[go: up one dir, main page]

Academia.eduAcademia.edu

Surveillance and its discontents

Surveillance in the sense of gathering information about people existed throughout history, a simple example can be given from the Roman Empire when Caesar Augustus issued a decree for taking census throughout the empire, in order to maintain the functioning of the Empire and collect taxes (Claytor & Bagnall, 215; Lyon, 1994, p. 22). Therefore, since it’s an old social event, one wonders what’s the matter with surveillance today? Why so much attention is increasing in regards to surveillance since the last decade? Are there any differences between the surveillance since the times of the Roman Empire with surveillance today? And if so what are they? All these questions will be answered in this paper. It will begin by attempting to define what is surveillance, then it will examine the 2009 House of Lords Report (HOL) on this subject, then it will critically examine some of the issues raised in the report; particularly how surveillance shapes the relationship between the citizens and the state, the Public-Private sectors relationship, and abuses of surveillance.

Surveillance and its discontents Abdullatif El Ali Surveillance in the sense of gathering information about people existed throughout history, a simple example can be given from the Roman Empire when Caesar Augustus issued a decree for taking census throughout the empire, in order to maintain the functioning of the Empire and collect taxes (Claytor & Bagnall, 215; Lyon, 1994, p. 22). Therefore, since it’s an old social event, one wonders what’s the matter with surveillance today? Why so much attention is increasing in regards to surveillance since the last decade? Are there any differences between the surveillance since the times of the Roman Empire with surveillance today? And if so what are they? All these questions will be answered in this paper. It will begin by attempting to define what is surveillance, then it will examine the 2009 House of Lords Report (HOL) on this subject, then it will critically examine some of the issues raised in the report; particularly how surveillance shapes the relationship between the citizens and the state, the Public-Private sectors relationship, and abuses of surveillance. As stated in the introduction surveillance has always existed, however, historical developments changed the way and expanded the scope of surveillance (Lyon, 1994), that conceiving surveillance as only gathering information doesn’t suffice, as these developments allowed surveillance to reach areas which were thought unimaginable decades ago like; wiretapping (Nunn, 2010), or videotaping using closed circuit television (CCTV) (2009, para. 18), or even watchingthrough-wall technologies (Hiranandani, 2010). In the HOL report, Surveillance is understood as monitoring the behaviour of persons, objects, or systems using a variaty of technologies (2009, para. 18). Gary T. Marx provided a very similar definition of surveillance as “the use of technical means to extract or create personal data. This may be taken from individuals or contexts” (2002, p. 12). From these definitions, it can be seen how surveillance in the modern time is inextricably linked with Technology. Thus, with the technological developments such as the three examples stated above, surveillance expand its scope like an octobus streching its arms as far as possible. A third definition of surveillance, which will be employed in this paper, is “the performative creation of suspect subjectivities”, in this definition, Matzner introduces positive and negative connotations concerning those under surveillance, rather than attributing these connotations to surveillance itself (Matzner, 2016, p. 200). The HOL report came as an outcome of increasing concerns about privacy, security and discrimination resulting from surveillance. These increasing concerns came hand in hand with the UK government’s massive usage of surveillance technologies. The report indicates that the government had “some £500 million of public money invested in CCTV in the decade up to 2006” (2009, para. 70) along with “The National DNA Database (NDNAD) is rapidly growing, and now contains millions of samples taken from individuals and crime scenes” (2009, para. 49). This increase in usage of surveillnace technologies are also combined with instances of data loss such as; the November 2007 Government announcement that “the child benefit details of 25 million people had been lost after an Her Majesty's Revenue and Customs (HMRC) computer disc went missing”; and the December 2007 news “that a computer hard drive with the details of 3 million UK learner drivers had gone missing in the USA, and that the details of 7,500 vehicles and their owners had been lost by the Driver and Vehicle Agency (DVA) in Northern Ireland” (2009, p. 7). The report states that data loss undermines the trust between the citizens and the state, which in turn could lead to disobedience of the citizens to the law (2009, para.108) Last but not least, the report also pointed out that the relation between public and private sectors is not in favour of UK citizens (2009, para. 55). Having summarized the report, this paper will examine how the issues raised above in the summary affect the citizen-state relationship. The government’s extensive incorporation of CCTV throughout the UK, doesn’t translate into the success of CCTV in reducing crime and increasing welfare. As the report indicated that despite all this enormous budget on CCTV, its effectiveness is dubious (Stedmon, 2011, p. 532). Surveillance is not just monitoring people, it’s also about creating subjectivities. However, this creation doesn’t lie in the machine, it is created by humans. The extensive use of CCTV blinded the government from noticing the human factor, Stedmon presents a case study where he and his wife got fined for crossing a bus lane during un-permitted hours. After examining the information he was provided and his research, he found out that they were innocent and that they shouldn’t be fined as they didn’t break the rules. He argues that the human factor plays an important role in the functioning of the system, as he states that “operators are typically expected to view a high number of monitors simultaneously, vigilance deteriorates as a function of the number of screens being attended to” (Stedmon, 2011, p. 533). Wiretapping is no better than CCTV, human factors also play a crucial role in determining the outcome of surveillance, one of these factors is the bias that takes place by the police when intercepting telephone conversations -wiretapping. Nunn, in his analysis of The United States, Indianapolis police wiretapping activities and comparing their translations, stated that there does exist a bias in the police where “terms of conversational exchanges that might appear ambiguous in nature […] are re-structured by the police translations to be, in contrast, completely unambiguous examples of criminal communications” (Nunn, 2010, p. 40). The report implies the huge reliance of government on surveillance technologies as a means to retain security, order and peace; rights that citizens expect from their government. However, it never mentions how the government uses surveillance in maintaining these rights, the report is mainly explanatory and provides the means through which government conduct its surveillance, yet one must question whether surveillance technologies do indeed fulfill these rights? In an answer to this question, this paper examines Matzner argument that surveillance, perceiving it as performative, based on big data, creates suspects as well as friends (Matzner, 2016). Many actions of the government stated in the report related to expanding surveillance amount to what can be called “Big data surveillance”, which “refers to both the unprecedented size of contemporary databases and the emerging techniques for making sense of them” (Andrejevic & Gates, 2014). But what does the government do with all this data? In his paper, Matzner, challenges the representationalist view of Big data surveillance -that is, the purpose of data is to represent the world, by arguing that the way data is being gathered doesn’t represent the world, but in fact has a performative features that allows surveillance to create suspects (Matzner, 2016). This performative feature, Martzner states, is structured by power relations. Relying on Foucauldian theories, he argues that power uses this performtive feature of big data to produce subjects (Matzner, 2016, p. 206). Matzner employs Judith butler’s concept of “citationality” in providing an understanding of how power produces subjects through big data. According to Butler, a citation is a speech act that only describes things, and “the meaning and the performative power of the speech act stem from its relation to similar acts, where particular structures of power and authority are already established” (Matzner, 2016, p. 205). Matzner’s emphasis on how the way people appear on digital communication affects who they are (2016, p. 205), rests on the relation between, on the one hand, ‘Hidden generation of information’ and ‘information given voluntarily’ modes (2016, p. 201), and on the other hand, citationality. When someone publishes things about who they are -which is the secomd mode of information gathering, these information are being processed covertly through the first mode where access is only limited to the authorities. This processing of information subjectifies individuals as “it singles out suspects as potential or possible future wrong doers” (Matzner, 2016, p. 202). This being said, Matzner’s work puts the citizens in a vulnerable position in front of the state power, by defining surveillance as “creating suspects” this implies that the function of the state is not protect the citizens from wrongdoers only, but also it can also create them. A further important point explored Harbisher (2015), who in his paper he questions the relationship between public and private sectors and shows with evidences how radical narratives were used by these sectors in order to legitimise surveillance, by assigning terms such as “extremism” not just to terrorist groups, but also to British campaigners. Harbisher argues that ‘fusion centres’ -organisations that result out from the relationship between public and private sectors, act according to the interests of their stakeholders rather than the public good (Harbisher, 2015, p. 478). The change in context of Global War on Terrorism (GWOT) to the Global Struggle Against Violent Extremism (GSAVE) had an impact on the UK domestic affairs, that the UK government Research Information and Communications Unit (RICU) was responsible for regulating all public communications. The RICU, generated what is known as ‘Britain’s “strategic dialogue” against terrorism’ (Harbisher, 2015, p. 479), this ‘Strategic Dialogue’ encompassed undesirable activities against the state under the banner of PREVENT strand of the 2003 CONTEST programme set out by the government to counter terrorism. Under such dialogue even political activists, protest groups could can be considered extremists, an example of that is the undermining of anti-capitalism campaigners in the London by the police as posing the ‘greatest threat of all to British society’ along with International terrorist organizations such as AlQaeda (Harbisher, 2015, p. 480). Harbisher, points out that “The Civil Contingencies Act enabled Britain’s governing authorities to establish a series of networks that fused together both private and public interests who identify and mitigate the risks posed to each individual catchment” (Harbisher, 2015, p. 482). However, this relationship must be questioned since private organizations act for the interests of their principals and not in the interests of the public. The report mentions that the boundary between the public and private sector “is becoming increasingly blurred as public services are provided through partnerships and other joint arrangements” (2009, para. 55). The reason behind the incorporation of the private sector in surveillance is based on the argument that their expertiese can be used in favour of inhancing state surveillance, therefore, a mutual co-ordination between the two sectors is for the benefit of all (2009, para. 55) (Helgesson, 2011, p. 475). However, Helgesson argues that while the function of the state is to work in favour of the general public, its relation with the private sector is dubious for in the realm of business, “surveillance is intertwined with systems of corporate governance and control” (2011, p. 472), therefore, surveillance conduct by the private actor is restricted in favour of the owner, which in turn raises the issue of the accountability of the private sector towards the government, or the other way around? Given the example of the 2006 “Operation Harmony” the North Yorkshire Local Resilience Forum (LRF), contained a mass protest in Selby and was considered “the first time that domestic extremisim had taken place in the county” (Harbisher, 2015, p. 484). In Conclusion, This paper discussed the main themes in the HOL report, and then tried to examine some of these themes; mainly the relationship between the citizens and the state, and the publicprivate sector relationship. It tried to show that surveillance is much more than just a way of monitoring and gathering data. The case study by Stedmon and Nunn’s analysis, proves one of the vulnerabilities that CCTV and Telecommunication intercepting systems faces, the paper argued that human factors have an influence over the processing of data. It then turned to Matzner’s work who argued that Surveillance is a way of creating suspects as well as friends. Matzner based introduced his argument against the representationalist view, arguing that surveillance doesn’t just represents how the world is but also acts as performative that creates subjectivities. In presenting Harbisher’s work the paper aimed at showing how surveillance could be abused easily and can lead to unfavoured results, such as totalitarianism by considering any dissenting voices as being an act of extremism and falls under terrorism, and also by bringing in Helgesson emphasis on how the relationship between the public and private sectors is dubious, the aim was to link Harbisher’s and Helgesson’s works in an attempt to indicate how private sectors can alter surveillance in their favour. In short, this paper tried to expose how that the problem is not in surveillance in essense, but the way that surveillance is used, Matzner’s analysis and his argument is very irritating and poses lots of questions on the relationship between the citizens and the state. References Andrejevic, M., & Gates, K. (2014). Big Date Surveillance: Introduction. Surveillance & Society, 12(2), 185-196. Claytor, W. G., & Bagnall, R. S. (215). THE BEGINNINGS OF THE ROMAN PROVINCIAL CENSUS: A NEW DECLARATION FROM 3 BCE. Greek, Roman, and Byzantine Studies, 55(3), 637–653. Harbisher, B. (2015). Unthinking extremisim: Radicalising narratives that legitimise surveillance. Surveillance & Society, 13(3/4), 474-486. Helgesson, K. S. (2011). Public-Private Partners Against Crime: Governance, Surveillance and the Limits of Corporate Accountability. Surveillance & Society, 8(4), 471-484. Hiranandani, V. (2010). Under-Explored Threats to Privacy: See -Through-Wall Technologies and Electro-Magnetic Radiations. Surveillance & Society, 8(1), 93-98. House of Lords. (2009). Surveillance: Citizens and the State. London: The Stationery Office Limited. Lyon, D. (1994). The Electronic Eye: The Rise of Surveillance Society. Cambridge: Polity Press. Marx, G. T. (2002). What's New About the "New Surveillance"? Classifying for Change and Continuity. Surveillance and Society, 1(1), 9-29. Matzner, T. (2016). Beyond data as representation: The performativity of Big Data in surveillance. Surveillance & Society, 14(2), 197-210. Nunn, S. (2010). 'Wanna Still nine-hard?': Exploring Mechanisms of Bias in the Translation and interpretation of Wiretap Conversations. Surveillance & Society, 8(1), 28-42. Stedmon, A. W. (2011). The camera never lies, or does it? The dangers of taking CCTV surveillance at face value. Surveillance & Society, 8(4), 527-537.