SlideShare a Scribd company logo
1 of 31
Post-Snowden Transparency
Arrangements: the ‘Veillant Panoptic
Assemblage’ & ‘Emotiveillance’
Vian Bakir and Andrew McStay
Bangor University
Wales, UK
Abstract
• We will present insights arising from the ESRC Seminar Series DATA-PSST (Debating
& Assessing Transparency Arrangements -
Privacy, Security, Sur/Sous/Veillance, Trust).
• Vian is interested in how ‘sousveillance’ works across media to challenge official
versions of events and hold power to account in the secretive area of national
security. She is concerned that this potential for resistance is being compromised
by weak civic structures and through the ever-growing surveillant state operating
through what she terms the ‘Veillant Panoptic Assemblage’.
• Andrew is researching how emotions are both being watched by ourselves, and
corporate and governmental actors.
2013 – Snowden Leaks
DATA-PSST!
Debating &
Assessing
Transparency
Arrangements -
Privacy,
Security,
Sur/Sous/Veillance,
Trust
Empathic Media:
Theory-Building and
Knowledge-Exchange
with Industry,
Regulators and NGOs
DATA-PSST!
Debating &
Assessing
Transparency
Arrangements -
Privacy,
Security,
Sur/Sous/Veillance,
Trust
http://data-psst.bangor.ac.uk/
1. Different aspects of transparency
2. How do these affect privacy, security,
surveillance and trust?
3. What different actors think of
existing/desirable transparency
arrangements?
4. Build a typology of transparency types
DATA-PSST!
Transparency has at least 2 dimensions
• degree of citizen control over how visible
they are
• degree of oversight of the surveillant entity
• Bakir, V. & A. McStay. 2015. Assessing Interdisciplinary Academic & Multi-
Stakeholder Positions on Transparency post-Snowden. Ethical Space, 12
(3/4):
http://www.communicationethics.net/espace/index.php?nav=feature
Transparency Type
Citizen Control over Personal
Visibility
Extent of Oversight of
Surveillant Entity
Liberal Transparency High
High (to ensure no unwanted
prying into citizens’lives)
Liberal Translucency High
Socially/ legally agreed
limitations
Radical Translucency
Low (everyone has signed away
their control to maximize social
good)
Socially/ legally agreed
limitations
Radical Transparency
Low (everyone has signed away
their control to maximize social
good)
High (to ensure concurrent citizen
& state/ corporate openness)
Forced Transparency
None (state/corporate-imposed,
secret control)
Insufficient to win social trust
Terminology (Steve Mann)
• Surveillance - monitoring from position of
power by those who are not a participant to
the activity being watched
• Sousveillance - monitoring from position of
minimal power, and by those participating in
the activity being watched
• Veillance - processes of mutual
watching/monitoring by surveillant
organizations & sousveillant individuals.
• Equiveillance - equality between surveillant &
sousveillant forces, or a‘transparent society’.
• https://www.youtube.com/watch?v=z82Zavh-NhI
• wearcam.org/veillance/veillance.pdf
• http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/veillance
Mann’s early sousveillant tech
Sousveillant tech mainstreamed 2000s+
Equiveillance – achieved when …
… veillance infrastructures are extensive
and the power requirements to enact
change from below are marginal.
This type of system would likely protect
whistle-blowers, encourage public fora
and debate, and implement participatory
projects and innovations to the system.
Even the powers of oversight in this
configuration are likely to be seen from
below and subject to evaluation.
(Mann & Ferenbok 2013: 30)
http://www.cogitatiopress.com/ojs/index.php/mediaandcommunication/article/view/277
How healthy are these infrastructures for enacting
change from below?
How healthy are these infrastructures for
enacting change from below?
Equiveillance:
• …. This type of
system would likely
protect whistle-
blowers, …
• Protect whistle-blowers:
• Snowden not technically a
whistleblower - didn’t follow
national security whistleblower
protocols -stranded in Russia
• Obama’s multiple indictments of
national security whistleblowers
under Espionage Act [1917]
• whistle-blowing is discouraged,
channeled & is a weak formal
mechanism to enact change from
below
How healthy are these infrastructures for
enacting change from below?
Equiveillance:
• …This type of
system would
likely …
encourage
public fora and
debate, …
• Encourage public fora & debate
– intelligence agencies manipulate
press via secrecy
• withhold information
• prior constraint
• whistle-blower prosecution
• harass non-compliant press
• self-censorship by journalists
– & propaganda
• spread intelligence-sourced,
disguised, propaganda
• Provide minimal critical reportage of
intel agencies
– MSM weak force for accountability
• http://hij.sagepub.com/content/early/20
15/01/29/1940161214566693.abstract
How healthy are these infrastructures for
enacting change from below?
Equiveillance:
• …This type of system
would likely …
implement
participatory
projects
• implement participatory
projects
• US/UK review groups/oversight boards on intel
agencies’ surveillance consulted wider
legislature & NGOs
• What weight was given to concerns expressed
by these broader voices?
– Eg UK’s Intelligence & Security Committee
presumes to know public opinion but
seems to discount it
– See Public Feeling on Privacy, Security and
Surveillance: A Report by DATA-PSST and
DCSS (Nov 2015)
– weak force for accountability?
How healthy are these infrastructures for
enacting change from below?
Equiveillance:
• …This type of system
would likely implement
…innovations to the
system.
• innovations to the
system
• tech industry campaigns for change
to surveillance & transparency
laws/practices
• Some leading tech companies
implemented end-to-end
encryption
• STRONG accountability mechanism
– intel agencies worry about
internet ‘going dark’
So where are we now (2017)?
• Very far from Mann’s ‘equiveillance’
• protect whistle-blowers – WEAK: discouraged, channeled
• encourage public fora/ debate – WEAK: MSM in thrall to security state.
• participatory projects - WEAK: just for show?
• innovations to the system – STRONG: Neo-liberal corporate activism/branding
So where are we now (2017)?
• Very far from Mann’s ‘equiveillance’
• Instead: a veillant panoptic assemblage
• assemblage – because conducted through the commercial digital networks &
platforms
• panoptic – because re-appropriated by the state for disciplinary purposes
• Veillant - because involves all sorts of directions of watching – sur, sous, & others
Veillance & Transparency
• Artistic/Academic responses
• Veillance:
https://player.vimeo.com/video/193888776?col
or=
• The Snowden Archive-in-a-
Box: A year of travelling
experiments in outreach and
education
• Crowd-Sourced Intelligence
Agency: Prototyping
counterveillance
• Tracing You: How transparent
surveillance reveals a desire
for visibility
• Academic Responses
• Veillance and Transparency: A
Critical Examination of Mutual
Watching in the Post-Snowden,
Big Data Era.
• Special Issue of Big Data &
Society
• Empathic media and advertising:
Industry, policy, legal and citizen
perspectives (the case for intimacy)
Empathic Media:
Emotiveillance, Cities and Security
‘If the technology is there – someone will exploit it.
This was true in Marconi’s time (radio), in Turing’s with
thinking machines, and today.’
David Omand (ex-Head of GCHQ, interview, 2016)
Sentiment analysis, respiration, heart rate, blood flow, facial expressions,
voice, skin conductivity and electroencephalograms (EEG)
Profiling city emotion
Dev’ of intelligence-led policing post-London riots (2012)
OSINT
Funding to engage with social media
Tracking conversations
Emotion/heat maps
Feeling-into groups to gauge probability of trouble and allocate
resources
• VR
Thoughts (beyond thinking that was a lot to take in)
1) What of citizens having emotions profiled,
even if not personal? (THIS IS KEY)
2) What of public servants such as the police –
should they be subject to this? (Yes/no…
why?)
3) If yes, should they this data be made public?
Contact details
• Prof. Vian Bakir
– v.bakir@bangor.ac.uk
– Twitter: @VianBakir1
• Dr Andrew McStay
– mcstay@bangor.ac.uk
– Twitter: @digi_ad

More Related Content

What's hot

2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
Sara-Jayne Terp
 
Geographies of Surveillance
Geographies of SurveillanceGeographies of Surveillance
Geographies of Surveillance
Stephen Graham
 
Crisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyCrisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technology
Anahi Iacucci
 

What's hot (19)

Risk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of ageRisk, SOCs, and mitigations: cognitive security is coming of age
Risk, SOCs, and mitigations: cognitive security is coming of age
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Civic tech for housing and urban development in Johannesburg: what works? Wha...
Civic tech for housing and urban development in Johannesburg: what works? Wha...Civic tech for housing and urban development in Johannesburg: what works? Wha...
Civic tech for housing and urban development in Johannesburg: what works? Wha...
 
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
2021 IWC presentation: Risk, SOCs and Mitigations: Cognitive Security is Comi...
 
2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation2021 12 nyu-the_business_of_disinformation
2021 12 nyu-the_business_of_disinformation
 
Cyberwar and Geopolitics
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
 
Data revolution or data divide? Can social movements bring the human back int...
Data revolution or data divide? Can social movements bring the human back int...Data revolution or data divide? Can social movements bring the human back int...
Data revolution or data divide? Can social movements bring the human back int...
 
Sj terp emerging tech radar
Sj terp emerging tech radarSj terp emerging tech radar
Sj terp emerging tech radar
 
Geographies of Surveillance
Geographies of SurveillanceGeographies of Surveillance
Geographies of Surveillance
 
Social Networks as Information Filters
Social Networks as Information FiltersSocial Networks as Information Filters
Social Networks as Information Filters
 
Civil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods UpgradedCivil Resistance 2.0: 198 Methods Upgraded
Civil Resistance 2.0: 198 Methods Upgraded
 
American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...American life in the midst of crisis: How people are using technology as thei...
American life in the midst of crisis: How people are using technology as thei...
 
Crisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technologyCrisis Mapping and the Middle East: revolutionizing the technology
Crisis Mapping and the Middle East: revolutionizing the technology
 
Future of democracy and civic innovation
Future of democracy and civic innovationFuture of democracy and civic innovation
Future of democracy and civic innovation
 
Shut it down or shape it up? The state of Vietnamese digital media in 2021
Shut it down or shape it up? The state of Vietnamese digital media in 2021Shut it down or shape it up? The state of Vietnamese digital media in 2021
Shut it down or shape it up? The state of Vietnamese digital media in 2021
 
Letter of Intent - Open Society Fellowship
Letter of Intent - Open Society FellowshipLetter of Intent - Open Society Fellowship
Letter of Intent - Open Society Fellowship
 
Digital technology impacts by 2020
Digital technology impacts by 2020Digital technology impacts by 2020
Digital technology impacts by 2020
 
Unintended Consequences: The Internet Regulation
Unintended Consequences: The Internet RegulationUnintended Consequences: The Internet Regulation
Unintended Consequences: The Internet Regulation
 
Corridors of uncertainty submitted
Corridors of uncertainty submittedCorridors of uncertainty submitted
Corridors of uncertainty submitted
 

Similar to Transparency, Veillance and emotiveillance

CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
Aimee Shuck
 
Snowden-final-report-for-publication
Snowden-final-report-for-publicationSnowden-final-report-for-publication
Snowden-final-report-for-publication
Zarte Siempre
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 Presentation
Bruce Forrester
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
andrewdyoung
 
Digital Activism
Digital ActivismDigital Activism
Digital Activism
lootra
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
gkurtz
 

Similar to Transparency, Veillance and emotiveillance (20)

Veillant Media & Emotiveillance
Veillant Media & Emotiveillance  Veillant Media & Emotiveillance
Veillant Media & Emotiveillance
 
Introducing Globaleaks
Introducing GlobaleaksIntroducing Globaleaks
Introducing Globaleaks
 
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and PhishingIncreasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
Increasing Sophistication - The Cyberpsychology of Online Fraud and Phishing
 
Safecast long version oct 2015
Safecast long version oct 2015Safecast long version oct 2015
Safecast long version oct 2015
 
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
Dr. Da-Yu Kao - The Investigation, Forensics, and Governance of ATM Heist Thr...
 
I4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric WachholzI4ADA 2019 - Presentation Cedric Wachholz
I4ADA 2019 - Presentation Cedric Wachholz
 
Cybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generationCybersecurity Strategies - time for the next generation
Cybersecurity Strategies - time for the next generation
 
2007 un dss class before one briefing
2007 un dss class before one briefing2007 un dss class before one briefing
2007 un dss class before one briefing
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
Snowden-final-report-for-publication
Snowden-final-report-for-publicationSnowden-final-report-for-publication
Snowden-final-report-for-publication
 
Script for ICCRTS 2011 Presentation
Script for ICCRTS 2011 PresentationScript for ICCRTS 2011 Presentation
Script for ICCRTS 2011 Presentation
 
If you can't beat em, join em
If you can't beat em, join emIf you can't beat em, join em
If you can't beat em, join em
 
Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...Networks, swarms and policy: what collective intelligence means for policy ma...
Networks, swarms and policy: what collective intelligence means for policy ma...
 
Presentation slides
Presentation slidesPresentation slides
Presentation slides
 
BYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi MaruBYOD: Beating IT's Kobayashi Maru
BYOD: Beating IT's Kobayashi Maru
 
Digital Activism
Digital ActivismDigital Activism
Digital Activism
 
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
 
"Retention & Online Search: How Current Challenges for Privacy Become New Thr...
"Retention & Online Search: How Current Challenges for Privacy Become New Thr..."Retention & Online Search: How Current Challenges for Privacy Become New Thr...
"Retention & Online Search: How Current Challenges for Privacy Become New Thr...
 
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוךמצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
 
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
Digital Citizenship and Surveillance Society: UK State-Media-Citizen Relation...
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 

Transparency, Veillance and emotiveillance

  • 1. Post-Snowden Transparency Arrangements: the ‘Veillant Panoptic Assemblage’ & ‘Emotiveillance’ Vian Bakir and Andrew McStay Bangor University Wales, UK
  • 2. Abstract • We will present insights arising from the ESRC Seminar Series DATA-PSST (Debating & Assessing Transparency Arrangements - Privacy, Security, Sur/Sous/Veillance, Trust). • Vian is interested in how ‘sousveillance’ works across media to challenge official versions of events and hold power to account in the secretive area of national security. She is concerned that this potential for resistance is being compromised by weak civic structures and through the ever-growing surveillant state operating through what she terms the ‘Veillant Panoptic Assemblage’. • Andrew is researching how emotions are both being watched by ourselves, and corporate and governmental actors.
  • 4. DATA-PSST! Debating & Assessing Transparency Arrangements - Privacy, Security, Sur/Sous/Veillance, Trust Empathic Media: Theory-Building and Knowledge-Exchange with Industry, Regulators and NGOs
  • 6. 1. Different aspects of transparency 2. How do these affect privacy, security, surveillance and trust? 3. What different actors think of existing/desirable transparency arrangements? 4. Build a typology of transparency types DATA-PSST!
  • 7. Transparency has at least 2 dimensions • degree of citizen control over how visible they are • degree of oversight of the surveillant entity • Bakir, V. & A. McStay. 2015. Assessing Interdisciplinary Academic & Multi- Stakeholder Positions on Transparency post-Snowden. Ethical Space, 12 (3/4): http://www.communicationethics.net/espace/index.php?nav=feature
  • 8. Transparency Type Citizen Control over Personal Visibility Extent of Oversight of Surveillant Entity Liberal Transparency High High (to ensure no unwanted prying into citizens’lives) Liberal Translucency High Socially/ legally agreed limitations Radical Translucency Low (everyone has signed away their control to maximize social good) Socially/ legally agreed limitations Radical Transparency Low (everyone has signed away their control to maximize social good) High (to ensure concurrent citizen & state/ corporate openness) Forced Transparency None (state/corporate-imposed, secret control) Insufficient to win social trust
  • 9. Terminology (Steve Mann) • Surveillance - monitoring from position of power by those who are not a participant to the activity being watched • Sousveillance - monitoring from position of minimal power, and by those participating in the activity being watched • Veillance - processes of mutual watching/monitoring by surveillant organizations & sousveillant individuals. • Equiveillance - equality between surveillant & sousveillant forces, or a‘transparent society’. • https://www.youtube.com/watch?v=z82Zavh-NhI • wearcam.org/veillance/veillance.pdf • http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/veillance
  • 10. Mann’s early sousveillant tech Sousveillant tech mainstreamed 2000s+
  • 11. Equiveillance – achieved when … … veillance infrastructures are extensive and the power requirements to enact change from below are marginal. This type of system would likely protect whistle-blowers, encourage public fora and debate, and implement participatory projects and innovations to the system. Even the powers of oversight in this configuration are likely to be seen from below and subject to evaluation. (Mann & Ferenbok 2013: 30)
  • 13. How healthy are these infrastructures for enacting change from below? Equiveillance: • …. This type of system would likely protect whistle- blowers, … • Protect whistle-blowers: • Snowden not technically a whistleblower - didn’t follow national security whistleblower protocols -stranded in Russia • Obama’s multiple indictments of national security whistleblowers under Espionage Act [1917] • whistle-blowing is discouraged, channeled & is a weak formal mechanism to enact change from below
  • 14. How healthy are these infrastructures for enacting change from below? Equiveillance: • …This type of system would likely … encourage public fora and debate, … • Encourage public fora & debate – intelligence agencies manipulate press via secrecy • withhold information • prior constraint • whistle-blower prosecution • harass non-compliant press • self-censorship by journalists – & propaganda • spread intelligence-sourced, disguised, propaganda • Provide minimal critical reportage of intel agencies – MSM weak force for accountability • http://hij.sagepub.com/content/early/20 15/01/29/1940161214566693.abstract
  • 15. How healthy are these infrastructures for enacting change from below? Equiveillance: • …This type of system would likely … implement participatory projects • implement participatory projects • US/UK review groups/oversight boards on intel agencies’ surveillance consulted wider legislature & NGOs • What weight was given to concerns expressed by these broader voices? – Eg UK’s Intelligence & Security Committee presumes to know public opinion but seems to discount it – See Public Feeling on Privacy, Security and Surveillance: A Report by DATA-PSST and DCSS (Nov 2015) – weak force for accountability?
  • 16. How healthy are these infrastructures for enacting change from below? Equiveillance: • …This type of system would likely implement …innovations to the system. • innovations to the system • tech industry campaigns for change to surveillance & transparency laws/practices • Some leading tech companies implemented end-to-end encryption • STRONG accountability mechanism – intel agencies worry about internet ‘going dark’
  • 17. So where are we now (2017)? • Very far from Mann’s ‘equiveillance’ • protect whistle-blowers – WEAK: discouraged, channeled • encourage public fora/ debate – WEAK: MSM in thrall to security state. • participatory projects - WEAK: just for show? • innovations to the system – STRONG: Neo-liberal corporate activism/branding
  • 18. So where are we now (2017)? • Very far from Mann’s ‘equiveillance’ • Instead: a veillant panoptic assemblage • assemblage – because conducted through the commercial digital networks & platforms • panoptic – because re-appropriated by the state for disciplinary purposes • Veillant - because involves all sorts of directions of watching – sur, sous, & others
  • 19. Veillance & Transparency • Artistic/Academic responses • Veillance: https://player.vimeo.com/video/193888776?col or= • The Snowden Archive-in-a- Box: A year of travelling experiments in outreach and education • Crowd-Sourced Intelligence Agency: Prototyping counterveillance • Tracing You: How transparent surveillance reveals a desire for visibility • Academic Responses • Veillance and Transparency: A Critical Examination of Mutual Watching in the Post-Snowden, Big Data Era. • Special Issue of Big Data & Society • Empathic media and advertising: Industry, policy, legal and citizen perspectives (the case for intimacy)
  • 20. Empathic Media: Emotiveillance, Cities and Security ‘If the technology is there – someone will exploit it. This was true in Marconi’s time (radio), in Turing’s with thinking machines, and today.’ David Omand (ex-Head of GCHQ, interview, 2016)
  • 21. Sentiment analysis, respiration, heart rate, blood flow, facial expressions, voice, skin conductivity and electroencephalograms (EEG)
  • 22. Profiling city emotion Dev’ of intelligence-led policing post-London riots (2012) OSINT Funding to engage with social media Tracking conversations Emotion/heat maps Feeling-into groups to gauge probability of trouble and allocate resources
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 29.
  • 30. Thoughts (beyond thinking that was a lot to take in) 1) What of citizens having emotions profiled, even if not personal? (THIS IS KEY) 2) What of public servants such as the police – should they be subject to this? (Yes/no… why?) 3) If yes, should they this data be made public?
  • 31. Contact details • Prof. Vian Bakir – v.bakir@bangor.ac.uk – Twitter: @VianBakir1 • Dr Andrew McStay – mcstay@bangor.ac.uk – Twitter: @digi_ad