Surveillance After September 11, 2001 David Lyon Lee Jungrye English Language and Literature

Slides:



Advertisements
Similar presentations
UFCE : Information Systems in Society Lecture 8: Theorizing surveillance Reading: –Lyon, 2002, Everyday Surveillance: Personal data and social classifications.
Advertisements

Development of a Surveillance Society By: Tyler Madden (Comp 1631, Winter 2011)
Relocation, relocation, relocation... MFL, History and PHSE moving together…
Propellant for National Spirit and Social Development --- Volunteerism in Shanghai Propellant for National Spirit and Social Development --- Volunteerism.
Bell Ringer. US-U9-L5 SSUSH25 G. Analyze the response of President George W. Bush to the attacks of September 11, 2001, on the United States, the war.
Budapest, September 29-30, 2011 Terrorism and Democracy in the 21 st Century Supervising Intelligence Networks: the new challenge for oversight Peter Gill.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Counter-Terrorism Implementation Task Force (CTITF) Open Briefing to Member States 27 July 2010 Conference Room 2 NLB.
Cultural Competence “Whenever people of different races come together in groups, leaders can assume that race is an issue, but not necessarily a problem.”
Management Roles l Management functions and roles l How is the management of HCOs different? l What are the challenges of HCOs management in the 90s and.
 Before you attempt the question given to you as an assignment … you must take note of the following information: ◦ A primary goal of terrorism is to.
Security By: Brad Martin and Nick Mcdowell. History After September 11 th the united states took extreme measures to make sure an event like that would.
A Common Immigration Policy for Europe Principles, actions and tools June 2008.
Felicity Gerry QC USING TECHNOLOGY AND LAW TO COMBAT HUMAN TRAFFICKING.
Starting at the beginning Foundations of Citizenship Unit one A Portrait of Americans Chapter one American Society And its Values Chapter two The Meaning.
Globalization. Definition: An economic phenomenon An economic phenomenon A social phenomenon A social phenomenon A cultural phenomenon A cultural phenomenon.
Jackie Phahlamohlaka Mapule Modise Nthumeni Nengovhela
Homeland Security. Learning Topics Purpose Introduction History Homeland Security Act Homeland Defense Terrorism Advisory System Keeping yourself safe.
Managing Organization Change and Innovation Chapter 12.
Presented By:. War in Afghanistan The war against Afghanistan was launched after Al Qaeda launched an attack on United States The United States attacked.
Globalization and reforms in the higher education sector Somayeh Parvazian.
HIV Prevention and Treatment for Men who have sex with Men: Achievements and Challenges Ifeanyi Kelly Orazulike National Coordinator Sexual Minorities.
Implementation of Personal Data Protection Strategy Kick-off Event Expert Workshop Presentation by Christof Tschohl Legal Researcher Ludwig Boltzmann.
EU responses to international terrorism. Definition of terrorism Schmit & Jongman: ‘an anxiety-inspiring method of repeated violent action, employed by.
UNITED NATIONS Population Unit ECONOMIC COMMISSION FOR EUROPE Road Maps for Mainstreaming Ageing  Fiona Willis-Núñez.
© 2012 Delmar, Cengage Learning Section V Getting the Job Done… Through Others Chapter 17 Learning from the Past; Looking to the Future.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
“Nineteen Eighty Four”, by George Orwell An Introduction.
Assessing Global Political Risks. Types of Political risk Companies have to evaluate all the possible risks that could happen in the potential foreign.
1 Building the Privacy culture, starts with the youngsters and their education 20 th and 21 st June 2013 Zagreb, Croatia.
Chapter 1 Defining Social Studies. Chapter 1: Defining Social Studies Thinking Ahead What do you associate with or think of when you hear the words social.
Copyright © Cengage Learning. All rights reserved.8 | 1 Globalization and Education Chapter Eight.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Babak Akhgar, Simeon Yates & Eleanor Lockley Chapter 1 - Strategy Formation in a Globalized and Networked.
Piemonte Workshop 1 11 September 2006 Paolo Salieri European Commission DG ENTR-H4 Security research in FP7.
Chapter Extension 16 Information Systems and Counterterrorism © 2008 Pearson Prentice Hall, Experiencing MIS, David Kroenke.
Dr. phil. Dr. rer. publ. Brigitte Jansen
@Fokus Security: Location Service for Security Companies Luis Felipe Del Carpio Vega Jiahua Chang Shan Gao Zhiheng Yang S Product Development of.
Surveillance After September 11, DAVID LYON Surveillance Online Journalism Jeong Goeun Seo Yeonjeong Lee Younhong.
 Organized crime has increased considerably while having a negative effect on the State and population.  The operation mode of organized crime is complex.
Radicalisation in Cumbria
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Collective Information Practice: Exploring Privacy and Security as Social and Cultural.
September 9, 2013 Question: What are your duties as a citizen? Objectives: Students will be able to identify the purposes and forms of government. Agenda:Complete.
CHALLENGE The Changing Landscape of European Liberty and Security CHALLENGE The Changing Landscape of European Liberty and Security Integrated Project.
1 “Media and Sovereignty: The Global Information Revolution and Its Challenge to State Power” Monroe E. Price, Ch. 36, pp (Excerpted from Price,
George Orwell’s. George Orwell  Born Eric Blair in 1903, in India, into an upper middle-class English  Went to Eton, one of the most expensive and prestigious.
Community BASED Policing/ ADELIN+JANNU. Structure Of Presentation Introduction for Community Based Policing Four basic principles of Community Based Policing.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Kristian Krieger, M. Brooke Rogers Chapter 7 - Promoting Public Resilience against Chemical, Biological, Radiological.
Eftec Economics for the Environment Consultancy Catchment Management in the UK: The Role of Arguments for Biodiversity envecon 2015: Applied Environmental.
CANADIAN IMMIGRATION. How well do Canada’s immigration laws and policies respond to immigration issues?  Canadian government- chooses who can or cannot.
Performance Evaluation Policy Macon County. Performance Appraisal is a process... Not a form or document.
PRIVACY Carl Hoppe Ted Worthington. OUTLINE What is privacy? What is privacy? 4 TH Amendment Rights 4 TH Amendment Rights Technology Growth and Privacy.
Directions Complete the PowerPoint Guided Notes. When finished with the PowerPoint, read the article on page 4 and analyze the political cartoons on pages.
Project idea of L.N. Gumilyov Eurasian National University within the framework of the European Programme “HORIZON 2020”
Crime Prevention Basics Morganton Department of Public Safety Criminal Investigations Division In conjunction with the Special Operations Division.
Into a New Century The War on Terrorism. September 11, 2001  Two airplanes hit the World Trade Center and a third hit the Pentagon A fourth plane was.
Radicalisation in Cumbria
Chapter 13 CIVIL LIBERTIES: Ordered Liberty in America
Bellwork Think about this…. Historical Event
Maritime Security as an Integral Part of an
Monday, September 28, 2015 Objective: Agenda: Notebook: Daily Quote:
What is terrorism? There is no agreed definition of terrorism internationally. The UK’s Terrorism Act 2000, defines terrorism as: The use or threat of.
BUSINESS ENVIRONMENT.
War on Terror.
Expository Essay.
Michael Mann’s “IEMP” Model of Power
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
8. Economics and Politics
Geopolitics & Lobbying
Introduction questions and scenarios
Presentation transcript:

Surveillance After September 11, 2001 David Lyon Lee Jungrye English Language and Literature

‘Big event’ - Transformation device between past and future - Indispensable prism to see social structure and process Also, surveillance is ‘Products of Modernity’ The September ‘terrorist’ attacks

Aftermaths of September ‘terrorist’ attacks - Military retaliation in Afghanistan - Extensive anti-terrorist legislation - Especially enhance surveillance operations iris scanners, closed circuit television(CCVT), political control on everywhere

Is surveillance good or bad? Bad?! Good?! Fare treatment of suspects A question of human right

- The expanding range of already existing range of surveillance processes and practices that circumscribe and help to shape our social existence - The tendency to rely on technological enhancements to surveillance systems Aspects of social structure and process of surveillance after 911

- Passed legislation intended to tighten security to give police and intelligence services greater powers, and to permit faster political responses to ‘terrorist’ attacks But, some questioned How new and necessary are the measures? How long the measures will be in force? Legal changes after 911

- Giving high-tech companies the opportunity to launch their products But, what about the price? - Technologies may be not precise - Social division and exclusion within the countries - Seeking superior technologies appears as a primary goal But, original terrorism involve relatively aged technologies Technical changes Technical changes after 911

Not long ago surveillance is - Centralized power - Big Brother, Class weapon, Unseen observer - Panopticon is a key point - Centrally controlled and coordinated system Social changed after 911

- Panopticon : A type of prison building to allow an observer to observe all prisoners. A power to control public. A surveillance system constructed by information technology. - Big Brother : A fictional character in George Orwell’s novel Nineteen Eighty- Four. Everyone is under complete surveillance by the authorities, mainly by telescreens. Authorities or power with monopolized information control a society.

Recent studies about surveillance - As a looser, more malleable and flowing set of processes – “Surveillant Assemblage” - Our daily experiences - Mundane moments - Designed in to the flows of everyday existence Social changed after 911

In the surveillant assemblage Then, question on hierarchies and centralized power Abstract human bodies from their territorial settings Reassemble in different locations as virtual ‘data doubles’ Separate them into flows

- Centralized state informational power - Socio-technical developments - Growth of information and communication technologies in personal and population data processing - More networked modes of social organization with flexibility and departmental openness Social changed after 911

- Potential threat to privacy and individual freedom - Social sorting : Verifying identities and assessing risks based on large personal information databases. Powerful means of creating and reinforcing long-term social differences. Surveillance and privacy Is it intrusion or exclusion?

- Reproducing and rein forcing social, economic, and cultural division in informational societies - We are “Bearers of our own surveillance” - The degree of collaboration with surveillance depends on a range of circumstances and attitudes Contemporary surveillance

- Effective in some very limited circumstances - Only increasing internal surveillance of citizens - Terrors can be by other means (not with high-tech) Limitation of surveillance

Surveillance responses to September 11 - Helps to make visible the already existing vast range of surveillance practices and processes that touch everyday life in informational societies - Surveillance is more dispersed that centralized, more intrusive then exclusionary, that data-subjects are dupes of the system, that it is technically-driven, that it contributes more to prevention than to investigation after the fact. Conclusion

Where are democratic accountability and ethical examination in surveillance systems? Only to start with a willingness to listen to others, care for the other to relieve and prevent suffering Conclusion

Thank you ^^