overview
states
identity
strategies
gawking
fiction
film
conspiracy
denunciation
gumshoes
spooks
bugs
sharing
meters
off grid
landmarks

related
Guides:
Privacy
Security
Consumers
Networks
Identity

related
Profiles:
Forgery &
Fakes
Private
Security
Biometrics
RFIDs
Passports
Assembly
APNR
|
strategies
This
page highlights strategies and technologies of surveillance
and identification, drawing together more detailed information
elsewhere on this site.
It covers -
introduction
Authentication schemes can be summarised as falling into
three categories -
- what
you know (eg a password or PIN)
- what
you have (eg a key, a passport, a driver's licence)
- what
you are (expressed through innate and individual characteristics
such as a fingerprint)
In
considering surveillance mechanisms we can use a similar
typology -
- what
you do
- where
you go
- what
you have
and
further differentiate by whether information is collected
and analysed on individual or mass basis.
Surveillance in ancien regimes was overt, unsophisticated
but often effective in achieving goals that included identifying
an individual's associates, accessing private communications
and deterring free expression. Being followed by a secret
policeman and having letters opened tended to foster self-censorship
and place the surveilled individual in a sort of quarantine.
It could however be spoofed or simply evaded; pre-1900
fiction and memoirs are replete with accounts of costume
changes, smuggled manuscripts or letters written in lemon
juice.
The emergence of electronic networks shifted the nature
of surveillance, with authorities (and other entities)
gaining access to mechanisms - such as the wiretap and
the bug - that were invisible and that by the late 1930s
were underpinned by recording technologies.
Subsequent years have seen a proliferation of mechanisms
for the capture of data and - more significantly - tools
for aggregating and making sense of that data. Thoe tools
include pattern recognition software, eg face and numberplate
recognition. They also include datamining that integrates
information held on disparate public/private sector databases
to build a picture - accurate or otherwise - of the activity
of specific individuals or ideal types.
In a networked economy it is difficult for individuals
not to leave traces on such databases and thus remain
outside what Christian Parenti characterised as the 'soft
cage'. Those databases are not going to disappear. The
challenge for policymakers and ordinary citizens instead
lies in achievement of a modus vivendi that provides appropriate
restrictions on the collection, exchange and misuse of
data by government agencies, business and individuals.
biometrics
The identification of people on the basis of innate and
stable physiological or behavioural characteristics (eg
fingerprint, DNA, voice or retina pattern) traces its
origins to before the telegraph.
Biometric technologies and applications are discussed
in a separate profile elsewhere
on this site.
payment systems
Some of the more zany conspiracy theories about RFIDs
feature claims that tags in currency will allow the 'invisible'
government to monitor the activity of every citizen in
advanced economies, receiving reports from automatic teller
machines and other devices.
Reality is more prosaic. The aspect of the soft cage embraced
by most Western consumers is electronic rather than paper
payments: the credit card, EFTPOS and monthly statement
from a financial institution.
The data is complemented by information provided to government
agencies, in particular taxation, income support and public
insurance bodies.
video and other cams
For CCTV see Surveillance, Closed Circuit Television
and Social Control (London: Ashgate 1998) edited by
Clive Norris and Policing, Surveillance & Social
Control: CCTV and Police Monitoring of Suspects (Cullompton:
Willan 2002) by Tim Newburn & Stephanie Hayman. Other
pointers are here.
vehicle tagging and imaging
[under development]
Automated number plate recognition (ANPR)
systems, which convert images of vehicle registration
numbers into information for real time or retrospective
matching with law enforcement and other databases, are
discussed in detail elsewhere on this site.
phone and mail systems
A technological determinism has led some critics to emphasise
the dangers of new technologies of surveillance. It is
clear, however, that reading mail, listening to phone
calls and tracking who is calling whom remain of significance.
The extent to which postal
traffic is logged and audited in most countries is unclear.
Many regimes publish aggregated or agency by agency statistics
on the annual number of phone interceptions.
RFIDS and other technological fixes
RFID technologies and applications are discussed in a
separate profile elsewhere
on this site.
eyes in the sky
Observation by spy satellite - sometimes pictured as surveilling
individuals by reading their car registration plates or
peering through their windows - has been a feature of
conspiracist fiction
and popular film over the past thirty years, an artefact
of Hollywood hyperbole and of government hype about military
observation satellites.
Images from commercial satellites (eg the SPOT
system) of public and private buildings regularly appear
in the media and are available for purchase within the
means of many consumers. Access to such images is an extension
of aerial photography schemes, which fallen outside traditional
privacy protection and led some public figures such as
Barbra Streisand to seek restriction on overhead shots
of their property.
The emergence of cheap high-resolution digital cameras
and increasingly reliable drones means that such surveillance
will in future be directly available to individuals rather
than to specialist service providers.
public and other registers
Much of the literature over the past fifty years has centred
on licit/illicit surveillance by government agencies.
There has been less attention to surveillance by the private
sector, in particular by individuals. 'Stalking' is thus
a newly-discovered phenomenon, although it has occurred
throughout history.
One enabler of stalking
- and of commercial profiling
of individuals - is the transfer from paper to digital
media (in particular internet access) of public registers
that for example feature information about the names,
addresses and property of individuals.
next page (gawking)
|
|