Consider one example of function creep. The Electoral Commission of Uganda has retained Viisage Technology to implement a face recognition system capable of enrolling 10 million voters in 60 days. The goal is to reduce voter registration fraud. But Woodward notes that the system might also be put to work fingering political opponents of the regime. And Uganda probably isn’t the first country that springs to mind when someone says “due process” or “civil rights.”
The central question raised by Amato’s story is: Who will decide which functions of a dramatic new technology are acceptable and which are just too, well, creepy? As Amato’s story and others that have recently appeared in TR suggest, we all need to think carefully about how new technologies are implemented and used. And after we’ve thought about it, we need to do something about it. If we don’t, then the decisions will get made by those with deep pockets and deep vested interests. We need to wake up to these issues soon, because “the technology is developing at the speed of light, but the privacy laws to protect us are back in the Stone Age,” as Barry Steinhardt, associate director of the American Civil Liberties Union, put it to Amato.
The same theme surfaces in another story in this issue, “Taming the Web,” by Charles C. Mann. Mann takes on a myth, incubated in the hacker culture, that has now spread to the rest of the world: that the Internet is too big and too anarchic to be controlled. Mann outlines three arguments that have been advanced to support this view: (1) the Net is too international to be controlled, (2) the Net is too interconnected to control and (3) there are just too many hackers for control to be established. In a provocative article, Mann shows that two of these arguments are false and one is irrelevant. There is no doubt, he writes, that the Internet will be controlled. The only question is-by whom?
“Governments are going to set down rules,” Internet-law specialist Justin Hughes at the University of California, Los Angeles, tells us in Mann’s piece, “and if you spend all your time fighting the existence of rules, you won’t have much chance to make sure the rules are good ones.” Those who claim that the Internet is inherently resistant to control have taken themselves out of the process of formulating those rules. In their absence, others, such as corporations and government agencies, will be only too happy to step in.
As these two articles make clear, new technologies are raising critical questions of public policy that must be answered soon. Yet many of these developments are taking place outside the public view-because the technology seems arcane or because its impact hasn’t been grasped by the public. By bringing the impact of emerging technologies into the spotlight, Technology Review intends to change all that. Cutting-edge technology is no longer an exotic realm where experts rule. It affects us all, and we all need to step up and take responsibility for how it’s used.
Embracing CX in the metaverse
More than just meeting customers where they are, the metaverse offers opportunities to transform customer experience.
Identity protection is key to metaverse innovation
As immersive experiences in the metaverse become more sophisticated, so does the threat landscape.
The modern enterprise imaging and data value chain
For both patients and providers, intelligent, interoperable, and open workflow solutions will make all the difference.
Scientists have created synthetic mouse embryos with developed brains
The stem-cell-derived embryos could shed new light on the earliest stages of human pregnancy.
Get the latest updates from
MIT Technology Review
Discover special offers, top stories, upcoming events, and more.