Quo Vadis Smart Surveillance? How Smart Technologies Combine and Challenge Democratic Oversight
- 1.6k Downloads
“Smart” seems to have become the new standard for surveillance technology. Smart surveillance promises fewer human resources, larger coverage, and higher detection rates. This article examines the roots of this development through the lens of current and emerging technologies. Based on the review and analysis of academic articles, policy documents and reports, press stories and research projects, we identify the different kinds of surveillance technologies prevalent in our society today and those that are emerging in the near future. Our analysis highlights the ways in which both current and emerging technologies are increasingly being organized into assemblages—“smart surveillance” systems where individual surveillance technologies and local systems are becoming integrated, multi-modal, automated, ubiquitous and increasingly accepted by the public. In the process, they challenge notions of consent and democratic oversight.
KeywordsActivity Recognition Voice Over Internet Protocol Defense Advance Research Project Agency Gait Recognition Defense Advance Research Project Agency
This paper has been prepared based in part on research undertaken in the context of the SAPIENT project (Project number: 261698), funded by the European Commission’s Directorate General Enterprise. The views expressed in this paper are those of the authors alone and are in no way intended to reflect those of the European Commission.
- Aaronovitch, David. 2009. The strange case of the surveillance cameras. The Times, 3 Mar 2009. http://www.timesonline.co.uk/tol/comment/columnists/david_aaronovitch/article5834725.ece.
- Andrejevic, Mark. 2005. The work of watching one another: Lateral surveillance, risk, and governance, surveillance & society 2 (4): 479–497 . http://www.surveillance-and-society.org.
- Bamford, James. 2009. The shadow factory. New York, Anchor Books, 161–163.Google Scholar
- Bauman, Zygmunt, and David Lyon. 2013. Liquid Surveillance. Cambridge: Polity Press, 2–3.Google Scholar
- Britannica. Electronic Eavesdropping, Encyclopædia Britannica, 2011. http://www.britannica.com/EBchecked/topic/183788/electronic-eavesdropping.
- Clarke, Roger. 1993. Profiling: A hidden challenge to the regulation of data surveillance. Journal of Law and Information Science 4 (2): 403–419.Google Scholar
- Clarke, Roger. 2003. Dataveillance—15 years on. Wellington: Privacy Issues Forum, 15–18.Google Scholar
- Coroama, Vlad. 2006. The smart tachograph—Individual accounting of traffic costs and its Implications. Proceedings of the 4th International Conference PERVASIVE 2006, Dublin, Ireland, Springer, May 2006, 135–152.Google Scholar
- Council of the European Union. 2010. The Stockholm programme—An open and secure Europe serving and protecting citizens, 5731/10, Brussels: 3 March 2010.Google Scholar
- Defense Advanced Research Projects Agency (DARPA). 2009. Strategic Plan, May 2009.Google Scholar
- Defense Advanced Research Projects Agency, “DARPAʼs S & T Privacy Principles”. http://www.darpa.mil/About/Initiative/DARPA%E2%80%99s_S_T_Privacy_Principles.aspx.
- Directorate of Airspace Policy. 2010. CAP 722: Unmanned Aircraft System Operations in UK Airspace—Guidance, Civil Aviation Authority, 6 Apr 2010.Google Scholar
- European Security Research and Innovation Forum (ESRIF). 2009. Final Report, December 2009, 155. www.esrif.eu.
- Fay, Joe. 2005. Dutch give football thugs a good talking to. The Register, 2 Sept 2005. http://www.theregister.co.uk/2005/09/02/dutch_hooligans/.
- Finn, Rachel L., and David Wright. 2012. Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. Computer Law & Security Review, 28 (2): 184–194. http://www.sciencedirect.com/science/journal/02673649.CrossRefGoogle Scholar
- Flacy, Mike. 2011. Men build small flying spy drone that cracks Wi-Fi and cell data. Digital trends, 30 July 2011. http://www.digitaltrends.com/mobile/men-build-small-flying-spy-drone-that-cracks-wi-fi-and-cell-data/.
- Frawley, W.J., G. Piatetsky-Shapiro, and C. J. Matheus. 1992. Knowledge discovery in databases: An overview. AI Magazine 13 (3): 57–70.Google Scholar
- Gardner, Julian W., and Philip N. Bartlett. 1999. Electronic noses: Principles and applications. Oxford: Oxford University Press.Google Scholar
- GeneWatch UK. The UK police national DNA database. http://www.genewatch.org/sub-539478.
- Goold, Benjamin J. 2009. Surveillance and the political value of privacy. Amsterdam Law Forum 1 (4): 3–6, . http://www.amsterdamlawforum.org/.
- Haggerty, Kevin D., and Richard V. Ericson. 2000. The surveillant assemblage. British Journal of Sociology 51 (4): 605–622.Google Scholar
- House of Commons Home Affairs Committee. (2007–2008). A Surveillance Society? Fifth Report of Session 2007–2008, Vol. I. London: The Stationery Office Limited, 25.Google Scholar
- Introna, Lucas D., and Helen Nissenbaum. 2009. Facial recognition technology: A survey of policy and implementation issues, The Center for Catastrophe Preparedness & Response, New York University. New York: 8 Apr 2009.Google Scholar
- Jones, Jeffrey M. 2010. In U.S., air travelers take body scans in stride, Gallup, 11 Jan 2010. http://www.gallup.com/poll/125018/Air-Travelers-Body-Scans-Stride.aspx.
- Langheinrich, Marc. 2009. Privacy in ubiquitous computing. In Ubiquitous Computing Fundamentals, ed. J. Krumm, 95–160. Chapman & Hall/CRC Press.Google Scholar
- Lee, David. 2010. Using thermal cameras to secure the homeland, photonics.com, Feb 2010. http://www.photonics.com/Article.aspx?AID=40915.
- Lyon, David. 2003. Introduction. In Surveillance as social sorting: Privacy, risk, and digital discrimination, In David Lyon, ed. 8. London: Routledge.Google Scholar
- Lyon, David. 2007. Surveillance Studies: An Overview, 15. Cambridge: Polity.Google Scholar
- Marx, Gary T. 2002. Whatʼs new about the ‘New Surveillance’?: Classifying for change and continuity. Surveillance and Society 1 (1): 9–29 .Google Scholar
- McBride, Paul. 2009. Beyond orwell: The application of unmanned aircraft systems in domestic surveillance operations. Journal of Air Law and Commerce 74:628.Google Scholar
- McCahill, Michael. 2002. The surveillance web: The rise of visual surveillance in an English city. Devon: Willan.Google Scholar
- McElroy, Wendy. 2011.Commentary—‘Pre-criminal’ profiling may be coming soon to an airport near you. TriValleyCentral.com, 4 Aug 2011. http://trivalleycentral.com/articles/2011/08/04/florence_reminder_blade_tribune/top_stories/doc4e39b5da387f1946508835.txt.
- Naraine, Ryan. 2007. First look: Sentry remote and eBlaster 6.0, PC World. http://www.pcworld.com/article/139460/first_look_sentry_remote_and_eblaster_60.html.
- Norris, Clive, and G. Armstrong. 1999. The maximum surveillance society: The rise of CCTV. Oxford: Berg.Google Scholar
- Nouwt, Sjaak, Berend R. Vries de, and van der Burgt Dorus. 2005. Camera surveillance and privacy in the Netherlands. Social Studies Research Network, 2. http://ssrn.com/abstract=849205.
- Petersen, J.K. 2007. Understanding surveillance technologies: Spy devices, privacy, history & applications (2nd ed.). Auerbach Publications: Boca Raton.Google Scholar
- Prevelakis, Vassilis, and Diomidis Spinellis. 2007. The Athens affair. IEEE Spectrum 18–25.Google Scholar
- Plungis, Jeff. Naked-image scanners to be removed from U.S. airports. Bloomberg News, 18 Jan 2013. http://www.bloomberg.com/news/2013-01-18/naked-image-scanners-to-be-removed-from-u-s-airports.html.
- Polgreen, Lydia. 2011. Scanning 2.4 Billion eyes, India tries to connect poor to growth. The New York Times, 1 September 2011. http://www.nytimes.com/2011/09/02/world/asia/02india.html?_r=1 & src=me & ref=general.
- Recon Robotics. Recon Scout XT. http://www.reconrobotics.com/products/recon-scout_XT.cfm.
- Rothstein, Mark A., and Meghan K. Talbott. 2006. The expanding use of DNA in law enforcement: What role for privacy? Journal of Law, Medicine & Ethics, Summer. 155. http://ssrn.com/abstract=1512746.
- Rule, James B. 2007. Privacy in Peril. Oxford University Press, 195.Google Scholar
- Savage, Charlie. 2010. U.S. tries to make it easier to wiretap the internet. The New York Times, 27 Sept 2010. http://www.nytimes.com/2010/09/27/us/27wiretap.html?_r=1 & hp.
- Schindler, F. 2011. Tumulte in der Zürcher Innenstadt – Polizei mit Grosseinsatz, Tagesanzeiger, 11 September 2011. http://www.tagesanzeiger.ch/panorama/vermischtes/Tumulte-in-der-Zuercher-Innenstadt-Polizei-mit-Grosseinsatz/story/22640435.
- ShotSpotter. The ShotSpotter Gunshot Location System. http://www.shotspotter.com/technology.
- Skyhook. How it Works. http://www.skyhookwireless.com/howitworks/.
- Spriggs, Argomaniz, et al. 2006. Public attitudes towards CCTV: results from the Pre-intervention public attitude survey carried out in areas implementing CCTV, Home Office Online Report, October 2006, 49.Google Scholar
- Stefani, John A. 2006. Finding Waldo. In Privacy and Security Technologies: An Interdisciplinary Conversation, eds. Katherine J. Strandberg and Danela Stan Raicu, 173–188. New York: Springer.Google Scholar
- Want, R. 2009. An introduction to ubiquitous computing. In Ubiquitous Computing Fundamentals, ed. J. Krumm, 1–36. Chapman & Hall/CRC Press.Google Scholar
- Wei, Gang, and Dongge Li. 2006. Biometrics: Applications, challenges and the future. In Privacy and Security Technologies: An Interdisciplinary Conversation, eds. Katherine J. Strandburg and Danela Stan Raicu, 135–150. New York: Springer.Google Scholar
- Wolfe, Alexander. 2010. Wolfe’s Den: IBM patenting airport security profiling technology. InformationWeek, 19 Jan 2010. http://www.informationweek.com/news/government/security/222301388.
- Wright, David, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, et al. 2010. Sorting out smart surveillance. Computer Law & Security Review 26 (4): 343–354.Google Scholar
- Zureik, Elia, and Karen Hindle. 2004. Governance, security and technology: The case of biometrics. Studies in Political Economy, Vol. 73, Spring/Summer, 113–137.Google Scholar