What’s ‘IN’ Dave Eggers ‘The Circle’?

In his Book The Circle, McSweeney’s founder, novelist  Dave Eggers writes about a very ambitious company that aims to be the catalyst (and the pathway too) through which all the communication that happens both in private space and in government circle could be made to travel.

The company called The Circle is planning to plug all the communication wires to its own servers and centers to be able to help citizen (that’s what they call it) and better their lives – but which essentially means a privately-controlled super-surveillance structure. The ambition is to get everything of one’s life to be on camera 24×7 whether it is about health, personal life or any other aspect. Well, that kind-a means surveillance but with approval from the society.

The Circle (Dave Eggers novel - cover art).jpg
Source: Wikipedia

The book seems placed between movie “The Truman Show”, Orwell’s “1984” and widespread acceptance of social network.

The main character of the novel Mae, in fact, wears a wearable camera throughout the day and remains in touch with the world 24X7. The world could read her emails, look at her letters, her friends, places she visits- in which she is proud of. During the day time (when she is not in sleeping) she is allowed only 3 minutes of privacy, in the bathroom when she can put off the audio of her wearable camera.

When she signs for the health insurance of her father they also have to agree to 24×7 surveillance which finally leads to them leaving everything behind (including cutting communication ties with their only daughter Mae) and run away.

That’s not everything ‘The Circle’ talks about. I am listing out all the tech things that Eggers mentions in the book.

One Person, One Identity

Eggers writes about TruYou which is one identity for your online life, social network and connects to your real life.

According to a 2009 report from Sharon J. Watson, Senior Producer, Security Squared which explores the convergence of physical and logical identities, “once identities converge, it becomes critical to ensure the person holding that physical/logical credential is truly who you think they are.”

As companies are working to make online accounts more secure for you we expect convergence of identities, and in fact also expect biometric passwords to converge person’s real life and online life. Read- No more passwords in near future

If one looks at today the Apple itunes account and Gmail account do seem to progress in this direction.  With Windows

One when there will be one identity across multiple devices, the future does moves in the direction.

A Camera Society

24×7 monitoring via camera to record almost every aspect of one’s life and sending the data to cloud for the whole world to see, is what The Circle aspires to do.

The Circle believes in-

Secrets Are Lies

Sharing is Caring

Privacy is Theft

and

All that happens must be known

While the argument that supports it is that it helps other people understand more about a health issue, this seriously violates the right to privacy.

This seems to buy from George Orwell’s 1984 which talks about the camera surveillance and its impact on the society. But Eggers adds consent to it. Mae is in fact happy to be the face of this 24×7 camera.

No more private photos

 The Circle is building a photo cloud where one can post any pics and details and they are shared globally for anyone who wants to access them. These can then be used to trace any human in almost any corner of the world.

Mercer, who wanted to run away from the Camera society, met his end when he was discovered using this photo cloud and drones.

Today there are few apps and software that make it possible for one to load pics to the web and they are shared globally. The app Rolapp lets you also hides your whereabouts and lets you post anonymously.

Social network that helps interpreting ‘you’

The social media or, ‘Zing’ reads all the posts and data you enter and helps other interpret you and your interests. Though this sounds good it becomes awkward when few pics of a visit to Lebanon posted by Mae were read as her interest in the country. As a result of this Mae gets invitation to events related to these, which turns weird when she misses to attend one such event and is approached by the person who invited her for her rude behavior.

Reading the behavior of the users has been an area of interest of Facebook. In 2014 the Mark Zuckerberg created social network altered newsfeed of about 7,00,000 users to study how user behaviour changes on seeing emotional content on timeline. The study received criticism in media and came under scanner, as a UK data regulator is looking at the ethics of social network website when it allowed this research. Read Kashmir Hill’s report in Forbes.

Look at the Facebook Data Use Policy from September 23 2011, here and compare it with the Data use policy that is visible on the site today.

Merging boundaries between life on social media and real life

Another aspect The Circle talks about is Social Media transforming into a source of manufacturing opinion and it made the members feel like taking a real-life decision (on a virtual platform) that could impact real lives.

We do know that social media have become an integral part of lives and a platform where people can give opinion on almost everything.

“Social media have flattened hierarchies, and media consumers have become producers” say Patricia Moy and Brandon Bosch in Theories of public opinion.

‘Manufacturing Consent’ Edward S. Herman and Noam Chomsky gives some insights into ways in which dominating interests public opinion and choices can be in a free society. It says , “if the powerful are able to fix the premises of discourse, to decide what the general populace is allowed to see, hear, and think about, and to “manage” public opinion by regular propaganda campaigns, the standard view of how the system works is at serious odds with reality.”

It further talks about virtual communities which are essentially consumers and are actively participating in the real-world politics. It says “The steady advance, and cultural power, of marketing and advertising has caused “the displacement of a political public sphere by a depoliticized consumer culture.” And it has had the effect of creating a world of virtual communities built by advertisers and based on demographics and taste differences of consumers. These consumption- and style-based clusters are at odds with physical communities that share a social life and common concerns and which participate in a democratic order.”

Life of virtual tours only

Eggers mentions about the virtual tours which give one the experience of visiting a far off geographic area. Well, while that sounds pretty okay for many, it might become a problem when one refuses to explore new places just because one has the option of virtual visits.

Use of Drones like paper planes

Eggers writes about use of drones (with camera, mic and speaker built into it) that could be controlled from ground and are capable of sending live feed to the millions in the world.

Drones have become the center of attraction since 2013-14 with Amazon looking to use drones for package delivery (the service being called Prime Air), Domino testing pizza delivery via drones called DomiCopters, and introduction of the first wearable drone camera Nixie.

Latest report suggest that there are new drones that could now stream live feed to YouTube in 720p quality when they are up to one mile (1.6km) away from its controllers with almost no lag.

This inevitable development turns bad when it violates Mercer’s Right to Privacy. Mercer left the city to be away of cameras and wiped of his presence on Internet. Things turn bad when on insistence of Mae who is making a presentation, a bunch of people try to find Mercer’s whereabouts. They unleash drones on him and in a bid to escape cameras Mercer gets killed.

Identity tagging

Eggers writes about Identification of a person based on the photo and identity mark (bracelet, chip embedded in the body). This thing is about a piece of software which can read the identification of a person (match that with the criminal records) and point them on a map as colored bodies.

This way they could be identified before entering any building or neighborhood, via an alarm that automatically goes off when a colored body is spotted.

With smart cities coming up that talk about surveillance cameras placed in streets to catch those with a criminal record with the police, the idea seems to have already kicked off.

Read the transcript of Ted talk of Lawyer and TED fellow Catherine Crump, who talks about the American police collecting data about citizen via cameras installed at public places here.

Finding the origin, PastPerfect

Such photos and a person’s genetic information can be used to trace the family past of a person.

There is a website called Family Search that promises connecting families across generations via images. It actively gathers, preserves, and shares genealogical records worldwide and tries to find the past.

There is another website called The Internet Surname Database, which is a database of surname origins where one can search for her ancestors.

There are other resources too, read Chris Paton Tracing your Family History on the Internet.

Mandatory membership

 The Circle wants every person on the earth to become its member or to have its account. This it wants to utilize in alerting all members during elections and for this it wants to make it mandatory for people to have a The Circle Account.

In January 2012 Google made a move that made new Gmail users to sigh in for a Google+ (Google’s social network) account. This was similar to the mandatory account creation for new YouTube accounts and mandatory facebook mail id when signing for facebook account.

Later in September 2014 Google removed this with a ‘No Thanks’ button.

Read the timeline of events that happened at Google between December 2013 to September 2014.

Facebook also tried to push a mandatory @facebook.com email address as the only contact email address to the existing and new of the social network. This showed up by default on your Facebook page or Timeline publicly.

Later in February 2014 it had to roll back the mail id as “Most people have not been using their @facebook.com email address” according to TheVerge.

Did Dave Eggers miss out something?

When the society is making a progress in every aspect of science and technology and we are seeing the rise of artificial intelligence machines and robots, Eggers misses these man-made machines completely in The Circle.

Eggers writes a lot about tiny and not-so-tiny drones which are indeed robots; he writes about the software that learns from you, reads you, scans you (that’s what we call artificial intelligence is, right?), but does not talk about the heavy machines based on this software, that will work for us in future.

He also forgets the technology that will power future cars and planes. Mae uses her car, Mercer uses a truck and Annie travels using plane but there is no single line of tech driving these vehicles.

Well, he is writing about software that could enslave human (democracies too—might be because the demand of transparency from people justifies the need of making everything public – All that happens must be known), and not about huge pieces of metals that could dominate the world.

 30 years of 1984: 8 Tech predictions of George Orwell that have come true

1984 Michael Radford
The DVD cover of the Michael Radford movie 1984 based on George Orwell’s 1984. This 110 minutes movie was released on 10th October 1984; Image credit: video.fnac.com

In 1949 the book of “George Orwell Nineteen Eighty Four’ (1984) was published. The book looked at the dystopian future of human societies, governments, mass surveillance, end of need of sexual lives of human beings and lot of new intelligent technology products by the year 1984. This book is considered the first documentation of government and mass surveillance as a tool for the State to control citizen.

On the 10th of October in 1984 Michael Radford released the movie 1984 based on Orwell’s novel in UK. Today the movie completes 30 years, and we are actually seeing a lot of things that were predicted by Orwell (later shown by Radford) in real life today.

I believe it took the human minds and technology a little more time than anticipated by Orwell in his famous novel. While Orwell thought 1984 to be a period when “technology” and “propaganda” will dominate the human day-to-day lives, “1984” was probably the beginning of all this.

The beginning

The rise of technology dates back to the age of cold war. “The primary developments that gave rise to the information and communications technology (ICT) revolution occurred during the cold war. These includes the global spread of electrical generation; the proliferation of communications satellite; commercial application of integrated circuits, fiber optics, and microprocessors; and the explosive growth of home/personal computers, the Internet and the World Wide Web” notes Richard H. Immerman and Petra Goedde in The Oxford Handbook of the Cold War.

Steve Jobs in 1984 in the very popular television commercial designed by Ridley Scott introduced Apple Macintosh PC to the world. The ad was based on dystopian future of mankind and meant to save humanity from the “conformity” of IBM’s attempts to dominate computer industry. The ad said “On January 24th, Apple Computer will introduce Macintosh. And you’ll see why 1984 won’t be like ‘1984’.”

These computers when arrived later in October heralded a new era of computers making possible more and more innovations in personal technology on one hand, and catalyzed competition in this sector on the other hand. Needless to say that this also made possible the proliferation of technology to homes (till this time it was restricted to offices, military organizations and were high in cost)

As a result of this computer technology which started with PCs and got nono-fied in later years with the urge to innovate fast and sell faster, gave us smartphones later. Needless to say today we are leading a life revolving around technology products in all form – call in smartphones, keeping data in cloud, connecting via social network, talking via a watch or driving without a steering wheel!

Today, I summarize Orwell’s predictions about future that have come true and understand how these are predictions will further consolidate themselves.

Here is a look at the 8 predictions of Orwell.

1. Big brother is watching – Continuous surveillance mechanism

This one is one of the most talked about and discussed interpretations of Orwell about the society and government. The continuous surveillance that happens in market places, in your home, office, on roads happens through HIDDEN MIKES and TELESCREENS. (and via human agents who work for the big brother)

These telescreens were able to detect any change in facial expression of a person, could hear breathing of any person or even he heart beat of a person.

That means the telescreens were fitted with cameras behind the screen that is able to zoom in on any face and see change in expressions. Two they carried very sensitive omni-directional microphones to pick sounds of all kinds.

Though Orwell did not use words like “camera on telescreen” or “comfecting” in the book (which is the fraudulent process of attempting to hack into a person’s webcam and activate it without the webcam owner’s permission) he did mentions that all telescreens are powered with the ability to look into every corner of the room they are installed in. Theses screens are always-on (owner did not had the ability to switch it off or change the direction TV is facing.

Orwell did explained “comfecting” of telescreens!

Progress on surveillance technology so far

After the Snowden revelations and many governments looking at the possibilities of peeping into conversations on social media (we do know about multiple arrests made for posting messages on social media like facebook) – we do know that big surveillance network is coming. Monitoring people is today done via cameras installed at public places, online monitoring of content that is passing through the network node.

Ever wondered if the phone camera (now every phone comes with two cameras right?) and mic is used for surveillance? Well, most of the phone users today stay online and from them mostly use an Android phone. Android OS has the largest market share in the world n terms of OS devices.

‘Once you are connected to internet the only thing a hacker needs to do is to break your lock’. The problem is when you are not hooked to Internet, the pathway that could make possible the hacker reach you, is just missing – well, this makes you safe though.

Android One
Android One smartphone from Google

According to Kaspersky, during 2011, it witnessed an explosion in the number of malicious threats targeting the Android platform. The number of threats for Android will continue to grow at an alarming rate, it predicted.

So, in case there is a possibility of switching on the camera/mic of your phone ‘remotely’, your own gadget turns as spy on you, and with the technology growing at a very fast pace, it is now possible. You will not even come to know that the phone is actually sending your conversation to a remote location to a third person.

If phones that we keep always with us, take with us to our bed, to kitchen, dining table, to a tennis game, to shower sometimes – can turn SPY- Orwell’s word will be true. Here is what he wrote –

“Always the eyes watching you and the voice enveloping you. Asleep or awake, working or eating, indoors or out of doors, in the bath or in bed – ne escape. Nothing was your own except the few cubic centimeters inside your skull.”

Now look at these self-explanatory news reports about viruses and apps that justify that this is actually possible and is being done today –

  •  The FBI can listen to everything you say, even when the cell phone is turned off. A recent court ruling in a case against the Genovese crime family revealed that the FBI has the ability from a remote location to activate a cell phone and turn its microphone into a listening device that transmits to an FBI listening post, a method known as a “roving bug.” – ABC News 2006 via Washingtonsblog.
  • By September 2004, the NSA had developed a technique that was dubbed “The Find” by special operations officers. The technique was used in Iraq and “enabled the agency to find cellphones even when they were turned off.” – A report in Slate via a news story in Washington Post.
  • FinFisher spyware can secretly monitor computers, intercept Skype calls, turn on Web cameras and record every keystroke. This virus has now spread to five continents – Bloomberg via Computerworld
  • According to Kaspersky Lab Flame virus is able to execute total surveillance and monitoring that includes turning on your camera and microphone, copying your data, and recording emails and chat conversations. – Inforwars, IBTimes
  • “If you can give me just any small amount of information about yourself, I promise you, within three days, I can turn on the camera on your computer at home and watch whatever you’re doing,” John MacAffee, the maker of AcAffee anti-virus says. – ABC news via DeepdotWeb
  • A researcher claims to have written an Android app that takes photos and videos using a smartphone camera, even while the screen is turned off – a pretty handy tool for a spy or a creepy stalker. – NakedSecurity
  • mSpy mobile surveillance application (not a spy software) runs on smartphones and tablets including iPhone, Android, BlackBerry, Symbian, iPad and Galaxy Tab devices. It allows users to remotely spy on (others) text messages, call logs, and emails; track location, record surroundings, and more on smartphones and tablets. – NakedSecurity

No privacy of personal communication

Use of media for personal communications spearheaded industrial revolution. Service like telephones, trains, postal facility helped industries grow. With email things became faster and virtual.

Orwell mentions “by a routine thaw a not even secret, all letters were opened in transit”. While this is possible with the written letters, emails have just widened the area under surveillance.

This prediction of Orwell was a very manual form of surveillance, which one can understand. But with the advent of Internet the scope of this searching of personal communication passing through Internet Nodes maintained either by companies or by the government- has increased. The geographical reach of surveillance has increased, and so is the capabilities of the governments. Now emails going from India can be opened and read in another geographical area.

The companies where we work have software to monitor our emails citing administrative purpose as reasons. Our governments have infrastructure to do so, on our personal emails, facebook posts if they wish to do so, citing security and national integrity as reasons.

You did heard of NSA’s prism surveillance program, and other such surviellence programs, didn’t you?

“After the 9/11 attacks, Bush started a still-mysterious National Security Agency program to eavesdrop on phone calls, texts, and emails by U.S. citizens who were communicating with people overseas,” Fusin reported in 2013 after Snowden Revelations.

“After the 9/11 attacks, Bush started a still-mysterious National Security Agency program to eavesdrop on phone calls, texts, and emails by U.S. citizens who were communicating with people overseas,” says Huffington Post.

In January 2014, Defence Research and Development Organisation (DRDO) launched NETRA (NEtwork TRaffic Analysis). Netra is the intelligence software network to intercept and analyse internet traffic using pre-defined filters.

The software is capable of analysing voice traffic passing through software such as Skype and Google Talk, and intercept messages with keywords such as ‘attack’, ‘bomb’, ‘blast’ or ‘kill’ in real-time from the enormous number of tweets, status updates, emails, instant messaging transcripts, internet calls, blogs, forums and even images generated on the internet to obtain the desired intelligence.

Where’s own life?

In an environment where your facebook posts are monitored, your movement on streets and bedroom is monitored – you will, become conscious enough not to do anything that is wrong (illegal). You tend to pretend, post posts that please other, behave in a way that you are not noticed.

In today’s world very many do not know that the camera can he hacked and operated remotely, you phone mic can be switched on and send all you do to the hacker. Many who know still believe that they no problem with this as “why would one spy on me?”

Given that the surveillance via your phone/tablet is a known fact and is told to the people, the behavior will definitely change.

2. New media – that will have a unidirectional “legacy media” structure again

burning books
In May 10, 1933 students and storm troopers put to fire a huge pile of books with “unGerman” ideas at the Opera Square in Berlin. In the picture the bonfire rages as books are tossed. Credit: http://www.historyplace.com

Destruction of evidence and correction of ‘misquoted’ text

When you look at the print media whatever has been printed cannot be erased (unless all such records are destroyed). Same is for TV or AV media where whatever is recorded stays as it is till destroyed. That needs physical search of text or data- difficult task indeed.

However, that is not the case with the online media. With online media the text you have written can be replaced easily. All such records (websites) can be searched for showing the text and can either be blocked or the text could be erased (includes, pursuing the content hosting portal or the user).

If all content is in on Internet, the problem of that comes with searching it no more exists. Destruction of evidence is easy compared to other media, right?

Bombarding messages – reinforcing of message

With the legacy media which started the Gutenberg era, media involved messages created at one end traveling to the other end. Inspired by the ‘Magic Bullet Theory’ of communication, bombardment of messages was the preferred mode of development of many nation states. Messages were assumed “to have a direct and immediate effect on the viewer’s consciousness as if they were injected like a drug into the bloodstream,” says LessonBucket.

With the development of Internet (largely) after 1995, this uni-directional media stood challenged. With more and more people hooking to Internet, producing, sharing and consuming content, the earlier relationship of “information producer -> information consumer” was challenged with a new emerging relation of “information producer <=> information consumer”.

But censorship of media, (all kind of online content), does indicate that media (including social media, since we are looking media as a platform for expression) is not going to be free expression.

A look at the Google Transparency Report would indicate that content removals requests asking to block access to content with allegations of defamation, local laws prohibiting hate speech or adult content, are received and complied. Let’s not talk about arrests that follow a post facebook.

According to the 2012 State of the News Media report from Pew Research centre, the news industry “finds itself more a follower than leader shaping its business.” Technology companies such as Google, Amazon, Facebook, Apple now control the future of news, says Forbes in a news report based on this report.

The flux in the state of Internet filtering highlights the crucial importance of strategic intervention by civil society in this intercourse. As the importance of the Internet grows, more systematic attempts will likely be made by the government to exert control over Internet content. (Arun Mehta and Manasi Dash; Internet Censorship 2011)

With a framework to censor content (that includes prosecution) is free expression possible? There will always be spaces where people will express whatever they want, but largely expression of thought will not nbe totally free.

Before the advent of Internet, Orwell in 1949 predicted that the media will turn uni-directional with surveillance. Though he reached to a extreme point when mentioned that writing a diary was also illegal and could be punished with “death”.

3. Speakwrite

Orwell mentions a speakwrite that is a mic with a mouthpiece. Whatever is said to the mic it is transformed into text and written.

We are today living in the age of speech-to-text software and virtual assistants. Almost every phone (tablet and computers) comes with speech recognizing virtual assistant. Windows have got Cortona, Apple has Siri and Android has OK, Google.

There are software like Dragon Dictate (speech recognition software too that let you dictate documents, search the web, email and more on your computer) and SpeakWrite (this is a converting transcription to text service) that listen to what you say and convert it to written text.

4. Digital document drawer with display screen

When Winston dialed “back numbers” on a telescreen and called for “appropriate issue of Times”, the pneumatic tube “slid out” the required document after few minutes.

Electronic document management systems in offices, libraries are common today. Even a normal file manager folder drawer we use today is the basic form of electronic drawer where we can ask or search for desired documents. 

5. Missile detection system 

Orwell mentions a “Proles” who had some kind of knowledge that a rocket is coming several seconds before the rocket actually lands.

After the 9/11 attack on United States that we started hearing about Missile Detection System that is detection of such item to toward the country’s air space and being able to destroy the incoming object with a faster missile.

6. Printed postcards

Orwell did not talk about email messages, but he did mentions “printed postcards” which has got a list of pre-written messages. All the sender needs to do is to strike on which is necessary.

Look at it as a pre-written SMS or a document or email format that we use today, the signature that we put on in an email by making a simple arrangement to make it appear at the end of each email that goes out of our email account is also an example. Most of us today use pre-written messages for mails that arrive when we are not online.

7. Reading Memory

No there was no mention of mind reading or mid reading technologies in Geroge Orwells book. I am however, tempted to use this here as Orwell does mentions that he telescreens were capable enough to look at the facial expressions which could reveal what is in one’s mind. It was important to keep the faces expressionless and even control breathing.

If we look at developments today we are yet to figure out mind reading. There have been some developments which we can call a beginning on mind reading-

  • US military’s project making binoculars that read the user’s own subconscious brainwaves to help identify threats from afar. These gadgets can take multiple images with each scan and feed them to a software program to identify potential threats from a distance.
  • Jack Gallant in the University of California, Berkeley is also working on a similar project in which he uses a screen to display images from movies. On another screen he uses feed from brain scans to read (guess) what the subject of study is watching at the time.

8. Memory hole 

This is the machine used in the story to alter or disappear incriminating or embarrassing documents, photographs, transcripts, or other records.

History is packed with examples where books were burned in an attempt to erase history. But with time and technology moving ahead, the way of doing so has changed.

Paper shredders had been invented, but were hardly used when Orwell wrote his book. The actual implementation of the technology or wiping out things from memory could be viewed as the concept of wiping out a hard drive in computer. With the source altered there remains no scope that the file/document is available in any form (unless there is print version of it).

9. Versifactor

This was the song composer that needed no human intervention. The song composer Versifactor was a mechanical instrument that could make songs.

Though Garage Band app still needs human intervention, but the app can produce music without the need of other musical instruments. We get a list of software called music composers that churn out new music and pre-fed voices today.