Skip to content

2020

MetadataDetails
Publication Date2021-12-13
JournalSurveillance & Society
AuthorsSacha Molitorisz
InstitutionsUniversity of Technology Sydney
Citations3
AnalysisFull AI Review Included
  • Core Focus: Exploration of the philosophical and jurisprudential challenges of privacy (networked, collective, relational) within a speculative, post-dystopian future society.
  • Setting: A classroom environment post-2030s, following a “data pandemic” and a societal “reset,” where advanced surveillance technologies are historical context.
  • Key Fictional Technology: Use of whole-wall “teachscreens” and “V-rooms” (virtual reality specs) for immersive history education, specifically simulating the year 2020.
  • Social Governance Mechanism: The current system uses “Relational Credits” (RCs) as a reward-only mechanism, contrasting sharply with the abandoned punitive “Global Social Credit Scheme” (GSCS).
  • Pedagogical Method: The teacher (Win) employs simulated data erasure (RC cancellation) and fictional legal exemptions (“teachers’ exemption”) to provoke critical discussion on privacy rights and legal frameworks.
  • Legal Frameworks: The narrative highlights key post-pandemic legislation: the Data Exploitation Act, the Relational Privacy Protection Act, and the Data Dignity Act.
  • Thematic Conclusion: Privacy is presented as a non-binary, subtle concept, analogous to gender fluidity, requiring protection not just by law but by collective understanding and trust.
ParameterValueUnitContext
Teachscreen Time Display13:13Time (HH:MM)Time shown at the start of the class
Student Age (Ari)14YearsAge of the primary student protagonist
Class Size25StudentsTotal number of children in the classroom
History Simulation Target2020YearModule chosen for V-room immersion
Simulation Duration20MinutesTime allocated for the virtual reality exercise
Homework Requirement600WordsLength of the required report on privacy laws
Personal Device SecurityFacepassBiometricProtection method for Win’s personal device (PD)
Surveillance System (Current)RCsCreditsRelational Credit Scheme (reward-based)
Surveillance System (Historical)GSCSSchemeGlobal Social Credit Scheme (punitive, pre-reset)
  1. Virtual Reality Pedagogy (V-rooms): Students engage in history lessons by wearing V-rooms (virtual specs) to access “reconstructed reality” modules (e.g., the 2020 module) for immersive learning.
  2. Interactive Display Interface: The teacher utilizes a whole-wall “teachscreen” navigated via “air-typing” and “air-tapping” hand movements to access and display student data (Relational Credits, family links).
  3. Simulated Data Manipulation: A core teaching method involved the teacher pretending to use a “teachers’ exemption” to erase students’ parents’ Relational Credits, demonstrating the power dynamics inherent in data control.
  4. Biometric Device Security: Personal Devices (PDs) rely on “facepass” protection. The narrative highlights the vulnerability of this system if the facelock is temporarily disabled.
  5. Historical Data Aggregation (GSCS): The abandoned Global Social Credit Scheme (GSCS) methodology involved compiling “every data point” about individuals, friends, and families into a “single database” to generate trustworthiness scores.

(Note: Applications are derived from the fictional technologies and societal structures described in the text.)

  • Advanced Educational Systems: Development and deployment of immersive virtual reality teaching tools (V-rooms) and large-scale interactive display technology (teachscreens) for history and social studies curricula.
  • Digital Identity and Data Governance: Implementation of sophisticated legal frameworks (e.g., Data Exploitation Act, Data Dignity Act) requiring robust compliance and auditing services for personal data management.
  • Social Credit and Incentive Platforms: Design and maintenance of non-punitive, reward-based social systems (Relational Credit Scheme) for managing civic engagement and societal behavior.
  • Biometric Security and Forensics: Development of “facepass” authentication for personal devices (PDs) and specialized IT services for forensic analysis (“sweep her PD for eye-access”) to detect unauthorized data viewing.
  • Fluid Rights and Advocacy Platforms: Support for social movements and infrastructure related to “fluid rights protests,” emphasizing non-binary identity recognition and protection in digital spaces.
View Original Abstract

In this imagined future, a jaded and anxious history teacher takes her fourteen-year-old students on a virtual visit back to 2020. Along the way, 1984 keeps surfacing. The references are both explicit and implicit: the protagonist’s name is Win and her off-stage other half is Julia; the first and last lines are a play on Orwell’s oft-cited opening sentence; and Ari is a fan of David Bowie’s 1984-themed Diamond Dogs album. But whereas Orwell (and Bowie) saw a dystopian future devoid of privacy, Win, Ari, and Jay inhabit a world where Orwell’s vision isn’t an imagined future but a nightmarish past. As a result, however, they have to struggle with issues of trust and vulnerability.