surveillance and power

48
Evil Surveillance or Surveillance of Evil Week 11 CULT1110 A/Prof Marj Kibby

Upload: marj-kibby

Post on 19-May-2015

1.766 views

Category:

Documents


0 download

DESCRIPTION

Presentation for freshman course on surveillance.

TRANSCRIPT

Page 1: Surveillance And Power

Evil Surveillance or Surveillance of Evil

Week 11 CULT1110

A/Prof Marj Kibby

Page 2: Surveillance And Power

Discipline & Punishment

Eighteenth-century torture:

• the body as the major target of penal repression,

• punishment as a

public spectacle.

Page 3: Surveillance And Power

Penal Process

• Punishment becomes abstract. • Its effectiveness results from its inevitability,

not from its visible intensity.• The mechanics of punishment changes its

mechanisms.  • A ‘carceral’ culture where discipline is

invisible and internalised.

Page 4: Surveillance And Power

Surveillance

Foucault talks of a ‘panoptic modality of power’

• the use of surveillance as a way to manage and control our ‘bodies’ – our behaviour; our understanding of one another; to establish right versus wrong etc.

Page 5: Surveillance And Power
Page 6: Surveillance And Power

Self-surveillance

• The model of the Panopticon was proposed by Jeremy Bentham in the 18th Century.

• The aim of this penal architecture was for inmates to control their own behaviour thus creating self-surveillance.

• The logic of the panopticon is that it disposes people to monitor their behaviour.

Page 7: Surveillance And Power

Surveillance

• Conventional understanding as a hierarchical system of power — snooping, prying and privacy invasion.

• Surveillance — from the French “to watch over”

Page 8: Surveillance And Power

Surveillance Society

The present, not the future. 24/7.• Loyalty cards• Electronic tags• Metadata• ID and access cards• Biometrics• Mobile phones • CCTV• Email, web access and status updates

Page 9: Surveillance And Power

Loyalty cards

Page 10: Surveillance And Power

Electronic tags

Page 11: Surveillance And Power

Metadata

Page 12: Surveillance And Power

ID & Access Cards

Assessment via captured data:

• Databases used

• Books borrowed

• Participation in Bb

• Time in student union

• Submission date/time

• Sporting venues used

• Labs and facilities used

Page 13: Surveillance And Power

Biometrics

Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits.

Walt Disney World is the USA's largest single commercial application of biometrics.

Page 14: Surveillance And Power

Mobile telephony

For mobile social networks, texted location information or mobile phone tracking can enable location-based services to enrich social networking.

Geolocation on web-based social network services can be IP-based or use hotspot trilateration.

Mobile phone tracking tracks the current position of a mobile phone even on the move, by linking the signal strength or weakness to nearby antenna masts.

Page 15: Surveillance And Power

Surveillance Process

Focus on pre-emptive solutions to social problems has had consequences:

• Social sorting.

• Unintentional control.

• Data meshing.

• Blurring of public/private

Page 16: Surveillance And Power

Social sorting

Sorting of the population into different categories.

Page 17: Surveillance And Power

Unintentional control

Efficiency overload:

• Intention to manage efficient and rapid flows of people, goods and information.

• Outcome of reducing

choice.

Page 18: Surveillance And Power

Data meshing

Partnership arrangements between agencies:

• Boundaries that enhance personal control of information disappear.

Income, lifestyle, life-stage, personal information, combine to give a

complete picture of an individual.

Page 19: Surveillance And Power

Blurring of Public/Private

• Where state information is available for private use there are concerns about the limits of consent.

• Privatisations of penal system, telecommunications, border

management, and local security.

Page 20: Surveillance And Power

CCTV:You Are Being Watched

• Closed circuit television came to Britain in 1967, when a small tea house in London introduced a basic black and white camera to see if the patrons were taking too many tea cakes.

• 40 years on and Britain has more public surveillance cameras than any other country on earth. It’s reckoned that some people are caught on camera 375 times a day.

Page 21: Surveillance And Power
Page 22: Surveillance And Power

Surveillance

• Benefits in catching criminals acknowledged, though debate over prevention of crime.

• Infringement on civil liberties.

• Potential for misuse;– Inadvertent– Misguided

Page 23: Surveillance And Power
Page 24: Surveillance And Power

Who is watched?

• Six hundred and ninety eight people were surveilled as of primary concern.

• 7% were women

• Over-representation of black youth and the ‘scruffy’ or ‘subcultural’

Page 25: Surveillance And Power

Who is watching?

• Actions based on targets' behaviour or appearance being 'out-of-place' in the operator's 'normative ecology'.

• Thus male on male violence was often reported to police but not violence to women from men they were with.

• So even if surveillance systems are all seeing they are not all knowing.

Page 26: Surveillance And Power

James Bulger Case

• The CCTV cameras that caught James Bulger being led away became a chilling indication of a world where surveillance is everywhere but disengaged - a world that sees everything but fails to respond.

Page 27: Surveillance And Power
Page 28: Surveillance And Power

Is anyone watching?

Page 29: Surveillance And Power

Visibility/Invisibility: The Failure of Surveillance

Important factors include:

• the visual representation – of the victim,– of the perpetrators – of the crime itself

These factors both fueled a desire to interpret the crime, but also worked to inhibit any interpretation.

Page 30: Surveillance And Power

Smart Technology

Page 31: Surveillance And Power

Peer Surveillance

Surveillance as a mutual, horizontal practice.

Not Big Brother but millions of cameras and recorders in the hands of millions of Little Brothers and Little Sisters.

Page 32: Surveillance And Power

• Speed and breadth of access are the best allies of transparency – the Internet provides both.

Page 33: Surveillance And Power

Privacy Publicity Buzz

Page 34: Surveillance And Power

Self-surveillance

• Impression of privacy.

• Apparently ephemeral.

• Social and cultural capital.

• Empowering exhibitionism

Page 35: Surveillance And Power

Empowering Exhibitionism

• By voluntarily revealing very personal details, people claim the right to publish their own lives.

• Visibility becomes a tool of self-empowerment.

Page 36: Surveillance And Power

Blurring of Boundaries

• Invisible audiences

• Multiple audiences

• Convergence

• Erosion of privacy

Page 37: Surveillance And Power

Invisible audiences

• A Quebec woman on long term sick-leave after a diagnosis of depression, had her benefits cancelled after posting photos of herself on the beach and at a Chippendales’ show on her Facebook profile.

Page 38: Surveillance And Power

Multiple audiences

Page 39: Surveillance And Power

Convergence

Sites such as Facebook, LinkedIn, MySpace, Wikipedia, digg, delicious, YouTube, and flickr are used for different purposes.

• Like time-lapse video or photographs through a microscope, these images of social networks offer glimpses of everyday life from an unconventional vantage point.

Page 40: Surveillance And Power

The Evolution of Privacy on Facebook

Page 41: Surveillance And Power

The Evolution of Privacy on Facebook

Page 42: Surveillance And Power

The Evolution of Privacy on Facebook

Page 43: Surveillance And Power

The Evolution of Privacy on Facebook

Page 44: Surveillance And Power

The Evolution of Privacy on Facebook

Page 45: Surveillance And Power

The Evolution of Privacy on Facebook

Page 46: Surveillance And Power

People Sleeping at U of N

Page 47: Surveillance And Power
Page 48: Surveillance And Power

Empowering exhibitionism