Source: http://www.abc.net.au/tv/bigideas/stories/2014/09/04/4081183.htm

Source: http://www.abc.net.au/tv/bigideas/stories/2014/09/04/4081183.htm

 Source: http://www.iq2oz.com/debates/we-are-becoming-enslaved-by-our-technology-/

Source: http://www.iq2oz.com/debates/we-are-becoming-enslaved-by-our-technology-/

 Source: http://www.abc.net.au/radionational/programs/bigideas/enslaved-by-our-technology3f/5598912

Source: http://www.abc.net.au/radionational/programs/bigideas/enslaved-by-our-technology3f/5598912

 Source: http://www.acola.org.au/index.php/news/70-we-are-becoming-enslaved-by-our-technology

Source: http://www.acola.org.au/index.php/news/70-we-are-becoming-enslaved-by-our-technology

Thanks E.T. for this link- article written for the New York Times (oped) by CASS R. SUNSTEIN AUG. 20, 2014.

"What do Americans actually think about predictive shopping? To find out, I produced a nationally representative survey, conducted with about 500 respondents, with a margin of error of plus or minus 4.5 percentage points.
I discovered, to my surprise, that a significant percentage of Americans already welcome predictive shopping.
The situation was presented like this: Suppose that over the years, your favorite online bookseller has compiled a great deal of information about your preferences. On the basis of a new algorithm, it thinks it knows what you will want to buy before you do. I asked, would you enroll in a program in which the seller sent you books that it knew you would purchase, and billed your credit card? (Anyone could send the book back for a refund or just opt out of the program.) Fifty-nine percent said no, but 41 percent said yes.
Second, I explored whether people would react differently if sellers signed people up without their consent. I asked, would you approve or disapprove if the seller automatically, and without your explicit consent, enrolled you in a program in which it sent you books that it knew you would purchase, and billed your credit card?
Twenty-nine percent said they would approve, and 71 percent said they would disapprove. People do care about explicit consent. Nonetheless, it is noteworthy that nearly a third of Americans would approve of such a program.
Books are, of course, an unusual commodity. We might like the idea of stumbling onto new topics and ideas. Whenever shopping itself is fun, whenever serendipity and surprise are valuable, we might want to choose on our own, hence reject predictive shopping. "

Read more here

It is with great joy that MG and I write to let you know that the Uberveillance edited volume is finally in stores and available for purchase. We encourage you to ask your libraries to purchase the volume. Of significance are the coming together of well-known voices in the surveillance field to discuss the definition and impact of uberveillance, including Katherine Albrecht, Roger Clarke, Mark Gasson, Kevin Haggerty, Steve Mann, Ellen McGee, Kevin Warwick, Marcus Wigan and numerous authorities on the topic of microchipping people. This volume contains 17 book chapters, and 7 interviews and panel presentations as well as full referencing of source materials in some 500 pages.

 "Uberveillance" edited volume by Michael and Michael (2014)

"Uberveillance" edited volume by Michael and Michael (2014)

 

CONTENTS PAGE

PART A The Veillances

Chapter 1 Introduction: On the “Birth” of Uberveillance  (pages 1-31) M. G. Michael (University of Wollongong, Australia)

Chapter 2 Veillance: Beyond Surveillance, Dataveillance, Uberveillance, and the Hypocrisy of One-Sided Watching  (pages 32-45) Steve Mann (University of Toronto, Canada)

Chapter 3 Uberveillance: Where Wear and Educative Arrangement  (pages 46-62) Alexander Hayes (University of Wollongong, Australia)

PART B Applications of Humancentric Implantables

Chapter 4 Practical Experimentation with Human Implants  (pages 64-132) Kevin Warwick (University of Reading, UK), Mark N. Gasson (University of Reading, UK)

Chapter 5 Knowledge Recovery: Applications of Technology and Memory  (pages 133-142) Maria E. Burke (University of Salford, UK), Chris Speed (University of Edinburgh, UK)

PART C Adoption of RFID Implants for Humans

Chapter 6 Willingness to Adopt RFID Implants: Do Personality Factors Play a Role in the Acceptance of Uberveillance?  (pages 144-168) Christine Perakslis (Johnson and Wales University, USA)

Chapter 7 Surveilling the Elderly: Emerging Demographic Needs and Social Implications of RFID Chip Technology Use  (pages 169-185) Randy Basham (University of Texas – Arlington, USA)

PART D Tracking and Tracing Laws, Directives, Regulations, and Standards

Chapter 8 Towards the Blanket Coverage DNA Profiling and Sampling of Citizens in England, Wales, and Northern Ireland  (pages 187-207) Katina Michael (University of Wollongong, Australia)

Chapter 9 ID Scanners and Überveillance in the Night-Time Economy: Crime Prevention or Invasion of Privacy?  (pages 208-225) Darren Palmer (Deakin University, Australia), Ian Warren (Deakin University, Australia), Peter Miller (Deakin University, Australia)

Chapter 10 Global Tracking Systems in the Australian Interstate Trucking Industry  (pages 226-234) Jann Karp (C.C.C. Australia, Australia)

Chapter 11 Tracking Legislative Developments in Relation to “Do Not Track” Initiatives  (pages 235-259) Brigette Garbin (University of Queensland, Australia), Kelly Staunton (University of Queensland, Australia), Mark Burdon (University of Queensland, Australia)

Chapter 12 Uberveillance, Standards, and Anticipation: A Case Study on Nanobiosensors in U.S. Cattle  (pages 260-279) Kyle Powys Whyte (Michigan State University, USA), Monica List (Michigan State University, USA), John V. Stone (Michigan State University, USA), Daniel Grooms (Michigan State University, USA), Stephen Gasteyer (Michigan State University, USA), Paul B. Thompson (Michigan State University, USA), Lawrence Busch (Michigan State University, USA), Daniel Buskirk (Michigan State University, USA), Erica Giorda (Michigan State University, USA), Hilda Bouri (Michigan State University, USA)

PART E Health Implications of Microchipping Living Things

Chapter 13 Microchip-Induced Tumors in Laboratory Rodents and Dogs: A Review of the Literature 1990–2006  (pages 281-317) Katherine Albrecht (CASPIAN Consumer Privacy, USA)

PART F Socio-Ethical Implications of RFID Tags and Transponders

Chapter 14 Privacy and Pervasive Surveillance: A Philosophical Analysis  (pages 319-350) Alan Rubel (University of Wisconsin – Madison, USA)

Chapter 15 Neuroethics and Implanted Brain Machine Interfaces  (pages 351-365) Ellen M. McGee (Independent Researcher, USA)

Chapter 16 We Are the Borg! Human Assimilation into Cellular Society  (pages 366-407) Ronnie D. Lipschutz (University of California - Santa Cruz, USA), Rebecca J. Hester (University of Texas Medical Branch, USA)

Chapter 17 Uberveillance and Faith-Based Organizations: A Renewed Moral Imperative  (pages 408-416) Marcus Wigan (Oxford Systematics, Australia & Edinburgh Napier University, UK)

Acronyms and Abbreviations

Compilation of References

About the Contributors

Index

EDITORIAL ADVISORY BOARD

Roba Abbas, University of Wollongong, Australia

Greg Adamson, University of Melbourne, Australia

Katherine Albrecht, CASPIAN, USA

Anas Aloudat, University of Jordan, Jordan

Michael V. Arnold, University of Melbourne, Australia

Emilia Belleboni, Universidad Politecnica de Madrid, Spain

Rafael Capurro, University of Wisconsin – Milwaukee, USA

Kenneth Foster, University of Pennsylvania, USA

Amal Graafstra, Amal.net, USA

Mireille Hildebrandt, Erasmus University Rotterdam, The Netherlands

Peter Hyland, University of Wollongong, Australia

Nicholas Huber, Accenture, Australia

Indrawati, Institut Manajemen Telkom, Indonesia

Eleni Kosta, K. U. Leuven, Belgium

Ronald Leenes, Tilburg University, The Netherlands

Avner Levin, Ryerson University, Canada

Michael Loui, University of Illinois – Urbana-Champaign, USA

Noëmi Manders-Huits, Delft University of Technology, The Netherlands

Keith W. Miller, University of Missouri – St. Louis, USA

Lyria Bennett Moses, University of New South Wales, Australia

Christine Perakslis, Johnson and Wales University, USA

Laura Perusco, Macquarie Bank, UK

Kenneth Pimple, Indiana University – Bloomington, USA

Joseph Savirimuthu, University of Liverpool, UK

Alan D. Smith, Robert Morris University, USA

Charles Smith, Mesa State College Alumni, USA

Judith Symonds, Auckland University of Technology, New Zealand

Samuel Fosso Wamba, Rouen Business School, France

John Weckert, Charles Sturt University, Australia

 

HOW TO CITE THE VOLUME

MLA Style

Michael, M.G. and Katina Michael. "Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies." IGI Global, 2014. 1-509. Web. 24 Dec. 2013. doi:10.4018/978-1-4666-4582-0

APA Style

Michael, M., & Michael, K. (2014). Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies (pp. 1-509). Hershey, PA: IGI Global. doi:10.4018/978-1-4666-4582-0

Chicago Style

Michael, M.G. and Katina Michael. "Uberveillance and the Social Implications of Microchip Implants: Emerging Technologies." 1-509 (2014), accessed December 24, 2013. doi:10.4018/978-1-4666-4582-0

"CONTROVERSIAL tracking technology will be deployed in Brisbane's CBD under a plan to snoop on visitors' movements throughout the Queen Street Mall and South Bank.

The technology, from UK-based company Path Intelligence, intercepts mobile phone signals to track each person as they move around the area.
But while the company insists it doesn't collect private data and all information is anonymous, a privacy expert has warned it is "basically spying" and could breach Australian law."
:
:
"Australian Privacy Foundation vice-chair David Vaile said the technology misused the telephone network by using it to snoop on unsuspecting visitors.
He said any such technology should have an open and transparent privacy assessment so citizens could be comfortable their personal data wasn't being collected and that the system wasn't vulnerable to abuse or hacking.
"They're basically spying on you . . . The phone system wasn't put there to enable people to spy on other people by tracking them, its only purpose was for facilitating calls," he said.
Mr Vaile said the technology could be in breach of telecommunication law, and differing international definitions of "anonymous" meant such tracking systems could also breach the Privacy Act. "

Read more

 

Transient

What starts off as a bargain... takes about 4 weeks to turn yukky.

I've washed both pairs of my new Kathmandu slacks on several occasions now. I've loved wearing them, they're comfortable, and good quality... But it's taken me till now to figure out what that stiff 'cardboard' feeling thing was in the bottom side of my pocket. I first thought it was the Kathmandu label but as I put up my washing this afternoon and compared my black and gray slacks as I pegged them onto the line, I soon realised that 'it' wasn't in the pocket, nor was it a label- but something else in that extra sew-on attachment.

What gave it away? 

The black pants had a black extra sew-on attachment, while the gray pants had a white sew-on attachment and as the sun beamed I turned the clothes inside out.  The light of the sun revealed something else through the white fabric! And in the end had it not been for that, I would have been completely oblivious to the embedded tag.

Click through to see the discovery as it happened...

I have to say it is the first time that I've come across an item I've bought whose manufacturer has gone to such extraordinary lengths to embed a tag into the clothing. At first I thought, yeah, a lot of thieves would frequent Kathmandu for the quality clothing, and then when I came to my senses I realised this was not about theft or loss prevention but about consumer tracking!

Having recently re-opened Katherine Albrecht's and Liz McIntyre's Spychips bestseller, I soon put one and one together (see e.g. the Benetton and Gillette campaign)... this tag would potentially be used to understand repeat clientele back into Kathmandu retail stores!

shook my head stunned, thinking this was not right... I went to fetch my camera and scissors to cut open the sew-on attachment... and there, to my amazement, was the tag in full view. If that was not enough, the tag was stuck onto the fabric. I was reminded of a short 2 minute clip I had shown my students in IACT905 IT & Innovation @ UOW of Will Smith in the famous scene of Enemy of the State... tags in shoes, watches, pants, smart phone, you name it!

 Enemy of the State (1998). Scene taken 57 min into film. 

Enemy of the State (1998). Scene taken 57 min into film. 

What have we become?! Tracking spychips... in slacks... chips in slacks...! How utterly abhorrent! I thought about my kids wearing Kathmandu as well- those tags must go! Check your clothes and cut the attachments off!

The last gallery image depicts me quite disturbed at this discovery... I added my face to my pants symbolically, using my new Samsung Galaxy 4 Android device! There are several reasons for this- but for the greater part, the tag in my slacks is linked to me forever because my name is now linked to those pants, as is my face, and my transaction history.

I wonder how soon all of this will sync up with the "anonymous" tracking of consumers at shopping malls! It seems only a matter of time that there will be a truly integrated effort to bring together CCTV, smartphones and RFID chips! 

 The elevator scene in  Enemy of the State  (1998) between Will Smith and Gene Hackman.

The elevator scene in Enemy of the State (1998) between Will Smith and Gene Hackman.

 The elevator scene in  Enemy of the State  (1998) between Will Smith and Gene Hackman.

The elevator scene in Enemy of the State (1998) between Will Smith and Gene Hackman.

 The elevator scene in  Enemy of the State  (1998) between Will Smith and Gene Hackman.

The elevator scene in Enemy of the State (1998) between Will Smith and Gene Hackman.