Can Mass Surveillance Create A Harmonious Society?

Can Mass Surveillance Create A Harmonious Society?

Can Mass Surveillance Create A Harmonious Society?

A lot has been written recently about how big data can be used for illicit and unethical purposes – yet away from the world of NSA surveillance and Edward Snowden, one country is using it to create a safer and more harmonious society for its citizens.

Singapore is the country in question, and its big data policies have now become so successful that the west is using it as a model for how they could build an intelligence network if long-standing cultural ideals such as civil liberties and a right to privacy weren’t getting in the way.

The technology in question is called ‘Total Information Awareness’ (TIA) and was originally developed within the US by the ‘Defence Advanced Research Projects Agency’ (DARPA) around the turn of the millenium. It originally worked by gathering as much information as possible from electronic records – emails, phone logs, Internet searches, airline reservations, hotel bookings, credit card transactions, medical reports, etc – and then scanning them for terrorist plots by using a predetermined set of scenarios.

peter-hoTIA was nominally mothballed in the US in 2003 due to massive public outcry about the way the experimental research mined huge amounts of American civilians’ information (though as we now know it was in fact splintered into smaller projects and put under the supervision of the NSA). Despite the domestic furore, Peter Ho – Singapore’s Permanent Secretary of Defence – visited DARPA, saw the TIA in action, and returned to his homeland inspired by audacity and scope of the system. Ho later recalled that he “was so impressed that by connecting a vast number of databases, that we could find the proverbial needle in the haystack”.

As the spectre of Islamist terrorism in South-East Asia grew in the aftermath of the 2002 Bali bombings, Ho was convinced that he could put the system to good use in his home country. His chance to find out arrived less than four months later with the region-wide outbreak of the deadly SARS virus. The virus claimed thirty three lives, slowed the Singaporean economy to a crawl, and stretched emergency services to their limits.

The Singapore Risk Assessment and Horizon Scanning (RAHS) program was established shortly after, with the explicit aim of preventing terrorist attacks and other nonconventional strikes. The government told its citizens they were using big data to aid national defence (a pitch that the city-state’s technology-hungry population loved), and they have never looked back.

In the ten years since its implementation RAHS has grown beyond Ho’s wildest dreams. All of Singapore’s national ministries and departments now use the system to plan and organise every aspect of governing the tiny country. Procurement cycles and budgets, economic forecasts, immigration policy, housing markets, and national education curriculums all get the RAHS treatment – there is even talk about expanding the plan to analyse various social media channels in an attempt to understand the nation’s mood about everything from government social programs to the potential for civil unrest.

The result is that the world’s third richest country (by GDP per capita) has become a laboratory for testing whether mass surveillance and technology can help to create a more harmonious society. It’s required a leap of faith from the country’s 3.8 million residents, but the results are overwhelming. The Singapore model is now so successful that there is no going back – an outcome that most western countries can only cast admiring glances at from afar.

What do you think? Would European and American civilians accept such intrusion if it dramatically improved their daily lives? Let us know in the comments below.

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

Choosing IaaS or a Cloud-Enabled Managed Hosting Provider?

There is a Difference – So Stop Comparing We are all familiar with the old saying “That’s like comparing apples to oranges” and though we learned this lesson during our early years we somehow seem to discount this idiom when discussing the Cloud. Specifically, IT buyers often feel justified when comparing the cost of a…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…