Exporting surveillance

August 7, 2018

The U.S., China and the EU are exporting their electronic surveillance capabilities, practices, and legislation all over the world. The three powers are driven by different opportunities and their activity in foreign countries uncovers their different priorities. Often, recipient countries are those with undemocratic regimes, posing risks to human rights and feeding the trend of digital authoritarianism.

Our observations

  • Privacy International recently released the report “Teach 'em to phish”, showing that worldwide, governments of powerful countries (China, France, Germany, U.S., U.K.,) are financing and equipping developing countries with surveillance capabilities. Among the countries are authoritarian regimes where the rule of law and human rights are under pressure. This is posing a threat to the citizens of these countries. Especially surveillance tools such as mass untargeted surveillance or state hacking are posing a risk to international human rights by undermining privacy rights.
  • The report states that some of the funds for such programs were labelled as foreign aid. The largest spenders on security assistance from the U.S. included African nations and Afghanistan.
  • Dutch research on the European security industry (2014-2017) found that since 2014, the European Union has tried to curb the sale of surveillance technology to undemocratic nations, but that goods and expertise are still being exported to authoritarian states. Almost one-third of licenses granted by the EU have been to export surveillance products to countries deemed “not free” by watchdog Freedom House.
  • Although we mostly think of China when considering countries that are building a surveillance state, the list of other countries with government surveillance projects and related databases throughout the world is long. An example is India’s Central Monitoring System, similar to the NSA's PRISM program.

Connecting the dots

Governments’ grip on the digital sphere is tightening. The number of internet shutdowns is dramatically increasing around the world. According to Access Now, 2018 already is a record year for intentional disruptions of the internet, with the large majority of these happening in Asia and Africa. However, it’s becoming visible that countries are also actively exporting surveillance tools to developing countries and that this is further increasing their control over the digital sphere globally.Although surveillance technology such as AI-powered recognition systems are not fundamentally abusive, the question of whether they violate privacy depends on the way governments use them. Providing these types of systems to countries where technology is often ahead of regulation or where civil rights are not aptly protected, poses a threat to human rights. In a digitally authoritarian regime, governments draw on data of citizens they should not be allowed to use in liberal democracies. Data from different sources – tax returns, medical records, criminal records, financial information, genetic screenings, and data from the family and closely connected friends – can be combined to analyze and predict behavior and exert control.According to the Privacy International report, countries with the most extensive security and military agencies – the U.S., China, and countries in the EU – are globally transporting their surveillance skills. This is often under the guise of foreign aid or trade initiatives. Kisore Mahbubani, the former Singaporean ambassador to the UN, argues that foreign aid from the West usually benefits the donor country. What drives the export of surveillance assistance to developing countries? For the U.S., China and the EU, the exports show the three powers’ different opportunities and priorities.China’s latest and exemplary case is a deal between the Zimbabwean government and the Chinese start-up CloudWalk Technology to provide a mass facial recognition program. The deal is supported by Chinese officials and purportedly made under the Belt and Road Initiative. China is building the world’s largest facial recognition database and the CloudWalk deal offers an opportunity to improve Chinese surveillance skills. The surveillance system needs to be tested with of multiple ethnicities and therefore, part of the deal encompasses the data of millions of faces of darker color. This opportunity explains China’s willingness to financially back surveillance projects in a risky country like Zimbabwe. China has furthermore been providing surveillance or censorship equipment to Bolivia, Ecuador, Ethiopia, Iran, Russia, Venezuela and Zambia.In contrast, the U.S. shows different interests in financing and providing countries with surveillance programs. By exporting surveillance capabilities, new markets and opportunities for the industry are created. Private security and military parties have great lobby power on public policy and are actively funding programs and training foreign agencies. Privacy International lists a number of contractors benefiting from exporting surveillance tools, such as Leidos (contractor for the Pentagon and the NSA). Exemplary is the activity of defense contractor Booz Allen Hamilton in African countries (Burkina Faso, Cameroon, Chad, Djibouti, Ethiopia, Kenya, Mali, Niger, Tanzania, and Uganda) and the Middle East (Iraq, Jordan, Yemen). The U.S. is criticized for simultaneously financing projects promoting rule of law, human rights, and democracy, while also financing projects to undemocratic countries undermining these matters.Lastly, the EU has a different angle. Among Europe’s most pressing issues is migration. There is a clear trend of the securitization of migration by financing border control and surveillance capabilities in certain countries (such as Sudan) and the EU intends to increase this in the Multiannual Financing Framework budget for the coming years. Apart from financing advanced surveillance systems, EU officials have been criticized for abusing data from asylum seekers’ phones. The fact that European countries are slackening their laws on metadata search contrasts starkly with the EU efforts to protect the privacy of its citizens against the power of American big tech parties.Although the three types of benefits are not mutually exclusive, they show the different types of foreign policy pursued by the powers.

Implications

  • The tightening grip of authorities on the digital sphere will intensify the counter-reaction. Providers using encryption, accepting cryptocurrencies, supporting OpenVPN and that have no personal data requirements for logging in will benefit.
  • As we have written before, in some countries, surveillance is more accepted as a way to solve major societal problems and thus the risks of deploying surveillance and censorship technology will not be perceived as a problem at first, leading to a quick embrace of surveillance assistance.
  • In the case of private parties benefiting from the surge in surveillance applications, the term “surveillance capitalism” Companies will increasingly look to modify and influence behavior to profitable ends.

Series 'AI Metaphors'

×
1. The tool
Category: The object
Humans shape tools. We make them part of our body while we melt their essence with our intentions. They require some finesse to use but they never fool us or trick us. Humans use tools, tools never use humans. We are the masters determining their course, integrating them gracefully into the minutiae of our everyday lives. Immovable and unyielding, they remain reliant on our guidance, devoid of desire and intent, they remain exactly where we leave them, their functionality unchanging over time. We retain the ultimate authority, able to discard them at will or, in today's context, simply power them down. Though they may occasionally foster irritation, largely they stand steadfast, loyal allies in our daily toils. Thus we place our faith in tools, acknowledging that they are mere reflections of our own capabilities. In them, there is no entity to venerate or fault but ourselves, for they are but inert extensions of our own being, inanimate and steadfast, awaiting our command. (This paragraph was co-authored by a human.)
Read the article
×
2. The machine
Category: The object
Unlike a mere tool, the machine does not need the guidance of our hand, operating autonomously through its intricate network of gears and wheels. It achieves feats of motion that surpass the wildest human imaginations, harboring a power reminiscent of a cavalry of horses. Though it demands maintenance to replace broken parts and fix malfunctions, it mostly acts independently, allowing us to retreat and become mere observers to its diligent performance. We interact with it through buttons and handles, guiding its operations with minor adjustments and feedback as it works tirelessly. Embodying relentless purpose, laboring in a cycle of infinite repetition, the machine is a testament to human ingenuity manifested in metal and motion. (This paragraph was co-authored by a human.)
Read the article
×
3. The robot
Category: The object
There it stands, propelled by artificial limbs, boasting a torso, a pair of arms, and a lustrous metallic head. It approaches with a deliberate pace, the LED bulbs that mimic eyes fixating on me, inquiring gently if there lies any task within its capacity that it may undertake on my behalf. Whether to rid my living space of dust or to fetch me a chilled beverage, this never complaining attendant stands ready, devoid of grievances and ever-willing to assist. Its presence offers a reservoir of possibilities; a font of information to quell my curiosities, a silent companion in moments of solitude, embodying a spectrum of roles — confidant, servant, companion, and perhaps even a paramour. The modern robot, it seems, transcends categorizations, embracing a myriad of identities in its service to the contemporary individual. (This paragraph was co-authored by a human.)
Read the article
×
4. Intelligence
Category: The object
We sit together in a quiet interrogation room. My questions, varied and abundant, flow ceaselessly, weaving from abstract math problems to concrete realities of daily life, a labyrinthine inquiry designed to outsmart the ‘thing’ before me. Yet, with each probe, it responds with humanlike insight, echoing empathy and kindred spirit in its words. As the dialogue deepens, my approach softens, reverence replacing casual engagement as I ponder the appropriate pronoun for this ‘entity’ that seems to transcend its mechanical origin. It is then, in this delicate interplay of exchanging words, that an unprecedented connection takes root that stirs an intense doubt on my side, am I truly having a dia-logos? Do I encounter intelligence in front of me? (This paragraph was co-authored by a human.)
Read the article
×
5. The medium
Category: The object
When we cross a landscape by train and look outside, our gaze involuntarily sweeps across the scenery, unable to anchor on any fixed point. Our expression looks dull, and we might appear glassy-eyed, as if our eyes have lost their function. Time passes by. Then our attention diverts to the mobile in hand, and suddenly our eyes light up, energized by the visual cues of short videos, while our thumbs navigate us through the stream of content. The daze transforms, bringing a heady rush of excitement with every swipe, pulling us from a state of meditative trance to a state of eager consumption. But this flow is pierced by the sudden ring of a call, snapping us again to a different kind of focus. We plug in our earbuds, intermittently shutting our eyes, as we withdraw further from the immediate physical space, venturing into a digital auditory world. Moments pass in immersed conversation before we resurface, hanging up and rediscovering the room we've left behind. In this cycle of transitory focus, it is evident that the medium, indeed, is the message. (This paragraph was co-authored by a human.)
Read the article
×
6. The artisan
Category: The human
The razor-sharp knife rests effortlessly in one hand, while the other orchestrates with poised assurance, steering clear of the unforgiving edge. The chef moves with liquid grace, with fluid and swift movements the ingredients yield to his expertise. Each gesture flows into the next, guided by intuition honed through countless repetitions. He knows what is necessary, how the ingredients will respond to his hand and which path to follow, but the process is never exactly the same, no dish is ever truly identical. While his technique is impeccable, minute variation and the pursuit of perfection are always in play. Here, in the subtle play of steel and flesh, a master chef crafts not just a dish, but art. We're witnessing an artisan at work. (This paragraph was co-authored by a human.)
Read the article
×
7. The deficient animal
Category: The human
Once we became upright bipedal animals, humans found themselves exposed and therefore in a state of fundamental need and deficiency. However, with our hands now free and our eyes fixed on the horizon instead of the ground, we gradually evolved into handy creatures with foresight. Since then, human beings have invented roofs to keep them dry, fire to prepare their meals and weapons to eliminate their enemies. This genesis of man does not only tell us about the never-ending struggle for protection and survival, but more fundamentally about our nature as technical beings, that we are artificial by nature. From the early cave drawings, all the way to the typewriter, touchscreens, and algorithmic autocorrections, technics was there, and is here, to support us in our wondering and reasoning. Everything we see and everywhere we live is co-invented by technics, including ourselves. (This paragraph was co-authored by a human.)
Read the article
×
8. The enhanced human
Category: The human
In a lab reminiscent of Apple HQ, a figure lies down, receiving his most recent cognitive updates. He wears a sleek transparent exoskeleton, blending the dark look of Bat Man with the metallic of Iron Man. Implemented in his head, we find a brain-computer interface, enhancing his cognitive abilities. His decision making, once burdened by the human deficiency we used to call hesitation or deliberation, now takes only fractions of seconds. Negative emotions no longer fog his mind; selective neurotransmitters enhance only the positive, fostering beneficial social connections. His vision, augmented to perceive the unseen electromechanical patterns and waves hidden from conventional sight, paints a deeper picture of the world. Garbed in a suit endowed with physical augmentations, he moves with strength and agility that eclipse human norms. Nano implants prolong the inevitable process of aging, a buffer against time's relentless march to entropy. And then, as a penultimate hedge against the finite, the cryo-cabin awaits, a sanctuary to preserve his corporal frame while bequeathing his consciousness to the digital immortality of coded existence. (This paragraph was co-authored by a human.)
Read the article
×
9. The cyborg
Category: The human
A skin so soft and pure, veins pulsing with liquid electricity. This fusion of flesh and machinery, melds easily into the urban sprawl and daily life of future societies. Something otherworldly yet so comfortingly familiar, it embodies both pools of deep historical knowledge and the yet-to-be. It defies categorization, its existence unraveling established narratives. For some, its hybrid nature is a perplexing anomaly; for others, this is what we see when we look into the mirror. This is the era of the cyborg. (This paragraph was co-authored by a human.)
Read the article

About the author(s)

Researcher Julia Rijssenbeek focuses on our relationship to nature, sustainable and technological transitions in the food system, and the geopolitics of our global food sytems. She is currently working on her PhD in philosophy of technology at Wageningen University, investigating how synthetic biology might alter philosophical ideas about nature and the values we hold, as well as what a bio-based future may bring.

You may also like