Abstract
“Smart” seems to have become the new standard for surveillance technology. Smart surveillance promises fewer human resources, larger coverage, and higher detection rates. This article examines the roots of this development through the lens of current and emerging technologies. Based on the review and analysis of academic articles, policy documents and reports, press stories and research projects, we identify the different kinds of surveillance technologies prevalent in our society today and those that are emerging in the near future. Our analysis highlights the ways in which both current and emerging technologies are increasingly being organized into assemblages—“smart surveillance” systems where individual surveillance technologies and local systems are becoming integrated, multi-modal, automated, ubiquitous and increasingly accepted by the public. In the process, they challenge notions of consent and democratic oversight.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Haggerty and Ericson 2000, pp. 605–622.
- 2.
An example for the automation of data collection is given by Diffie and Susan (2009) for the surveillance of communications. The pervasiveness and automation of data analysis can be observed, for example, by means of the profiling technique, which is enabled by data mining: Hildebrandt (2008).
- 3.
Wright et al. (2010).
- 4.
Figueiras and Frattasi (2010).
- 5.
Skyhook.
- 6.
Lee (2010).
- 7.
Naraine (2007).
- 8.
Haggerty and Ericson (2000).
- 9.
Goodchild, Sophie, “Britain becoming a Big Brother society, says data watchdog”, The Independent, 29 April 2007. These numbers have been widely and frequently quoted, however, there has been some controversy about just how many CCTV cameras there are in the UK and how many times a day on average a person in London is caught by CCTV cameras (see Aaronovitch 2009). The source of these “statistics” appears to be Norris and Armstrong (1999).However, Norris and Armstrong say that their numbers are “guesstimates”.
- 10.
Transportation Security Administration, “Advanced Imaging Technology (AIT)”, 2011. http://www.tsa.gov/approach/tech/ait/index.shtm. US airports have installed both millimetre wave and backscatter x-ray scanners. In early 2013, the TSA decided to remove the backscatter scanners, which some had described as equivalent to a strip search. Plungis (2013)
- 11.
Lyon (2008).
- 12.
GeneWatch UK.
- 13.
Polgreen (2011).
- 14.
Clarke (1988).
- 15.
Clarke (2003).
- 16.
Want (2009).
- 17.
Langheinrich (2009).
- 18.
Coroama (2006).
- 19.
Wright et al., op. cit., 2010.
- 20.
Cited from Haggerty and Ericson, op. cit., 2000, p. 606.
- 21.
Bauman (2013).
- 22.
Marx (2002).
- 23.
Mathiesen (1997).
- 24.
Nouwt et al. (2005).
- 25.
Webster and William (2009).
- 26.
Quoted from Aviation Safety Unmanned Aircraft Programme Office, 2008, in McBride (2009).
- 27.
McBride, op. cit., 2009, p. 629. See also Directorate of Airspace Policy (2010).
- 28.
Britannica (2011).
- 29.
Diffie and Landau, op. cit., 2009.
- 30.
Diffie and Landau, op. cit., 2009.
- 31.
These come in numerous flavours, from rather home-brewed devices that can only be used in pairs by both parties and that use unknown, possibly unsafe algorithms (e.g., http://www.pimall.com/nais/voicekeeper.html) to enterprise-scale devices that use state-of-the-art encryption algorithms with a new key for every conversation (e.g., http://www.cisco.com/en/US/products/ps5853/index.html).
- 32.
Prevelakis and Spinellis (2007).
- 33.
Petersen (2007).
- 34.
Gardner and Bartlett (1999).
- 35.
McElroy (2011).
- 36.
Wolfe (2010).
- 37.
Wei and Dongge (2006).
- 38.
Stefani (2006).
- 39.
- 40.
Wei and Li, op. cit., 2006.
- 41.
Adkins (2007).
- 42.
Wei and Li, op. cit., 2006.
- 43.
The Times, “Joyrider, 14, is first tagging guinea pig”, 17 July 2001.
- 44.
Fay (2005).
- 45.
Wei and Li, op. cit., 2006.
- 46.
Strictly speaking, “triangulation” denotes the AOA technique, which measures the angles between the unknown location and several points of reference. Using distances would thus be called ‘trilateration’. The term “triangulation”, however, is commonly used to denote either of the two methods.
- 47.
ShotSpotter, “The ShotSpotter Gunshot Location System”. http://www.shotspotter.com/technology.
- 48.
Clarke (1988).
- 49.
Clarke (2003).
- 50.
Clarke, op. cit., 1988.
- 51.
Ibid.
- 52.
Frawley et al. (1992).
- 53.
Hildebrandt (2008).
- 54.
Hildebrandt, op. cit., 2008.
- 55.
Clarke (1993). A closely related term is “social sorting”. Lyon comments that surveillance is “a means of social sorting. It classifies and categorizes relentlessly, on the basis of various—clear or occluded criteria. It is often, but not always, accomplished by means of remote networked databases whose algorithms enable digital discrimination to take place”. Lyon (2003).
- 56.
The remit of the Article 29 WP is to provide expert advice to policy-makers in relation to data protection in Europe.
- 57.
Lyon, op. cit., 2007.
- 58.
See, for example, Liberty, Liberty’s Evidence to the Home Affairs Committee on the Government’s Identity Card Proposals, Dec 2003.
- 59.
Zureik and Hindle, op. cit., 2004.
- 60.
Zureik and Hindle, op. cit., 2004, p. 123.
- 61.
Rothstein and Talbott (2006).
- 62.
Wei and Li, op. cit., 2006.
- 63.
McCahill (2002).
- 64.
Zureik and Hindle, op. cit., 2004, p. 121.
- 65.
Webster and William (2009).
- 66.
Council of the European Union (2010).
- 67.
Zureik and Hindle, op. cit., 2004.
- 68.
Lyon, op. cit., 2008, p. 503.
- 69.
McCahill, op. cit., 2002.
- 70.
Jones (2010).
- 71.
The complete list of projects funded under the theme security is available at http://cordis.europa.eu/fp7/security/projects_en.html.
- 72.
See the FP7 projects dynamic database developed by the HIDE project and available on the HIDE website at http://www.hideproject.org/references/fp7_projects.html.
- 73.
Information taken from DARPA Financial Year 2012 Budget Estimates, available on the DARPA website.
- 74.
See Defense Advanced Research Projects Agency (DARPA) (2009).
- 75.
Wikipedia explains that the Tooth to Tail Ratio is a military term that refers to the amount of military personnel (“tail”) it takes to supply and support each combat soldier (“tooth”). One of the stated goals of DARPA is increasing the tooth to tail ratio (reducing the amount of logistics and support personnel necessary in proportion to combat personnel without reducing combat effectiveness).
- 76.
E.g., Changing landscape of European liberty and security (CHALLENGE), a project which took place from 2004 to 2008; European liberty and security (ELISE), 2004–2008; Bioethical Implications of Globalisation (BIG), 2002–2006.
- 77.
European Security Research and Innovation Forum (ESRIF) (2009).
- 78.
Defense Advanced Research Projects Agency, “DARPA’s S&T Privacy Principles”.
- 79.
Ibid.
- 80.
For examples of how law enforcement authorities are using drones, see Finn and Wright (2012).
- 81.
See, for example, Recon Robotics.
- 82.
Andrejevic (2005).
- 83.
See, for example, the videos of the “Team Black Sheep”. http://www.team-blacksheep.com/videos
- 84.
Flacy (2011).
- 85.
TomTom, “Real-time traffic information”. http://www.tomtom.com/landing_pages/traffic_solutions/web/
- 86.
European Parliament, “Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system) (2001/2098(INI))”, Rapporteur: Gerhard Schmid, A5–0264/2001, 11 July 2001. http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//NONSGML+REPORT+A5-2001-264+0+DOC+PDF+V0//EN&language=EN. See also Bamford (2009).
- 87.
European Parliament, op. cit.
- 88.
Even so, politicians and law enforcement authorities are pushing the new Internet companies to “co-operate” so that digital communications can be intercepted. See, for example, Savage (2010).
- 89.
As, for example, the organisers of an illegal party recently did in Zurich. See Schindler (2011).
- 90.
Several Home Office studies have found evidence of strong public support for surveillance cameras. One found that “the level of support for CCTV remained high at over 70 % of the sample in all but one area” of the 13 schemes the study had assessed. Other research found that “levels of support for CCTV are high, although it was not clear that respondents were fully informed about how it functioned”. House of Commons Home Affairs Committee (2007–2008). As evidence, the report cites Gill and Spriggs (2005) Assessing the impact of CCTV (London: Home Office Research, Developments and Statistics Directorate, 2005), p. ix; Spriggs, Argomaniz et al (2006).
- 91.
Wright et al., op. cit., 2010, p. 344, n. 3.
- 92.
Goold (2009).
- 93.
The Supreme Court of Canada has stated that “society has come to realize that privacy is at the heart of liberty in a modern state … Grounded in man’s physical and moral autonomy, privacy is essential for the well-being of the individual”. R. v. Dyment (188), 55 D.L.R. (4th) 503 at 513 (S.C.C.).
- 94.
Rule (2007).
- 95.
Ibid.
- 96.
Ibid., p. 196.
References
Aaronovitch, David. 2009. The strange case of the surveillance cameras. The Times, 3 Mar 2009. http://www.timesonline.co.uk/tol/comment/columnists/david_aaronovitch/article5834725.ece.
Adkins, Lauren D. 2007. Biometrics: Weighing convenience and national security against your privacy. 2007. Michigan Telecommunications Technology Law Review 13:541–555. http://www.mttlr.org/volthirteen/adkins.pdf.
Andrejevic, Mark. 2005. The work of watching one another: Lateral surveillance, risk, and governance, surveillance & society 2 (4): 479–497 [481]. http://www.surveillance-and-society.org.
Bamford, James. 2009. The shadow factory. New York, Anchor Books, 161–163.
Bauman, Zygmunt, and David Lyon. 2013. Liquid Surveillance. Cambridge: Polity Press, 2–3.
Britannica. Electronic Eavesdropping, Encyclopædia Britannica, 2011. http://www.britannica.com/EBchecked/topic/183788/electronic-eavesdropping.
Clarke, Roger. 1988. Information technology and dataveillance. Communications of the ACM 31 (5): 498–512.
Clarke, Roger. 1993. Profiling: A hidden challenge to the regulation of data surveillance. Journal of Law and Information Science 4 (2): 403–419.
Clarke, Roger. 2003. Dataveillance—15 years on. Wellington: Privacy Issues Forum, 15–18.
Coroama, Vlad. 2006. The smart tachograph—Individual accounting of traffic costs and its Implications. Proceedings of the 4th International Conference PERVASIVE 2006, Dublin, Ireland, Springer, May 2006, 135–152.
Council of the European Union. 2010. The Stockholm programme—An open and secure Europe serving and protecting citizens, 5731/10, Brussels: 3 March 2010.
Defense Advanced Research Projects Agency (DARPA). 2009. Strategic Plan, May 2009.
Defense Advanced Research Projects Agency, “DARPAʼs S & T Privacy Principles”. http://www.darpa.mil/About/Initiative/DARPA%E2%80%99s_S_T_Privacy_Principles.aspx .
Diffie, Whitfield, and Susan Landau. 2009. Communications surveillance: Privacy and security at risk. Communications of the ACM 52 (11): 42–47.
Directorate of Airspace Policy. 2010. CAP 722: Unmanned Aircraft System Operations in UK Airspace—Guidance, Civil Aviation Authority, 6 Apr 2010.
European Security Research and Innovation Forum (ESRIF). 2009. Final Report, December 2009, 155. www.esrif.eu.
Fay, Joe. 2005. Dutch give football thugs a good talking to. The Register, 2 Sept 2005. http://www.theregister.co.uk/2005/09/02/dutch_hooligans/.
Finn, Rachel L., and David Wright. 2012. Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. Computer Law & Security Review, 28 (2): 184–194. http://www.sciencedirect.com/science/journal/02673649.
Figueiras, J., and S. Frattasi. 2010. Mobile positioning and tracking: From conventional to cooperative techniques. Indianapolis: Wiley.
Flacy, Mike. 2011. Men build small flying spy drone that cracks Wi-Fi and cell data. Digital trends, 30 July 2011. http://www.digitaltrends.com/mobile/men-build-small-flying-spy-drone-that-cracks-wi-fi-and-cell-data/.
Frawley, W.J., G. Piatetsky-Shapiro, and C. J. Matheus. 1992. Knowledge discovery in databases: An overview. AI Magazine 13 (3): 57–70.
Gardner, Julian W., and Philip N. Bartlett. 1999. Electronic noses: Principles and applications. Oxford: Oxford University Press.
GeneWatch UK. The UK police national DNA database. http://www.genewatch.org/sub-539478.
Goold, Benjamin J. 2009. Surveillance and the political value of privacy. Amsterdam Law Forum 1 (4): 3–6, [5]. http://www.amsterdamlawforum.org/.
Haggerty, Kevin D., and Richard V. Ericson. 2000. The surveillant assemblage. British Journal of Sociology 51 (4): 605–622.
House of Commons Home Affairs Committee. (2007–2008). A Surveillance Society? Fifth Report of Session 2007–2008, Vol. I. London: The Stationery Office Limited, 25.
Introna, Lucas D., and Helen Nissenbaum. 2009. Facial recognition technology: A survey of policy and implementation issues, The Center for Catastrophe Preparedness & Response, New York University. New York: 8 Apr 2009.
Jones, Jeffrey M. 2010. In U.S., air travelers take body scans in stride, Gallup, 11 Jan 2010. http://www.gallup.com/poll/125018/Air-Travelers-Body-Scans-Stride.aspx.
Langheinrich, Marc. 2009. Privacy in ubiquitous computing. In Ubiquitous Computing Fundamentals, ed. J. Krumm, 95–160. Chapman & Hall/CRC Press.
Lee, David. 2010. Using thermal cameras to secure the homeland, photonics.com, Feb 2010. http://www.photonics.com/Article.aspx?AID=40915.
Lyon, David. 2003. Introduction. In Surveillance as social sorting: Privacy, risk, and digital discrimination, In David Lyon, ed. 8. London: Routledge.
Lyon, David. 2008. Biometrics, identification and surveillance. Bioethics 22 (9): 500.
Lyon, David. 2007. Surveillance Studies: An Overview, 15. Cambridge: Polity.
Marx, Gary T. 2002. Whatʼs new about the ‘New Surveillance’?: Classifying for change and continuity. Surveillance and Society 1 (1): 9–29 [12].
Mathiesen, Thomas. 1997. The viewer society: Michel Foucaultʼs ‘Panoptique’ Revisited. Theoretical Criminology 1 (2): 215–34.
McBride, Paul. 2009. Beyond orwell: The application of unmanned aircraft systems in domestic surveillance operations. Journal of Air Law and Commerce 74:628.
McCahill, Michael. 2002. The surveillance web: The rise of visual surveillance in an English city. Devon: Willan.
McElroy, Wendy. 2011.Commentary—‘Pre-criminal’ profiling may be coming soon to an airport near you. TriValleyCentral.com, 4 Aug 2011. http://trivalleycentral.com/articles/2011/08/04/florence_reminder_blade_tribune/top_stories/doc4e39b5da387f1946508835.txt.
Mireille Hildebrandt and Serge Gutwirth, eds. 2008. Profiling the European Citizen: crossdisciplinary perspectives. 17–46.
Naraine, Ryan. 2007. First look: Sentry remote and eBlaster 6.0, PC World. http://www.pcworld.com/article/139460/first_look_sentry_remote_and_eblaster_60.html.
Norris, Clive, and G. Armstrong. 1999. The maximum surveillance society: The rise of CCTV. Oxford: Berg.
Nouwt, Sjaak, Berend R. Vries de, and van der Burgt Dorus. 2005. Camera surveillance and privacy in the Netherlands. Social Studies Research Network, 2. http://ssrn.com/abstract=849205.
Petersen, J.K. 2007. Understanding surveillance technologies: Spy devices, privacy, history & applications (2nd ed.). Auerbach Publications: Boca Raton.
Prevelakis, Vassilis, and Diomidis Spinellis. 2007. The Athens affair. IEEE Spectrum 18–25.
Plungis, Jeff. Naked-image scanners to be removed from U.S. airports. Bloomberg News, 18 Jan 2013. http://www.bloomberg.com/news/2013-01-18/naked-image-scanners-to-be-removed-from-u-s-airports.html.
Polgreen, Lydia. 2011. Scanning 2.4 Billion eyes, India tries to connect poor to growth. The New York Times, 1 September 2011. http://www.nytimes.com/2011/09/02/world/asia/02india.html?_r=1 & src=me & ref=general.
Recon Robotics. Recon Scout XT. http://www.reconrobotics.com/products/recon-scout_XT.cfm.
Rothstein, Mark A., and Meghan K. Talbott. 2006. The expanding use of DNA in law enforcement: What role for privacy? Journal of Law, Medicine & Ethics, Summer. 155. http://ssrn.com/abstract=1512746.
Rule, James B. 2007. Privacy in Peril. Oxford University Press, 195.
Savage, Charlie. 2010. U.S. tries to make it easier to wiretap the internet. The New York Times, 27 Sept 2010. http://www.nytimes.com/2010/09/27/us/27wiretap.html?_r=1 & hp.
Schindler, F. 2011. Tumulte in der Zürcher Innenstadt – Polizei mit Grosseinsatz, Tagesanzeiger, 11 September 2011. http://www.tagesanzeiger.ch/panorama/vermischtes/Tumulte-in-der-Zuercher-Innenstadt-Polizei-mit-Grosseinsatz/story/22640435.
ShotSpotter. The ShotSpotter Gunshot Location System. http://www.shotspotter.com/technology.
Skyhook. How it Works. http://www.skyhookwireless.com/howitworks/.
Spriggs, Argomaniz, et al. 2006. Public attitudes towards CCTV: results from the Pre-intervention public attitude survey carried out in areas implementing CCTV, Home Office Online Report, October 2006, 49.
Stefani, John A. 2006. Finding Waldo. In Privacy and Security Technologies: An Interdisciplinary Conversation, eds. Katherine J. Strandberg and Danela Stan Raicu, 173–188. New York: Springer.
Want, R. 2009. An introduction to ubiquitous computing. In Ubiquitous Computing Fundamentals, ed. J. Krumm, 1–36. Chapman & Hall/CRC Press.
Webster, C. William R. 2009. CCTV policy in the UK: reconsidering the evidence base. Surveillance & Society 6 (1): 10–22. http://www.surveillance-and-society.org.
Wei, Gang, and Dongge Li. 2006. Biometrics: Applications, challenges and the future. In Privacy and Security Technologies: An Interdisciplinary Conversation, eds. Katherine J. Strandburg and Danela Stan Raicu, 135–150. New York: Springer.
Wolfe, Alexander. 2010. Wolfe’s Den: IBM patenting airport security profiling technology. InformationWeek, 19 Jan 2010. http://www.informationweek.com/news/government/security/222301388.
Wright, David, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, et al. 2010. Sorting out smart surveillance. Computer Law & Security Review 26 (4): 343–354.
Zureik, Elia, and Karen Hindle. 2004. Governance, security and technology: The case of biometrics. Studies in Political Economy, Vol. 73, Spring/Summer, 113–137.
Acknowledgement
This paper has been prepared based in part on research undertaken in the context of the SAPIENT project (Project number: 261698), funded by the European Commission’s Directorate General Enterprise. The views expressed in this paper are those of the authors alone and are in no way intended to reflect those of the European Commission.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media Dordrecht
About this chapter
Cite this chapter
Langheinrich, M., Finn, R., Coroama, V., Wright, D. (2014). Quo Vadis Smart Surveillance? How Smart Technologies Combine and Challenge Democratic Oversight. In: Gutwirth, S., Leenes, R., De Hert, P. (eds) Reloading Data Protection. Springer, Dordrecht. https://doi.org/10.1007/978-94-007-7540-4_9
Download citation
DOI: https://doi.org/10.1007/978-94-007-7540-4_9
Published:
Publisher Name: Springer, Dordrecht
Print ISBN: 978-94-007-7539-8
Online ISBN: 978-94-007-7540-4
eBook Packages: Humanities, Social Sciences and LawLaw and Criminology (R0)