Search results

1 – 10 of over 14000
Book part
Publication date: 29 February 2008

Kevin Stenson

An industry of description and interpretation has developed around the growth of surveillance, accelerated by: the development of the internet; volatile international relations…

Abstract

An industry of description and interpretation has developed around the growth of surveillance, accelerated by: the development of the internet; volatile international relations since the collapse of communism; demographic mobility, segregation by class and ethnicity in the rich and poor worlds, sharpening inequalities, and post 9/11 fears of terrorism. Influential narratives have emphasised the diminishing power of sovereign nation-states in a marketised and globalised world. This chapter challenges the notion that coercive, sovereign modes of rule are a monarchical survival in decline. Rather, sovereign technologies of rule, in which surveillance is central involves strategies of governance from below as well as from above. They combine coercive with rhetorical, metaphorical communication and other ‘soft’ modes of rule. These make thinkable the nation-state as a discrete, defensible entity. Political communication translates between the complex technical expertise of evolving surveillance and security technologies and language intelligible to the public. Though surveillance technologies and information can be produced by commercial and other non-state sites of governance, metaphorically, much surveillance can be viewed as the extension of the eye of the sovereign. Although we are all targets of surveillance, those seen as threatening to the majority help to constitute and reproduce the social collectivity.

Details

Surveillance and Governance: Crime Control and Beyond
Type: Book
ISBN: 978-0-7623-1416-4

Abstract

Details

Intelligence and State Surveillance in Modern Societies
Type: Book
ISBN: 978-1-78769-171-1

Book part
Publication date: 12 July 2022

Caitlin Rowe

This paper will provide an overview of the contemporary surveillance environment in the age of Big Data and an insight into the complexities and overlap between security, bodily

Abstract

This paper will provide an overview of the contemporary surveillance environment in the age of Big Data and an insight into the complexities and overlap between security, bodily and informational surveillance as well as the subsequent impacts on privacy and democracy. These impacts include the ethical dilemmas facing librarians and information scientists as they endeavour to uphold principles of equality of access to information, and the support of intellectual freedom in private in an increasingly politicised informational environment. If we accept that privacy is integral to the notion of learning, free thought and intellectual exploration and a crucial element in the separation of the state and the individual in democratic society, then the emergence of the data age and the all-encompassing surveillance and exposure of once private acts will undoubtedly lead to the reimagining of the social and political elements of society.

Details

Who's Watching? Surveillance, Big Data and Applied Ethics in the Digital Age
Type: Book
ISBN: 978-1-80382-468-0

Keywords

Article
Publication date: 25 July 2023

Smith Oduro-Marfo

The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse…

Abstract

Purpose

The proliferation of surveillance-enhancing laws, policies and technologies across African countries deepens the risk of privacy rights breaches, as well as the risks of adverse profiling and social sorting. There is a heightened need for dedicated advocacy and activism to consistently demand accountability and transparency from African states, governments and their allies regarding surveillance. The purpose of this paper is to understand the issue frames that accompany anti-surveillance and privacy advocacy in Ghana and the related implications.

Design/methodology/approach

Using a qualitative and interpretivist approach, the author focuses on three different surveillance-oriented incidents/programs in Ghana and analyzes the frames underpinning the related advocacy and narratives of various non-state actors.

Findings

Privacy and anti-surveillance advocacy in Ghana tends to be less framed in the context of privacy rights and is more driven by concerns about corruption and value for money. Such pecuniary emphasis is rational per issue salience calculations as it elevates principles of economic probity, transparency and accountability and pursues a high public shock value and resonance.

Practical implications

Economics-centered critiques of surveillance could be counterproductive as they create a low bar for surveillance promoters and sustains a culture of permissible statist intrusions into citizens’ lives once economic virtues are satisfied.

Originality/value

While anti-surveillance and privacy advocacy is budding across African countries, little is known about its nature, frames and modus compared to such advocacy in European and North American settings. To the best of the author’s knowledge, this is likely the first paper or one of the first dedicated fully to anti-surveillance and advocacy in Africa.

Details

Journal of Information, Communication and Ethics in Society, vol. 21 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Book part
Publication date: 1 March 2013

Priska Daphi, Anja Lê and Peter Ullrich

This chapter provides an analysis of images produced and employed in protests against surveillance in Germany in 2008 and 2009. For this purpose, a method of visual analysis is…

Abstract

This chapter provides an analysis of images produced and employed in protests against surveillance in Germany in 2008 and 2009. For this purpose, a method of visual analysis is developed that draws mainly on semiotics and art history. Following this method, the contribution examines a selection of images (pictures and graphic design) from the anti-surveillance protests in three steps: description of components, detection of conventional signs, and contextual analysis. Furthermore, the analysis compares the images of the two major currents of the protest (liberal and radical left) in order to elucidate the context in which images are created and used. The analysis shows that images do not merely illustrate existing political messages but contribute to movements’ systems of meaning creation and transportation. The two currents in the protests communicate their point of view through the images both strategically and expressively. The images play a crucial role in formulating groups’ different strategies as well as worldviews and identities. In addition, the analysis shows that the meaning of images is contested and contextual. Images are produced and received in specific national as well as issue contexts. Future research should address the issue of context and reception in greater depth in order to further explore the effects of visual language on mobilization. Overall, the contribution demonstrates that systematic visual analysis allows our understanding of social movements’ aims, strategy, and collective identity to be deepened. In addition, visual analysis may provide activists with a tool to critically assess their visual communication.

Details

Advances in the Visual Analysis of Social Movements
Type: Book
ISBN: 978-1-78190-636-1

Keywords

Book part
Publication date: 20 September 2014

Patrick Rafail

Scholarship on the state control of social movements has predominately focused on overt repression, resulting in comparatively less attention to more covert forms of control…

Abstract

Scholarship on the state control of social movements has predominately focused on overt repression, resulting in comparatively less attention to more covert forms of control. Researchers have suggested that government surveillance of social movement organizations (SMOs) has become increasingly widespread and routinized in the post-September 11, 2001 era, but this hypothesis has remained untested. Since contemporary surveillance is grounded in a logic of information gathering that has diffused across law enforcement agencies since the September 11 attacks, government actors now cast a wide net and monitor a large variety of groups. This study shows that a result, traditional factors predicting surveillance, such as contentious behavior, have less explanatory power. Using a database of 409 SMOs active in Philadelphia between January 1996 and October 2009, the research asked who and why particular groups are monitored by the Pennsylvania Office of Homeland Security (PA-OHS) between November 2009 and September 2010. Bayesian logistic regression analysis is used to examine the variables predicting surveillance. Findings show that 23% of the SMOs in the sample were targets of surveillance. Organizational ideology was the strongest predictor and there was little evidence that history of contentious protests or previous conflict with the police influenced coming under surveillance. However, groups with less visibility in traditional media sources were more likely to be monitored.

Details

Intersectionality and Social Change
Type: Book
ISBN: 978-1-78441-105-3

Keywords

Open Access
Book part
Publication date: 9 December 2021

Kevin Macnish

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of…

Abstract

This short chapter is an introduction to my 2018 book: The Ethics of Surveillance: An Introduction (Macnish, 2018). It is provided at the start of this PRO-RES collection of essays because it anticipates and supplements the range of issues covered in this collection and lays out some of the fundamental considerations necessary to ensure if surveillance must be conducted, it will be done as ethically as possible.

When is surveillance justified? We can largely agree that there are cases in which surveillance seems, at least prima facie, to be morally correct: police tracking a suspected mass murderer, domestic state security tracking a spy network, or a spouse uncovering partner’s infidelity. At the same time, there are other cases in which surveillance seems clearly not to be justified: the mass surveillance practices of the East German Stasi, an employer watching over an employee to ensure that they do not spend too long in the toilet, or a voyeur watching the subject of his lust undress night after night.

As an introductory text, my book does not seek to provide a list of necessary and sufficient conditions for ethical surveillance. What it does provide is an overview of the current thinking in surveillance ethics, looking at a range of proposed arguments about these questions, and how those arguments might play out in a variety of applied settings. It hence provides a useful and accessible volume for policymakers wishing to rapidly get up to speed on developments in surveillance and the accompanying ethical discussions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Article
Publication date: 23 November 2017

Christian Fuchs and Daniel Trottier

This paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward…

3217

Abstract

Purpose

This paper aims to present results of a study that focused on the question of how computer and data experts think about Internet and social media surveillance after Edward Snowden’s revelations about the existence of mass-surveillance systems of the Internet such as Prism, XKeyscore and Tempora. Computer and data experts’ views are of particular relevance because they are confronted day by day with questions about the processing of personal data, privacy and data protection.

Design/methodology/approach

The authors conducted two focus groups with a total of ten experts based in London. As London is considered by some as the surveillance capital of the world, and has a thriving Internet industry, it provided a well-suited context.

Findings

The focus group discussions featured three topics that are of crucial importance for understanding Internet and social media surveillance: the political economy surveillance in general; surveillance in the context of the Snowden revelations; and the question what the best political reactions are to the existence of a surveillance-industrial complex that results in political and economic control of the Internet and social media. The focus groups provided indications that computer and data experts are pre-eminently informed on how Internet surveillance works, are capable of critically assessing its implications for society and have ideas about on what should be done politically.

Originality/value

Studies of privacy and surveillance after Edward Snowden’s revelations have taken on a new dimension: Large-scale covert surveillance is conducted in a collaborative endeavour of secret services, private communications corporations and security companies. It has become evident that a surveillance-industrial Internet surveillance complex exists, in which capitalist communications and security corporations and state institutions collaborate.

Details

Journal of Information, Communication and Ethics in Society, vol. 15 no. 4
Type: Research Article
ISSN: 1477-996X

Keywords

Book part
Publication date: 7 May 2019

Emanuel Boussios

This chapter focuses on a critical issue in cyber intelligence in the United States (US) that concerns the engagement of state-owned or state-controlled entities with overseeing…

Abstract

This chapter focuses on a critical issue in cyber intelligence in the United States (US) that concerns the engagement of state-owned or state-controlled entities with overseeing citizen’s activity in cyberspace. The emphasis in the discussion is placed on the constitutionality of state actions and the shifting boundaries in which the state can act in the name of security to protect its people from the nation’s enemies. A second piece of this discussion is which state actors and agencies can control the mechanisms by which this sensitive cyber information is collected, stored, and if needed, acted upon. The most salient case with regard to this debate is that of Edward Snowden. It reveals the US government’s abuses of this surveillance machinery prompting major debates around the topics of privacy, national security, and mass digital surveillance. When observing the response to Snowden’s disclosures one can ask what point of view is being ignored, or what questions are not being answered. By considering the silence as a part of our everyday language we can improve our understanding of mediated discourses. Recommendations on cyber-intelligence reforms in response to Snowden’s revelations – and whether these are in fact practical in modern, high-technology societies such as the US – follow.

Details

Politics and Technology in the Post-Truth Era
Type: Book
ISBN: 978-1-78756-984-3

Keywords

Open Access
Book part
Publication date: 9 December 2021

David J. Harper, Darren Ellis and Ian Tucker

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented…

Abstract

This chapter focusses on the ethical issues raised by different types of surveillance and the varied ways in which surveillance can be covert. Three case studies are presented which highlight different types of surveillance and different ethical concerns. The first case concerns the use of undercover police to infiltrate political activist groups over a 40-year period in the UK. The second case study examines a joint operation by US and Australian law enforcement agencies: the FBI’s operation Trojan Shield and the AFP’s Operation Ironside. This involved distributing encrypted phone handsets to serious criminal organisations which included a ‘backdoor’ secretly sending encrypted copies of all messages to law enforcement. The third case study analyses the use of emotional artificial intelligence systems in educational digital learning platforms for children where technology companies collect, store and use intrusive personal data in an opaque manner. The authors discuss similarities and differences in the ethical questions raised by these cases, for example, the involvement of the state versus private corporations, the kinds of information gathered and how it is used.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

1 – 10 of over 14000