Understanding Surveillance

In order to make informed decisions, one must first have information. So in this section, I want to give a brief overview of some of the most common ways surveillance works. This is not an exhaustive list, but it should give you a general idea to recognize potential surveillance mechanisms.

Generally speaking, the most common form of surveillance is Surveillance Capitalism, meaning companies like Amazon or Google who collect information about you in order to serve more relevant ads or products. Governments also perform surveillance, but typically government surveillance piggybacks off existing surveillance capitalism infrastructures (see PRISM), meaning while ending up on "a list" is probably a fairly easy, common, and automated thing, getting an actual person to watch you individually is less likely than you'd think. Most surveillance is performed automatically by algorithms and automated systems. The bad news is, this means such surveillance is everywhere. The good news is, that means it's aimed at the masses and therefore relatively easy to get out of.

Before I go any further, I also want to point out that there are organizations known as data brokers who collect your information for profiling purposes. Amazon and Apple may not be sharing data with each other, but they are likely sharing it with companies like Acxiom and LexisNexis who in turn sell your profile back to companies who use it for advertising.

The Three Types of Surveillance (According to Me)

The most obvious form of surveillance is what I'll call "consented surveillance." This is when you give up obvious forms of information. For example, if you sign up to both Amazon and eBay using the same email address, then obviously any purchases made on both are atuomatically tied back to you. As I said in the previous paragraph, Amazon and eBay may not be sharing your purchase history with each other, but they definitely share it with data brokers. Their automated systems easily correlate the two accounts and combine them.

The next form of surveillance I'll call "unconscious surveillance." Technically you consent to this form whenever you click "I agree to the terms of service" but let's be honest: who reads those? This is when you click that button without reading and the company does more invisible things: maybe they plant a cookie on your computer that tells them every site you visit, or you unwittingly agree to share your contacts list even though the app has nothing do with contacts. It could also include bots that automatically scan your emails for keywords or that aggregate your browsing habits based on your stored cookies.

The final form of surveillance I'll call "secret surveillance." This is the kind that, honestly, probably is only an issue if you're already getting the attention of the government. This is the kind that isn't automated, the kind where they plant a fake version of an app on your phone or computer to track your entire phone or just that app specifically, or where they actively capture and read your communications by a person and not just a machine. This is expensive and rare, and generally speaking falls outside the scope of this book/site.

This site will focus primarily on the first two forms of surveillance and how to opt out of them. Narrow AI is the AI you're already familiar with: Siri, Alexa, Netflix's viewing algorithms, Google's navigation. They're really good at what they do, but what they do is very specific and limited. The upside is that because it is so narrow, it's relatively easy to avoid it, and because companies already make so much money off the data of those who don't avoid it, they probably don't really care about you escaping.


Previous Next