JOHN TWELVE HAWKS
The continuing revelations by Edward Snowden have convinced many of us that we are living in a modern surveillance state. And the problem isn’t just the activities of the National Security Agency and Great Britain’s GCHQ. “Trickle Down Surveillance” has provided spy technology to small town police officers and developing world dictators. In addition, our activities are monitored for commercial reasons by a wide variety of international corporations (Amazon isn’t the “Everything Store,” it’s the “Find Out Everything About You” store).
Anyone who steps back for a minute and observes our modern digital world might conclude that we have destroyed our privacy in exchange for convenience and false security. That private world within our thoughts has been monitored, tabulated and quantified. Our tastes, our opinions, our needs and our desires have been packaged and sold as commodities. Those in power have pushed their need for control one step too far. They turned unique individuals into data files, and our most intimate actions have become algorithmic probabilities.
The destruction of personal privacy is not an ideological issue. Thoughtful women and men on every point of the political spectrum are beginning to realize that surveillance technology has shifted the balance of power between institutions and individuals. Without private thoughts and actions we can never truly be free.
Ten years ago, I believed that individuals could live off the grid, but because of “trickle-down surveillance,” it’s becoming impossible to escape surveillance in a rural area or in a developing country. Most of the people reading this essay have jobs that involve computers. We have cellphones, and we use the Internet. Like it or not, we’re living in a digital infrastructure.
Although I write dystopian fiction, I don’t believe in dystopian fantasies. Unless some future hacker genius creates a virus that wipes every database clean, it’s clear that destroying one small part of this Virtual Panopticon is not going to bring the walls down.
So what are we supposed to do? How can we avoid becoming just another bar-coded object tracked within a World of Things?
A place of refuge
A good first step is to find or create an occasional place of refuge where you can escape the electronic grid that surrounds us. It’s a place without phones or computers — without monitoring of any kind. Stepping back from the grid is especially important if you have small children. They need to discover the possibilities created by their own imaginations.
I realize that switching off one’s Twitter feed is highly difficult for some people. But walking alone down a forest path, smelling the wet earth, and watching branches sway in the wind is actually the first step in your act of resistance.
You can’t truly hear your own voice until the shouting around you disappears. New ideas and possibilities — our own ideas, our own possibilities — will occur only when we step away from the Virtual Panopticon.
At various times of my life I have turned away from our high-tech society. When I was younger I simply camped or explored the wilderness on my own. During the last few years, I’ve experienced more extreme periods of isolation in Nepal and Tibet (in both of these countries, people are more accepting of these kinds of actions).
The last time I stepped off the grid, I took photographs of myself before and after the experience. On the first day, my face showed the conventional “mask” we all create to protect our private Self. Thirty-one days later, I had grown a beard, but that was an insignificant change. I was smiling. My eyes were wide open and ready to see the beauty of our world.
One consequence of living — even for a short time — in a place of refuge is that when you return to your daily routine, you’ll be more aware of the ways that the Panopticon is watching you and predicting your behavior. This awareness gives you the motivation to gradually create a parallel life.
My Public Self uses a credit card to buy an airline ticket, walks through an airport and boards a plane. This Self pays income taxes, uses a smartphone, and doesn’t hide his face from the CCTV cameras that have appeared throughout New York and London.
Then there is my Private Self that gives a fake phone number to an inquisitive clerk, doesn’t post a photograph on Facebook, and uses a search engine that won’t remember searches. I’ve used a gift card (paid for with cash) to purchase Apple apps and my identity is not on the Apple Corp.’s database.
Finally there is a Secret Self that owns a throwaway cellphone purchased with cash and uses Internet software like Tor that enables online anonymity.
In the beginning, these actions to defend your privacy feel like a game. But deliberately concealing yourself from the Panopticon makes you feel less passive and more aware. There’s nothing flashy going on here, just small daily actions that continually undercut the constant attempt by governments and corporations to know who you are and what you’re doing.
The Shark Cage
The Internet is not a cyber-utopia offering freedom to anyone with a blog. It’s part of the world economy (other than Wikipedia, the vast majority of the top 100 websites are owned by large corporations).
We exist in a marketplace where our personal information is collected and sold. But the marketplace can protect our privacy if we make conscious choices. Companies selling computers and phones design their product first, then add firewalls and security software later. The growing awareness of the attack on privacy has prompted a small group of cryptographers to design communications devices that assume that both the Internet and the cellular network have been compromised.
Recently, a company has introduced the Blackphone — an Android-based smartphone that provides easy-to-use encryption for phone calls and text messaging (the same company is developing “a private and secure” email system called Dark Mail). By the time you read this, there may be better-designed phones and more secure email systems. The real news is that the market is beginning to respond to the public’s growing realization of how the surveillance state destroys freedom. More pro-privacy computers and communications devices will be created, and they will gradually become less expensive and easier to use.
Wealthy people and celebrities routinely hire specialists to create an electronic “shark cage” that protects their phone and online privacy. But privacy is no longer a rich man’s luxury. In the last few years, small companies like the Boston-based Abine Corp. are selling software that can control the personal information that companies and other people can see about consumers online.
In democratic countries with a digital infrastructure, the market will eventually offer us cheap and easy-to-use ways to step away from certain aspects of the Panopticon. All you need is enough cash to buy a prepaid debit card — and the desire to live an unmonitored life.
I own two smartphones (one purchased with cash), an iPad, two regular computers, and a “clean” notebook computer that’s unattached to any identity. There’s nothing wrong with technology itself. A license plate scanner attached to a computer has no ideology. The real issue is control. Who gives instructions to these new machines, and what are they used for? Who makes the rules for our society and our lives?
One positive aspect of the new technology is that it gives us the means to create parallel systems that exist alongside the dominant social and economic system. Examples can be found everywhere: organic farming, home solar power, and the do-it-yourself movement (DIY), which encourages people to “life hack” common problems and use open-source designs to make machines.
Using a parallel system allows us to makes a distinction between the surveillance state and those transactions that are not instantly part of a database. When we buy a locally grown tomato at the farmer’s market, use a peer-to-peer payment system that involves cryptocurrency, or rent a room in someone’s apartment while traveling, we’re engaged in a transaction that will not be tracked or quantified.
Participating in these parallel systems and creating a parallel life are both choices. And most people living in democratic countries still have these choices. But what should we do if the new surveillance states extend their power into every aspect of our lives?
When do you decide that you have had enough?
For several years I worked for an organization that sent its employees out to work in war zones all over the world. On a number of occasions, I walked through villages where everyone had been killed and the bodies were left to swell up and rot in the sun. Time disappeared during these moments, and I was conscious only of the stench and the buzzing sound that came from swarms of flies. Eventually, my Sikh driver would honk the horn of the truck filled with relief supplies. I would get back into the truck cab and continue up the road. But these experiences stayed in my memory. I wanted to know why humans acted with such deliberate cruelty. When should we turn away from evil? And when should we resist?
When I returned to America, I began to read books about the Holocaust that described how ordinary people were transformed into executioners while a smaller group risked their lives trying to save others. There’s a long shelf of books about individual rescuers like Oskar Schindler, but it was difficult to come up with a general theory as to why they stepped forward.
A friend recommended that I read about Stanley Milgram’s famous “obedience studies” in the early 1960s. The Yale University psychologist was trying to understand how authority could push individuals into performing cruel or unethical actions, so he conducted a series of experiments on the Yale campus.
Imagine that you were one of the people who answered a newspaper ad looking for paid participants in a “scientific experiment.” When you arrive at the basement laboratory, a man wearing a white lab coat tells you that you’re going to participate in a study of how memory is influenced by punishment. You fill out a questionnaire, then pick a piece of paper that gives you the role of “teacher” while the other participant is “the learner” (actually an actor hired by Milgram). The learner is taken to another room and an electrode is strapped to his wrist. Then the experimenter asks you to give the learner a set of word pairings to memorize.
If the learner in the next room answers correctly over an intercom, you’re supposed to praise him. But if the learner gives the wrong answer, you’re told to press a switch that gives a shock to the other person. At first, the learner answers correctly, and then he begins to make mistakes. Each time that happens, you’re told to press a switch with a higher voltage indicated on the control panel. You’re ordered to keep going even when the learner begins to scream.
After 19 different experiments with more than a thousand participants, Milgram described the obedience study to a group of 40 psychiatrists and asked them to estimate what percentage of teachers would reach the 450-volt level marked with an ominous XXX on the control panel. The psychiatrists decided that only 1 percent of the test group would go all the way. They were astonished to learn that two out of three “ordinary” men and women gave the maximum shock even when the learner in the other room had stopped responding.
Humans can be manipulated to obey. As information and communications technology creates a surveillance state, I’m worried that fear of terrorism will create a system where police officers and soldiers will obey the computer-generated decisions that appear on their optical head-mounted displays.
So what can stop this from happening? In 2006, a professor at Santa Clara University named Jerry Burger duplicated Milgram’s experiment using an experimental procedure where the “teachers” were pushed only toward a maximum 150-volt level. When he interviewed the participants afterward, Burger discovered that those who had stopped participating felt that they were responsible for giving the shocks, while those participants who obeyed had decided that the experimenter was responsible.
Milgram’s research shows us that anyone who identifies with authority can be manipulated to defend institutional goals. This sort of mindless obedience can be defeated only by one’s sense of identity.
Identity is not taste or fashion; it has nothing to do with what we’ve purchased in the past or want to buy in the future. Identity comes from making real choices that force you to decide what is true, fair and just.
One Man Standing in the Middle of a Street
The key image of our era is not an astronaut on the moon or a smirking billionaire holding a new smartphone. I’m continually inspired by the 1989 video of a man standing in front of a column of tanks one day after the Chinese military massacred the pro-democracy protesters who had gathered in Beijing’s Tiananmen Square.
When the lead tank tries to drive around this protester, he repeatedly steps into its path. The driver of the lead tank shouts at him. The column starts to move, but the lone protester stops them once again. I don’t know this hero’s name and I don’t know what happened to him, but I’m still inspired by his bravery. The Tank Man was acting like a free human being — making a conscious choice to resist authority.
Even if you spent most of your day using some kind of electronic device, you’re not a light-emitting diode or a computer chip. We should never consider ourselves a functional component of any new technological system. We are physical beings that have been given the privilege and the power to say no.
When your own moment arrives, it probably won’t involve a column of tanks, but you’ll know that there is no other alternative. You must confront authority or your true Self would no longer exist.
The new surveillance states have placed us in an invisible prison. If we wish to break free, we need only to step forward and open the door.