Search This Blog

Wednesday, February 7, 2024

Surveillance

From Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Surveillance
Surveillance cameras
Surveillance Camera to support the Washington DC Police

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Surveillance is used by citizens, for instance for protecting their neighborhoods. It is widely used by governments for intelligence gathering, including espionage, prevention of crime, the protection of a process, person, group or object, or the investigation of crime. It is also used by criminal organizations to plan and commit crimes, and by businesses to gather intelligence on criminals, their competitors, suppliers or customers. Religious organizations charged with detecting heresy and heterodoxy may also carry out surveillance. Auditors carry out a form of surveillance.

A byproduct of surveillance is that it can unjustifiably violate people's privacy and is often criticized by civil liberties activists. Democracies may have laws that seek to restrict governmental and private use of surveillance, whereas authoritarian governments seldom have any domestic restrictions.

Espionage is by definition covert and typically illegal according to the rules of the observed party, whereas most types of surveillance are overt and are considered legal or legitimate by state authorities. International espionage seems to be common among all types of countries.

Methods

Computer

Official seal of the Information Awareness Office – a U.S. agency which developed technologies for mass surveillance

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by federal law enforcement agencies.

There is far too much data on the Internet for human investigators to manually search through all of it. Therefore, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic to identify and report to human investigators the traffic that is considered interesting or suspicious. This process is regulated by targeting certain "trigger" words or phrases, visiting certain types of web sites, or communicating via email or online chat with suspicious individuals or groups. Billions of dollars per year are spent by agencies, such as the NSA, the FBI and the now-defunct Information Awareness Office, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data to extract only the information which is useful to law enforcement and intelligence agencies.

Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI's Magic Lantern and CIPAV, on a computer system, they can easily gain unauthorized access to this data. Such software could be installed physically or remotely. Another form of computer surveillance, known as van Eck phreaking, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters. The NSA runs a database known as "Pinwale", which stores and indexes large numbers of emails of both American citizens and foreigners. Additionally, the NSA runs a program known as PRISM, which is a data mining system that gives the United States government direct access to information from technology companies. Through accessing this information, the government is able to obtain search history, emails, stored information, live chats, file transfers, and more. This program generated huge controversies in regards to surveillance and privacy, especially from U.S. citizens.

Telephones

The official and unofficial tapping of telephone lines is widespread. In the United States for instance, the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major telecommunications companies in the U.S.—AT&T Inc. and Verizon—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $1.8 million per year. Between 2003 and 2005, the FBI sent out more than 140,000 "National Security Letters" ordering phone companies to hand over information about their customers' calling and Internet histories. About half of these letters requested information on U.S. citizens.

Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the Information Awareness Office, or companies such as Verint, and Narus, which search for certain words or phrases, to decide whether to dedicate a human agent to the call.

Law enforcement and intelligence services in the United Kingdom and the United States possess technology to activate the microphones in cell phones remotely, by accessing phones' diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone.

The StingRay tracker is an example of one of these tools used to monitor cell phone usage in the United States and the United Kingdom. Originally developed for counterterrorism purposes by the military, they work by broadcasting powerful signals that cause nearby cell phones to transmit their IMSI number, just as they would to normal cell phone towers. Once the phone is connected to the device, there is no way for the user to know that they are being tracked. The operator of the stingray is able to extract information such as location, phone calls, and text messages, but it is widely believed that the capabilities of the StingRay extend much further. A lot of controversy surrounds the StingRay because of its powerful capabilities and the secrecy that surrounds it.

Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required. Records for one carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.

The headquarters of UK intelligence activities is Government Communications Headquarters, Cheltenham, England (2017)

In response to customers' privacy concerns in the post Edward Snowden era, Apple's iPhone 6 has been designed to disrupt investigative wiretapping efforts. The phone encrypts e-mails, contacts, and photos with a code generated by a complex mathematical algorithm that is unique to an individual phone, and is inaccessible to Apple. The encryption feature on the iPhone 6 has drawn criticism from FBI director James B. Comey and other law enforcement officials since even lawful requests to access user content on the iPhone 6 will result in Apple supplying "gibberish" data that requires law enforcement personnel to either break the code themselves or to get the code from the phone's owner. Because the Snowden leaks demonstrated that American agencies can access phones anywhere in the world, privacy concerns in countries with growing markets for smart phones have intensified, providing a strong incentive for companies like Apple to address those concerns in order to secure their position in the global market.

Apple has made several moves to emphasize their concern for privacy, in order to appeal to more consumers. In 2011, Apple stopped the use of permanent device identifiers, and in 2019, they banned the ability of third parties to track on children’s apps.

Although the CALEA requires telecommunication companies to build into their systems the ability to carry out a lawful wiretap, the law has not been updated to address the issue of smart phones and requests for access to e-mails and metadata. The Snowden leaks show that the NSA has been taking advantage of this ambiguity in the law by collecting metadata on "at least hundreds of millions" of "incidental" targets from around the world. The NSA uses an analytic tool known as CO-TRAVELER in order to track people whose movements intersect and to find any hidden connections with persons of interest.

The Snowden leaks have also revealed that the British Government Communications Headquarters (GCHQ) can access information collected by the NSA on American citizens. Once the data has been collected, the GCHQ can hold on to it for up to two years. The deadline can be extended with the permission of a "senior UK official".

Cameras

A surveillance camera in Cairns, Queensland
Surveillance cameras such as these are installed by the millions in many countries, and are nowadays monitored by automated computer programs instead of humans.

Surveillance cameras, or security cameras, are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database, and by video analysis software (such as VIRAT and HumanID). The amount of footage is also drastically reduced by motion sensors which record only when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance. Video cameras are one of the most common methods of surveillance.

As of 2016, there are about 350 million surveillance cameras worldwide. About 65% of these cameras are installed in Asia. The growth of CCTV has been slowing in recent years. In 2018, China was reported to have a huge surveillance network of over 170 million CCTV cameras with 400 million new cameras expected to be installed in the next three years, many of which use facial recognition technology.

In the United States, the Department of Homeland Security awards billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of Chicago, Illinois, recently used a $5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as Operation Virtual Shield. Speaking in 2009, Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by 2016. New York City received a $350 million grant towards the development of the Domain Awareness System, which is an interconnected system of sensors including 18,000 CCTV cameras used for continual surveillance of the city by both police officers and artificial intelligence systems.

In the United Kingdom, the vast majority of video surveillance cameras are not operated by government bodies, but by private individuals or companies, especially to monitor the interiors of shops and businesses. According to 2011 Freedom of Information Act requests, the total number of local government operated CCTV cameras was around 52,000 over the entirety of the UK. The prevalence of video surveillance in the UK is often overstated due to unreliable estimates being requoted; for example one report in 2002 extrapolated from a very small sample to estimate the number of cameras in the UK at 4.2 million (of which 500,000 were in Greater London). More reliable estimates put the number of private and local government operated cameras in the United Kingdom at around 1.85 million in 2011.

In the Netherlands, one example city where there are cameras is The Hague. There, cameras are placed in city districts in which the most illegal activity is concentrated. Examples are the red-light districts and the train stations.

As part of China's Golden Shield Project, several U.S. corporations, including IBM, General Electric, and Honeywell, have been working closely with the Chinese government to install millions of surveillance cameras throughout China, along with advanced video analytics and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people. Lin Jiang Huai, the head of China's "Information Security Technology" office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project.

A payload surveillance camera manufactured by Controp and distributed to the U.S. government by ADI Technologies

The Defense Advanced Research Projects Agency (DARPA) is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report "suspicious" activity (such as waving arms, looking side-to-side, standing in a group, etc.).

At Super Bowl XXXV in January 2001, police in Tampa, Florida, used Identix's facial recognition software, FaceIt, to scan the crowd for potential criminals and terrorists in attendance at the event (it found 19 people with pending arrest warrants).

Governments often initially claim that cameras are meant to be used for traffic control, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 "traffic" cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform "day-to-day monitoring".

The development of centralized networks of CCTV cameras watching public areas – linked to computer databases of people's pictures and identity (biometric data), able to track people's movements throughout the city, and identify whom they have been with – has been argued by some to present a risk to civil liberties. Trapwire is an example of such a network.

Social network analysis

A graph of the relationships between users on the social networking site Facebook. Social network analysis enables governments to gather detailed information about peoples' friends, family, and other contacts. Since much of this information is voluntarily made public by the users themselves, it is often considered to be a form of open-source intelligence

One common form of surveillance is to create maps of social networks based on data from social networking sites such as Facebook, MySpace, Twitter as well as from traffic analysis information from phone call records such as those in the NSA call database, and others. These social network "maps" are then data mined to extract useful information such as personal interests, friendships & affiliations, wants, beliefs, thoughts, and activities.

Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are investing heavily in research involving social network analysis. The intelligence community believes that the biggest threat to U.S. power comes from decentralized, leaderless, geographically dispersed groups of terrorists, subversives, extremists, and dissidents. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.

Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:

The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people.... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.

— Jason Ethier

AT&T developed a programming language called "Hancock", which is able to sift through enormous databases of phone call and Internet traffic records, such as the NSA call database, and extract "communities of interest"—groups of people who call each other regularly, or groups that regularly visit certain sites on the Internet. AT&T originally built the system to develop "marketing leads", but the FBI has regularly requested such information from phone companies such as AT&T without a warrant, and, after using the data, stores all information received in its own databases, regardless of whether or not the information was ever useful in an investigation.

Some people believe that the use of social networking sites is a form of "participatory surveillance", where users of these sites are essentially performing surveillance on themselves, putting detailed personal information on public websites where it can be viewed by corporations and governments. In 2008, about 20% of employers reported using social networking sites to collect personal data on prospective or current employees.

Biometric

Fingerprints being scanned as part of the US-VISIT program

Biometric surveillance is a technology that measures and analyzes human physical and/or behavioral characteristics for authentication, identification, or screening purposes. Examples of physical characteristics include fingerprints, DNA, and facial patterns. Examples of mostly behavioral characteristics include gait (a person's manner of walking) or voice.

Facial recognition is the use of the unique configuration of a person's facial features to accurately identify them, usually from surveillance video. Both the Department of Homeland Security and DARPA are heavily funding research into facial recognition systems. The Information Processing Technology Office ran a program known as Human Identification at a Distance which developed technologies that are capable of identifying a person at up to 500 ft (150 m) by their facial features.

Another form of behavioral biometrics, based on affective computing, involves computers recognizing a person's emotional state based on an analysis of their facial expressions, how fast they are talking, the tone and pitch of their voice, their posture, and other behavioral traits. This might be used for instance to see if a person's behavior is suspect (looking around furtively, "tense" or "angry" facial expressions, waving arms, etc.).

A more recent development is DNA profiling, which looks at some of the major markers in the body's DNA to produce a match. The FBI is spending $1 billion to build a new biometric database, which will store DNA, facial recognition data, iris/retina (eye) data, fingerprints, palm prints, and other biometric data of people living in the United States. The computers running the database are contained in an underground facility about the size of two American football fields.

The Los Angeles Police Department is installing automated facial recognition and license plate recognition devices in its squad cars, and providing handheld face scanners, which officers will use to identify people while on patrol.

Facial thermographs are in development, which allow machines to identify certain emotions in people such as fear or stress, by measuring the temperature generated by blood flow to different parts of the face. Law enforcement officers believe that this has potential for them to identify when a suspect is nervous, which might indicate that they are hiding something, lying, or worried about something.

In his paper in Ethics and Information Technology, Avi Marciano maps the harms caused by biometric surveillance, traces their theoretical origins, and brings these harms together in one integrative framework to elucidate their cumulative power. Marciano proposes four types of harms: Unauthorized use of bodily information, denial or limitation of access to physical spaces, bodily social sorting, and symbolic ineligibility through construction of marginality and otherness. Biometrics' social power, according to Marciano, derives from three main features: their complexity as "enigmatic technologies", their objective-scientific image, and their increasing agency, particularly in the context of automatic decision-making.

Aerial

Micro Air Vehicle with attached surveillance camera

Aerial surveillance is the gathering of surveillance, usually visual imagery or video, from an airborne vehicle—such as an unmanned aerial vehicle, helicopter, or spy plane. Military surveillance aircraft use a range of sensors (e.g. radar) to monitor the battlefield.

Digital imaging technology, miniaturized computers, and numerous other technological advances over the past decade have contributed to rapid advances in aerial surveillance hardware such as micro-aerial vehicles, forward-looking infrared, and high-resolution imagery capable of identifying objects at extremely long distances. For instance, the MQ-9 Reaper, a U.S. drone plane used for domestic operations by the Department of Homeland Security, carries cameras that are capable of identifying an object the size of a milk carton from altitudes of 30,000 feet (9.1 km), and has forward-looking infrared devices that can detect the heat from a human body at distances of up to 60 kilometers (37 mi). In an earlier instance of commercial aerial surveillance, the Killington Mountain ski resort hired 'eye in the sky' aerial photography of its competitors' parking lots to judge the success of its marketing initiatives as it developed starting in the 1950s.

HART program concept drawing from official IPTO (DARPA) official website

The United States Department of Homeland Security is in the process of testing UAVs to patrol the skies over the United States for the purposes of critical infrastructure protection, border patrol, "transit monitoring", and general surveillance of the U.S. population. Miami-Dade police department ran tests with a vertical take-off and landing UAV from Honeywell, which is planned to be used in SWAT operations. Houston's police department has been testing fixed-wing UAVs for use in "traffic control".

The United Kingdom, as well, is working on plans to build up a fleet of surveillance UAVs ranging from micro-aerial vehicles to full-size drones, to be used by police forces throughout the U.K.

In addition to their surveillance capabilities, MAVs are capable of carrying tasers for "crowd control", or weapons for killing enemy combatants.

Programs such as the Heterogeneous Aerial Reconnaissance Team program developed by DARPA have automated much of the aerial surveillance process. They have developed systems consisting of large teams drone planes that pilot themselves, automatically decide who is "suspicious" and how to go about monitoring them, coordinate their activities with other drones nearby, and notify human operators if something suspicious is occurring. This greatly increases the amount of area that can be continuously monitored, while reducing the number of human operators required. Thus a swarm of automated, self-directing drones can automatically patrol a city and track suspicious individuals, reporting their activities back to a centralized monitoring station. In addition, researchers also investigate possibilities of autonomous surveillance by large groups of micro aerial vehicles stabilized by decentralized bio-inspired swarming rules.

Corporate

Corporate surveillance is the monitoring of a person or group's behavior by a corporation. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Although there is a common belief that monitoring can increase productivity, it can also create consequences such as increasing chances of deviant behavior and creating punishments that are not equitable to their actions. Additionally, monitoring can cause resistance and backlash because it insinuates an employer's suspicion and lack of trust.

Data mining and profiling

Data mining is the application of statistical techniques and programmatic algorithms to discover previously unnoticed relationships within the data. Data profiling in this context is the process of assembling information about a particular individual or group in order to generate a profile — that is, a picture of their patterns and behavior. Data profiling can be an extremely powerful tool for psychological and social network analysis. A skilled analyst can discover facts about a person that they might not even be consciously aware of themselves.

Economic (such as credit card purchases) and social (such as telephone calls and emails) transactions in modern society create large amounts of stored data and records. In the past, this data was documented in paper records, leaving a "paper trail", or was simply not documented at all. Correlation of paper-based records was a laborious process—it required human intelligence operators to manually dig through documents, which was time-consuming and incomplete, at best.

But today many of these records are electronic, resulting in an "electronic trail". Every use of a bank machine, payment by credit card, use of a phone card, call from home, checked out library book, rented video, or otherwise complete recorded transaction generates an electronic record. Public records—such as birth, court, tax and other records—are increasingly being digitized and made available online. In addition, due to laws like CALEA, web traffic and online purchases are also available for profiling. Electronic record-keeping makes data easily collectable, storable, and accessible—so that high-volume, efficient aggregation and analysis is possible at significantly lower costs.

Information relating to many of these individual transactions is often easily available because it is generally not guarded in isolation, since the information, such as the title of a movie a person has rented, might not seem sensitive. However, when many such transactions are aggregated they can be used to assemble a detailed profile revealing the actions, habits, beliefs, locations frequented, social connections, and preferences of the individual. This profile is then used, by programs such as ADVISE and TALON, to determine whether the person is a military, criminal, or political threat.

In addition to its own aggregation and profiling tools, the government is able to access information from third parties — for example, banks, credit companies or employers, etc. — by requesting access informally, by compelling access through the use of subpoenas or other procedures, or by purchasing data from commercial data aggregators or data brokers. The United States has spent $370 million on its 43 planned fusion centers, which are national network of surveillance centers that are located in over 30 states. The centers will collect and analyze vast amounts of data on U.S. citizens. It will get this data by consolidating personal information from sources such as state driver's licensing agencies, hospital records, criminal records, school records, credit bureaus, banks, etc. – and placing this information in a centralized database that can be accessed from all of the centers, as well as other federal law enforcement and intelligence agencies.

Under United States v. Miller (1976), data held by third parties is generally not subject to Fourth Amendment warrant requirements.

Human operatives

A tail may surreptitiously track and report on the movements and contacts of a person of interest. Such following by one or more people may provide useful in formation in relatively densely populated urban environments.

Organizations that have enemies who wish to gather information about the groups' members or activities face the issue of potential infiltration.

In addition to operatives' infiltrating an organization, the surveilling party may exert pressure on certain members of the target organization to act as informants (i.e., to disclose the information they hold on the organization and its members).

Fielding operatives is very expensive, and governments with wide-reaching electronic surveillance tools at their disposal, rather than gathering the sort of information which operatives can provide, may use less problematic forms of surveillance - such as those mentioned above. Nevertheless, the use of human infiltrators remains common. For instance, in 2007 documents surfaced showing that the FBI planned to field a total of 15,000 undercover agents and informants in response to an anti-terrorism directive (issued by President George W. Bush in 2004) that ordered intelligence and law-enforcement agencies to increase their HUMINT capabilities.

Satellite imagery

On May 25, 2007, the U.S. Director of National Intelligence Michael McConnell authorized the National Applications Office (NAO) of the Department of Homeland Security to allow local, state, and domestic Federal agencies to access imagery from military intelligence Reconnaissance satellites and Reconnaissance aircraft sensors which can now be used to observe the activities of U.S. citizens. The satellites and aircraft sensors will be able to penetrate cloud cover, detect chemical traces, and identify objects in buildings and "underground bunkers", and will provide real-time video at much higher resolutions than the still-images produced by programs such as Google Earth.

Identification and credentials

A card containing an identification number

One of the simplest forms of identification is the carrying of credentials. Some nations have an identity card system to aid identification, whilst others are considering it but face public opposition. Other documents, such as passports, driver's licenses, library cards, banking or credit cards are also used to verify identity.

If the form of the identity card is "machine-readable", usually using an encoded magnetic stripe or identification number (such as a Social Security number), it corroborates the subject's identifying data. In this case it may create an electronic trail when it is checked and scanned, which can be used in profiling, as mentioned above.

Wireless Tracking

This section refers to methods that involve the monitoring of tracking devices through the aid of wireless signals.

Mobile phones

Mobile carrier antennas are also commonly used to collect geolocation data on mobile phones. The geographical location of a powered mobile phone (and thus the person carrying it) can be determined easily (whether it is being used or not), using a technique known as multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. Dr. Victor Kappeler of Eastern Kentucky University indicates that police surveillance is a strong concern, stating the following statistics from 2013:

Of the 321,545 law enforcement requests made to Verizon, 54,200 of these requests were for "content" or "location" information—not just cell phone numbers or IP addresses. Content information included the actual text of messages, emails and the wiretapping of voice or messaging content in real-time.

A comparatively new off-the-shelf surveillance device is an IMSI-catcher, a telephone eavesdropping device used to intercept mobile phone traffic and track the movement of mobile phone users. Essentially a "fake" mobile tower acting between the target mobile phone and the service provider's real towers, it is considered a man-in-the-middle (MITM) attack. IMSI-catchers are used in some countries by law enforcement and intelligence agencies, but their use has raised significant civil liberty and privacy concerns and is strictly regulated in some countries.

In March 2020, British daily The Guardian, based on the claims of a whistleblower, accused the government of Saudi Arabia of exploiting global mobile telecom network weaknesses to spy on its citizens traveling around the United States. The data shared by the whistleblower in support of the claims, showed that a systematic spying campaign was being run by the kingdom exploiting the flaws of SS7, a global messaging system. The data showed that millions of secret tracking commands originated from Saudi in a duration of four-months, starting from November 2019.

RFID tagging

RFID chip pulled from a new credit card

Radio Frequency Identification (RFID) tagging is the use of very small electronic devices (called "RFID tags") which are applied to or incorporated into a product, animal, or person for the purpose of identification and tracking using radio waves. The tags can be read from several meters away. They are extremely inexpensive, costing a few cents per piece, so they can be inserted into many types of everyday products without significantly increasing the price, and can be used to track and identify these objects for a variety of purposes.

Some companies appear to be "tagging" their workers by incorporating RFID tags in employee ID badges. Workers in U.K. considered strike action in protest of having themselves tagged; they felt that it was dehumanizing to have all of their movements tracked with RFID chips. Some critics have expressed fears that people will soon be tracked and scanned everywhere they go. On the other hand, RFID tags in newborn baby ID bracelets put on by hospitals have foiled kidnappings.

In a 2003 editorial, CNET News.com's chief political correspondent, Declan McCullagh, speculated that, soon, every object that is purchased, and perhaps ID cards, will have RFID devices in them, which would respond with information about people as they walk past scanners (what type of phone they have, what type of shoes they have on, which books they are carrying, what credit cards or membership cards they have, etc.). This information could be used for identification, tracking, or targeted marketing. As of 2021, this has largely not come to pass.

RFID tagging on humans

Hand with planned insertion point for Verichip device

A human microchip implant is an identifying integrated circuit device or RFID transponder encased in silicate glass and implanted in the body of a human being. A subdermal implant typically contains a unique ID number that can be linked to information contained in an external database, such as personal identification, medical history, medications, allergies, and contact information.

Several types of microchips have been developed in order to control and monitor certain types of people, such as criminals, political figures and spies, a "killer" tracking chip patent was filed at the German Patent and Trademark Office (DPMA) around May 2009.

Verichip is an RFID device produced by a company called Applied Digital Solutions (ADS). Verichip is slightly larger than a grain of rice, and is injected under the skin. The injection reportedly feels similar to receiving a shot. The chip is encased in glass, and stores a "VeriChip Subscriber Number" which the scanner uses to access their personal information, via the Internet, from Verichip Inc.'s database, the "Global VeriChip Subscriber Registry". Thousands of people have already had them inserted. In Mexico, for example, 160 workers at the Attorney General's office were required to have the chip injected for identity verification and access control purposes.

Implantable microchips have also been used in healthcare settings, but ethnographic researchers have identified a number of ethical problems with such uses; these problems include unequal treatment, diminished trust, and possible endangerment of patients.

Radar

Perimeter surveillance radar (PSR) is a class of radar sensors that monitor activity surrounding or on critical infrastructure areas such as airports, seaports, military installations, national borders, refineries and other critical industry and the like. Such radars are characterized by their ability to detect movement at ground level of targets such as an individual walking or crawling towards a facility. Such radars typically have ranges of several hundred metres to over 10 kilometres.

Alternate technologies include laser-based systems. These have the potential for very high target position accuracy, however they are less effective in the presence of fog and other obscurants.

Geolocation devices

Global Positioning System

Diagram of GPS satellites orbiting Earth

In the U.S., police have planted hidden GPS tracking devices in people's vehicles to monitor their movements, without a warrant. In early 2009, they were arguing in court that they have the right to do this.

Several cities are running pilot projects to require parolees to wear GPS devices to track their movements when they get out of prison.

Devices

Covert listening devices and video devices, or "bugs", are hidden electronic devices which are used to capture, record, and/or transmit data to a receiving party such as a law enforcement agency.

The U.S. has run numerous domestic intelligence operations, such as COINTELPRO, which have bugged the homes, offices, and vehicles of thousands of U.S. citizens, usually political activists, subversives, and criminals.

Law enforcement and intelligence services in the U.K. and the United States possess technology to remotely activate the microphones in cell phones, by accessing the phone's diagnostic/maintenance features, in order to listen to conversations that take place nearby the person who holds the phone.

Postal services

As more people use faxes and e-mail the significance of surveilling the postal system is decreasing, in favor of Internet and telephone surveillance. But interception of post is still an available option for law enforcement and intelligence agencies, in certain circumstances. This is not a common practice, however, and entities like the US Army require high levels of approval to conduct.

The U.S. Central Intelligence Agency and Federal Bureau of Investigation have performed twelve separate mail-opening campaigns targeted towards U.S. citizens. In one of these programs, more than 215,000 communications were intercepted, opened, and photographed.

Stakeout

A stakeout is the coordinated surveillance of a location or person. Stakeouts are generally performed covertly and for the purpose of gathering evidence related to criminal activity. The term derives from the practice by land surveyors of using survey stakes to measure out an area before the main building project begins.

Internet of things

The Internet of Things (IoT) is a term that refers to the future of technology in which data can be collected without human and computer interaction. IoTs can be used for identification, monitoring, location tracking, and health tracking. While IoTs have the benefit of being a time-saving tool that makes activities simpler, they raise the concern of government surveillance and privacy regarding how data will be used.

Controversy

Graffiti expressing concern about the proliferation of video surveillance

Support

Supporters of surveillance systems believe that these tools can help protect society from terrorists and criminals. They argue that surveillance can reduce crime by three means: by deterrence, by observation, and by reconstruction. Surveillance can deter by increasing the chance of being caught, and by revealing the modus operandi. This requires a minimal level of invasiveness.

Another method on how surveillance can be used to fight criminal activity is by linking the information stream obtained from them to a recognition system (for instance, a camera system that has its feed run through a facial recognition system). This can for instance auto-recognize fugitives and direct police to their location.

A distinction here has to be made however on the type of surveillance employed. Some people that support video surveillance in city streets may not support indiscriminate telephone taps and vice versa. Besides the types, the way in which this surveillance is done also matters a lot; i.e. indiscriminate telephone taps are supported by much fewer people than say telephone taps done only to people suspected of engaging in illegal activities.

Surveillance can also be used to give human operatives a tactical advantage through improved situational awareness, or through the use of automated processes, i.e. video analytics. Surveillance can help reconstruct an incident and prove guilt through the availability of footage for forensics experts. Surveillance can also influence subjective security if surveillance resources are visible or if the consequences of surveillance can be felt.

Some of the surveillance systems (such as the camera system that has its feed run through a facial recognition system mentioned above) can also have other uses besides countering criminal activity. For instance, it can help in retrieving runaway children, abducted or missing adults and mentally disabled people. Other supporters simply believe that there is nothing that can be done about the loss of privacy, and that people must become accustomed to having no privacy. As Sun Microsystems CEO Scott McNealy said: "You have zero privacy anyway. Get over it."

Another common argument is: "If you aren't doing something wrong then you don't have anything to fear." That is, one does not have a right to privacy regarding illegal activities, while those following the law suffer no harm from surveillance and so have no standing to object to it. Beyond the heroically self-serving identification of what is wrong with what is illegal, the ethical fly in this ointment is the tacit premise that the individual has no duty to preserve the health of the state--the antithesis of the principle that only the consent of the governed can adequately serve as the moral foundation of a (just) state and warrant the vast gulf between its power (and agency) and that of the individual. 

Opposition

Surveillance lamppost brought down in Hong Kong by citizens fearing state surveillance
An elaborate graffito in Columbus, Ohio, depicting state surveillance of telecommunications

With the advent of programs such as the Total Information Awareness program and ADVISE, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance for Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of their subjects. Many civil rights and privacy groups, such as the Electronic Frontier Foundation and American Civil Liberties Union, have expressed concern that by allowing continual increases in government surveillance of citizens we will end up in a mass surveillance society, with extremely limited, or non-existent political and/or personal freedoms. Fears such as this have led to numerous lawsuits such as Hepting v. AT&T.

Some critics state that the claim made by supporters should be modified to read: "As long as we do what we're told, we have nothing to fear.". For instance, a person who is part of a political group which opposes the policies of the national government, might not want the government to know their names and what they have been reading, so that the government cannot easily subvert their organization, arrest, or kill them. Other critics state that while a person might not have anything to hide right now, the government might later implement policies that they do wish to oppose, and that opposition might then be impossible due to mass surveillance enabling the government to identify and remove political threats. Further, other critics point to the fact that most people do have things to hide. For example, if a person is looking for a new job, they might not want their current employer to know this. Also if an employer wishes total privacy to watch over their own employee and secure their financial information it may become impossible, and they may not wish to hire those under surveillance.

In December 2017, the Government of China took steps to oppose widespread surveillance by security-company cameras, webcams, and IP cameras after tens-of-thousands were made accessible for internet viewing by IT company Qihoo

Totalitarianism

A traffic camera atop a high pole oversees a road in the Canadian city of Toronto

Programs such as the Total Information Awareness program, and laws such as the Communications Assistance For Law Enforcement Act have led many groups to fear that society is moving towards a state of mass surveillance with severely limited personal, social, political freedoms, where dissenting individuals or groups will be strategically removed in COINTELPRO-like purges.

Kate Martin, of the Center For National Security Studies said of the use of military spy satellites being used to monitor the activities of U.S. citizens: "They are laying the bricks one at a time for a police state."

Some point to the blurring of lines between public and private places, and the privatization of places traditionally seen as public (such as shopping malls and industrial parks) as illustrating the increasing legality of collecting personal information. Traveling through many public places such as government offices is hardly optional for most people, yet consumers have little choice but to submit to companies' surveillance practices. Surveillance techniques are not created equal; among the many biometric identification technologies, for instance, face recognition requires the least cooperation. Unlike automatic fingerprint reading, which requires an individual to press a finger against a machine, this technique is subtle and requires little to no consent.

Psychological/social effects

Some critics, such as Michel Foucault, believe that in addition to its obvious function of identifying and capturing individuals who are committing undesirable acts, surveillance also functions to create in everyone a feeling of always being watched, so that they become self-policing. This allows the State to control the populace without having to resort to physical force, which is expensive and otherwise problematic.

With the development of digital technology, individuals have become increasingly perceptible to one another, as surveillance becomes virtual. Online surveillance is the utilization of the internet to observe one's activity. Corporations, citizens, and governments participate in tracking others' behaviours for motivations that arise out of business relations, to curiosity, to legality. In her book Superconnected, Mary Chayko differentiates between two types of surveillance: vertical and horizontal. Vertical surveillance occurs when there is a dominant force, such as the government that is attempting to control or regulate the actions of a given society. Such powerful authorities often justify their incursions as a means to protect society from threats of violence or terrorism. Some individuals question when this becomes an infringement on civil rights.

Horizontal diverges from vertical surveillance as the tracking shifts from an authoritative source to an everyday figure, such as a friend, coworker, or stranger that is interested in one's mundane activities. Individuals leave traces of information when they are online that reveal their interests and desires of which others observe. While this can allow people to become interconnected and develop social connections online, it can also increase potential risk to harm, such as cyberbullying or censoring/stalking by strangers, reducing privacy.

In addition, Simone Browne argues that surveillance wields an immense racializing quality such that it operates as "racializing surveillance." Browne uses racializing surveillance to refer to moments when enactments of surveillance are used to reify boundaries, borders, and bodies along racial lines and where the outcome is discriminatory treatment of those who are negatively racialized by such surveillance. Browne argues racializing surveillance pertains to policing what is "in or out of place."

Privacy

Numerous civil rights groups and privacy groups oppose surveillance as a violation of people's right to privacy. Such groups include: Electronic Privacy Information Center, Electronic Frontier Foundation, American Civil Liberties Union and Privacy International.

There have been several lawsuits such as Hepting v. AT&T and EPIC v. Department of Justice by groups or individuals, opposing certain surveillance activities.

Legislative proceedings such as those that took place during the Church Committee, which investigated domestic intelligence programs such as COINTELPRO, have also weighed the pros and cons of surveillance.

Court cases

People vs. Diaz (2011) was a court case in the realm of cell phone privacy, even though the decision was later overturned. In this case, Gregory Diaz was arrested during a sting operation for attempting to sell ecstasy. During his arrest, police searched Diaz's phone and found more incriminating evidence including SMS text messages and photographs depicting illicit activities. During his trial, Diaz attempted to have the information from his cell phone removed from evidence, but the courts deemed it as lawful and Diaz's appeal was denied on the California State Court level and, later, the Supreme Court level. Just three short years after, this decision was overturned in the case Riley vs. California (2014).

Riley vs. California (2014) was a U.S. Supreme Court case in which a man was arrested for his involvement in a drive-by shooting. A few days after the shooting the police made an arrest of the suspect (Riley), and, during the arrest, the police searched him. However, this search was not only of Riley's person, but also the police opened and searched his cell phone, finding pictures of other weapons, drugs, and of Riley showing gang signs. In court, the question arose whether searching the phone was lawful or if the search was protected by the 4th amendment of the constitution. The decision held that the search of Riley's cell phone during the arrest was illegal, and that it was protected by the 4th Amendment.

Countersurveillance, inverse surveillance, sousveillance

Countersurveillance is the practice of avoiding surveillance or making surveillance difficult. Developments in the late twentieth century have caused counter surveillance to dramatically grow in both scope and complexity, such as the Internet, increasing prevalence of electronic security systems, high-altitude (and possibly armed) UAVs, and large corporate and government computer databases. Other examples include encrypted messenger apps such as Signal and privacy cryptocurrencies such as Monero and ZCash.

Inverse surveillance is the practice of the reversal of surveillance on other individuals or groups (e.g., citizens photographing police). Well-known examples include George Holliday's recording of the Rodney King beating and the organization Copwatch, which attempts to monitor police officers to prevent police brutality. Counter-surveillance can be also used in applications to prevent corporate spying, or to track other criminals by certain criminal entities. It can also be used to deter stalking methods used by various entities and organizations.

Sousveillance is inverse surveillance, involving the recording by private individuals, rather than government or corporate entities.

Tuesday, February 6, 2024

Union of egoists

From Wikipedia, the free encyclopedia
 
Max Stirner's idea of the "Union of egoists" (German: Verein von Egoisten) was first expounded in The Ego and Its Own. A union of egoists is understood as a voluntary and non-systematic association which Stirner proposed in contradistinction to the state. Each union is understood as a relation between egoists which is continually renewed by all parties' support through an act of will. The Union requires that all parties participate out of a conscious egoism. If one party silently finds themselves to be suffering, but puts up and keeps the appearance, the union has degenerated into something else. This union is not seen as an authority above a person's own will, but a voluntary relation subordinate to the wills of its members. This idea has received interpretations for politics, economics, romance and sexual relations.

Stirner on the Union of egoists

On The Ego and Its Own

Society vs. Unions of egoists

Portrait of Max Stirner by Friedrich Engels

In his main work, The Ego and Its Own, Stirner makes a difference between society and the Union of egoists. As such, "[m]orality is incompatible with egoism, because the former does not allow validity to me, but only to the Man in me. But, if the State is a society of men, not a union of egos each of whom has only himself before his eyes, then it cannot last without morality, and must insist on morality. Therefore we two, the State and I, are enemies. I, the egoist, have not at heart the welfare of this "human society," I sacrifice nothing to it, I only utilize it; but to be able to utilize it completely I transform it rather into my property and my creature; i. e., I annihilate it, and form in its place the Union of Egoists".

Stirner establishes other oppositions along the same lines: "The Christian people has produced two societies whose duration will keep equal measure with the permanence of that people: these are the societies State and Church. Can they be called a union of egoists? Do we in them pursue an egoistic, personal, own interest, or do we pursue a popular (i.e. an interest of the Christian people), to wit, a State, and Church interest? Can I and may I be myself in them? May I think and act as I will, may I reveal myself, live myself out, busy myself? Must I not leave untouched the majesty of the State, the sanctity of the Church? Well, I may not do so as I will. But shall I find in any society such an unmeasured freedom of maying? Certainly no! Accordingly we might be content? Not a bit! It is a different thing whether I rebound from an ego or from a people, a generalization. [...] For the State is likewise a society, not a union; it is the broadened family ("Father of the Country — Mother of the Country — children of the country")".

On economics, Stirner sees the idea of Union of egoists apply as follows: "If men reach the point of losing respect for property, every one will have property, as all slaves become free men as soon as they no longer respect the master as master. Unions will then, in this matter too, multiply the individual's means and secure his assailed property".

The Ego and Its Own by Max Stirner

Elements of a Union of egoists

Stirner establishes that reciprocity and what he calls "intercourse" are important elements of the Union of egoists: "Like the hall, the prison does form a society, a companionship, a communion (e.g. communion of labor), but no intercourse, no reciprocity, no union. On the contrary, every union in the prison bears within it the dangerous seed of a "plot," which under favorable circumstances might spring up and bear fruit".

Unions of egoists are also associations with a participant's active will: "But war might rather be declared against establishment itself, the State, not a particular State, not any such thing as the mere condition of the State at the time; it is not another State (e.g. a "people's State") that men aim at, but their union, uniting, this ever-fluid uniting of everything standing. — A State exists even without my co-operation: I am born in it, brought up in it, under obligations to it, and must "do it homage." [huldigen] It takes me up into its "favor," [Huld] and I live by its "grace." [...] Now the Nationals are exerting themselves to set up the abstract, lifeless unity of beehood; but the self-owned are going to fight for the unity willed by their own will, for union. [...] In this combination I see nothing whatever but a multiplication of my force, and I retain it only so long as it is my multiplied force. But thus it is a — union. Neither a natural ligature nor a spiritual one holds the union together, and it is not a natural, not a spiritual league".

What is and what is not a Union of egoists

Egoistical relationships have to be flexible enough so that it can be ended up at the will of the participant. The Union of egoists ceases to be one under specific conditions, i.e. "the party ceases to be a union at the same moment at which it makes certain principles binding and wants to have them assured against attacks; but this moment is the very birth-act of the party. As party it is already a born society, a dead union, an idea that has become fixed. As party of absolutism it cannot will that its members should doubt the irrefragable truth of this principle; they could cherish this doubt only if they were egoistic enough to want still to be something outside their party, i.e. non-partisans. Non-partisans they cannot be as party-men, but only as egoists. [...] [T]he dissolution of society is intercourse or union. A society does assuredly arise by union too, but only as a fixed idea arises by a thought — to wit, by the vanishing of the energy of the thought (the thinking itself, this restless taking back all thoughts that make themselves fast) from the thought. If a union [Verein] has crystallized into a society, it has ceased to be a coalition [Vereinigung]; for coalition is an incessant self-uniting; it has become a unitedness, come to a standstill, degenerated into a fixity; it is — dead as a union, it is the corpse of the union or the coalition, i.e. it is —society, community. [...] You bring into a union your whole power, your competence, and make yourself count; in a society you are employed, with your working power; in the former you live egoistically, in the latter humanly, i.e. religiously, as a "member in the body of this Lord”; to a society you owe what you have, and are in duty bound to it, are — possessed by "social duties"; a union you utilize, and give it up undutifully and unfaithfully when you see no way to use it further".

Stirner admits that "complete freedom" is not possible, but he sees that the Union of egoists are the most free form of association that can be had: "Limitation of liberty is inevitable everywhere, for one cannot get rid of everything; one cannot fly like a bird merely because one would like to fly so, for one does not get free from his own weight...The union will assuredly offer a greater measure of liberty, as well as (and especially because by it one escapes all the coercion peculiar to State and society life) admit of being considered as "a new liberty"; but nevertheless it will still contain enough of unfreedom and involuntariness. For its object is not this — liberty (which on the contrary it sacrifices to ownness), but only ownness".

Stirner's Critics

In Stirner's Critics, Stirner intended to respond to criticisms made to important arguments put forward in The Ego and Its Own. In it, Stirner tends to refer to himself in the third person. He defines the Union of egoists as follows: "Egoism, as Stirner uses it, is not opposed to love nor to thought; it is no enemy of the sweet life of love, nor of devotion and sacrifice; it is no enemy of intimate warmth, but it is also no enemy of critique, nor of socialism, nor, in short, of any actual interest. It doesn't exclude any interest. It is directed against only disinterestedness and the uninteresting; not against love, but against sacred love, not against thought, but against sacred thought, not against socialists, but against sacred socialists, etc. The "exclusiveness" of the egoist, which some want to pass off as isolation, separation, loneliness, is on the contrary full participation in the interesting by — exclusion of the uninteresting".

Unions of egoists vs. class hierarchy

In this work, Stirner corrects what he sees as a misinterpretation of his idea of Union of egoists by the German socialist writer Moses Hess. He charges Hess of wanting to characterize Unions of egoists as "the utterly common opposition of the liberal bourgeoisies who put the blame on the state when people fall into poverty and starve". Instead, he corrects him by saying that it "is a union in which most of those involved are hoodwinked about their most natural and obvious interests, a union of egoists? Have "egoists" come together where one is the slave or serf of the other? There are, it's true, egoists in such a society, and in this sense, it might in some aspects be called an "egoistic union"; but the slaves have not really sought this society from egoism, and are instead, in their egoistic hearts, against these lovely "unions," as Hess calls them".

Stirner's examples of Unions of egoists in practice

Stirner also proceeds to give specific examples of what he would consider Unions of egoists: "It would be another thing indeed, if Hess wanted to see egoistic unions not on paper, but in life. Faust finds himself in the midst of such a union when he cries: "Here I am human, here I can be human" — Goethe says it in black and white. If Hess attentively observed real life, to which he holds so much, he will see hundreds of such egoistic unions, some passing quickly, others lasting. Perhaps at this very moment, some children have come together just outside his window in a friendly game. If he looks at them, he will see a playful egoistic union. Perhaps Hess has a friend or a beloved; then he knows how one heart finds another, as their two hearts unite egoistically to delight (enjoy) each other, and how no one "comes up short" in this. Perhaps he meets a few good friends on the street and they ask him to accompany them to a tavern for wine; does he go along as a favor to them, or does he "unite" with them because it promises pleasure? Should they thank him heartily for the "sacrifice," or do they know that all together they form an "egoistic union" for a little while?"

Interpretations and influence

Scholar Andrew Carlson argues that people would be held together by mutual advantage through common "use" of one another in this Union of egoists. In joining the Union, an individual increases his own individual power—each person would through his own might control what they could. It does not imply though that there would be a region of universal rapacity and perpetual slaughter, nor does it mean the wielding of power over others as each person would defend his own uniqueness. Carlson holds that once a person has attained self-realization of true egoism, they would not want to rule over others or hold more possessions than they need because this would destroy their independence. Carlson views the Union of egoists as essentially a non-formal group that participants voluntarily engage in for personal gain. Since no one person is obligated to the group, they may leave if it ceases to serve their interests, making the benefit mutual to all members. Whereas individuals in communism are obligated to one another in society, in egoism they are obligated only to themselves. Stirner saw this as the opposite of a state, government or society, which could use the individual for its own gain without benefiting the individual or truly being in his interest.

There would be neither masters nor servants, only egoists. Everyone would withdraw into his own uniqueness which would prevent conflict because no one will be trying to prove themselves "in the right" before a third party as each individual would be "above" the Union. It is claimed by egoist anarchists that egoism will foster genuine and spontaneous union between individuals. Stirner held that only this form of organisation would not intrude on the individual's power, exerting neither moral influence nor legal constraint.

Stirner does not develop in any detail the form of social organisation that the Union of egoists might take, with some, such as Carlson, arguing that organization itself is anathema to Stirner's Union. Within the Union, the individual will be able to develop himself and the Union exists for the individual. The Union of egoists is not to be confused with society which Stirner opposes because society lays claim to a person which is considered to be sacred, but which consumes an individual. The Union is made up of individuals who consume the Union for their own good.

In his introduction to Benjamin Tucker's 1907 edition of The Ego and His Own, James L. Walker said: "In Stirner we have the philosophical foundation for political liberty. His interest in the practical development of egoism to the dissolution of the State and the union of free men is clear and pronounced, and harmonizes perfectly with the economic philosophy of Josiah Warren. Allowing for difference of temperament and language, there is a substantial agreement between Stirner and Proudhon. Each would be free, and sees in every increase of the number of free people and their intelligence an auxiliary force against the oppressor".

The writers of An Anarchist FAQ report that "many in the anarchist movement in Glasgow, Scotland, took Stirner's "Union of egoists" literally as the basis for their anarcho-syndicalist organising in the 1940s and beyond. Similarly, we discover the noted anarchist historian Max Nettlau stating that "[o]n reading Stirner, I maintain that he cannot be interpreted except in a socialist sense". They also say "Stirner believed that as more and more people become egoists, conflict in society will decrease as each individual recognises the uniqueness of others, thus ensuring a suitable environment within which they can co-operate (or find "truces" in the "war of all against all"). These "truces" Stirner termed "Unions of egoists." [...] The unions Stirner desires would be based on free agreement, being spontaneous and voluntary associations drawn together out of the mutual interests of those involved, who would "care best for their welfare if they unite with others" [p. 309]. Unlike the state, the unions exist to ensure what Stirner calls "intercourse", or "union" between individuals. To better understand the nature of these associations, which will replace the state, Stirner lists the relationships between friends, lovers and children at play as examples [No Gods, No Masters, vol. 1, p. 25]. These illustrate the kinds of relationships that maximise an individual's self-enjoyment, pleasure, freedom and individuality as well as ensuring that those involved sacrifice nothing while belonging to them. Such associations are based on mutuality and a free and spontaneous co-operation between equals. As Stirner puts it, "intercourse is mutuality, it is the action, the commercium, of individuals" [p. 218]. Its aim is "pleasure" and "self-enjoyment".

The idea of Union of egoists was interpreted in a sexual sense by French and Spanish individualist anarchists of the early 20th century. Catalan historian Xavier Diez reports: "In this sense, the theoretical positions and the vital experiences of french [sic] individualism are deeply iconoclastic and scandalous, even within libertarian circles. The call of nudist naturism, the strong defence of birth control methods, the idea of "unions of egoists" with the sole justification of sexual practices, that will try to put in practice, not without difficulties, will establish a way of thought and action, and will result in sympathy within some, and a strong rejection within others". The main theorist of this was the French individualist anarchist Émile Armand in what he called "amorous camaraderie".

While explaining his concept of immediatism, post-left thinker Hakim Bey compares the idea of Union of egoists to those of other thinkers:

The penetration of everyday life by the marvelous—the creation of "situations"—belongs to the "material bodily principle", and to the imagination, and to the living fabric of the present... The individual who realizes this immediacy can widen the circle of pleasure to some extent simply by waking from the hypnosis of the "Spooks" (as Stirner called all abstractions); and yet more can be accomplished by "crime"; and still more by the doubling of the Self in sexuality. From Stirner's "Union of Self-Owning Ones" we proceed to Nietzsche's circle of "Free Spirits" and thence to Charles Fourier's "Passional Series", doubling and redoubling ourselves even as the Other multiplies itself in the eros of the group.

When speaking about his concept of permanent autonomous zone in his book Temporary Autonomous Zone, Hakim Bey compares it to Peter Kropotkin's concept of mutual aid. He says that "face-to-face, a group of humans synergize their efforts to realize mutual desires, whether for good food and cheer, dance, conversation, the arts of life; perhaps even for erotic pleasure, or to create a communal artwork, or to attain the very transport of bliss—in short, a "union of egoists" (as Stirner put it) in its simplest form—or else, in Kropotkin's terms, a basic biological drive to "mutual aid".

Bureaucracy

From Wikipedia, the free encyclopedia

There are two key dilemmas in bureaucracy. The first dilemma revolves around whether bureaucrats should be autonomous or directly accountable to their political masters. The second dilemma revolves around bureaucrats' responsibility to follow preset rules, and what degree of latitude they may have to determine appropriate solutions for circumstances that are unaccounted for in advance.

Various commentators have argued for the necessity of bureaucracies in modern society. The German sociologist Max Weber (1864–1920) argued that bureaucracy constitutes the most efficient and rational way in which human activity can be organized and that systematic processes and organized hierarchies are necessary to maintain order, to maximize efficiency, and to eliminate favoritism. On the other hand, Weber also saw unfettered bureaucracy as a threat to individual freedom, with the potential of trapping individuals in an impersonal "iron cage" of rule-based, rational control.

Etymology and usage

The term "bureaucracy" originated in the French language: it combines the French word bureau – desk or office – with the Greek word κράτος (kratos) – rule or political power. The French economist Jacques Claude Marie Vincent de Gournay (1712–1759) coined the word in the mid-18th century. Gournay never wrote the term down but a letter from a contemporary later quoted him:

The late M. de Gournay... sometimes used to say: "We have an illness in France which bids fair to play havoc with us; this illness is called bureaumania." Sometimes he used to invent a fourth or fifth form of government under the heading of "bureaucracy."

— Baron von Grimm (1723–1807)

The first known English-language use dates to 1818 with Irish novelist Lady Morgan referring to the apparatus used by the British government to subjugate Ireland as "the Bureaucratie, or office tyranny, by which Ireland has so long been governed". By the mid-19th century the word appeared in a more neutral sense, referring to a system of public administration in which offices were held by unelected career officials. In this context "bureaucracy" was seen as a distinct form of management, often subservient to a monarchy. In the 1920s the German sociologist Max Weber expanded the definition to include any system of administration conducted by trained professionals according to fixed rules. Weber saw bureaucracy as a relatively positive development; however, by 1944 the Austrian economist Ludwig von Mises opined in the context of his experience in the Nazi regime that the term bureaucracy was "always applied with an opprobrious connotation", and by 1957 the American sociologist Robert Merton suggested that the term "bureaucrat" had become an "epithet, a Schimpfwort" in some circumstances.

The word "bureaucracy" is also used in politics and government with a disapproving tone to disparage official rules that appear to make it difficult—by insistence on procedure and compliance to rule, regulation, and law—to get things done. In workplaces, the word is used very often to blame complicated rules, processes, and written work that are interpreted as obstacles rather than safeguards and accountability assurances. Socio-bureaucracy would then refer to certain social influences that may affect the function of a society.

In modern usage, modern bureaucracy has been defined as comprising four features:

  1. hierarchy (clearly defined spheres of competence and divisions of labor)
  2. continuity (a structure where administrators have a full-time salary and advance within the structure)
  3. impersonality (prescribed rules and operating rules rather than arbitrary actions)
  4. expertise (officials are chosen according to merit, have been trained, and hold access to knowledge)

Bureaucracy in a political theory is mainly a centralized form of management and tends to be differentiated from adhocracy, in which management tends more to decentralization.

History

Ancient

Students competed in imperial examinations to receive a position in the bureaucracy of Imperial China.

Although the term "bureaucracy" first originated in the mid-18th century, organized and consistent administrative systems existed much earlier. The development of writing (c. 3500 BC) and the use of documents was a critical component of such systems. The first definitive example of bureaucracy occurred in ancient Sumer, where an emergent class of scribes used clay tablets to document and carry out various administrative functions, such as the management of taxes, workers, and public goods/resources like granaries. Similarly, Ancient Egypt had a hereditary class of scribes that administered a civil-service bureaucracy.

In China, when the Qin dynasty (221–206 BC) unified China under the Legalist system, the emperor assigned administration to dedicated officials rather than nobility, ending feudalism in China, replacing it with a centralized, bureaucratic government. The form of government created by the first emperor and his advisors was used by later dynasties to structure their own government. Under this system, the government thrived, as talented individuals could be more easily identified in the transformed society. The Han dynasty (202 BC – 220 AD) established a complicated bureaucracy based on the teachings of Confucius, who emphasized the importance of ritual in a family, in relationships, and in politics. With each subsequent dynasty, the bureaucracy evolved. In 165 BC, Emperor Wen introduced the first method of recruitment to civil service through examinations, while Emperor Wu (r. 141–87 BC), cemented the ideology of Confucius into mainstream governance installed a system of recommendation and nomination in government service known as xiaolian, and a national academy whereby officials would select candidates to take part in an examination of the Confucian classics, from which Emperor Wu would select officials.

In the Sui dynasty (581–618) and the subsequent Tang dynasty (618–907) the shi class would begin to present itself by means of the fully standardized civil service examination system, of partial recruitment of those who passed standard exams and earned an official degree. Yet recruitment by recommendations to office was still prominent in both dynasties. It was not until the Song dynasty (960–1279) that the recruitment of those who passed the exams and earned degrees was given greater emphasis and significantly expanded. During the Song dynasty (960–1279) the bureaucracy became meritocratic. Following the Song reforms, competitive examinations took place to determine which candidates qualified to hold given positions. The imperial examination system lasted until 1905, six years before the Qing dynasty collapsed, marking the end of China's traditional bureaucratic system.

A hierarchy of regional proconsuls and their deputies administered the Roman Empire. The reforms of Diocletian (Emperor from 284 to 305) doubled the number of administrative districts and led to a large-scale expansion of Roman bureaucracy. The early Christian author Lactantius (c. 250 – c. 325) claimed that Diocletian's reforms led to widespread economic stagnation, since "the provinces were divided into minute portions, and many presidents and a multitude of inferior officers lay heavy on each territory." After the Empire split, the Byzantine Empire developed a notoriously complicated administrative hierarchy, and in the 20th century the term "Byzantine" came to refer to any complex bureaucratic structure.

Modern

Persia

Uzun Hasan's conquest of most of mainland Iran shifted the seat of power to the east, where the Aq Qoyunlu adopted Iranian customs for administration and culture. In the Iranian areas, Uzun Hasan preserved the previous bureaucratic structure along with its secretaries, who belonged to families that had in a number of instances served under different dynasties for several generations. The four top civil posts of the Aq Qoyunlu were all occupied by Iranians, which under Uzun Hasan included; the vizier, who led the great council (divan); the mostawfi al-mamalek, high-ranking financial accountants; the mohrdar, who affixed the state seal; and the marakur "stable master", who supervised the royal court.

At his new capital, Tabriz, Uzun Hasan managed a refined Persian court. There he utilized the trappings of pre-Islamic Persian royalty and bureaucrats taken from several earlier Iranian regimes. Through the use of his increasing revenue, Uzun Hasan was able to buy the approval of the ulama (clergy) and the mainly Iranian urban elite, while also taking care of the impoverished rural inhabitants.

The Safavid state was one of checks and balance, both within the government and on a local level. At the apex of this system was the Shah, with total power over the state, legitimized by his bloodline as a sayyid, or descendant of Muhammad. So absolute was his power, that the French merchant, and later ambassador to Iran, Jean Chardin thought the Safavid Shahs ruled their land with an iron fist and often in a despotic manner. To ensure transparency and avoid decisions being made that circumvented the Shah, a complex system of bureaucracy and departmental procedures had been put in place that prevented fraud. Every office had a deputy or superintendent, whose job was to keep records of all actions of the state officials and report directly to the Shah. The Shah himself exercised his own measures for keeping his ministers under control by fostering an atmosphere of rivalry and competitive surveillance. And since the Safavid society was meritocratic, and successions seldom were made on the basis of heritage, this meant that government offices constantly felt the pressure of being under surveillance and had to make sure they governed in the best interest of their leader, and not merely their own.

The Ottomans adopted Persian bureaucratic traditions and culture. The sultans also made an important contribution in the development of Persian literature.

Russia

The autocracy survived the Time of Troubles and the rule of weak or corrupt tsars because of the strength of the government's central bureaucracy. Government functionaries continued to serve, regardless of the ruler's legitimacy or the boyar faction controlling the throne. In the 17th century, the bureaucracy expanded dramatically. The number of government departments (prikazy; sing., prikaz ) increased from twenty-two in 1613 to eighty by mid-century. Although the departments often had overlapping and conflicting jurisdictions, the central government, through provincial governors, was able to control and regulate all social groups, as well as trade, manufacturing, and even the Eastern Orthodox Church.

The tsarist bureaucracy, alongside the military, the judiciary and the Russian Orthodox Church, played a major role in solidifying and maintaining the rule of the Tsars in the Tsardom of Russia (1547–1721) and in the Russian Empire (1721–1917). In the 19th century, the forces of change brought on by the Industrial Revolution propelled many countries, especially in Europe, to significant social changes. However, due to the conservative nature of the Tsarist regime and its desire to maintain power and control, social change in Russia lagged behind that of Europe.

Russian-speakers referred to bureaucrats as chinovniki (Russian: чиновники) because of the rank or chin (Russian: чин) which they held.

Ashanti Empire

The government of the Ashanti Empire was built upon a sophisticated bureaucracy in Kumasi, with separate ministries which saw to the handling of state affairs. Ashanti's Foreign Office was based in Kumasi. Despite the small size of the office, it allowed the state to pursue complex negotiations with foreign powers. The Office was divided into departments that handled Ashanti relations separately with the British, French, Dutch, and Arabs. Scholars of Ashanti history, such as Larry Yarak and Ivor Wilkes, disagree over the power of this sophisticated bureaucracy in comparison to the Asantehene. However, both scholars agree that it was a sign of a highly developed government with a complex system of checks and balances.

United Kingdom

The 18th century Department of Excise developed a sophisticated bureaucracy. Pictured, the Custom House in the City of London.

Instead of the inefficient and often corrupt system of tax farming that prevailed in absolutist states such as France, the Exchequer was able to exert control over the entire system of tax revenue and government expenditure. By the late 18th century, the ratio of fiscal bureaucracy to population in Britain was approximately 1 in 1300, almost four times larger than the second most heavily bureaucratized nation, France. Thomas Taylor Meadows, Britain's consul in Guangzhou, argued in his Desultory Notes on the Government and People of China (1847) that "the long duration of the Chinese empire is solely and altogether owing to the good government which consists in the advancement of men of talent and merit only", and that the British must reform their civil service by making the institution meritocratic. Influenced by the ancient Chinese imperial examination, the Northcote–Trevelyan Report of 1854 recommended that recruitment should be on the basis of merit determined through competitive examination, candidates should have a solid general education to enable inter-departmental transfers, and promotion should be through achievement rather than "preferment, patronage, or purchase". This led to implementation of His Majesty's Civil Service as a systematic, meritocratic civil service bureaucracy.

In the British civil service, just as it was in China, entrance to the civil service was usually based on a general education in ancient classics, which similarly gave bureaucrats greater prestige. The Cambridge-Oxford ideal of the civil service was identical to the Confucian ideal of a general education in world affairs through humanism. (Well into the 20th century, Classics, Literature, History and Language remained heavily favoured in British civil service examinations. In the period of 1925–1935, 67 percent of British civil service entrants consisted of such graduates.) Like the Chinese model's consideration of personal values, the British model also took personal physique and character into account.

France

Like the British, the development of French bureaucracy was influenced by the Chinese system. Under Louis XIV of France, the old nobility had neither power nor political influence, their only privilege being exemption from taxes. The dissatisfied noblemen complained about this "unnatural" state of affairs, and discovered similarities between absolute monarchy and bureaucratic despotism. With the translation of Confucian texts during the Enlightenment, the concept of a meritocracy reached intellectuals in the West, who saw it as an alternative to the traditional ancien regime of Europe. Western perception of China even in the 18th century admired the Chinese bureaucratic system as favourable over European governments for its seeming meritocracy; Voltaire claimed that the Chinese had "perfected moral science" and François Quesnay advocated an economic and political system modeled after that of the Chinese. The governments of China, Egypt, Peru and Empress Catherine II were regarded as models of Enlightened Despotism, admired by such figures as Diderot, D'Alembert and Voltaire.

Napoleonic France adopted this meritocracy system and soon saw a rapid and dramatic expansion of government, accompanied by the rise of the French civil service and its complex systems of bureaucracy. This phenomenon became known as "bureaumania". In the early 19th century, Napoleon attempted to reform the bureaucracies of France and other territories under his control by the imposition of the standardized Napoleonic Code. But paradoxically, that led to even further growth of the bureaucracy.

French civil service examinations adopted in the late 19th century were also heavily based on general cultural studies. These features have been likened to the earlier Chinese model.

Other industrialized nations

By the mid-19th century, bureaucratic forms of administration were firmly in place across the industrialized world. Thinkers like John Stuart Mill and Karl Marx began to theorize about the economic functions and power-structures of bureaucracy in contemporary life. Max Weber was the first to endorse bureaucracy as a necessary feature of modernity, and by the late 19th century bureaucratic forms had begun their spread from government to other large-scale institutions.

Within capitalist systems, informal bureaucratic structures began to appear in the form of corporate power hierarchies, as detailed in mid-century works like The Organization Man and The Man in the Gray Flannel Suit. Meanwhile, in the Soviet Union and Eastern Bloc nations, a powerful class of bureaucratic administrators termed nomenklatura governed nearly all aspects of public life.

The 1980s brought a backlash against perceptions of "big government" and the associated bureaucracy. Politicians like Margaret Thatcher and Ronald Reagan gained power by promising to eliminate government regulatory bureaucracies, which they saw as overbearing, and return economic production to a more purely capitalistic mode, which they saw as more efficient. In the business world, managers like Jack Welch gained fortune and renown by eliminating bureaucratic structures inside corporations. Still, in the modern world, most organized institutions rely on bureaucratic systems to manage information, process records, and administer complex systems, although the decline of paperwork and the widespread use of electronic databases is transforming the way bureaucracies function.

Theories

Karl Marx

Karl Marx theorized about the role and function of bureaucracy in his Critique of Hegel's Philosophy of Right, published in 1843. In Philosophy of Right, Hegel had supported the role of specialized officials in public administration, although he never used the term "bureaucracy" himself. By contrast, Marx was opposed to bureaucracy. Marx posited that while corporate and government bureaucracy seem to operate in opposition, in actuality they mutually rely on one another to exist. He wrote that "The Corporation is civil society's attempt to become state; but the bureaucracy is the state which has really made itself into civil society."

Leon Trotsky

Leon Trotsky developed a critical theory of the emerging Soviet bureaucracy during the early years of the Soviet Union. According to political scientist, Thomas M.Twiss, Trotsky associated bureaucratism with authoritarianism, excessive centralism and conservatism. Social theorist Martin Krygier had noted the impact of Trotsky's post-1923 writings in shaping receptive views of bureaucracy among later Marxists and many non-Marxists. Twiss argued that Trotsky's theory of Soviet bureaucracy was essential for a study of Soviet history and understanding the process of capitalist restoration in Russia and Eastern Europe. Political scientist, Baruch Knei-Paz argued Trotsky had, above all others, written "to show the historical and social roots of Stalinism" as a bureaucratic system.

One of the predictions made by Trotsky in his 1936 work, The Revolution Betrayed, was that the USSR would come before a disjuncture: either the toppling of the ruling bureaucracy by means of a political revolution, or capitalist restoration led by the bureaucracy:

The fall of the present bureaucratic dictatorship, if it were not replaced by a new socialist power, would thus mean a return to capitalist relations with a catastrophic decline of industry and culture.

John Stuart Mill

Writing in the early 1860s, political scientist John Stuart Mill theorized that successful monarchies were essentially bureaucracies, and found evidence of their existence in Imperial China, the Russian Empire, and the regimes of Europe. Mill referred to bureaucracy as a distinct form of government, separate from representative democracy. He believed bureaucracies had certain advantages, most importantly the accumulation of experience in those who actually conduct the affairs. Nevertheless, he believed this form of governance compared poorly to representative government, as it relied on appointment rather than direct election. Mill wrote that ultimately the bureaucracy stifles the mind, and that "a bureaucracy always tends to become a pedantocracy."

Max Weber

The fully developed bureaucratic apparatus compares with other organisations exactly as does the machine with the non-mechanical modes of production.

–Max Weber

The German sociologist Max Weber was the first to formally study bureaucracy and his works led to the popularization of this term. In his essay Bureaucracy, published in his magnum opus Economy and Society, Weber described many ideal-typical forms of public administration, government, and business. His ideal-typical bureaucracy, whether public or private, is characterized by:

  • hierarchical organization
  • formal lines of authority (chain of command)
  • a fixed area of activity
  • rigid division of labor
  • regular and continuous execution of assigned tasks
  • all decisions and powers specified and restricted by regulations
  • officials with expert training in their fields
  • career advancement dependent on technical qualifications
  • qualifications evaluated by organizational rules, not individuals

Weber listed several preconditions for the emergence of bureaucracy, including an increase in the amount of space and population being administered, an increase in the complexity of the administrative tasks being carried out, and the existence of a monetary economy requiring a more efficient administrative system. Development of communication and transportation technologies make more efficient administration possible, and democratization and rationalization of culture results in demands for equal treatment.

Although he was not necessarily an admirer of bureaucracy, Weber saw bureaucratization as the most efficient and rational way of organizing human activity and therefore as the key to rational-legal authority, indispensable to the modern world. Furthermore, he saw it as the key process in the ongoing rationalization of Western society. Weber also saw bureaucracy, however, as a threat to individual freedoms, and the ongoing bureaucratization as leading to a "polar night of icy darkness", in which increasing rationalization of human life traps individuals in a soulless "iron cage" of bureaucratic, rule-based, rational control. Weber's critical study of the bureaucratization of society became one of the most enduring parts of his work. Many aspects of modern public administration are based on his work, and a classic, hierarchically organized civil service of the Continental type is called "Weberian civil service" or "Weberian bureaucracy". It is debated among social scientists whether Weberian bureaucracy contributes to economic growth.

The political scientist Jan Vogler challenges Max Weber's characterization of modern bureaucracies. Specifically, he lists Weber's views regarding strict merit recruitment, clearly delineated career paths for bureaucrats, the full separation of bureaucratic operations from politics, and mutually exclusive spheres of competence for government agencies. Because he considers several of these aspects to be violated by the overwhelming majority of existing public administrative systems, Vogler provides an alternative view of the defining organizational features of modern bureaucracies. According to this view, modern public bureaucracies are "(internally hierarchical) administrative organizations ... subordinated to the government" that have all of the following characteristics:

  • a full separation of offices and officeholders (i.e., no private possession of administrative positions)
  • recruitment procedures focused on relevant skills and ensuring at least minimal competence
  • written rules and regulations that set standards for official conduct
  • stable salaries and salary progression, mostly determined by individual bureaucratic rank
  • limited discretion in bureaucrats' work routines and an overall political-legal orientation of the administrative system

Vogler considers modern bureaucracies as only requiring "minimal competence" from candidates for bureaucratic offices. This leaves space for the possibility of biases in recruitment processes that give preferential treatment to members of specific social, economic, or ethnic groups, which are observed in many real-world bureaucratic systems. Moreover, Vogler's perspective does not portray bureaucracies as strictly separated from politics and does not require government agencies to have mutually exclusive spheres of influence, which is in line with frequent interagency collaboration and conflict over disputed areas of competence in existing public administrations.

Woodrow Wilson

Writing as an academic while a professor at Bryn Mawr College, Woodrow Wilson's essay The Study of Administration argued for bureaucracy as a professional cadre, devoid of allegiance to fleeting politics. Wilson advocated a bureaucracy that:

...is a part of political life only as the methods of the counting house are a part of the life of society; only as machinery is part of the manufactured product. But it is, at the same time, raised very far above the dull level of mere technical detail by the fact that through its greater principles it is directly connected with the lasting maxims of political wisdom, the permanent truths of political progress.

Wilson did not advocate a replacement of rule by the governed, he simply advised that, "Administrative questions are not political questions. Although politics sets the tasks for administration, it should not be suffered to manipulate its offices". This essay became a foundation for the study of public administration in America.

Ludwig von Mises

In his 1944 work Bureaucracy, the Austrian economist Ludwig von Mises compared bureaucratic management to profit management. Profit management, he argued, is the most effective method of organization when the services rendered may be checked by economic calculation of profit and loss. When, however, the service in question can not be subjected to economic calculation, bureaucratic management is necessary. He did not oppose universally bureaucratic management; on the contrary, he argued that bureaucracy is an indispensable method for social organization, for it is the only method by which the law can be made supreme, and is the protector of the individual against despotic arbitrariness. Using the example of the Catholic Church, he pointed out that bureaucracy is only appropriate for an organization whose code of conduct is not subject to change. He then went on to argue that complaints about bureaucratization usually refer not to the criticism of the bureaucratic methods themselves, but to "the intrusion of bureaucracy into all spheres of human life." Mises saw bureaucratic processes at work in both the private and public spheres; however, he believed that bureaucratization in the private sphere could only occur as a consequence of government interference. According to him, "What must be realized is only that the strait jacket of bureaucratic organization paralyzes the individual's initiative, while within the capitalist market society an innovator still has a chance to succeed. The former makes for stagnation and preservation of inveterate methods, the latter makes for progress and improvement."

Robert K. Merton

American sociologist Robert K. Merton expanded on Weber's theories of bureaucracy in his work Social Theory and Social Structure, published in 1957. While Merton agreed with certain aspects of Weber's analysis, he also noted the dysfunctional aspects of bureaucracy, which he attributed to a "trained incapacity" resulting from "over conformity". He believed that bureaucrats are more likely to defend their own entrenched interests than to act to benefit the organization as a whole but that pride in their craft makes them resistant to changes in established routines. Merton stated that bureaucrats emphasize formality over interpersonal relationships, and have been trained to ignore the special circumstances of particular cases, causing them to come across as "arrogant" and "haughty".

Elliott Jaques

In his book A General Theory of Bureaucracy, first published in 1976, Elliott Jaques describes the discovery of a universal and uniform underlying structure of managerial or work levels in the bureaucratic hierarchy for any type of employment systems.

Jaques argues and presents evidence that for the bureaucracy to provide a valuable contribution to the open society some of the following conditions must be met:

  • The number of levels in the hierarchy of a bureaucracy must match the complexity level of the employment system for which the bureaucratic hierarchy is created. (Elliott Jaques identified a maximum of eight levels of complexity for bureaucratic hierarchies.)
  • Roles within a bureaucratic hierarchy differ in the level of work complexity.
  • The level of work complexity in the roles must be matched by the level of human capability of the role holders. (Elliott Jaques identified maximum of eight Levels of human capability.)
  • The level of work complexity in any managerial role within a bureaucratic hierarchy must be one level higher than the level of work complexity of the subordinate roles.
  • Any managerial role in a bureaucratic hierarchy must have full managerial accountabilities and authorities (veto selection to the team, decide task types and specific task assignments, decide personal effectiveness and recognition, decide initiation of removal from the team within due process).
  • Lateral working accountabilities and authorities must be defined for all the roles in the hierarchy (seven types of lateral working accountabilities and authorities: collateral, advisory, service-getting and -giving, coordinative, monitoring, auditing, prescribing).

Jaques' definition of effective bureaucratic hierarchy is important not only in sociology but also in social psychology, social anthropology, economics, politics, and social philosophy. It also has a practical application in business and administrative studies.

Bureaucracy and democracy

Like every modern state, a liberal democracy is highly bureaucratized, with numerous sizable organizations filled with career civil servants. Some of those bureaucracies have a substantial amount of influence to preserve the current political system because they are primarily focused on defending the country and the state from threats from both within and beyond. Since these institutions frequently operate independently and are mostly shielded from politics, they frequently have no affiliation with any particular political party or group. For instance, loyal British civil officials work for both the Conservative and Labour parties. However, on occasion a group might seize control of a bureaucratic state, as the Nazis did in Germany in the 1930s.

Although numerous ideals associated with democracy, such as equality, participation, and individuality, are in stark contrast to those associated with modern bureaucracy, specifically hierarchy, specialization, and impersonality, political theorists did not recognize bureaucracy as a threat to democracy. Yet democratic theorists still have not developed a sufficient solution to the problem bureaucratic authority poses to democratic government.

One answer to this problem is to say that bureaucracy has no place at all in a real democracy. Theorists who adopt this perspective typically understand that they must demonstrate that bureaucracy does not necessarily occur in every contemporary society; only in those they perceive to be non-democratic. Because their democracy was resistant to bureaucracy, nineteenth-century British writers frequently referred to it as the "Continental nuisance".

According to Marx and other socialist thinkers, the most advanced bureaucracies were those in France and Germany. However, they argued that bureaucracy was a symptom of the bourgeois state and would vanish along with capitalism, which gave rise to the bourgeois state. Though clearly not the democracies Marx had in mind, socialist societies ended up being more bureaucratic than the governments they replaced. Similarly, after capitalist economies developed the administrative systems required to support their extensive welfare states, the idea that bureaucracy exclusively exists in socialist governments could scarcely be maintained.

Bayesian inference

From Wikipedia, the free encyclopedia https://en.wikipedia.org/wiki/Bayesian_inference Bayesian inference ( / ...