Search Results

You are looking at 1 - 10 of 282 items for :

  • "surveillance" x
  • All content x
Clear All
Restricted access

Ira J. Allen

Surveillance now is ubiquitous—each of us is decomposed along multiple axes into discrete data points, and then recomposed on screens and in combinatory algorithms that organize our life chances. Such surveillance is directly screened in popular culture, however, quite rarely. It is hard to see ubiquitous surveillance, and the harder something powerful is to see, the more powerful it tends to be. The essays of this Screen Shot offer perspective on various concrete instances of contemporary surveillance, both ubiquitous and granular, and in so doing offer tools for negotiating its suffusive presence in and organization of our lives.

Restricted access

Sarah Young

The origin story is an important element for any superhero/villain, as it provides context for a character’s seemingly out-of-this-world abilities. A radioactive spider bit Spiderman, and the Penguin was bullied in his youth. It can also be beneficial for surveillance scholars, inasmuch as it provides context for a once invisible but superhuman body of digital information that circulates as a proxy for us in digital milieus. This body is best understood through contemporary surveillance practices, yet metaphors of the panopticon and George Orwell’s 1984 proliferate in the surveillant imagination. I argue here that mapping an origin story onto a view of our data as a superhuman body not only creates a tangible representation of surveillance, but it also emphasizes and animates alternative surveillance theories useful for circulation in the surveillant imagination.

Restricted access

Giovanni Navarria

The technological revolution that began with the Arpanet in the late Sixties has changed the world we live in. The Internet and social media have improved our lives considerably, but the changes came in with a high-price tag attached: our freedom. We now live in a world in which technology has exponentially expanded the power of the State to keep tabs on its citizens (within and across borders). If we continue on this path, democracy as we know it is doomed. Yet the future is not as grey as it might look at first sight. The ubiquity of social media and smartphones and the increasing relevance of the Internet in everyday life have also drastically changed the impact-power of citizens in technologically advanced societies. Understanding these changes is to understand which shape democracy will take in the future.

Free access

“Can You Really See What We Write Online?”

Ethics and Privacy in Digital Research with Girls

Ronda Zelezny-Green

this study. This will lead to discussions about the surveillance of the girls’ online behavior and communications that focus on the ethical dilemmas that surfaced and how they were addressed. In the final part of the article, I will argue for a people

Restricted access

Damien Smith Pfister

In the wake of the mass shootings in Dayton, Ohio, and El Paso, Texas, the Trump Administration floated the creation of a new governmental agency named HARPA, the Health Advanced Research Projects Agency, modeled after DARPA, the Defense Advanced Research Projects Agency, that could explore novel ways of curtailing gun violence. For an administration unwilling to entertain serious legislation to address the problem of gun violence in the United States, HARPA offered a way to appear to be doing something about gun violence. HARPA, advocates maintained, could house a project called SAFEHOME, an acronym for “Stopping Aberrant Events by Helping Overcome Mental Extremes.” SAFEHOME would use “breakthrough technologies with high specificity and sensitivity for early diagnosis of neuropsychiatric violence”; the proposal would draw on data from Apple Watches, Fitbits, Amazon Echo, and Google Home to predict when someone might be on the cusp of mass violence (Alemany 2019). The guiding assumption of SAFEHOME is that surveillance of this biophysical data, combined with extant surveillance of textual messaging, search patterns, social networking sites, and discussion boards would alert law enforcement officials to a prospective shooter. Think Minority Report (2002, Steven Spielberg) with digital surveillance technology playing the role of psychic precogs. SAFEHOME is probably (hopefully) a nonstarter in serious conversations about gun violence, given the tenuous link between mental health, physical disposition, and violence; the inevitability of data-profiling being articulated to minoritized subjects and false positives (imagine the first time SAFEHOME flags a SWAT team on someone having sex) and obvious concerns about such an invasive surveillance regime. But the very fact that a program like SAFEHOME is posed as a potentially credible solution points to a dimension of surveillance that complements this forum’s discussion of ubiquity: granularity.

Restricted access

Laura A. Sparks

Relying on select US government Torture Memos, this article develops the term “surveillance time” to highlight the ways in which surveillance practices, in this case within the material confines of post-9/11 detention centers, come to threaten humans’ subjectivities through temporal disruption and manipulation. While surveillance has lately been understood in digital terms, such as in corporations’ data-mining practices and in technologies like facial-recognition software, we should not neglect its material, embodied dimensions. Surveillance time ultimately asks us to reconsider how monitoring and information-harvesting practices blur the boundaries between human bodies and data. Attention to the relationship between torture and surveillance also opens up new possibilities for understanding the now-ubiquitous monitoring strategies integrated into everyday life.

Restricted access

Video Surveillance in Portugal

Political Rhetoric at the Center of a Technological Project

Catarina Frois

This article gives a detailed account of the political processes and stages involved in the implementation of video surveillance devices in two major Portuguese cities, Oporto and Lisbon. It seeks to draw two main conclusions regarding the introduction of these systems in public areas and the developments that they have undergone over the period under analysis. The first is that installing these devices reflects a political response designed to provide a hasty solution to a social phenomenon—fear—that is largely subjective. The second is that the generalized perception as to the uncertainty of the effectiveness of these systems explains the lack of consistency and coordination in their implementation. The article concludes by discussing fear and insecurity in the context of concerns for a more efficient justice system.

Restricted access

"Pseudo-Sousveillance"

(Re)imagining Immigration Narratives and Surveillance Practices by Experiencing "Use of Force"

Kellie Marin

This article introduces the concept of “pseudo-sousveillance” as simulated sousveillance practices created by the sensory environments of immersive technologies. To advance this concept, I analyze the virtual reality (VR) experience “Use of Force” that immerses participants within the scene of the night during which immigrant Anastasio Hernandez Rojas was beaten by border patrol officers at the San Ysidro Port of Entry. I argue that the pseudo-sousveillance practices of cellphone recording and surveillance from above enlist users to be active participants in resisting dominant surveillance practices by constructing alternative narratives about immigrant experiences, exposing the overreach of the border patrol, and revealing the limits of surveillance in immigration control. I then discuss the implications that pseudo-sousveillance has for rethinking the rhetorical power of emerging technologies and sousveillance in a surveillant age.

Open access

Policing at a distance and that human thing

An appreciative critique of police surveillance

David Sausdal

Policing technologies are increasingly being developed to surveil and control people from afar. This is especially true in relation to cross-border crimes and other global threats where the necessity of monitoring such illegal flows is often advocated. In the literature, this is sometimes referred to as “policing at a distance,” signifying how the growth in different policing technologies is allowing police to oversee people without coming into physical contact with them. Overall, scholars find this development alarming. It is alarming because it reduces human lives to data points and because studies have shown how policing at a distance may trigger hateful police attitudes. With these problems of policing at a distance in mind, this article explores how an increasing use of surveillance technologies affects Danish detectives.

Restricted access

"This Video Call May Be Monitored and Recorded"

Video Visitation as a Form of Surveillance Technology and Its Effect on Incarcerated Motherhood

JWells

This article argues that the implementation of video visitation in correctional facilities is a mechanism of control used to enact punitive measures for regulating mothers who act outside the dominant paradigms of motherhood. Because prisons were designed to surveil and mothers have historically been surveilled by institutions, incarcerated mothers are often overlooked when we discuss the surveillance methods used to keep institutionalized motherhood intact. This article builds on existing scholarship characterizing surveillance technology’s role in criminalizing poor mothers of color, and considers the ways in which surveillance technology is used to normalize these mothers during their incarceration. Applying a Foucauldian framework, this article explores how adapting Video Visitation (VV)—a Skype-like video chat program—enables correctional facilities to extend the role of “watcher” and expand the panoptic gaze, which prompts mother-to-mother surveillance and intensifies self-surveillance. The article concludes by drawing attention to VV’s structure and its ability to expand correctional facilities’ surveillance to the children of incarcerated mothers.