Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Surveillance And Power


Published on

Presentation for freshman course on surveillance.

  • Be the first to comment

  • Be the first to like this

Surveillance And Power

  1. 1. Evil Surveillance or Surveillance of Evil Week 11 CULT1110 A/Prof Marj Kibby
  2. 2. Discipline & Punishment <ul><li>Eighteenth-century torture: </li></ul><ul><li>the body as the major target of penal repression, </li></ul><ul><li>punishment as a </li></ul><ul><ul><li>public spectacle. </li></ul></ul>
  3. 3. Penal Process <ul><li>Punishment becomes abstract. </li></ul><ul><li>Its effectiveness results from its inevitability, not from its visible intensity. </li></ul><ul><li>The mechanics of punishment changes its mechanisms.  </li></ul><ul><li>A ‘carceral’ culture where discipline is invisible and internalised. </li></ul>
  4. 4. Surveillance <ul><li>Foucault talks of a ‘panoptic modality of power’ </li></ul><ul><li>the use of surveillance as a way to manage and control our ‘bodies’ – our behaviour; our understanding of one another; to establish right versus wrong etc. </li></ul>
  5. 6. Self-surveillance <ul><li>The model of the Panopticon was proposed by Jeremy Bentham in the 18th Century. </li></ul><ul><li>The aim of this penal architecture was for inmates to control their own behaviour thus creating self-surveillance. </li></ul><ul><li>The logic of the panopticon is that it disposes people to monitor their behaviour. </li></ul>
  6. 7. Surveillance <ul><li>Conventional understanding as a hierarchical system of power — snooping, prying and privacy invasion. </li></ul><ul><li>Surveillance — from the French “to watch over” </li></ul>
  7. 8. Surveillance Society <ul><li>The present, not the future. 24/7. </li></ul><ul><li>Loyalty cards </li></ul><ul><li>Electronic tags </li></ul><ul><li>Metadata </li></ul><ul><li>ID and access cards </li></ul><ul><li>Biometrics </li></ul><ul><li>Mobile phones </li></ul><ul><li>CCTV </li></ul><ul><li>Email, web access and status updates </li></ul>
  8. 9. Loyalty cards
  9. 10. Electronic tags
  10. 11. Metadata
  11. 12. ID & Access Cards <ul><li>Assessment via captured data: </li></ul><ul><li>Databases used </li></ul><ul><li>Books borrowed </li></ul><ul><li>Participation in Bb </li></ul><ul><li>Time in student union </li></ul><ul><li>Submission date/time </li></ul><ul><li>Sporting venues used </li></ul><ul><li>Labs and facilities used </li></ul>
  12. 13. Biometrics Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Walt Disney World is the USA's largest single commercial application of biometrics.
  13. 14. Mobile telephony For mobile social networks, texted location information or mobile phone tracking can enable location-based services to enrich social networking. Geolocation on web-based social network services can be IP-based or use hotspot trilateration. Mobile phone tracking tracks the current position of a mobile phone even on the move, by linking the signal strength or weakness to nearby antenna masts.
  14. 15. Surveillance Process <ul><li>Focus on pre-emptive solutions to social problems has had consequences: </li></ul><ul><li>Social sorting. </li></ul><ul><li>Unintentional control. </li></ul><ul><li>Data meshing. </li></ul><ul><li>Blurring of public/private </li></ul>
  15. 16. Social sorting <ul><li>Sorting of the population into different categories. </li></ul>
  16. 17. Unintentional control <ul><li>Efficiency overload: </li></ul><ul><li>Intention to manage efficient and rapid flows of people, goods and information. </li></ul><ul><li>Outcome of reducing </li></ul><ul><li>choice. </li></ul>
  17. 18. Data meshing <ul><li>Partnership arrangements between agencies: </li></ul><ul><li>Boundaries that enhance personal control of information disappear. </li></ul><ul><li>Income, lifestyle, life-stage, personal information, combine to give a </li></ul><ul><li>complete picture of an individual. </li></ul>
  18. 19. Blurring of Public/Private <ul><li>Where state information is available for private use there are concerns about the limits of consent. </li></ul><ul><li>Privatisations of penal system, telecommunications, border </li></ul><ul><li>management, and local security. </li></ul>
  19. 20. CCTV:You Are Being Watched <ul><li>Closed circuit television came to Britain in 1967, when a small tea house in London introduced a basic black and white camera to see if the patrons were taking too many tea cakes. </li></ul><ul><li>40 years on and Britain has more public surveillance cameras than any other country on earth. It’s reckoned that some people are caught on camera 375 times a day. </li></ul>
  20. 22. Surveillance <ul><li>Benefits in catching criminals acknowledged, though debate over prevention of crime. </li></ul><ul><li>Infringement on civil liberties. </li></ul><ul><li>Potential for misuse; </li></ul><ul><ul><li>Inadvertent </li></ul></ul><ul><ul><li>Misguided </li></ul></ul>
  21. 24. Who is watched? <ul><li>Six hundred and ninety eight people were surveilled as of primary concern. </li></ul><ul><li>7% were women </li></ul><ul><li>Over-representation of black youth and the ‘scruffy’ or ‘subcultural’ </li></ul>
  22. 25. Who is watching? <ul><li>Actions based on targets' behaviour or appearance being 'out-of-place' in the operator's 'normative ecology'. </li></ul><ul><li>Thus male on male violence was often reported to police but not violence to women from men they were with. </li></ul><ul><li>So even if surveillance systems are all seeing they are not all knowing. </li></ul>
  23. 26. James Bulger Case <ul><li>The CCTV cameras that caught James Bulger being led away became a chilling indication of a world where surveillance is everywhere but disengaged - a world that sees everything but fails to respond. </li></ul>
  24. 28. Is anyone watching?
  25. 29. Visibility/Invisibility: The Failure of Surveillance <ul><li>Important factors include: </li></ul><ul><li>the visual representation </li></ul><ul><ul><li>of the victim, </li></ul></ul><ul><ul><li>of the perpetrators </li></ul></ul><ul><ul><li>of the crime itself </li></ul></ul><ul><li>These factors both fueled a desire to interpret the crime, but also worked to inhibit any interpretation. </li></ul>
  26. 30. Smart Technology
  27. 31. Peer Surveillance <ul><li>Surveillance as a mutual, horizontal practice. </li></ul><ul><li>Not Big Brother but millions of cameras and recorders in the hands of millions of Little Brothers and Little Sisters. </li></ul>
  28. 32. <ul><li>Speed and breadth of access are the best allies of transparency – the Internet provides both. </li></ul>
  29. 33. Privacy Publicity Buzz
  30. 34. Self-surveillance <ul><li>Impression of privacy. </li></ul><ul><li>Apparently ephemeral. </li></ul><ul><li>Social and cultural capital. </li></ul><ul><li>Empowering exhibitionism </li></ul>
  31. 35. Empowering Exhibitionism <ul><li>By voluntarily revealing very personal details, people claim the right to publish their own lives. </li></ul><ul><li>Visibility becomes a tool of self-empowerment. </li></ul>
  32. 36. Blurring of Boundaries <ul><li>Invisible audiences </li></ul><ul><li>Multiple audiences </li></ul><ul><li>Convergence </li></ul><ul><li>Erosion of privacy </li></ul>
  33. 37. Invisible audiences <ul><li>A Quebec woman on long term sick-leave after a diagnosis of depression, had her benefits cancelled after posting photos of herself on the beach and at a Chippendales’ show on her Facebook profile. </li></ul>
  34. 38. Multiple audiences
  35. 39. Convergence <ul><li>Sites such as Facebook, LinkedIn, MySpace, Wikipedia, digg, delicious, YouTube, and flickr are used for different purposes. </li></ul><ul><li>Like time-lapse video or photographs through a microscope, these images of social networks offer glimpses of everyday life from an unconventional vantage point. </li></ul>
  36. 40. The Evolution of Privacy on Facebook
  37. 41. The Evolution of Privacy on Facebook
  38. 42. The Evolution of Privacy on Facebook
  39. 43. The Evolution of Privacy on Facebook
  40. 44. The Evolution of Privacy on Facebook
  41. 45. The Evolution of Privacy on Facebook
  42. 46. People Sleeping at U of N
  43. 48. Empowering exhibitionism