Skip to main content

Introduction: Twists and Turns? From Analogue to Digital Surveillance

  • Chapter
  • First Online:
Digital Surveillance in Southern Africa
  • 180 Accesses

Abstract

The talk of the existence of ‘Big Brother’ in the lives of ordinary people is something that is often discussed in mainstream literature as a distant occurrence. It is often associated with “the state and its agencies exspressing their overreach tendencies through intelligence and policies strategies” (Lyon & Murakami Wood, 2020). It is also presented in very abstract terms in its manifestation and material consequences. It is framed as if it only targsets terrorists or in lay man’s terms ‘the enemies of the state’. This ‘watching over’ of individuals and collectives is meant to control, discipline and sort information and behaviours. It is synonymous with the tracking and monitoring of the activities of what some loosely call ‘problematic elements’ in society. Such a stereotypical representation of surveillance is problematic on many fronts. It simplifies a very complex societal phenomenon with disproportionate consequences on individual and collective rights. It obfuscates the invasive and intrusive nature of surveillance in contemporary societies. It ignores the ‘everydayness’ of this unprecedented and pervasive ‘watching over’. It normalizes surveillance activities of the state and corporate entities in an environment where the infrastructure for monitoring and tracking actors and actants in everyday life has become pervasive and relatively cheaper to acquire and deploy. In most cases, the idea of the Fourth Industrial Revolution (4IR) is sold to many of us in colourful and enticing ways. Unfortunately, what is obfuscated from this technological solutionistic narrative is that automation, datafication of society and robotization of social processes unintentionally promote invasive surveillance practices and cultures. These surveillance practices impact negatively on the enjoyment of the right to privacy as enshrined in national constitutional, regional instruments and international model laws.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 129.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The 4IR is characterized by a range of new technologies that are fusing the physical, digital and biological worlds, impacting all disciplines, economies and industries, and even challenging ideas about what it means to be human (Schwab, 2016).

  2. 2.

    http://www.lemonde.fr/afrique/article/2018/01/26/a-addis- abeba-le-siege-de-l-union-africaine-espionne-par-les-chinois_5247521_3212.html.

  3. 3.

    Surveillance refers to “any collection and processing of personal data, whether identifiable or not, for the purpose of influencing or managing those whose data have been garnered” (Lyon, 2001a, p. 1). At the core of this definition is the acknowledgement that surveillance involves power. It involves the collection of information for the purposes of “influencing or managing” some individual or group. Another important aspect is that surveillance is relational, involving a power dynamic likely to unfold in complicated ways.

  4. 4.

    It refers to those assets (online or offline), networks, systems, processes, information and functions that are vital for the maintenance of vital societal functions, health, safety, security, economic or social well-being of people, and the disruption or destruction of which would have serious consequences.

  5. 5.

    This refers to “the use of technical means to extract or create personal data” (Marx, 2002, p. 12).

  6. 6.

    This refers to colonial practices and cultures in the digital space, where Big Tech corporations from the global North exploit resources from the Global South in ways that mimic traditional colonialism.

  7. 7.

    AI is a set of theories, approaches, methods and applications—such as machine learning, deep learning and neural networks—increasingly used in many aspects of computing and everyday life.

  8. 8.

    To consider surveillance as social sorting is to focus on the social and economic categories and the computer codes by which personal data is organized with a view to influencing and managing people and populations.

  9. 9.

    Metadata can include the length of phone calls, the phone numbers of the caller and the recipient, the serial numbers of the devices used and sometimes the locations of those who made the call. It consists of information about who phone users call, when they call and for how long.

  10. 10.

    Resistance can take many forms. It incorporates varying notions of action, interaction, opposition, awareness and power. It has four consistent properties: its interactional nature, the central role of power, how the concept of resistance is socially constructed and the complex nature of resistance.

  11. 11.

    Sousveillance is ‘watching from below,’ a form of inverse surveillance in which people monitor the surveillors. It includes citizen video, watchdog web sites or the monitoring of authorities (corporations, military and government). It also embraces the idea of transparency as an antidote to concentrated power in the hands of surveillers.

References

  • Albrechtslund, A. (2008). Online Social Networking as Participatory Surveillance. First Monday, 13(3). https://doi.org/10.5210/fm.v13i3.2142

  • Amnesty International. (2021). Forensic Methodology Report: How to Catch NSO Group’s Pegasus. Amnesty International. https://www.amnesty.org/en/documents/doc10/4487/2021/en/

    Google Scholar 

  • Andrejevic, M. (2007). iSpy: Surveillance and Power in the Interactive Era. University Press of Kansas.

    Google Scholar 

  • Babbie, E., & Mouton, J. (2001). The Practice of Social Research. Oxford University Press: Cape Town.

    Google Scholar 

  • Bakir, V. (2015). ‘Veillant Panoptic Assemblage’: Mutual Watching and Resistance to Mass Surveillance after Snowden. Media and Communication, 3(3), 12–25.

    Article  Google Scholar 

  • Balule, T. B. (2022). Surveillance of Digital Communications in Botswana: An Assessment of the Regulatory Legal Framework. Media Policy and Democracy Project. https://www.mediaanddemocracy.com/uploads/1/6/5/7/16577624/botswana_report.pdf

  • Bauman, Z. (2000). Liquid Modernity. Polity Press.

    Google Scholar 

  • Bauman, Z., & Lyon, D. (2013). Liquid Surveillance: A Conversation. Polity Press.

    Google Scholar 

  • Bayat, A. (2009). Life as Politics: How Ordinary People Change the Middle East. Stanford University Press.

    Google Scholar 

  • Bogard, W. (2006). Surveillance Assemblages and Lines of Flight. In D. Lyon (Ed.), Theorising Surveillance: The Panopticon and Beyond. Willan Publishing.

    Google Scholar 

  • Boyne, R. (2000). Post-Panopticism. Economy and Society, 29(2), 285–307.

    Article  Google Scholar 

  • Braman, S. (2006). Change of State: Information, Policy, and Power. MIT Press.

    Google Scholar 

  • Browne, S. (2015). Dark Matters: On the Surveillance of Blackness. Duke University Press.

    Book  Google Scholar 

  • Bryman, A. (1988). Quantity and Quality in Social Research. Routledge.

    Google Scholar 

  • Byrum, G., & Benjamin, R. (2022). Disrupting the Gospel of Tech Solutionism to Build Tech Justice. Stanford Social Innovation Review. https://ssir.org/articles/entry/disrupting_the_gospel_of_tech_solutionism_to_build_tech_justice#

  • Caluya, G. (2010). The Post-panoptic Society? Reassessing Foucault in Surveillance Studies. Social Identities, 16(5), 621–633.

    Article  Google Scholar 

  • Chiumbu, S. H. (2022). Chinese Digital Infrastructure, Smart Cities and Surveillance in Zambia. Media Policy and Democracy Project. https://www.mediaanddemocracy.com/uploads/1/6/5/7/16577624/zambia_report.pdf

  • CIVICUS. (2020). State of Civil Society Report 2020. CIVICUS. https://www.civicus.org/index.php/state-of-civil-society-report-2020

  • Clarke, R. (1988). Information Technology and Dataveillance. Communications of the ACM, 31(5), 498–512.

    Article  Google Scholar 

  • Coleman, R., & McCahill, M. (2011a). Surveillance & Crime. Sage.

    Google Scholar 

  • Coleman, R., & McCahill, M. (2011b). Surveillance & Crime: Key Approaches to Criminology. SAGE Publications.

    Google Scholar 

  • Couldry, N., & Mejias, U. A. (2019). The Costs of Connection: How Data Is Colonizing Human Life and Appropriating it for Capitalism. Stanford University Press.

    Google Scholar 

  • Dahir, A. L. (2018, January 30). China “Gifted” the African Union a Headquarters Building and Then Allegedly Bugged it for State Secrets. Retrieved May 6, 2022, from https://qz.com/africa/1192493/chinaspied-on-african-union-headquarters-for-five-years/

  • Davenport, C. (2005). Understanding Covert Repressive Action: The Case of the U.S. Government Against the Republic of New Africa. The Journal of Conflict Resolution, 49(1), 120–140.

    Article  Google Scholar 

  • Deleuze, G., & Guattari, F. (2000). Anti-Oedipus: Capitalism and Schizophrenia. Minneapolis: University of Minnesota Press.

    Google Scholar 

  • Della Porta, D. (1995). Social Movements, Political Violence, and the State: A Comparative Analysis of Italy and Germany (Cambridge Studies in Comparative Politics). Cambridge University Press.

    Book  Google Scholar 

  • Dencik, L. (2015). The Advent of Surveillance Realism. JOMEC@Cardiff University. http://www.jomec.co.uk/blog/the-advent-ofsurveillance-realism-2/

  • Dencik, L., Jansen, F., & Metcalfe, P. (2018, August 30). A Conceptual Framework for Approaching Social Justice in an Age of Dataficaton. Data Justice Project. https://datajusticeproject.net/2018/08/30/a-conceptual-framework-for-approaching-social-justice-in-an-age-of-datafication/

  • Duncan, J. (2014). The Rise of the Securocrats: The Case of South Africa. Jacana Media.

    Google Scholar 

  • Duncan, J. (2016a). Protest Nation: The Right to Protest in South Africa. University of KwaZulu-Natal Press.

    Google Scholar 

  • Duncan, J. (2016b). Putting Political Economy Back into Struggles Against Communications Surveillance: Lessons from South Africa. Paper produced for the ‘Memory, commemoration and communication’ IAMCR 2016 Conference in Leicester, UK, July 27–31.

    Google Scholar 

  • Duncan, J. (2018). Stopping the Spies: Constructing and Resisting the Surveillance State in South Africa. Wits University Press.

    Book  Google Scholar 

  • Duncan, J. (2022). National Security Surveillance in Southern Africa: An Anti-Capitalist Perspective. Zed Books.

    Book  Google Scholar 

  • Ekdale, B., & Tully, M. (2019). African Elections as a Testing Ground: Comparing Coverage of Cambridge Analytica in Nigerian and Kenyan Newspapers. African Journalism Studies, 40(4), 27–43.

    Article  Google Scholar 

  • Feldstein, S. (2019, September, 17). The Global Expansion of AI Surveillance. Carnegie Endowment for International Peace. https://carnegieendowment.org/2019/09/17/global-expansion-of-ai-surveillance-pub-79847

  • Fernandez, L. A., & Huey, L. (2009). Editorial. Is Resistance Futile? Thoughts on Resisting Surveillance. Surveillance & Society, 6(3), 198–202.

    Article  Google Scholar 

  • Fidler, D. P. (Ed.). (2015). The Snowden Reader. Indiana University Press.

    Google Scholar 

  • Foucault, M. (1979). Discipline and Punish. Vintage.

    Google Scholar 

  • Fraser, N. (2001). Recognition Without Ethics? Theory, Culture & Society, 18, 21–42.

    Article  Google Scholar 

  • Fraser, N. (2008). Scales of Justice: Reimagining Political Space in a Globalizing World. Polity.

    Google Scholar 

  • Freedom House. (2018). Freedom on the Net 2018: The Rise of Digital Authoritarianism. Freedom House. https://freedomhouse.org/report/freedom-net/2018/rise-digital-authoritarianism

  • Freedom House. (2021). Freedom in the World 2021: Democracy under Siege. Freedom House. https://freedomhouse.org/report/freedom-world/2021/democracy-under-siege

  • Gandy, O. (1993). The Panoptic Sort: A Political Economy of Personal Information. Westview Press.

    Google Scholar 

  • Geertz, C. (1973). Thick Description: Toward an Interpretive Theory of Culture. The Interpretation of Cultures: Selected Essays. Basic Books.

    Google Scholar 

  • Geesin, B. (2012). Resistance to Surveillance in Everyday Life. PhD thesis, University of York.

    Google Scholar 

  • Giddens, A. (1984). The Constitution of Society. Outline of the Theory of Structuration. University of California Press.

    Google Scholar 

  • Giddens, A. (1985). The Nation State and Violence. Volume Two of a Contemporary Critique of Historical Materialism. Polity Press.

    Google Scholar 

  • Gillham, B. (2000). The Research Interview. Continuum.

    Google Scholar 

  • Gilliom, J. (2001). Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy. University of Chicago Press.

    Google Scholar 

  • Gilliom, J., & Monahan, T. (2012). Everyday Resistance. In K. Ball, K. Haggerty, & D. Lyon (Eds.), Routledge Handbook of Surveillance Studies (pp. 405–412). Routledge.

    Google Scholar 

  • Graham, S., & Murakami Wood, D. (2003). Digitizing Surveillance: Categorization, Space, Inequality. Acoustics, Speech and Signal Processing Newsletter, IEEE, 23(2), 227–248.

    Google Scholar 

  • Greenwald, G. (2014). No Place to Hide: Edward Snowden, the NSA and the US Surveillance State. Metropolitan Books.

    Google Scholar 

  • Grinyer, A. (2002). The Anonymity of Research Participants: Assumptions, Ethics and Practicalities. Social Research Update. 36. University of Surry. www.soc.surrey.ac.uk/sru/SRU36.htm

  • Guillemin, M., & Gillam, L. (2004). Ethics, Reflexivity, and “Ethically Important Moments” Research. Qualitative Inquiry, 10(2), 261–280.

    Article  Google Scholar 

  • Haggerty, K. D. (2006). Tear Down the Walls: On Demolishing the Panopticon. Routledge.

    Google Scholar 

  • Haggerty, K. D., & Ericson, R. V. (2000). The Surveillant Assemblage. British Journal of Sociology, 51(4), 605–622.

    Article  Google Scholar 

  • Haggerty, K. D., & Ericson, R. V. (2006). The New Politics of Surveillance and Visibility. Toronto University Press.

    Google Scholar 

  • Handler, J. F. (1992). Presidential Address: Postmodernism, Protest, and the New Social Movements. Law and Society Review, 26(4), 697–732.

    Article  Google Scholar 

  • Haynes, D., & Prakash, G. (Eds). (1991). Contesting Power: Resistance and Everyday Social Relations in South Asia. Oxford University Press, New Delhi.

    Google Scholar 

  • Hintz, L., Dencik, L., & Wahl-Jorgensen, K. (2018). Digital Citizenship in a Datafied Society. Wiley and Sons.

    Google Scholar 

  • Human Rights Watch. (2014). With Liberty to Monitor All: How Large-Scale US Surveillance Is Harming Journalism, Law and American Democracy. Human Rights Watch.

    Google Scholar 

  • Hunter, M. (2020). Cops and Call Records: Policing and Metadata Privacy in South Africa, Media Policy and Democracy Project, Johannesburg, 12. http://mediaanddemocracy.com/

  • Hunter, M., & Mare, A. (2020). Patchwork for Privacy: Communication Surveillance in Southern Africa. https://archive.org/details/patchwork-for-privacy-communication-surveillance-in-southern-africa/page/n1/mode/2up

  • Introna, L. D., & Murakami Wood, D. (2002). Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems. Surveillance & Society, 2(2/3), 177–198.

    Article  Google Scholar 

  • Jili, B. (2020, December 11). The Spread of Surveillance Technology in Africa Stirs Security Concerns. Africa Centre for Strategic Studies. https://africacenter.org/spotlight/surveillance-technology-in-africa-security-concerns/

  • Kaiser, K. (2009a). Protecting Respondent Confidentiality in Qualitative Research. www.ncbi.nlm.nih.gov

  • Kaiser, K. (2009b). Protecting Respondent Confidentiality in Qualitative Research. Qualitative Health Research, 19(11), 1632–1641.

    Article  Google Scholar 

  • Karekwaivanane, G., & Msonza, N. (2021). Zimbabwe Digital Rights Landscape Report. In T. Roberts (Ed.), Digital Rights in Closing Civic Space: Lessons from Ten African Countries. Institute of Development Studies. https://doi.org/10.19088/IDS.2021.006

    Chapter  Google Scholar 

  • Kvale, S. (1996). Interviews: An Introduction to Qualitative Research Interviewing. Sage.

    Google Scholar 

  • Kwet, M. (2019). Digital Colonialism: US Empire and the New Imperialism in the Global South. Race & Class, 60(4), 3–26.

    Article  Google Scholar 

  • Kwet, M. (2020). Surveillance in South Africa: From Skin Branding to Digital Colonialism. In J. Vagle & M. Kwet (Eds.), The Cambridge Handbook of Race and Surveillance. Cambridge University Press.

    Google Scholar 

  • Lee, D. (2019). WhatsApp Discovers ‘Targeted’ Surveillance Attack. Retrieved May 7, 2022, from https://www.bbc.com/news/technology-48262681

  • Lichbach, M. I. (1987). Deterrence or Escalation? The Puzzle of Aggregate Studies of Repression and Dissent. Journal of Conflict Resolution, 31, 266–297.

    Article  Google Scholar 

  • Links, F. (2018a, February 16). The Rise of the Namibian Surveillance State (Part I). The Namibian.

    Google Scholar 

  • Links, F. (2018b, March 2). Surveillance Overreach: The Rise of the Namibian Surveillance State (Part II). The Namibian.

    Google Scholar 

  • Links, F. (2018c, March 15). The Rise of the Namibian Surveillance State (Part 3). The Namibian.

    Google Scholar 

  • Loftus, B., & Goold, B. (2012). Covert Surveillance and the Invisibilities of Policing. Criminology and Criminal Justice, 12(3), 275–288.

    Article  Google Scholar 

  • Lyon, D. (1994). The Electronic Eye: The Rise of Surveillance Society. University of Minnesota Press.

    Google Scholar 

  • Lyon, D. (2001a). Surveillance Society. Open University Press.

    Google Scholar 

  • Lyon, D. (2001b). Surveillance Society: Monitoring Everyday Life. Open University Press.

    Google Scholar 

  • Lyon, D. (2003a). Surveillance after September 11 (p. 36). Polity Press.

    Google Scholar 

  • Lyon, D. (2003b). Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination. Routledge.

    Google Scholar 

  • Lyon, D. (Ed.). (2006). Theorising Surveillance: The Panopticon and Beyond. Willan Publishing.

    Google Scholar 

  • Lyon, D. (2010a). Liquid Surveillance: The Contribution of Zygmunt Bauman to Surveillance Studies. International Political Sociology, 4, 325–338.

    Article  Google Scholar 

  • Lyon, D. (2010b). Surveillance, Power and Everyday Life. In P. Kalantzis-Cope & K. Cherab-Martin (Eds.), Emerging Digital Spaces in Contemporary Society (pp. 107–120). Palgrave Macmillan.

    Chapter  Google Scholar 

  • Lyon, D. (2018). The Culture of Surveillance: Watching as a Way of Life. Polity Press.

    Google Scholar 

  • Lyon, D. (2021a). Pandemic Surveillance. New York: Polity Press.

    Google Scholar 

  • Lyon, D. (2021b). Surveillance, Transparency, and Trust: Critical Challenges from the COVID-19 Pandemic. In L. A. Viola & P. Laidler (Eds.), Trust and Transparency in the Age of Surveillance (pp. 243–257). Routledge.

    Chapter  Google Scholar 

  • Lyon, D., & Murakami Wood, D. (2020). Security Intelligence and Surveillance in the Big Data Age: The Canadian Case. University of British Columbia Press.

    Google Scholar 

  • Mail and Guardian. (2013, June 21). Spy Wars: South Africa Is Not Innocent. Mail and Guardian. http://mg.co.za/article/2013-06-21-00-spy-wars-south-africa-is-not-innocent

  • Mann, S. (2004). ‘Sousveillance’: Inverse Surveillance in Multimedia Imaging. In Proceedings of the ACM Multimedia.

    Google Scholar 

  • Mann, S. (2013). Veillance and Reciprocal Transparency: Surveillance versus Sousveillance, AR Glass, Lifeglogging, and Wearable Computing. http://wearcam.org/veillance/veillance.pdf

  • Mare, A. (2015). An Analysis of the Communications Surveillance Frameworks in South Africa. Media Policy and Democracy Project. https://www.mediaanddemocracy.com/uploads/1/6/5/7/16577624/comms-surveillance-framework_mare2.pdf

  • Mare, A (2016a). Facebook, Youth and Political Action: A Comparative Study of Zimbabwe and South Africa. PhD dissertation, Rhodes University.

    Google Scholar 

  • Mare, A. (2016b). A Qualitative Analysis of How Investigative Journalists, Civic Activists, Lawyers and Academics Are Adapting to and Resisting Communications Surveillance in South Africa. Media Policy and Democracy Project. https://www.mediaanddemocracy.com/uploads/1/6/5/7/16577624/duncan_2_comm_surveillance.pdf

  • Mare, A. (2019). Communication Surveillance in Namibia: An Exploratory Study. Media Policy and Democracy Project. https://www.mediaanddemocracy.com/uploads/1/6/5/7/16577624/namibia_report_3rd_pages.pdf

  • Martin, A. K., Van Brakel, R., & Bernhard, D. J. (2009). Understanding Resistance to Digital Surveillance. Towards a Multi-disciplinary, Multi-actor Framework. Surveillance & Society, 6(3), 213–232.

    Article  Google Scholar 

  • Marx, G. T. (2002). What’s New About the “New Surveillance”? Classifying for Change and Continuity. Surveillance & Society, 1(1), 9–29.

    Article  Google Scholar 

  • Marx, G. T. (2003). A Tack in the Shoe: Neutralizing and Resisting the New Surveillance. Journal of Social Issues, 59(2), 369–390.

    Article  Google Scholar 

  • Mathiesen, T. (1997). The Viewer Society: Michel Foucault’s ‘Panopticon’ Revisited. Theoretical Criminology, 1(2), 215–233.

    Article  Google Scholar 

  • McCahill, M., & Finn, R. L. (2014). Surveillance, Capital and Resistance: Theorising the Surveillance Subject. Routledge.

    Book  Google Scholar 

  • Media Democracy and Policy Project (2019). Drifting Towards Darkness: An Exploratory Study of State Surveillance in Post-2000 Zimbabwe. Media Policy and Democracy Project. https://www.mediaanddemocracy.com/uploads/1/6/5/7/16577624/zimbabwe_report_2nd_pages.pdf

  • Monahan, T. (2010). Surveillance in the Time of Insecurity. Rutgers University Press.

    Google Scholar 

  • Moyo, D., Mare, A., & Matsilele, T. (2019). Analytics-Driven Journalism? Editorial Metrics and the Reconfiguration of Online News Production Practices in African Newsrooms. Digital Journalism, 7(4), 490–506.

    Article  Google Scholar 

  • Mudongo, O. (2021. January). Africa’s Expansion of AI Surveillance — Regional Gaps and Key Trends. Research ICT Africa. https://researchictafrica.net/publication/africas-expansion-of-ai-surveillance-regional-gaps-and-key-trends/

  • Munoriyarwa, A. (2021). The Growth of Military-Driven Surveillance in Post-2000 Zimbabwe. Media Policy and Democracy Project. https://www.mediaanddemocracy.com/uploads/1/6/5/7/16577624/report_01_2021_military_driven_surveillance_zimbabwe_masterset.pdf

  • Munoriyarwa, A., & Chiumbu, S. H. (2022). Powers, Interests and Actors: The Influence of China in Africa’s Digital Surveillance Practices. In F. A. Kperogi (Ed.), Digital Dissidence and Social Media Censorship in Africa. Routledge.

    Google Scholar 

  • Murakami Wood, D. (2012). Beyond the Panopticon? Foucault and Surveillance Studies. In J. Crampton & S. Elden (Eds.), Space, Knowledge and Power: Foucault and Geography (pp. 245–263). Ashgate.

    Google Scholar 

  • Murakami Wood, D. (2013a). What Is Global Surveillance? Towards a Relational Political Economy of the Global Surveillant Assemblage. Geoforum, 49, 317–326.

    Article  Google Scholar 

  • Murakami Wood, D. (2013b). Brandscapes of Control? Surveillance, Marketing and the Co-construction of Subjectivity and Space in Neo-liberal Capitalism. Marketing Theory, 13(1), 47–67.

    Article  Google Scholar 

  • Norris, C., & Armstrong, G. (2002). CCTV and the Rise of Mass Surveillance Society. In P. Carlen & R. Morgan (Eds.), Crime Unlimited? Questions for the 21st Century (pp. 76–98). Palgrave Macmillan.

    Google Scholar 

  • Orwell, G. (1949). Nineteen Eighty-Four. Penguin.

    Google Scholar 

  • Parry, O., & Mauthner, N. (2004). Whose Data Are They Anyway? Practical, Legal and Ethical Issues in Archiving Qualitative Research Data. Sociology, 38(1), 139–152.

    Article  Google Scholar 

  • Penney, J. W. (2017). Internet Surveillance, Regulation, and Chilling Effects Online: A Comparative Case Study. Internet Policy Review, 6(2). https://doi.org/10.14763/2017.2.692

  • Phiri, S., & Zorro. (2021). Zambia Digital Rights Landscape Report. Institute of Development Studies. https://opendocs.ids.ac.uk/opendocs/bitstream/handle/20.500.12413/15964/Zambia_Report.pdf?sequence=7&isAllowed=y

  • Privacy International. (2015). The Right to Privacy in Namibia: Stakeholder Report on Universal Periodic Review 24th session-Namibia. Submitted by Privacy International June 2015. Retrieved May 29, 2019, from https://privacyinternational.org/sites/default/files/2017-12/Namibia%20UPR_PI_ submission_FINAL.pdf

  • Right to Know Campaign. (2014). Big Brother Exposed: Stories of South Africa’s Intelligence Structures Monitoring and Harassing Activist Movements. Activist Handbook. www.bigbrother.r2k.org.za

  • Right2Know Campaign. (2015). Big Brother Exposed: How South Africa’s Intelligence Structures Monitor and Harass Our Movements, Unions and Activists. Right2Know Campaign.

    Google Scholar 

  • Roberts, T., & Mohamed Ali, A. (2021). Opening and Closing Online Civic Space in Africa: An Introduction to the Ten Digital Rights Landscape Reports. In T. Roberts (Ed.), Digital Rights in Closing Civic Space: Lessons from Ten African Countries. Institute of Development Studies. https://doi.org/10.19088/IDS.2021.005

    Chapter  Google Scholar 

  • Roberts, T., Mohamed Ali, A., Farahat, M., Oloyede, R., & Mutung’u, G. (2021). Surveillance Law in Africa: A Review of Six Countries. Institute of Development Studies. https://doi.org/10.19088/IDS.2021.059

    Book  Google Scholar 

  • Rubin, H. J., & Rubin, I. S. (2005). Qualitative Interviewing: The Art of Hearing Data (2nd ed.). Sage.

    Book  Google Scholar 

  • Saki, O. (2022). Non-governmental Organisations Compliance with Zimbabwe’s Cyber and Data Protection Act. https://www.linkedin.com/pulse/non-governmental-organisations-compliance-zimbabwes-cyber-otto-saki?trk=articles_directory

  • Schwab, K. (2016). The Fourth Industrial Revolution. World Economic Forum.

    Google Scholar 

  • Scott, J. C. (1976). Weapons of the Weak: Everyday Forms of Peasant Resistance. Yale University Press.

    Google Scholar 

  • Sieber, J. (1992). Planning Ethically Responsible Research: A Guide for Students and Internal Review Boards. Sage.

    Book  Google Scholar 

  • Simon, B. (2004). The Return of Panopticism: Supervision, Subjection and the New Surveillance. Surveillance & Society, 3(1), 1–20.

    Google Scholar 

  • Singleton, R., Jr., & Straits, B. (1999). Approaches to Social Research (3rd ed.). Oxford University Press.

    Google Scholar 

  • Solove, D. J. (2006). A Taxonomy of Privacy. University of Pennsylvania Law Review, 154, 477–564.

    Article  Google Scholar 

  • Starr, A., Fernandez, L., Amster, R., Wood, L., & Caro, M. J. (2008). The Impact of Surveillance on the Exercise of Political Rights: An Interdisciplinary Analysis 1998-2006. Qualitative Sociology, 31(3), 251–270.

    Article  Google Scholar 

  • Tarrow, S. (1998). Power in Movement: Social Movements and Contentious Politics. Cambridge University Press.

    Book  Google Scholar 

  • Taylor, L. (2017). What Is Data Justice? The Case for Connecting Digital Rights and Freedoms Globally. Big Data and Society, 4(2), 1–14.

    Article  Google Scholar 

  • Tendi, B. (2016). State Intelligence and the Politics of Zimbabwe’s Presidential Succession. African Affairs, 115(459), 203–224.

    Article  Google Scholar 

  • Tolich, M. (2004). Internal Confidentiality: When Confidentiality Assurances Fail Relational Informants. Qualitative Sociology, 27, 101–106.

    Article  Google Scholar 

  • Wahl-Jorgensen, K., Hintz, A., Dencik, L., & Bennett, L. (2017). Introduction. Digital Journalism, 5(3), 256–261.

    Article  Google Scholar 

  • Wasserman, H., & Garman, A. (2012). Speaking Out as Citizens: Voice and Agency in Post-apartheid South African Media. Communitas, 17, 39–58.

    Google Scholar 

  • Wasserman, H., & Garman, A. (2014). The Meanings of Citizenship: Media Use and Democracy in South Africa. Social Dynamics, 40(2), 392–407.

    Article  Google Scholar 

  • Weiss, R. (2004). Learning from Strangers: The Art and Method of Qualitative Interview Studies. The Free Press.

    Google Scholar 

  • Wilson, D., & Serisier, T. (2010). Video Activism and the Ambiguities of Counter-Surveillance. Surveillance & Society, 8(2), 166–180.

    Article  Google Scholar 

  • York, J. (2014). Communications Surveillance in the Digital Age: The Harms of Surveillance to Privacy, Expression and Association. Global Information Society Watch. https://www.giswatch.org/sites/default/files/the_harms_of_surveillance.pdf

  • Zuboff, S. (2019). The Age of Surveillance Capitalism: The Fight for a Human Future at the New Frontier of Power. New York: Public Affairs.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Munoriyarwa, A., Mare, A. (2022). Introduction: Twists and Turns? From Analogue to Digital Surveillance. In: Digital Surveillance in Southern Africa. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-031-16636-5_1

Download citation

Publish with us

Policies and ethics