AI and Political Culture of Democratic Socities
AI and Political Culture of Democratic Socities
AI and Political Culture of Democratic Socities
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Daniel K. Inouye Asia-Pacific Center for Security Studies is collaborating with JSTOR to
digitize, preserve and extend access to this content.
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
4
SURVEILLANCE TECHNOLOGY
CHALLENGES POLITICAL CULTURE OF
DEMOCRATIC STATES
Inez Miyamoto
49
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Hindsight, Insight, Foresight: Thinking about Security in the Indo-Pacific
50
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Surveillance Technology Challenges Democratic Culture
51
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Hindsight, Insight, Foresight: Thinking about Security in the Indo-Pacific
of the tool was revealed, it eroded public trust already strained by the
police brutality incident which had sparked the protest. By being open
about the social media tool and having clear policies on use of surveillance
technologies, the Baltimore Police Department could have eased public
concerns.
52
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Surveillance Technology Challenges Democratic Culture
and U.S. Secret Service) and local law Biometric technology is used to
enforcement agencies.11 identify or authenticate by using
In this case study, law enforce- the biological attributes of indi-
viduals. Individuals can be identi-
ment used a private-sector database fied using physiological biometrics
to identify individuals, whereas in (e.g., retina, vein, or fingerprint)
the Geofeedia case law enforcement or behavioral biometrics (e.g.,
used a government database. Law gait, signature, or keystrokes).
Facial recognition and fingerprint
enforcement agencies traditionally recognition are examples of bio-
rely on government databases for metrics.
criminal identification, but an indi-
vidual may not be in government da-
tabases. Clearview AI’s technology provided an alternative for identifying
individuals through open-source images. According to Clearview AI, law
enforcement’s use of its product does not violate any federal and state pri-
vacy or biometrics laws if it is used for its intended purpose and is not the
sole basis for an arrest.12 However, Clearview AI’s database was contro-
versial because the company violated individuals’ rights: it never received
the informed consent of the individuals owning the images or allowed
individuals to opt out of its database.
Video Surveillance
There are two types of video surveillance commonly used: stationary and
aerial video surveillance cameras. The first type involves the use of station-
ary cameras mounted at key locations. The second type involves the use of
aerial craft mounted with cameras, which can be manned or unmanned.
As an illustration, the military developed wide-area surveillance technol-
ogy for use on a battlefield, but now law enforcement is using it for polic-
ing, border control, and wildlife protection.
In 2016 the Baltimore Police Department contracted with a wide-
area surveillance company called Persistent Surveillance Systems. Over a
period of several months, the company collected over 300 hours of sur-
veillance video using aerial craft. After the plane downloaded the images
onto a server hard drive, police could access the imagery to solve crimes.
The video resolution did not allow for the identification of individuals or
vehicles, but it was good enough to follow objects over time.13
After the program ended, Bloomberg News published an article reveal-
ing the Baltimore Police Department’s use of wide-area surveillance tech-
53
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Hindsight, Insight, Foresight: Thinking about Security in the Indo-Pacific
nology. Public officials had no idea of the existence of the program be-
cause normal public spending oversight mechanisms were circumvented.
Instead of using public funding, the police used a private donation from
the Laura and John Arnold Foundation. The Foundation, which supports
evidence-based policing solutions, had a prior agreement with Persistent
Surveillance Systems to fund the project if the company could find a po-
lice department to use the technology.14
The Baltimore Police Department did not violate the law because U.S.
laws allow for aerial surveillance without a warrant as long as the tech-
nology is publicly accessible.15 The police wanted the technology because
most of Baltimore’s homicides occur in outdoor public spaces.16 Since the
camera resolution does not allow for visual identification of individuals
or vehicles, there is even less of an invasion of privacy. Nevertheless, the
department lost the public’s trust because it was not transparent: it did not
provide public notification, go through the normal procurement review, or
publish its wide-area surveillance policy.
Despite all of the controversy, in 2019, Persistent Surveillance Sys-
tems solicited the Baltimore Police Department for a long-term contract.
The three-year contract for US$6.6 million, which was funded again by the
Laura and John Arnold Foundation, involved three planes, and covered
32-square miles. Persistent Surveillance Systems also disclosed its privacy
program, limiting the resolution of images to prevent the identification
of individuals.17 Since the Baltimore Police Department was transparent
and involved the public, in April 2020, the city of Baltimore approved the
contract.
54
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Surveillance Technology Challenges Democratic Culture
55
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Hindsight, Insight, Foresight: Thinking about Security in the Indo-Pacific
56
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Surveillance Technology Challenges Democratic Culture
erating faster than global governance. According to the Office of the Di-
rector of National Intelligence, “technological change will continue to far
outpace the ability of states, agencies and international organizations to set
standards, policies, regulations, and norms.”26 Under those circumstances,
the gap between technology and governance will only widen.
Nevertheless, there are other ways states can work collaboratively to-
ward global norms and standards in areas such as human rights, ethics, and
safety. International organizations, such as the North Atlantic Treaty Orga-
nization (NATO) and International Committee of the Red Cross, provide
opportunities to identify common values and approaches for increasing
trust in surveillance technologies. In a like manner, while the Organisation
for Economic Co-operation and Development (OECD) Principles on AI
are non-binding, they establish political commitment to promote AI that
is trustworthy and respects human rights and democratic values.27 Addi-
tionally, the World Economic Forum has an initiative to bringing private
and public stakeholders together to design and test policy frameworks for
technologies such as AI, machine learning, and facial recognition.28 These
types of initiatives are the first steps toward global cooperation.
At the domestic level, states should consider establishing comprehen-
sive security and privacy laws and engaging in dialogue with their citizens
about surveillance technologies. First, the EU’s General Data Protection
Regulation (GDPR) is considered to be one of the strictest and most
comprehensive laws for privacy and security.29 The regulation was passed
in 2014 when surveillance technologies were not as advanced as they are
today. Consequently, critics are calling for GDPR regulatory reforms be-
cause it hinders the development and use of AI by placing limitations on
the collection and sharing of personal data.30 In addition, although the
GDPR limits live facial recognition by mandating individual consent, it
also specifies exceptions for law enforcement use, personal use, and situ-
ations where a person cannot be identified.31 Therefore, while the GDPR
is a proven framework that can be used to build a comprehensive privacy
and security law, the GDPR should be expanded to include emerging tech-
nologies and their impacts on privacy and security.
Second, the public and private sector will need more dialogue on
future surveillance technologies. Michelle Cayford, Wolter Pieters, and
P.H.A.J.M. van Gelder found that when it comes to surveillance technol-
ogy, the public wants both security and privacy with no tradeoffs.32 For
this reason, states need to engage with their citizens to take the discussion
beyond the balance between security and civil liberty. Specifically, Cayford
57
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Hindsight, Insight, Foresight: Thinking about Security in the Indo-Pacific
Future Challenges
Technology is constantly evolving and providing states with more power-
ful surveillance capabilities. Advancements in real-time connectivity and
data analytics, in particular, elevate the privacy threat from omnipresent
surveillance. In this section, two technological drivers of change are exam-
ined in understanding the future environment: 5th Generation (5G) and
6th Generation (6G) connectivity and AI analytics advancement.
First, 5G-cellular technology is the catalyst launching the world into
the Fourth Industrial Revolution with speeds of up to 100 times faster
than current cellular networks. 5G is an enabling technology for the In-
ternet of Things (IoT), which is a network of devices and objects with
built-in sensors for connectivity and communication. The IoT needs 5G’s
speed and low latency to move data to and from a massive number of
devices and sensors. Many of the IoT connections involve machine-to-
machine (M2M) applications in which communication between devices
and sensors occur without human intervention. The convergence of 5G
and IoT provides the means to create smart cities, smart manufacturing,
and autonomous cars, all of which run M2M applications.
In the future, many aspects of life will be monitored by billions of
IoT sensors and devices. By 2023, Cisco expects there will be 3.9 billion
Internet users and 29.3 billion connected devices, of which half (14.7 bil-
lion devices) are for M2M applications.36 By 2030, not only will the num-
ber of connected devices grow to 500 billion,37 but connectivity speed is
also expected to increase with the deployment of 6G-mobile technology.38
It is important to realize that this vast network of devices and sensors will
58
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Surveillance Technology Challenges Democratic Culture
59
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Hindsight, Insight, Foresight: Thinking about Security in the Indo-Pacific
60
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Surveillance Technology Challenges Democratic Culture
pacts. The third effort of the task force is to use the framework to exam-
ine risks, gaps, and opportunities, to develop policies, and to recommend
regulations and laws. The fourth effort of the task force is to regularly
monitor the progress of the government toward achieving task force ob-
jectives using annual reports, to update the framework, and to proactively
respond with policy or regulatory recommendations.
61
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Hindsight, Insight, Foresight: Thinking about Security in the Indo-Pacific
Notes
62
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Surveillance Technology Challenges Democratic Culture
chive/2016/08/the-sneaky-program-to-spy-on-baltimore-from-above/497588/.
15 Arthur Holland Michel, “The Military-Style Surveillance Technology Being Test-
ed in American Cities,” The Atlantic, August 3, 2019, https://www.theatlantic.com/
technology/archive/2019/08/military-style-surveillance-air-often-legal/595063/.
16 Baynard Woods, “Baltimore’s Newly Revealed Surveillance Program Raises Legal
Questions,” The Guardian, August 26, 2016, https://www.theguardian.com/us-
news/2016/aug/26/baltimore-police-surveillance-legal-questions.
17 Kevin Rector, “Baltimore Officials Pitched on Putting Three Surveillance
Planes in the Sky at Once, Covering Most of City,” Baltimore Sun, September 19,
2019, https://www.baltimoresun.com/news/crime/bs-md-ci-cr-surveillance-pitch-
20190919-dkurugpjdretrjzcevzlc7eabu-story.html.
18 United Nations Human Rights Council, Forty-first session, “Surveillance and Hu-
man Rights: Report of the Special Rapporteur on the Promotion and Protection of
the Right to Freedom of Opinion and Expression,” A/HRC/41/35, May 28, 2019,
accessed April 1, 2020, https://www.ohchr.org/EN/HRBodies/HRC/RegularSes-
sions/Session41/Pages/ListReports.aspx.
19 Feldstein, “The Global Expansion.”
20 Arkaitz Gamino Garcia et al., Mass Surveillance: Part 1—Risks, Opportunities and
Mitigation Strategies, (Brussels: European Union, 2015), https://www.europarl.europa.
eu/RegData/etudes/STUD/2015/527409/EPRS_STU%282015%29527409_
REV1_EN.pdf.
21 United Nations Human Rights Commission, “The 2019 Report on the Surveil-
lance Industry,” United Nations, accessed April 1, 2020, https://www.ohchr.org/
EN/Issues/FreedomOpinion/Pages/SR2019ReporttoHRC.aspx.
22 Elise Thomas, “New Surveillance Tech Means You’ll Never Be Anonymous
Again,” Wired, September 16, 2019, https://www.wired.co.uk/article/surveillance-
technology-biometrics.
23 Jay Stanley, “The Dawn of Robot Surveillance: AI, Video Analytics, and Privacy,”
American Civil Liberties Union, June 2019, https://www.aclu.org/report/dawn-
robot-surveillance.
24 “About,” Partnership on AI, accessed April 12, 2020, https://www.partnershipo-
nai.org/about/.
25 Camino Kavanagh, “New Tech, New Threats, and New Governance Challenges:
Opportunity to Craft Smarter Responses?” Carnegie Endowment for International
Peace, August 28, 2019, https://carnegieendowment.org/2019/08/28/new-tech-
new-threats-and-new-governance-challenges-opportunity-to-craft-smarter-responses-
pub-79736.
26 U.S. National Intelligence Council, Global Trends: Paradox of Progress (Washington:
National Intelligence Council, 2017), accessed April 1, 2020, https://www.dni.gov/
index.php/key-global-trends/how-people-govern.
27 “Recommendation of the Council on Artificial Intelligence,” Organisation for
Economic Co-operation and Development, May 2019, http://www.oecd.org/going-
digital/ai/principles/.
28 “Shaping the Future of Technology Governance: Artificial Intelligence and
Machine Learning,” World Economic Forum, accessed April 1, 2020, https://www.
weforum.org/platforms/shaping-the-future-of-technology-governance-artificial-
intelligence-and-machine-learning/.
29 Ben Wolford, “What Is GDPR, the EU’s New Data Protection Law?” GDPR.
EU, accessed April 1, 2020. https://gdpr.eu/what-is-gdpr/.
63
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Hindsight, Insight, Foresight: Thinking about Security in the Indo-Pacific
30 Eline Chivot and Daniel Castro, “The EU Needs to Reform the GDPR to
Remain Competitive in the Algorithmic Economy,” Center for Data Innovation, May
13, 2019, https://www.datainnovation.org/2019/05/the-eu-needs-to-reform-the-
gdpr-to-remain-competitive-in-the-algorithmic-economy/.
31 “Guidelines 3/2019 on Processing of Personal Data through Video Devices,”
European Data Protection Board, July 10, 2019, https://edpb.europa.eu/sites/edpb/
files/consultation/edpb_guidelines_201903_videosurveillance.pdf.
32 Michelle Cayford, Wolter Pieters, and P.H.A.J.M. van Gelder, “Wanting It All—
Public Perceptions of the Effectiveness, Cost, and Privacy of Surveillance Technol-
ogy,” Journal of Information, Communication and Ethics in Society 18, no.1 (2019), https://
www.emerald.com/insight/content/doi/10.1108/JICES-11-2018-0087/full/html.
33 Michelle Cayford and Wolter Pieters, “The Effectiveness of Surveillance Technol-
ogy: What Intelligence Officials Are Saying,” The Information Society 34, no. 2 (2018),
https://www.tandfonline.com/doi/full/10.1080/01972243.2017.1414721.
34 Max Bauer, “Review of Studies on Surveillance Camera Effectiveness,” American
Civil Liberties Union of Massachusetts, accessed April 1, 2020, https://privacysos.
org/camera_studies/.
35 Michelle Cayford, Wolter Pieters, and Constant Hijzen, “Plots, Murders, and
Money: Oversight Bodies Evaluating the Effectiveness of Surveillance Technology,”
Intelligence and National Security 33, no. 7 (2018), https://www.tandfonline.com/doi/pd
f/10.1080/02684527.2018.1487159.
36 “Cisco Annual Internet Report (2018–2023),” Cisco, 2020, accessed April 2,
2020, https://www.cisco.com/c/en/us/solutions/collateral/executive-perspectives/
annual-internet-report/white-paper-c11-741490.pdf.
37 Fastco Works, “What Will Happen When 28 Billion Devices Are Connected
Online?” Fast Company, July 24, 2019, https://www.fastcompany.com/90380201/
what-will-happen-when-28-billion-devices-are-connected-online.
38 “5G Evolution and 6G,” NTT Docomo, Inc., 2020, https://www.nttdocomo.
co.jp/english/binary/pdf/corporate/technology/whitepaper_6g/DOCOMO_6G_
White_PaperEN_20200124.pdf.
39 “Strategic Foresight Analysis,” NATO, 2017, accessed April 2, 2020, https://
www.act.nato.int/images/stories/media/doclibrary/171004_sfa_2017_report_hr.pdf.
40 Zach Doffman, “Smarter Cities: Will Autonomous AI Surveillance and IoT Now
Automate Law Enforcement?” Forbes, December 15, 2018, https://www.forbes.com/
sites/zakdoffman/2018/12/15/smarter-cities-will-autonomous-ai-surveillance-and-
iot-now-automate-law-enforcement/.
41 Christianna Reedy, “Kurzweil Claims That the Singularity Will Happen by 2045,”
Futurism, October 5, 2017, https://futurism.com/kurzweil-claims-that-the-singulari-
ty-will-happen-by-2045.
42 Dom Galeon, “Separating Science Fact from Science Hype: How Far Off Is the
Singularity?” Futurism, January 30, 2018, https://futurism.com/separating-science-
fact-science-hype-how-far-off-singularity.
43 “Autonomous Weapons: An Open Letter from AI and Robotics Researchers,”
Future of Life Institute, accessed April 1, 2020, https://futureoflife.org/open-letter-
autonomous-weapons/.
44 Jonathan Shaw, “Artificial Intelligence and Ethics,” Harvard Magazine, January-
February 2019, https://harvardmagazine.com/2019/01/artificial-intelligence-limita-
tions.
64
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
Surveillance Technology Challenges Democratic Culture
65
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms
This content downloaded from 119.158.39.18 on Tue, 05 Mar 2024 18:14:29 +00:00
All use subject to https://about.jstor.org/terms