You are on page 1of 7

AJPH PERSPECTIVES

COVID-19 and the Rise of Participatory SIGINT:


An Examination of the Rise in Government
Surveillance Through Mobile Applications
The COVID-19 pandemic has trig- Rose Bernard, MA, Gemma Bowsher, MBBS, MA, and Richard Sullivan, MBBS, FRCS, PhD
gered a significant growth in gov-
ernment surveillance techniques
globally, primarily through the use
of cell phone applications. How-
ever, although these applications
can have actionable effects on
T he COVID-19 pandemic
has triggered a significant
growth in government surveil-
nation-state governments
or government agencies and
thus covert collection; how-
its own transactional data
market, with individuals
regularly trading personal data
public health efforts to control lance and monitoring tech- ever, a “democratization for access to services or products.
pandemics, the participatory or niques across the globe, largely of SIGINT” has made these Governments have exploited
voluntary nature of these mea- through the use of cell phone capabilities increasingly the normality of this transac-
sures is obscuring the relationship applications and other smart available for commercial tional relationship with com-
between health information and device technologies.1 Official purposes.4 mercial technology during a
traditional government surveil- government and media narra- In a public health context, the pandemic-precipitated state of
lance techniques, potentially pre- tives have not presented these use of SIGINT and other unique exception to introduce a new
venting effective oversight. Public technologies as an extension intelligence tools has become form of SIGINT. We frame
health measures have traditionally of surveillance but rather as a increasingly integral to epidemic this concept as “participatory
been resistant to the integration of transaction, which requires that and pandemic preparedness and SIGINT,” because rather than
government-led intelligence tech- individuals surrender data in response, even if not overtly harvesting data from passive
niques, such as signals intelligence exchange for the return of civil referred to in these terms, as surveillance participants, people
(SIGINT), because of ethical and liberties after emergence from national security doctrines participate in their own sur-
legal issues arising from the nature quarantine, or for the promise of expanded to include the pan- veillance by readily surrendering
of surveillance techniques. an as yet unarticulated “safer” demic threat.5 Of all these in- personal data either directly
We explore this rise of partici- future. The underpinning ra- telligence methods, SIGINT is through direct government-
patory SIGINT and its nature as
tionale for these measures has perhaps the most controversial: sanctioned or -sponsored tech-
an extension of biosurveillance
been “the science,” which although it could be used in nology or indirectly through
through 3 drivers: the rise of sur-
governments have repeatedly contact tracing, tracking adher- trusted third parties. The par-
veillance capitalism, the exploita- ence to quarantine, tracking ticipatory nature of this new
presented as an apolitical regime
tion of a public health crisis to health data from smartphones SIGINT mechanism effectively
naturally determining credible
obscure state of exception politics and connected devices, and allows the avoidance of nor-
governance.2
with a moral imperative, and the tracking purchase data for mative, legal, and ethical barriers
Data collection falls under
historically enduring nature of location or prescription needs, associated with traditional se-
the definition of signals intelli-
emergency-implemented surveil- there are significant legal, curity sector SIGINT. In these
gence (SIGINT)—an intelli-
lance measures. ethical, and normative barriers discourses of necessity driving
gence collection technique that
We conclude that although to its use. personal self-management
governs data collected from
mobile applications may indeed be Furthermore, the COVID- through technology, the prom-
electronic or communications
useful in containing pandemics, 19 pandemic has occurred dur- inence of science as a legitimizing
devices—or foreign instru-
they should be subject to similar ing an unprecedented period currency mediating extractive
mentation data.3 In this practice
oversight and regulation as other of technological integration state–individual relations is made
there are 2 specific types of
government intelligence collection into daily life. This has brought apparent.
techniques. (Am J Public Health.
collection, “signals external,”
2020;110:1780–1785. https://doi.
which deals with collecting the
signal itself, its strength, fre- ABOUT THE AUTHORS
org/10.2105/AJPH.2020.305912) All authors are with the Conflict and Health Research Group, Kings College London, London,
quency, and network traffic, UK.
and “signals internal,” which Correspondence should be sent to Rose Bernard, Comprehensive Cancer Centre, Guy’s
deals with the message data.4 Campus, Great Maze Pond, London, SE1 9RT, United Kingdom (e-mail: rose.bernard@
kcl.ac.uk). Reprints can be ordered at http://www.ajph.org by clicking the “Reprints” link.
Such collection has tradition- This article was accepted August 3, 2020.
ally been associated with https://doi.org/10.2105/AJPH.2020.305912

1780 Analytic Essay Peer Reviewed Bernard et al. AJPH December 2020, Vol 110, No. 12
AJPH PERSPECTIVES

COVID-19 AND SIGINT South Korean have imple- in different ways, globally there is the difference in collection
USE mented geofencing via cell an upward trend in the use of techniques and targeting be-
SIGINT is traditionally de- phone data—a technique that such surveillance measures. As of tween bulk data collection—or
fined as intelligence deriving alerts authorities when quar- July 3, 2020, the privacy tracking signals external—and the use of
from communications and elec- antined individuals leave their site Top10VPN found that mobile applications to track and
tronics data. This can include, but primary place of quarantine.9 contact-tracing applications were trace data that could include ac-
is not limited to, call, message, 3. Cell phone applications to being used in 28 countries, with cess to signals internal, the public
and e-mail contents and met- support quarantine measures: alternative digital tracing mea- perception of such techniques
adata, location data, purchases some governments are using sures used in 35 different coun- remains intertwined as a result of
made using connected devices, an application to achieve tries and 47 applications emerging their association with govern-
health information recorded or geofencing measures—for specifically to manage contact- ment use. This, combined with
collected by mobile applications, example, in Singapore quar- tracing and quarantine mea- subsequent reports on the com-
and information from connected antined individuals must click sures of COVID-19 available mercialization of surveillance
devices such as smart watches and on links in text messages sent globally.13 technology associated with
fitness trackers. It includes data by health officials that sends The majority of these appli- SIGINT led to a public backlash
gathered both at an individual location data back and can be cations are not, at least overtly, against the use of government
level and, more controversially, used to track whether indi- mandatory. Although anony- mass data collection and pro-
at a bulk level from telecom- viduals have left their place of mized bulk data collection of voked a shift in public attitudes
munication or technology com- quarantine.10 location and geofencing tech- toward government mass
panies.6 Traditionally, SIGINT 4. Cell phone applications to niques and applications have surveillance.15
has been considered a capability support track and trace mea- been used to mandatorily enforce In the health domain,
limited to security sectors of sures: many countries are quarantine, cell phone applica- SIGINT has remained contro-
nation-states because of high developing cell phone appli- tions intended to supplement versial, and although phone-
operating costs, sensitivity of ac- cations to conduct and en- track and trace are perceived as tracking data have been used in
cess, and costs connected with hance contact tracing. For voluntary. Both the European complex humanitarian emer-
associated analysis. Crucially, example, countries, such as Union and the United Kingdom gencies, such as tracking the 2012
SIGINT is governed by legal and South Korea, India, Hong have claimed that their applica- Haiti earthquake victims, data-
regulatory frameworks. Kong, Romania, Slovakia, tions will be voluntary; however, collection techniques have not
A substantial number of tra- and Poland, as well as some although participation may be yet been used at scale in pan-
ditional SIGINT techniques are regions of Spain are using overtly perceived as voluntary, demics, and questions regarding
being used in the management similar apps. Both the Euro- nonadherence may have detri- their effectiveness and quality
of the COVID-19 pandemic. pean Union and the United mental effects on individual persist.16 In the 2003 SARS (se-
There are currently 4 broad Kingdom are developing apps freedoms. In China, for example, vere acute respiratory syndrome)
categories of data collection be- to track users; these apps de- although the application remains epidemic and the 2015 MERS
ing used for this purpose: termine proximity to other technically voluntary, it is nec- (Middle East respiratory syn-
app users, and, if users come essary for travel and entrance into drome) outbreak, some rudi-
into contact with an individ- most shops and restaurants, and mentary and localized tracking
1. Anonymized bulk data col- ual who subsequently tests building managers require it to systems were used. Examples
lection and telecommunica- positive, they would be re- rent an apartment. Nevertheless, include RFID (radio-frequency
tions companies’ provision of quired to quarantine for a the framing of these measures identification) locators to track
location data to governments: predetermined period of as voluntary participation marks visitors to hospitals in Singapore
for example, the United time.11 This has been most a departure from traditional and cell phone data to track
States, the European Union, evident in China, where the SIGINT while retaining the key quarantined individuals in South
Canada, and South Korea are HealthCode apps work on features of large-scale personal Korea; however, these practices
working with telecommuni- user input and government- data collection for surveillance did not become widespread
cations companies to use tel- provided information, in- purposes. globally.17 Similarly, in the 2014
ecoms data to track general cluding health symptoms, test SIGINT and associated tech- to 2016 Ebola outbreak, al-
compliance with social- results, and location data to niques, such as government though mHealth applications
distancing measures or to provide individuals with a agencies’ bulk data collection, were used to deliver health
identify large groupings of red, orange, or green code face a normative barrier to use communications and advice to
individuals.7,8 that restricts movement that largely arose from the 2013 individuals in affected countries,
2. Geofencing: countries have accordingly.12 revelation of a mass data collec- connectivity and lack of cell phone
used geofencing data to im- tion program the United States ownership in rural areas hindered
plement and enforce manda- Although countries are ran with the assistance of the the use of SIGINT as a tracking
tory quarantine. Taiwan and implementing these techniques United Kingdom.14 Despite or quarantine measure.18

December 2020, Vol 110, No. 12 AJPH Bernard et al. Peer Reviewed Analytic Essay 1781
AJPH PERSPECTIVES

It therefore appears that in response measures. In the context sensitive nature of the data col- (often via the use of mobile ap-
seeking to avoid the public per- of the ongoing COVID-19 lected make it difficult to apply plications or online technologies)
ception and regulatory implica- pandemic, we therefore con- the regulations. One of the fun- is used as a means of garnering
tions of bulk data collection and sider the use of government- damental principles of the GDPR collective public participation
covert surveillance, governments developed, -sanctioned, -controlled, is that data participants must in programs employing broad-
have opted for the use of mobile or -coordinated applications used consent to the processing of their based SIGINT processes, often
apps, often framed as voluntary, to enhance or take the place of information and to do so must be with indeterminate limits on
marking a departure from the track and trace schemes to be informed of the full scope, fea- collection and data use.
contentious data collection tech- participatory SIGINT. tures, usage, and storage of those We have identified 3 drivers
niques of traditional SIGINT. Although the track and trace data.19 in the growth of participatory
Nevertheless, the differences in applications are used ostensibly In unequal power balances, SIGINT during the COVID-19
public communication of these for locating contact data and such as the relationship between pandemic: (1) the Trojan horse of
new applications during this the quarantine applications for employee and employer, some surveillance capitalism, (2) the
pandemic have not significantly enforcing periods of isolation, guidance has questioned whether politics of exception as moral
altered the nature of data col- in the course of this they collect it is possible for employees to imperative, and (3) the endur-
lection and the use of commu- data associated with traditional voluntarily consent to the gath- ance of emergency-implemented
nications data for broadly defined SIGINT, including location data, ering, processing, and transfer- surveillance measures.
surveillance purposes. contact data, and travel data. A ence of their personal data.20 In
study of the HealthCode apps the context of a pandemic during
used in China revealed that in- which governments are asking Trojan Horse
formation collected using the individuals to hand over personal Surveillance capitalism is the
apps could draw an alarmingly data without a full understanding commodification of our personal
THE GROWTH OF detailed picture of the average of the extent, scope, and duration data by companies that provide
PARTICIPATORY city dweller’s life, including their of application, it is difficult to “free” services to collect and
SIGINT GPS (Global Positioning System) understand how data participants generate our behavioral data to
We define “participatory location, stores at which they can be fully informed of what sell in “behavioral futures mar-
SIGINT” as intelligence derived shopped, meals ordered, rides or they are consenting to and kets,” a concept coined and ex-
from communication devices or transportation used, specific bi- whether the unequal govern- plored by author Shoshana
electronic devices, which in- cycles rented, and even friends ment–citizen power balance in Zuboff.21 The prevalence of
cludes mobile devices and smart messaged and associated detailed an exceptional political envi- these practices is in part attrib-
devices and may include mes- social plans.17 In fact, of the 47 ronment can constitute consent. utable to these services’ transac-
saging contents, geolocations, applications currently available, This novel form of participa- tional nature—which, despite
health data, and contacts, or any 24 contain Google and Facebook tory SIGINT used in a public the heavy balance in favor of the
part thereof, and which the data tracking, 11 have no privacy health event requires that indi- companies, generates the sense
originator (also known as the policy, 25 do not disclose the viduals participate in their own that individuals are deriving a
“data subject” under the GDPR) length of time that they hold the surveillance by providing nation- desirable and worthwhile benefit
provides voluntarily to govern- data for, and 28 have no publicly state intelligence capabilities via a service of convenience.
ment authorities or commer- disclosed anonymity measures.13 with information and, in so Surveillance capitalism is a new
cial authorities as part of a Public criticism of the doing, consent to bypassing phase in “dataveillance,” a term
government-affiliated program. government-proposed apps has traditional state barriers and that reflects the collection of
This can take place through a moved away from traditional normative frameworks. In this personal data and its aggregation
Web site or a mobile application. questions relating to SIGINT definition, the use of the term into a surveillance model but
Participation is typically volun- processes—which largely con- “participatory” departs some- wherein, by framing it as a
tary, although extenuating cir- cern proportionality legality and what from its use in other settings transaction, the user maintains
cumstances may involve coerced regulatory oversight—and into such as “participatory gover- the illusion of participation by
volunteering. Two key features the realm of data protection and nance,” in which the emphasis is choice.22 This practice has be-
of these technologies is the role regulation, effectively transfer- on diminishing gulfs between come increasingly pervasive and
of individuals as semivoluntary ring the question from why to government and community intertwined with the growth of
participants engaging in self- how. Although some data pro- actors as a mode of empower- our reliance on technology, to
managing practices through these tection regulations, in particular ment and democratization. In the extent that the encroachment
mobile applications and the use the European Union’s General our use it reflects a contemporary of digital devices collecting per-
of a public health imperative Data Protection Regulations mode of engaging individuals in sonal data has been compared
to override ongoing privacy ob- (GDPR), require a specific need government and commercial with the process of colonialism:
jections by presenting participa- for organizations to collect spe- initiatives whereby voluntary whereas historical practices of
tion as engagement in necessary cific data, the intrusive and or semivoluntary subscription colonialism targeted physical

1782 Analytic Essay Peer Reviewed Bernard et al. AJPH December 2020, Vol 110, No. 12
AJPH PERSPECTIVES

territories and countries, con- methods of data protection, exceptional state measures nor- Emergency Surveillance
temporary data colonialism tar- rather than the regulatory over- mally subject to close public Measures
gets our personal information for sight of intelligence capabilities. scrutiny have been legitimized States of exception, and mea-
profit, and “human experience, Consequently, further govern- under a doctrine of necessity, and sures introduced to manage them,
potentially every layer and aspect ment use of these data has gone the moral dimension of the are intended to be temporary;
of it, is becoming the target of relatively unexamined. Although “right” and “wrong” sides cre- however, history has demonstrated
profitable extraction.”23(px) many governments promise an- ated in warfare has protecting this that surveillance measures intro-
Despite ongoing revelations onymity, this is often flawed framing from criticism. duced during crises are rarely later
about the treatment of our per- in practice: a study carried out The character of war as the rolled back. This is particularly
sonal data, or perhaps because of on anonymized data found basis of a state of exception during evident in the sweeping intelli-
the ubiquity of them, this attitude that nearly all people can be a public health crisis has had the gence reforms the United States
toward companies’ use of per- identified from just 15 separate effect of increasing the legitimacy introduced under the Patriot Act
sonal data continues to persist. A characteristics.25 of military involvement during following the 2001 terrorist attacks
watershed moment for public Additionally, although users public health responses. In set- in New York, which granted
privacy—the news in 2018 that may choose to provide informa- tings such as the United King- unprecedented surveillance and
UK company Cambridge Ana- tion based on current and specific dom and the United States, SIGINT powers to law enforce-
lytica had harvested the data of up need, the absence of a regulatory for example, military units have ment and intelligence agencies.
to 87 million Facebook users and framework means that the ability been deployed to support the These measures were supposed to
used it for political campaigning to enforce this consent is limited in COVID-19 response at the same expire in 2005, but the majority of
—resulted in few lasting conse- the longer term. For example, on time that their governments have them have been renewed regularly
quences: Facebook was fined the March 12 the UK Information received widespread criticism for in varying form, regardless of
equivalent of $663 000 by the Commissioner’s Office asserted, failing to invest in or deliver the sitting president’s party affilia-
UK Information Commissioner’s “Public bodies may require ad- timely and effective public health tion. The erosion of civil liberties
Office and $5 billion by the US ditional collection and sharing of measures, such as contact tracing tends to aggregate over time, with
courts (a low amount for a personal data to protect against and widespread testing regimes.29 each new iteration expanding in
company whose turnover for serious threats to public health”— This character of war has also scope.31
2018 alone was $56 billion). Al- a statement vague enough to meant that certain measures Accordingly, oversight for the
though Facebook’s publicly cover a wide range of current and that would normally represent use of participatory SIGINT,
traded stock value fell by 24% in future possibilities.26 a failure of public health mea- including need-based temporally
the week following the report, it sures, such as nationwide quar- restricted permissions, is crucial.
had recovered less than 2 months antines, are instead seen as a By using mobile apps in health
later. Despite growth in calls for Politics of Exception first line of defense that second- crises operating under data pro-
regulation, little has changed in A state of exception can be ary public health measures do tection rather than intelligence
Facebook’s day-to-day regula- conceptualized as an emergency not necessarily effectively regulation, we risk normalizing
tory practices. The illusion of a regime in which a government support. this surrendering of personal data
transaction we recognize—per- can extend the boundaries of The convergence of security both during and outside emer-
sonal data for access to services— sovereignty by increasing its narratives with discourses of sci- gencies. Although many may
grants the user a false sense of risk power during times of supposed entific necessity has been a key consider the use of apps and the
mitigation and control.24 crisis or as a space that allows a step in generating the moral relinquishing of personal data
Thus, by framing the SIGINT state to operate without a legal imperative that has mediated to be proportionate and legal in
associated with managing quar- framework.27 The current pan- individual engagement with the case of this pandemic, this is
antine and contact tracing as an demic has been overwhelmingly surveillance technologies. The unlikely to automatically be the
app, governments are packaging securitized by Western govern- UK secretary of state for health, case in all future permutations of
traditional surveillance capacities ments, who have framed it Matt Hancock, publicly stated these programs.
as a transaction associated with as a war or a state of war by that downloading the prospec-
surveillance capitalism—and employing the language of ex- tive UK government contract
therefore associated with risks ception to create a state of tracing app constituted a “civic
that the user recognizes and is emergency requiring recourse to duty” crucial to “getting our
relatively willing to accept. This extensive powers while also using liberty back.”30 In this framing, CONCLUSIONS
practice has driven a critical the nature of the public health participation in the contribution We do not intend to present a
conceptual shift whereby the crisis as a moral imperative to of SIGINT data is presented as a general opposition to the use of
framing of this method in the justify that creation.28 This war- necessary sacrifice of civil liber- mobile technologies in public
terms of surveillance capitalism like rhetoric of the “invisible ties and as part of individual health crises: there is evidence that
instead of a SIGINT method enemy” has formulated an “us” participation in a national effort their use can present a significant
draws focus to the norms and against “it” framing, whereby during a science-led war. contribution to the opening of

December 2020, Vol 110, No. 12 AJPH Bernard et al. Peer Reviewed Analytic Essay 1783
AJPH PERSPECTIVES

quarantine, the management of surveillance; however, although beyond the COVID-19 8. Tau B. Government tracking how
people move around in coronavirus
quarantine stages, or the initial the process of submission may pandemic.
pandemic. 2020. Available at: https://
stages of infection within coun- vary, the nature of the data col- www.wsj.com/articles/government-
CONTRIBUTORS
tries. Indeed, there is some evi- lected and their processing, All authors contributed equally to the
tracking-how-people-move-around-in-
dence that given the speed of analysis, and dissemination re- coronavirus-pandemic-115853932020.
research and drafting of this article.
Accessed May 5, 2020.
transmission associated with main in keeping with SIGINT
9. Ghaffary S. What the US can learn from
COVID-19, digital contact trac- practices.32 In obscuring the ACKNOWLEDGMENTS
other countries using phones to track
This article was funded by the UK Re-
ing may be a highly effective tool similarities between these pro- search and Innovation Global Challenges
COVID-19. 2020. Available at: https://
for disease control.32 However, cesses, both methods become Research Fund (research for health in www.vox.com/recode/2020/4/18/
conflict ES/P010962/1). 21224178/covid-19-tech-tracking-
we argue that the use of these more opaque and the collection phones-china-Singapore-Taiwan-Korea-
applications should be overtly of neither form of data should be google-apple-contact-tracing-digital.
CONFLICTS OF INTEREST Accessed May 5, 2020.
recognized as an extension of state made a condition of public health The authors have no potential or actual
intelligence and surveillance ca- or the possession of civil liberties. conflicts of interest to disclose. 10. Wetsman N. Google and Apple’s
COVID19 tracking system can’t save
pacity and data collection. Clarity In particular, health data
lives all on its own. 2020. Available at:
in methods, usage, and regulation should be treated with more HUMAN PARTICIPANT
https://www.theverge.com/2020/4/15/
PROTECTION
should be paramount in the roll- caution, not less. History has No protocol approval was necessary be-
21222161/apple-google-Bluetooth-
contact-tracing-system-coronavirus-
out of these applications, and the shown us repeatedly that health cause no human participants were involved
health. Accessed May 5, 2020.
“soft” coercion of individuals into and population metrics have in this study.
11. Mancourt V. EU data regulator
surrendering personal data for been used as tools of discrimi- calls for pan-European COVID-19 app.
REFERENCES
these purposes should be recog- nation, including the denial of 1. Gershgorn D. We mapped how the 2020. Available at: https://www.politico.
nized as an ethically challenging health insurance and thus the coronavirus is driving new surveillance eu/article/coronavirus-Europe-data-
programs around the world. 2020. regulator-calls-for-pan-european-covid-
domain. Participants should not denial of health care to disen- 19-app. Accessed May 5, 2020.
Available at: https://onezero.medium.
be coerced into consenting to franchised populations in the com/the-pandemic-is-a-trojan-horse-for- 12. Mozur P, Zhong R, Krolik A. In
having their data collected with- United States and the Chinese surveillance-programs-around-the-world- coronavirus fight, China gives citizens
out being fully aware of the nature adoption of biosurveillance in its 887fa6f12ec9. Accessed May 5, 2020. a color code, with red flags. 2020. Avail-
2. King-Hill S, Powell M. Coronavirus: able at: https://www.nytimes.com/2020/
and scope of the processing and suppression of the Uighur pop- 03/01/business/china-coronavirus-
what does it mean when the government
the programs and other applica- ulation in Xinjiang province.33 says it is “following the science”? 2020. surveillance.html. Accessed May 5, 2020.
tions that they access or with It is imperative, therefore, Available at: https://theconversation. 13. TOP10VPN. COVID-19 digital
which they share data. that, whether participatory or com/coronavirus-what-does-it-mean- rights tracker. 2020. Available at: https://
when-the-government-says-it-is-following- www.top10vpn.com/news/surveillance/
We also call for transparency not, collection of these data the-science-137109. Accessed July 6, 2020. covid-19-digital-rights-tracker. Accessed
around the objectives of these should be governed by legislation 3. Joint Chiefs of Staff. Department of May 5, 2020.
apps: if they are deemed necessary similar to other national intelli- Defense: Dictionary of Military and As- 14. Hopkins N. UK gathering secret in-
for use in this pandemic then they gence capacities, recognizing the sociated Terms. 2016. Available at: telligence via covert NSA operation.
https://fas.org/irp/doddir/dod/jp1_02. 2013. Available at: https://www.
should be time limited to the highly sensitive nature of these pdf. Accessed September 10, 2020. theguardian.com/technology/2013/jun/
duration of this pandemic and data and subjecting them to high 4. Weinbaum C, Berner S, McClintock B. 07/uk-gathering-secret-intelligence-nsa-
subject to regular and transparent levels of regulatory oversight. In SIGINT for anyone: the growing avail- prism. Accessed May 5, 2020.
reviews. At all times during such addition, such measures should ability of signals intelligence in the public 15. Lyon D. Surveillance After Snowden.
domain. 2017. Available at: https://www. Cambridge, UK: Polity Press; 2015.
health emergencies, processes be used only within a national rand.org/pubs/perspectives/PE273.html.
meant to guide personal conduct security preparedness and re- Accessed July 3, 2020. 16. Wilson J. The use of intelligence to
or to collect personal data should sponse framework to specific determine attribution of the 2010 Haiti
5. Bernard R, Bowsher G, Milner C, cholera disaster. Intell Natl Secur. 2018;
be made visible at an individual pandemics, not as a part of nor- Boyle P, Patel P, Sullivan R. Intelligence 33(6):866–874. https://doi.org/10.1080/
and global health: assessing the role of
level. Merely claiming that an mative public health demand–led 02684527.2018.1464430
open source and social media intelligence
application is voluntary does not advisory functions. As a SIGINT analysis in infectious disease outbreaks. J 17. Cha S. Mapping coronavirus: South
mean that its processes, purposes, capacity, apps should not be au- Public Health (Berl.). 2018;26(5):509–514. Koreans turn to online tracking as
https://doi.org/10.1007/s10389-018- cases surge. 2020. Available at: https://
and functions are visible or excuse tomatically deployed in broadly www.uk.reuters.com/article/us-china-
0899-3
the obfuscation of its internal defined health contexts, whether health-South Korea-maps/mapping-
6. National Security Agency Central Se-
practices in the short or long term. infectious disease outbreaks or coronavirus-south-koreans-turn-to-
curity Service. Signals intelligence. 2020.
online-tracking-as-cases-surge-
We also contest the supposed other national crises. Instead each Available at: https://www.nsa.gov/what-
idUKKCN20I0HG. Accessed May 5,
difference between coercive data situation should be required to we-do/signals-intelligence. Accessed
2020.
May 5, 2020.
extraction and voluntary provi- reach the proportionality and 18. Bernard R, Sullivan R. The use of
7. Scott M, Cerulus L, Kayali L. Com-
sion of personal information via legality aspects of all SIGINT mission tells carriers to hand over mobile
HUMINT in epidemics: a practical as-
sessment. Intell Natl Secur. 2020;35(4):
these applications. Some have uses to avoid the unfettered data in coronavirus fight. 2020. Available
493–501. https://doi.org/10.1080/
claimed that the voluntary pro- penetration of extractive sur- at: https://www.politico.eu/article/
European-commission-mobile-phone- 02684527.2020.1750137
vision of data is a path to the veillance technologies in our data-Thierry-Breton-coronavirus- 19. Schulz M, Hennis-Plasschaert JA.
avoidance of potentially coercive daily lives both during and covid19. Accessed May 5, 2020. Regulations. Official Journal of the European

1784 Analytic Essay Peer Reviewed Bernard et al. AJPH December 2020, Vol 110, No. 12
AJPH PERSPECTIVES

Union. May 4, 2016. Available at: https:// liberties. 2020. Available at: https://www.
eur-lex.europa.eu/legal-content/EN/ theguardian.com/commentisfree/2020/
TXT/PDF/?uri=CELEX:32016R0679. mar/23/coronavirus-civil-liberties-
Accessed July 3, 2020. authoritarian-measures. Accessed May 5,
20. Jodka S. The GDPR covers em- 2020.
ployee/HR data and it’s tricky, tricky 32. Ferretti L, Wymant C, Kendall M,
(tricky) tricky: what HR needs to know. et al. Quantifying SARS-CoV-2 trans-
2018. Available at: https://www. mission suggests epidemic control with
dickinson-wright.com/news-alerts/the- digital contact tracing. Science. 2020;
gdpr-covers-employee-hr-data-and- 368(6491):eabb6936. https://doi.org/10.
tricky. Accessed July 3, 2020. 1126/science.abb6936
21. Zuboff S. The Age of Surveillance Capi- 33. Wee S. China uses DNA to track its
talism. London, UK: Profile Books; 2019. people, with the help of American ex-
pertise. 2019. Available at: https://www.
22. Clarke R. Information technology and
nytimes.com/2019/02/21/business/
dataveillance. Commun ACM. 1988;31(5):
china-xinjiang-uighur-dna-thermo-
498–512. https://doi.org/10.1145/42411.42413
fisher.html. Accessed May 5, 2020.
23. Couldry N, Mejias U. The Costs of
Connection. Palo Alto, CA: Stanford
University Press; 2019. https://doi.org/
10.1515/9781503609754
24. Wong J. The Cambridge Analytica
scandal changed the world but—it
didn’t change Facebook. 2019. Available
at: https://www.theguardian.com/
technology/2019/mar/17/the-
cambridge-analytica-scandal-changed-
the-world-but-it-didnt-change-facebook.
Accessed May 5, 2020.
25. Rocher L, Hendrickx J, de Montjoye
Y. Estimating the success of re-identifications
in incomplete datasets using generative
models. Nat Commun. 2019;10(1):3069.
https://doi.org/10.1038/s41467-019-
10933-3
26. Information Commissioner’s Office.
Data protection and coronavirus. 2020.
Available at: https://www.ico.org.uk/
about-the-ico/news-and-events/news-
and-blogs/2020/03/data-protection-
and-coronavirus. Accessed May 5,
2020.
27. Humphreys S. Legalizing lawlessness:
on Giorgio Agamben’s state of exception.
Eur J Int Law. 2006;17(3):677–687.
https://doi.org/10.1093/ejil/chl020
28. Sears N. The securitization of
COVID-19: three political dilemmas.
2020. Available at: https://www.
globalpolicyjournal.com/blog/25/03/
2020/Securitization-covid-19-three-
political-dilemmas. Accessed May 5,
2020.
29. Fall F. Coronavirus: how to avoid
military responses becoming a double
edged sword. 2020. Available at: https://
theconversation.com/coronavirus-how-
to-avoid-military-responses-becoming-
double-edged-swords-135262. Accessed
July 3, 2020.
30. Johnston J. Matt Hancock says public
has a “duty” to download coronavirus
contact tracing app. 2020. Available at:
https://www.politicshome.com/news/
article/matt-hancock-says-public-have-a-
duty-to-download-coronavirus-contact-
tracing-app. Accessed July 6, 2020.
31. McDonald S. We can’t let the coro-
navirus lead to a 9/11-style erosion of civil

December 2020, Vol 110, No. 12 AJPH Bernard et al. Peer Reviewed Analytic Essay 1785
Reproduced with permission of copyright owner. Further reproduction
prohibited without permission.

You might also like