoint security

To combat the sophisticated, stealthy, and targeted attacks of today's threat landscape, organizations can no longer rely on traditional antivirus and antispyware solutions. It is necessary to implement additional layers of security to proactively protect against zero-day threats. Symantec Endpoint Protection combines essential best-in-breed technologies to deliver advanced threat prevention from known and unknown threats. Download this white paper to learn more.

Download this white paper 
Symantec Network Access Control

The new wave of sophisticated crimeware not only targets specific companies, but it also targets desktops and laptops as backdoor entryways into those business' operations and resources. Network Access Control from Symantec enables proper configuration and security of user endpoints before they are allowed access on the corporate network. To find out more about this level of endpoint compliance, download this white paper.

Download this white paper