Can Mass Surveillance Create A Harmonious Society?

Can Mass Surveillance Create A Harmonious Society?

Can Mass Surveillance Create A Harmonious Society?

A lot has been written recently about how big data can be used for illicit and unethical purposes – yet away from the world of NSA surveillance and Edward Snowden, one country is using it to create a safer and more harmonious society for its citizens.

Singapore is the country in question, and its big data policies have now become so successful that the west is using it as a model for how they could build an intelligence network if long-standing cultural ideals such as civil liberties and a right to privacy weren’t getting in the way.

The technology in question is called ‘Total Information Awareness’ (TIA) and was originally developed within the US by the ‘Defence Advanced Research Projects Agency’ (DARPA) around the turn of the millenium. It originally worked by gathering as much information as possible from electronic records – emails, phone logs, Internet searches, airline reservations, hotel bookings, credit card transactions, medical reports, etc – and then scanning them for terrorist plots by using a predetermined set of scenarios.

peter-hoTIA was nominally mothballed in the US in 2003 due to massive public outcry about the way the experimental research mined huge amounts of American civilians’ information (though as we now know it was in fact splintered into smaller projects and put under the supervision of the NSA). Despite the domestic furore, Peter Ho – Singapore’s Permanent Secretary of Defence – visited DARPA, saw the TIA in action, and returned to his homeland inspired by audacity and scope of the system. Ho later recalled that he “was so impressed that by connecting a vast number of databases, that we could find the proverbial needle in the haystack”.

As the spectre of Islamist terrorism in South-East Asia grew in the aftermath of the 2002 Bali bombings, Ho was convinced that he could put the system to good use in his home country. His chance to find out arrived less than four months later with the region-wide outbreak of the deadly SARS virus. The virus claimed thirty three lives, slowed the Singaporean economy to a crawl, and stretched emergency services to their limits.

The Singapore Risk Assessment and Horizon Scanning (RAHS) program was established shortly after, with the explicit aim of preventing terrorist attacks and other nonconventional strikes. The government told its citizens they were using big data to aid national defence (a pitch that the city-state’s technology-hungry population loved), and they have never looked back.

In the ten years since its implementation RAHS has grown beyond Ho’s wildest dreams. All of Singapore’s national ministries and departments now use the system to plan and organise every aspect of governing the tiny country. Procurement cycles and budgets, economic forecasts, immigration policy, housing markets, and national education curriculums all get the RAHS treatment – there is even talk about expanding the plan to analyse various social media channels in an attempt to understand the nation’s mood about everything from government social programs to the potential for civil unrest.

The result is that the world’s third richest country (by GDP per capita) has become a laboratory for testing whether mass surveillance and technology can help to create a more harmonious society. It’s required a leap of faith from the country’s 3.8 million residents, but the results are overwhelming. The Singapore model is now so successful that there is no going back – an outcome that most western countries can only cast admiring glances at from afar.

What do you think? Would European and American civilians accept such intrusion if it dramatically improved their daily lives? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

Find out more
View All Articles

2 Responses to Can Mass Surveillance Create A Harmonious Society?

  1. Perhaps a better question: Is it important to create a harmonious society?

    Or is it important enough to create a harmonious society to justify the use of mass surveillance?

    Another question, can a harmonious society be created without the use of mass surveillance, and the implicit curtailment of rights that go along with it?

    Before we go the route of mass surveillance we need, as a society, to answer these and other questions.

  2. “Harmony” for whom: our overlords? Surveillance must go hand-in-hand with security and inalienable human rights and freedoms. Harmony needs a little chaos.

Comic
Cloud Computing – The Good and the Bad

Cloud Computing – The Good and the Bad

The Cloud Movement Like it or not, cloud computing permeates many aspects of our lives, and it’s going to be a big part of our future in both business and personal spheres. The current and future possibilities of global access to files and data, remote working opportunities, improved storage structures, and greater solution distribution have…

The FTC, Data Privacy and Facebook

The FTC, Data Privacy and Facebook

Data Protection Facebook is in deep water over their recent decision to start harvesting phone numbers from one of the apps they own, called WhatsApp. WhatsApp is a mobile phone app that allows people to place long distance phone calls and send SMS messages for free. A complaint was filed with the Federal Trade Commission…

Three Tips To Simplify Governance, Risk And Compliance

Three Tips To Simplify Governance, Risk And Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Annual Compliance & Ethics Institute:  Hot Topics – Cyber Security, Big Data, Privacy Breach Response

The Annual Compliance & Ethics Institute: Hot Topics – Cyber Security, Big Data, Privacy Breach Response

Cyber Security, Big Data, Privacy Breach Response MINNEAPOLIS, Aug. 30, 2016 /PRNewswire-USNewswire/ — Cyber security, social media, modern slavery, anti-corruption, export controls and sanctions, and privacy top the list of “Hot Issues” compliance and ethics professionals face each day. These and many other compliance and ethics concerns will be addressed at the 2016 Compliance & Ethics…

Top 5 Digital Health Trends

Top 5 Digital Health Trends

Digital Health Trends It is very important to keep up with the changing technology. However, it is also just as important to advance the consumer experience, care delivery methods and create opportunities for career development for the healthcare workforce. Five trends that are proven to be effective in winning in the digital age have been…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Which Is Better For Your Company: Cloud-Based or On-Premise ERP Deployment?

Cloud-Based or On-Premise ERP Deployment? You know how enterprise resource management (ERP) can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing – A Requirement For Greater Innovation

Cloud Computing Innovation Sao Paulo, Brazil has had trouble with both energy and water supplies as of late. Despite it is the rainy period. Unfortunately Sao Paulo is very dependent on its rain as a majority of its power is generated from large dams. No water, no energy. Difficult situation for a city of some…

Five Signs The Internet of Things Is About To Explode

Five Signs The Internet of Things Is About To Explode

The Internet of Things Is About To Explode By 2020, Gartner estimates that the Internet of Things (IoT) will generate incremental revenue exceeding $300 billion worldwide. It’s an astoundingly large figure given that the sector barely existed three years ago. We are now rapidly evolving toward a world in which just about everything will become…

Infographic: IoT Programming Essential Job Skills

Infographic: IoT Programming Essential Job Skills

Learning To Code As many readers may or may not know we cover a fair number of topics surrounding new technologies such as Big data, Cloud computing , IoT and one of the most critical areas at the moment – Information Security. The trends continue to dictate that there is a huge shortage of unfilled…

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Consequences Of Combining Off Premise Cloud Storage and Corporate Data

Off Premise Corporate Data Storage Cloud storage is a broad term. It can encompass anything from on premise solutions, to file storage, disaster recovery and off premise options. To narrow the scope, I’ve dedicated the focus of today’s discussion to the more popular cloud storage services—such as Dropbox, Box, OneDrive—which are also known as hosted,…

The Internet of Things – Redefining The Digital World As We Know It

The Internet of Things – Redefining The Digital World As We Know It

Redefining The Digital World According to Internet World Stats (June 30th, 2015), no fewer than 3.2 billion people across the world now use the internet in one way or another. This means an incredible amount of data sharing through the utilization of API’s, Cloud platforms and inevitably the world of connected Things. The Internet of Things is a…

The Big Data Movement Gets Bigger

The Big Data Movement Gets Bigger

The Big Data Movement In recent years, Big Data and Cloud relations have been growing steadily. And while there have been many questions raised around how best to use the information being gathered, there is no question that there is a real future between the two. The growing importance of Big Data Scientists and the…