Professional Documents
Culture Documents
Acknowledgements vi
1
2 The Intensification of Surveillance
SURVEILLANCE STUDIES
Given the raft of issues and controversies that pervade the inten-
sification of surveillance, it is no coincidence that, over the last
ten years, the sub-field of Surveillance Studies has developed. This
brings together scholars from a variety of backgrounds: urbanists,
sociologists, computer scientists, political scientists, and even
organization theorists contribute. One of its leading lights, David
Lyon, surveys the scene following September 11 in Chapter 2
here. Lyon (2002b) observes that surveillance is crucial to the
identification and sorting of people and things. He helpfully dis-
tinguishes two major categories of surveillance, namely
categorical suspicion and categorical seduction. We propose a
further two types: categorical care and categorical exposure.
Categorical Suspicion involves surveillance that is concerned
with identification of threats to law and order – with malcon-
8 The Intensification of Surveillance
one switches on the mobile). Much the same case may be made
for credit and debit cards: they simultaneously surveille and
thereby intrude into the individual’s private life and allow those
with access remarkable advantages in terms of day-to-day actions
(no need for cash, foreign currencies, and so on).
It is important to recognize this paradoxical character of sur-
veillance: it intrudes and enables at one and the same time. There
is a similar ambivalence about surveillance when it is seen from
the perspective of social inclusion and exclusion. To be included
as a citizen in our society one must submit to being surveilled
(to provide an address to the authorities, to enter a tax return
when required, to submit to the recording of one’s health details
… ), but in return one gets access to a range of desirable services
(the vote, welfare rights, medical benefits … ). Against this, one
might endeavour to escape surveillance, but this is to invite both
hardship and the attention of disciplinary agencies. Indeed, to
be excluded in today’s world means, at least for the majority, that
surveillance will be directed at them as ‘outsiders’, as probable
‘deviants’, ‘threats’ or, more kindly, ‘in need of help’. Bluntly, to
be included one must submit to surveillance, while the excluded
will be watched willy-nilly.
There are many well-rehearsed objections to the growth of sur-
veillance. Prominent amongst these is a perceived threat to civil
liberties. Many commentators are understandably concerned
that information may be accumulated for nebulous ends, or by
the wrong people, or that files will remain active when they are
long outdated. There is a substantial literature, and associated
social movements as well as legislation, concerned with the civil
liberties aspects of surveillance (e.g. Campbell and Connor, 1986;
Davies, 1996), and several of our contributors to this book raise
similar fears and suggest safeguards. This is entirely proper since
the surge of surveillance in recent years poses sharper threats to
liberty than before.
There is also a well-established tradition of thought, in both the
United States and Britain, that objects to surveillance on grounds
of intrusions on privacy (e.g. Rosen, 2000; Garfinkel, 2000;
Thompson, 1980). The issue of privacy always – and rightly –
looms large in consideration of surveillance. Fischer-Hubner
(2001), drawing on Westin (1967), helpfully distinguishes three
main areas of privacy – territorial, personal (of the body) and infor-
The Intensification of Surveillance 13
book issues, their train journeys and so forth. But this is to track
someone’s actions, not to get inside their motivations and men-
talities. As such, it is at best an approximation to who they really
are. Further, the recorded data is but a snapshot in time, easily
taken out of context, and devoid of the essential meanings with
which humans accord their behaviours. Faced with an expansion
of surveillance, it is as well to remember that it does not straight-
forwardly give access to the inner workings of the mind.
Second, surveillance does strive to illuminate the observed, to
shine a bright light on subjects whom it would make transparent.
In addition, those who surveille are frequently not known to the
subject. Indeed, the surveillance can be a secondary product of a
particular action, which sets the surveiller still further apart from
the surveilled (for example, the payment of the meal may be
recorded as a measure of a lifestyle pattern by the market
researcher who melds it with other information, not simply as the
transaction concerning the dinner imagined by the restaurant
user (cf. Monmonier, 2002)). But this ambition and this secondary
and unstated purpose are affronts to the self, both because there
is something essential to one’s identity that calls for limits on
what may be known about oneself to others, and because to
garner information for disguised purposes is morally dubious.
We would emphasize the importance to the self of there being
limits to surveillance. The reason for this is that a transparent
self is a non-self, one that can have no control over what is
revealed to others, something surely essential to one’s sense of
being. To be sure, one does reveal oneself to one’s intimate
friends, but note that this takes place over time and in intimate
circumstances, and typically involves reciprocity. That is, one
reveals oneself to others by choice in terms of mutuality, trust
and openness, in situations in which control is more or less
equal. Surveillance takes away this control from the self, and
endeavours to reveal its identity without discussion or reciproc-
ity, thereby being an invasive force that strips the self of its
independence and autonomy.
It is striking that tabloid media especially refuse to acknowl-
edge or allow such differences. The justification of exposure of
private matters (an affair, a financial arrangement, an old rela-
tionship) is that the public and the private should be at one,
entirely consistent. Secrets have no place in such an outlook and
are regarded as unconscionable by a media dedicated to exposure
The Intensification of Surveillance 15
NOTE
1. It is worth adding here that such examples undermine assertions that sur-
veillance is a recent outcome of the application of sophisticated ICTs.
While advanced technologies do facilitate and speed surveillance, the fact
that Stalinist Russia and the entire Soviet regime were infected by secret
police and spies is testimony to the efficacy of non-technological surveil-
lance (Conquest, 1971).
Index
Compiled by Sue Carlton
169
170 The Intensification of Surveillance
e-mail Europol 48
address lists 124–5 exclusion orders 67–8, 74
classification of text 29 Experian 131, 133
interception 17
see also unsolicited bulk e-mails FaceIT 147, 148
(UBEs) facial recognition technologies 19,
Echelon 90 147–8
Economist 101 Falklands War 1982 95
Electronic Communication Act FBI 20, 34, 35, 41, 143
2000 54 Federal Probation 83
electronic monitoring (EM) of Federal Trade Commission (FTC)
offenders 62–84, 139–40 39
acceptance of 69–70 Feeley, M. 82
administering companies 70–1, Fionda, J. 80
139 Fischer-Hubner, S. 12–13
of bailees 64, 67, 72, 79 Fisk, Robert 94
and civil liberties 72 Fletcher, H. 68
and community penalties 67, Foreign Intelligence Surveillance
69–70, 73–6, 79, 81–2 Court 41
creation of digital personae 78 Foucault, M. 6, 20, 22, 112
curfew orders 64, 65, 66, 67, 69, 74 fundamentalism 98–9
dream of omniperception 76–7,
80–1, 83–4 Gandy, O. 6
and early release 66, 139 Garland, D. 81
and exclusion orders 67–8, 74 Geografix 70
failures of 82 Giddens, A. 98, 99
introduction into Britain 64–6 globalization 91–2
and managerialism 79–80, 84 and democracy and human
monitoring staff 71, 76, 139 rights 97, 107
opposition to 64–5, 72–3, 79, 139 effect of economic matters 97–8
and post-release supervision 68 and growth of fundamentalism
press reaction to 72, 79, 81 98–9
public debate 68–73 and inequalities 98
as punishment 72–3, 79, 83, 139 of media 2, 92–6, 106
and seamless sentences 75–6 and military surveillance 145
and sex offenders 68 and nation state 91–2, 96–9, 107
as solution to prison overcrowd- and peace and conflict 98–9
ing 66, 69, 72 Gnutella 134
and tracking technology 68 Goffman, E. 15
and women 69–70 Goldenberg, S. 94
Elegant, R. 95 governments, and data mining
Ellison, L. 18 applications 34–6
Ellul, J. 19 GPS 68
encryption 59 Greek, C. 83
Ericson, R.V. 77, 122 Group 4 Falke 70–1
European Union GSSC Europe 71
and computer crime 48 Guardian 94
Human Rights Act 1998 13 Guattari, F. 20
ID cards 142 Gulf War (1991) 101, 102–3, 105
regulation of UBEs 126 Gulf War (2003) 102, 103
172 The Intensification of Surveillance