Evil Surveillance or Surveillance of Evil Week 11 CULT1110 A/Prof Marj Kibby
Discipline & Punishment Eighteenth-century torture:  the body as the major target of penal repression, punishment as a  public spectacle.
Penal Process Punishment becomes abstract.  Its effectiveness results from its inevitability, not from its visible intensity. The mechanics of punishment changes its mechanisms.   A ‘carceral’ culture where discipline is invisible and internalised.
Surveillance Foucault talks of a ‘panoptic modality of power’  the use of surveillance as a way to manage and control our ‘bodies’ – our behaviour; our understanding of one another; to establish right versus wrong etc.
 
Self-surveillance The model of the Panopticon was proposed by Jeremy Bentham in the 18th Century. The aim of this penal architecture was for inmates to control their own behaviour thus creating self-surveillance. The logic of the panopticon is that it disposes people to monitor their behaviour.
Surveillance Conventional understanding as a hierarchical system of power — snooping, prying and privacy invasion. Surveillance — from the French “to watch over”
Surveillance Society The present, not the future. 24/7. Loyalty cards Electronic tags Metadata ID and access cards Biometrics Mobile phones  CCTV Email, web access and status updates
Loyalty cards
Electronic tags
Metadata
ID & Access Cards Assessment via captured data: Databases used Books borrowed Participation in Bb Time in student union Submission date/time Sporting venues used Labs and facilities used
Biometrics Biometrics  comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Walt Disney World is the USA's largest single commercial application of biometrics.
Mobile telephony For mobile social networks, texted location information or mobile phone tracking can enable location-based services to enrich social networking. Geolocation on web-based social network services can be IP-based or use hotspot trilateration. Mobile phone tracking  tracks the current position of a mobile phone even on the move, by linking the signal strength or weakness to nearby antenna masts.
Surveillance Process Focus on pre-emptive solutions to social problems has had consequences: Social sorting. Unintentional control. Data meshing. Blurring of public/private
Social sorting Sorting of the population into different categories.
Unintentional control Efficiency overload: Intention to manage efficient and rapid flows of people, goods and information. Outcome of reducing  choice.
Data meshing Partnership arrangements between agencies: Boundaries that enhance personal control of information disappear. Income, lifestyle, life-stage, personal information, combine to give a  complete picture of an individual.
Blurring of Public/Private Where state information is available for private use there are concerns about the limits of consent. Privatisations of penal system, telecommunications, border  management, and local security.
CCTV:You Are Being Watched Closed circuit television came to Britain in 1967, when a small tea house in London introduced a basic black and white camera to see if the patrons were taking too many tea cakes.  40 years on and Britain has more public surveillance cameras than any other country on earth. It’s reckoned that some people are caught on camera 375 times a day.
 
Surveillance Benefits in catching criminals acknowledged, though debate over prevention of crime. Infringement on civil liberties. Potential for misuse; Inadvertent Misguided
 
Who is watched? Six hundred and ninety eight people were surveilled as of primary concern. 7% were women Over-representation of black youth and the ‘scruffy’ or ‘subcultural’
Who is watching? Actions based on targets' behaviour or appearance being 'out-of-place' in the operator's 'normative ecology'.  Thus male on male violence was often reported to police but not violence to women from men they were with.  So even if surveillance systems are all seeing they are not all knowing.
James Bulger Case The CCTV cameras that caught James Bulger being led away became a chilling indication of a world where surveillance is everywhere but disengaged - a world that sees everything but fails to respond.
 
Is anyone watching?
Visibility/Invisibility: The Failure of Surveillance Important factors include:  the visual representation  of the victim, of the perpetrators  of the crime itself These factors both fueled a desire to interpret the crime, but also worked to inhibit any interpretation.
Smart Technology
Peer Surveillance Surveillance as a mutual, horizontal practice. Not  Big Brother  but millions of cameras and recorders in the hands of millions of  Little Brothers  and  Little Sisters.
Speed and breadth of access are the best allies of transparency – the Internet provides both.
Privacy Publicity Buzz
Self-surveillance Impression of privacy. Apparently ephemeral. Social and cultural capital. Empowering exhibitionism
Empowering Exhibitionism By voluntarily revealing very personal details, people claim the right to publish their own lives. Visibility becomes a tool of self-empowerment.
Blurring of Boundaries Invisible audiences Multiple audiences Convergence Erosion of privacy
Invisible audiences A Quebec woman on long term sick-leave after a diagnosis of depression, had her benefits cancelled after posting photos of herself on the beach and at a Chippendales’ show on her Facebook profile.
Multiple audiences
Convergence Sites such as Facebook, LinkedIn, MySpace, Wikipedia, digg, delicious, YouTube, and flickr are used for different purposes. Like time-lapse video or photographs through a microscope, these images of social networks offer glimpses of everyday life from an unconventional vantage point.
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
The Evolution of Privacy on Facebook
People Sleeping at U of N
 
Empowering exhibitionism

More Related Content

PDF
Geographies of Surveillance
DOCX
1984 chip-cathyy
PDF
2021人機互動與科技藝術匯整
PPT
Soft machines and the design of perception
PPT
Privacy with Internet
PDF
Deeper Learning in a Digital World of Possibilities Keynote
PPT
Virtual Worlds and Concrete Codes
PDF
Don't Jump The Meme Shark
Geographies of Surveillance
1984 chip-cathyy
2021人機互動與科技藝術匯整
Soft machines and the design of perception
Privacy with Internet
Deeper Learning in a Digital World of Possibilities Keynote
Virtual Worlds and Concrete Codes
Don't Jump The Meme Shark

Viewers also liked (16)

PDF
lmtp_program
PPTX
Role of law enforcement, si as & others
PPT
DRUG ENFORCEMENT 2
PPT
A Personal And Home Defense Strategy Converted
PPTX
K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)
PPTX
[Challenge:Future] Proactive Counter-Terrorism
PDF
ASIS CCCT Workshop: Wireless Security & Surveillance
PDF
iPhone Apple iOS backdoors attack-points surveillance mechanisms
PPT
Forecasting Technological Change (1)
PDF
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
PPT
Surveillance and Notification of Diseases
PPT
Introduction to Epidemiology and Surveillance
PPTX
Surveillance
PPTX
Surveillance Society
PPTX
Surveillance
PPTX
Surveillance
lmtp_program
Role of law enforcement, si as & others
DRUG ENFORCEMENT 2
A Personal And Home Defense Strategy Converted
K-10714 ABHISHEK(AUTOMOBILE SURVEILLANCE)
[Challenge:Future] Proactive Counter-Terrorism
ASIS CCCT Workshop: Wireless Security & Surveillance
iPhone Apple iOS backdoors attack-points surveillance mechanisms
Forecasting Technological Change (1)
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Surveillance and Notification of Diseases
Introduction to Epidemiology and Surveillance
Surveillance
Surveillance Society
Surveillance
Surveillance

Similar to Surveillance And Power (19)

PDF
Surveillance In 1984
PDF
Digital Surveillance
PDF
2600 v25 n1 (spring 2008)
PDF
Selfies, Surveillance and the Voluntary Panopticon
PDF
Visual monitoring of people in private spaces. From the “Big Brother” to the...
PPTX
Media Information Literacy_ Senior High School
PPTX
Living Information Public Life
PDF
Censorship Persuasive Essay.pdf
PPTX
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
PDF
Privacy Transparency Secrecy - The PRactice April 2017 issue
PPT
The rise of peep culture
PPTX
Oral Presentation - Cyberbullying.pptx
PDF
Civil Resistance 2.0: 198 Methods Upgraded
PDF
005 kaspersky-digital-amnesia-19.6.15
PDF
Should The Government Surveillance Systems Affect Personal...
PDF
Self-Assessment Examples - 46 Samp
PDF
Disruptive Technologies Articles -by Yogesh Malik
PPTX
We Media 10 surveillance 1
PDF
Could COVID-19 Kickstart Surveillance Culture?
Surveillance In 1984
Digital Surveillance
2600 v25 n1 (spring 2008)
Selfies, Surveillance and the Voluntary Panopticon
Visual monitoring of people in private spaces. From the “Big Brother” to the...
Media Information Literacy_ Senior High School
Living Information Public Life
Censorship Persuasive Essay.pdf
מצגת של פרופ' ניב אחיטוב בסמינר בי"ס לחינוך
Privacy Transparency Secrecy - The PRactice April 2017 issue
The rise of peep culture
Oral Presentation - Cyberbullying.pptx
Civil Resistance 2.0: 198 Methods Upgraded
005 kaspersky-digital-amnesia-19.6.15
Should The Government Surveillance Systems Affect Personal...
Self-Assessment Examples - 46 Samp
Disruptive Technologies Articles -by Yogesh Malik
We Media 10 surveillance 1
Could COVID-19 Kickstart Surveillance Culture?

More from Marj Kibby (8)

PPTX
Location based apps and the spatial self
PPTX
Who's read my essay?
PPT
PLEs And CMSs
PPT
Web 2.0
PPT
Flickr And New Media Literacy
PPT
Pathways
PPT
Not Sleeping With The Band
PPT
Hybrid Teaching
Location based apps and the spatial self
Who's read my essay?
PLEs And CMSs
Web 2.0
Flickr And New Media Literacy
Pathways
Not Sleeping With The Band
Hybrid Teaching

Surveillance And Power

  • 1. Evil Surveillance or Surveillance of Evil Week 11 CULT1110 A/Prof Marj Kibby
  • 2. Discipline & Punishment Eighteenth-century torture: the body as the major target of penal repression, punishment as a public spectacle.
  • 3. Penal Process Punishment becomes abstract. Its effectiveness results from its inevitability, not from its visible intensity. The mechanics of punishment changes its mechanisms.  A ‘carceral’ culture where discipline is invisible and internalised.
  • 4. Surveillance Foucault talks of a ‘panoptic modality of power’ the use of surveillance as a way to manage and control our ‘bodies’ – our behaviour; our understanding of one another; to establish right versus wrong etc.
  • 5.  
  • 6. Self-surveillance The model of the Panopticon was proposed by Jeremy Bentham in the 18th Century. The aim of this penal architecture was for inmates to control their own behaviour thus creating self-surveillance. The logic of the panopticon is that it disposes people to monitor their behaviour.
  • 7. Surveillance Conventional understanding as a hierarchical system of power — snooping, prying and privacy invasion. Surveillance — from the French “to watch over”
  • 8. Surveillance Society The present, not the future. 24/7. Loyalty cards Electronic tags Metadata ID and access cards Biometrics Mobile phones CCTV Email, web access and status updates
  • 12. ID & Access Cards Assessment via captured data: Databases used Books borrowed Participation in Bb Time in student union Submission date/time Sporting venues used Labs and facilities used
  • 13. Biometrics Biometrics comprises methods for uniquely recognizing humans based upon one or more intrinsic physical or behavioral traits. Walt Disney World is the USA's largest single commercial application of biometrics.
  • 14. Mobile telephony For mobile social networks, texted location information or mobile phone tracking can enable location-based services to enrich social networking. Geolocation on web-based social network services can be IP-based or use hotspot trilateration. Mobile phone tracking tracks the current position of a mobile phone even on the move, by linking the signal strength or weakness to nearby antenna masts.
  • 15. Surveillance Process Focus on pre-emptive solutions to social problems has had consequences: Social sorting. Unintentional control. Data meshing. Blurring of public/private
  • 16. Social sorting Sorting of the population into different categories.
  • 17. Unintentional control Efficiency overload: Intention to manage efficient and rapid flows of people, goods and information. Outcome of reducing choice.
  • 18. Data meshing Partnership arrangements between agencies: Boundaries that enhance personal control of information disappear. Income, lifestyle, life-stage, personal information, combine to give a complete picture of an individual.
  • 19. Blurring of Public/Private Where state information is available for private use there are concerns about the limits of consent. Privatisations of penal system, telecommunications, border management, and local security.
  • 20. CCTV:You Are Being Watched Closed circuit television came to Britain in 1967, when a small tea house in London introduced a basic black and white camera to see if the patrons were taking too many tea cakes. 40 years on and Britain has more public surveillance cameras than any other country on earth. It’s reckoned that some people are caught on camera 375 times a day.
  • 21.  
  • 22. Surveillance Benefits in catching criminals acknowledged, though debate over prevention of crime. Infringement on civil liberties. Potential for misuse; Inadvertent Misguided
  • 23.  
  • 24. Who is watched? Six hundred and ninety eight people were surveilled as of primary concern. 7% were women Over-representation of black youth and the ‘scruffy’ or ‘subcultural’
  • 25. Who is watching? Actions based on targets' behaviour or appearance being 'out-of-place' in the operator's 'normative ecology'. Thus male on male violence was often reported to police but not violence to women from men they were with. So even if surveillance systems are all seeing they are not all knowing.
  • 26. James Bulger Case The CCTV cameras that caught James Bulger being led away became a chilling indication of a world where surveillance is everywhere but disengaged - a world that sees everything but fails to respond.
  • 27.  
  • 29. Visibility/Invisibility: The Failure of Surveillance Important factors include: the visual representation of the victim, of the perpetrators of the crime itself These factors both fueled a desire to interpret the crime, but also worked to inhibit any interpretation.
  • 31. Peer Surveillance Surveillance as a mutual, horizontal practice. Not Big Brother but millions of cameras and recorders in the hands of millions of Little Brothers and Little Sisters.
  • 32. Speed and breadth of access are the best allies of transparency – the Internet provides both.
  • 34. Self-surveillance Impression of privacy. Apparently ephemeral. Social and cultural capital. Empowering exhibitionism
  • 35. Empowering Exhibitionism By voluntarily revealing very personal details, people claim the right to publish their own lives. Visibility becomes a tool of self-empowerment.
  • 36. Blurring of Boundaries Invisible audiences Multiple audiences Convergence Erosion of privacy
  • 37. Invisible audiences A Quebec woman on long term sick-leave after a diagnosis of depression, had her benefits cancelled after posting photos of herself on the beach and at a Chippendales’ show on her Facebook profile.
  • 39. Convergence Sites such as Facebook, LinkedIn, MySpace, Wikipedia, digg, delicious, YouTube, and flickr are used for different purposes. Like time-lapse video or photographs through a microscope, these images of social networks offer glimpses of everyday life from an unconventional vantage point.
  • 40. The Evolution of Privacy on Facebook
  • 41. The Evolution of Privacy on Facebook
  • 42. The Evolution of Privacy on Facebook
  • 43. The Evolution of Privacy on Facebook
  • 44. The Evolution of Privacy on Facebook
  • 45. The Evolution of Privacy on Facebook
  • 47.