Quo Vadis Smart Surveillance? How Smart Technologies Combine and Challenge Democratic Oversight

  • Marc Langheinrich
  • Rachel Finn
  • Vlad Coroama
  • David Wright
Chapter

Abstract

“Smart” seems to have become the new standard for surveillance technology. Smart surveillance promises fewer human resources, larger coverage, and higher detection rates. This article examines the roots of this development through the lens of current and emerging technologies. Based on the review and analysis of academic articles, policy documents and reports, press stories and research projects, we identify the different kinds of surveillance technologies prevalent in our society today and those that are emerging in the near future. Our analysis highlights the ways in which both current and emerging technologies are increasingly being organized into assemblages—“smart surveillance” systems where individual surveillance technologies and local systems are becoming integrated, multi-modal, automated, ubiquitous and increasingly accepted by the public. In the process, they challenge notions of consent and democratic oversight.

References

  1. Aaronovitch, David. 2009. The strange case of the surveillance cameras. The Times, 3 Mar 2009. http://www.timesonline.co.uk/tol/comment/columnists/david_aaronovitch/article5834725.ece.
  2. Adkins, Lauren D. 2007. Biometrics: Weighing convenience and national security against your privacy. 2007. Michigan Telecommunications Technology Law Review 13:541–555. http://www.mttlr.org/volthirteen/adkins.pdf.Google Scholar
  3. Andrejevic, Mark. 2005. The work of watching one another: Lateral surveillance, risk, and governance, surveillance & society 2 (4): 479–497 [481]. http://www.surveillance-and-society.org.
  4. Bamford, James. 2009. The shadow factory. New York, Anchor Books, 161–163.Google Scholar
  5. Bauman, Zygmunt, and David Lyon. 2013. Liquid Surveillance. Cambridge: Polity Press, 2–3.Google Scholar
  6. Britannica. Electronic Eavesdropping, Encyclopædia Britannica, 2011. http://www.britannica.com/EBchecked/topic/183788/electronic-eavesdropping.
  7. Clarke, Roger. 1988. Information technology and dataveillance. Communications of the ACM 31 (5): 498–512.CrossRefGoogle Scholar
  8. Clarke, Roger. 1993. Profiling: A hidden challenge to the regulation of data surveillance. Journal of Law and Information Science 4 (2): 403–419.Google Scholar
  9. Clarke, Roger. 2003. Dataveillance—15 years on. Wellington: Privacy Issues Forum, 15–18.Google Scholar
  10. Coroama, Vlad. 2006. The smart tachograph—Individual accounting of traffic costs and its Implications. Proceedings of the 4th International Conference PERVASIVE 2006, Dublin, Ireland, Springer, May 2006, 135–152.Google Scholar
  11. Council of the European Union. 2010. The Stockholm programme—An open and secure Europe serving and protecting citizens, 5731/10, Brussels: 3 March 2010.Google Scholar
  12. Defense Advanced Research Projects Agency (DARPA). 2009. Strategic Plan, May 2009.Google Scholar
  13. Defense Advanced Research Projects Agency, “DARPAʼs S & T Privacy Principles”. http://www.darpa.mil/About/Initiative/DARPA%E2%80%99s_S_T_Privacy_Principles.aspx.
  14. Diffie, Whitfield, and Susan Landau. 2009. Communications surveillance: Privacy and security at risk. Communications of the ACM 52 (11): 42–47.CrossRefGoogle Scholar
  15. Directorate of Airspace Policy. 2010. CAP 722: Unmanned Aircraft System Operations in UK Airspace—Guidance, Civil Aviation Authority, 6 Apr 2010.Google Scholar
  16. European Security Research and Innovation Forum (ESRIF). 2009. Final Report, December 2009, 155. www.esrif.eu.
  17. Fay, Joe. 2005. Dutch give football thugs a good talking to. The Register, 2 Sept 2005. http://www.theregister.co.uk/2005/09/02/dutch_hooligans/.
  18. Finn, Rachel L., and David Wright. 2012. Unmanned aircraft systems: Surveillance, ethics and privacy in civil applications. Computer Law & Security Review, 28 (2): 184–194. http://www.sciencedirect.com/science/journal/02673649.CrossRefGoogle Scholar
  19. Figueiras, J., and S. Frattasi. 2010. Mobile positioning and tracking: From conventional to cooperative techniques. Indianapolis: Wiley.CrossRefGoogle Scholar
  20. Flacy, Mike. 2011. Men build small flying spy drone that cracks Wi-Fi and cell data. Digital trends, 30 July 2011. http://www.digitaltrends.com/mobile/men-build-small-flying-spy-drone-that-cracks-wi-fi-and-cell-data/.
  21. Frawley, W.J., G. Piatetsky-Shapiro, and C. J. Matheus. 1992. Knowledge discovery in databases: An overview. AI Magazine 13 (3): 57–70.Google Scholar
  22. Gardner, Julian W., and Philip N. Bartlett. 1999. Electronic noses: Principles and applications. Oxford: Oxford University Press.Google Scholar
  23. GeneWatch UK. The UK police national DNA database. http://www.genewatch.org/sub-539478.
  24. Goold, Benjamin J. 2009. Surveillance and the political value of privacy. Amsterdam Law Forum 1 (4): 3–6, [5]. http://www.amsterdamlawforum.org/.
  25. Haggerty, Kevin D., and Richard V. Ericson. 2000. The surveillant assemblage. British Journal of Sociology 51 (4): 605–622.Google Scholar
  26. House of Commons Home Affairs Committee. (2007–2008). A Surveillance Society? Fifth Report of Session 2007–2008, Vol. I. London: The Stationery Office Limited, 25.Google Scholar
  27. Introna, Lucas D., and Helen Nissenbaum. 2009. Facial recognition technology: A survey of policy and implementation issues, The Center for Catastrophe Preparedness & Response, New York University. New York: 8 Apr 2009.Google Scholar
  28. Jones, Jeffrey M. 2010. In U.S., air travelers take body scans in stride, Gallup, 11 Jan 2010. http://www.gallup.com/poll/125018/Air-Travelers-Body-Scans-Stride.aspx.
  29. Langheinrich, Marc. 2009. Privacy in ubiquitous computing. In Ubiquitous Computing Fundamentals, ed. J. Krumm, 95–160. Chapman & Hall/CRC Press.Google Scholar
  30. Lee, David. 2010. Using thermal cameras to secure the homeland, photonics.com, Feb 2010. http://www.photonics.com/Article.aspx?AID=40915.
  31. Lyon, David. 2003. Introduction. In Surveillance as social sorting: Privacy, risk, and digital discrimination, In David Lyon, ed. 8. London: Routledge.Google Scholar
  32. Lyon, David. 2008. Biometrics, identification and surveillance. Bioethics 22 (9): 500.CrossRefGoogle Scholar
  33. Lyon, David. 2007. Surveillance Studies: An Overview, 15. Cambridge: Polity.Google Scholar
  34. Marx, Gary T. 2002. Whatʼs new about the ‘New Surveillance’?: Classifying for change and continuity. Surveillance and Society 1 (1): 9–29 [12].Google Scholar
  35. Mathiesen, Thomas. 1997. The viewer society: Michel Foucaultʼs ‘Panoptique’ Revisited. Theoretical Criminology 1 (2): 215–34.CrossRefGoogle Scholar
  36. McBride, Paul. 2009. Beyond orwell: The application of unmanned aircraft systems in domestic surveillance operations. Journal of Air Law and Commerce 74:628.Google Scholar
  37. McCahill, Michael. 2002. The surveillance web: The rise of visual surveillance in an English city. Devon: Willan.Google Scholar
  38. McElroy, Wendy. 2011.Commentary—‘Pre-criminal’ profiling may be coming soon to an airport near you. TriValleyCentral.com, 4 Aug 2011. http://trivalleycentral.com/articles/2011/08/04/florence_reminder_blade_tribune/top_stories/doc4e39b5da387f1946508835.txt.
  39. Mireille Hildebrandt and Serge Gutwirth, eds. 2008. Profiling the European Citizen: crossdisciplinary perspectives. 17–46.CrossRefGoogle Scholar
  40. Naraine, Ryan. 2007. First look: Sentry remote and eBlaster 6.0, PC World. http://www.pcworld.com/article/139460/first_look_sentry_remote_and_eblaster_60.html.
  41. Norris, Clive, and G. Armstrong. 1999. The maximum surveillance society: The rise of CCTV. Oxford: Berg.Google Scholar
  42. Nouwt, Sjaak, Berend R. Vries de, and van der Burgt Dorus. 2005. Camera surveillance and privacy in the Netherlands. Social Studies Research Network, 2. http://ssrn.com/abstract=849205.
  43. Petersen, J.K. 2007. Understanding surveillance technologies: Spy devices, privacy, history & applications (2nd ed.). Auerbach Publications: Boca Raton.Google Scholar
  44. Prevelakis, Vassilis, and Diomidis Spinellis. 2007. The Athens affair. IEEE Spectrum 18–25.Google Scholar
  45. Plungis, Jeff. Naked-image scanners to be removed from U.S. airports. Bloomberg News, 18 Jan 2013. http://www.bloomberg.com/news/2013-01-18/naked-image-scanners-to-be-removed-from-u-s-airports.html.
  46. Polgreen, Lydia. 2011. Scanning 2.4 Billion eyes, India tries to connect poor to growth. The New York Times, 1 September 2011. http://www.nytimes.com/2011/09/02/world/asia/02india.html?_r=1 & src=me & ref=general.
  47. Rothstein, Mark A., and Meghan K. Talbott. 2006. The expanding use of DNA in law enforcement: What role for privacy? Journal of Law, Medicine & Ethics, Summer. 155. http://ssrn.com/abstract=1512746.
  48. Rule, James B. 2007. Privacy in Peril. Oxford University Press, 195.Google Scholar
  49. Savage, Charlie. 2010. U.S. tries to make it easier to wiretap the internet. The New York Times, 27 Sept 2010. http://www.nytimes.com/2010/09/27/us/27wiretap.html?_r=1 & hp.
  50. Schindler, F. 2011. Tumulte in der Zürcher Innenstadt – Polizei mit Grosseinsatz, Tagesanzeiger, 11 September 2011. http://www.tagesanzeiger.ch/panorama/vermischtes/Tumulte-in-der-Zuercher-Innenstadt-Polizei-mit-Grosseinsatz/story/22640435.
  51. ShotSpotter. The ShotSpotter Gunshot Location System. http://www.shotspotter.com/technology.
  52. Spriggs, Argomaniz, et al. 2006. Public attitudes towards CCTV: results from the Pre-intervention public attitude survey carried out in areas implementing CCTV, Home Office Online Report, October 2006, 49.Google Scholar
  53. Stefani, John A. 2006. Finding Waldo. In Privacy and Security Technologies: An Interdisciplinary Conversation, eds. Katherine J. Strandberg and Danela Stan Raicu, 173–188. New York: Springer.Google Scholar
  54. Want, R. 2009. An introduction to ubiquitous computing. In Ubiquitous Computing Fundamentals, ed. J. Krumm, 1–36. Chapman & Hall/CRC Press.Google Scholar
  55. Webster, C. William R. 2009. CCTV policy in the UK: reconsidering the evidence base. Surveillance & Society 6 (1): 10–22. http://www.surveillance-and-society.org.Google Scholar
  56. Wei, Gang, and Dongge Li. 2006. Biometrics: Applications, challenges and the future. In Privacy and Security Technologies: An Interdisciplinary Conversation, eds. Katherine J. Strandburg and Danela Stan Raicu, 135–150. New York: Springer.Google Scholar
  57. Wolfe, Alexander. 2010. Wolfe’s Den: IBM patenting airport security profiling technology. InformationWeek, 19 Jan 2010. http://www.informationweek.com/news/government/security/222301388.
  58. Wright, David, Michael Friedewald, Serge Gutwirth, Marc Langheinrich, et al. 2010. Sorting out smart surveillance. Computer Law & Security Review 26 (4): 343–354.Google Scholar
  59. Zureik, Elia, and Karen Hindle. 2004. Governance, security and technology: The case of biometrics. Studies in Political Economy, Vol. 73, Spring/Summer, 113–137.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  • Marc Langheinrich
    • 1
  • Rachel Finn
    • 2
  • Vlad Coroama
    • 3
  • David Wright
    • 2
  1. 1.Faculty of InformaticsUniversità della Svizzera italiana (USI)LuganoSwitzerland
  2. 2.Trilateral Research & ConsultingCrown HouseLondonUK
  3. 3.Center for Industrial EcologyUniversity of CoimbraCoimbraPortugal

Personalised recommendations