"Everyone as Other: Video surveillance and the right to be invisible" CRI5 CRIMINOLOGY -- PROJECT CHRIS MCCORMICK.

Slides:



Advertisements
Similar presentations
TECHNO-TONOMY Privacy & Autonomy in a Networked World Learning Module 2: Legislating Privacy: Your Rights.
Advertisements

Course Themes Week 2 Sociology has a distinctive way of understanding human experience Week 3 This distinctive understanding is based on the claim that.
TASK: The comparison between basic and applied research.
Owen Underwood Katherine Lee Heidi Stallings
FUNcTIONALIST PERSPECTIVES OF CRIME
White collar crimes Elite crimes Crimes of the powerful.
Communication & Theatre 4/514 Issues in Organizational Communication Administrative Evil.
Criteria For Approval 45 CFR CFR Minimized risks Reasonable risk/benefit ratio Equitable subject selection Informed consent process Informed.
UFCE : Information Systems in Society Lecture 8: Theorizing surveillance Reading: –Lyon, 2002, Everyday Surveillance: Personal data and social classifications.
Crime Control or Crime Culture? Closed Circuit Televisions (CCTV)
Biometrics Biometrics refers primarily to the measurement of physiological and behavioral characteristics to automatically identify people.
BREAK AWAY SESSION – CAMPROSA CONFERENCE ON BOARD M.S.C. SINFONIA 8-11 NOVEMBER 2011 FORENSIC EVALUATION OF CCTV FOOTAGE Camprosa conference 8-11 november.
Edwin Sutherland Persons of the upper socio-economic class engage in much criminal behaviou; this criminal behaviour differs from the criminal behaviour.
DIGITAL CULTURE AND SOCIOLOGY session 4 – Susana Tosca Digital Culture and Sociology People Online.
Perpetuity Research & Consultancy International (PRCI) Ltd Is CCTV working? The effectiveness of CCTV and the British experience.
Ethics in a Computing Culture
The media is extension of our central nervous system Group members Bolarinwa Adedamola (Dammy)
Working group discussion 1 Cyber Risk Security, Privacy ?
© Digital Worlds Embedding Geographical Information Systems into the Curriculum.
ESSAY WRITING Can be fun.
Banking and Financial Services
MODELS IN SCIENCE AND RELIGION Unit 2b: What is real?
JOSEPH M. PIRO LONG ISLAND UNIVERSITY Foucault and the Architecture of Surveillance: Creating Regimes of Power in Schools, Shrines, and Society.
Identity, privacy and technology: DNA fingerprints, identity cards, and CCTV HI 269 Week 5.
ByBrendanMalindaRachael. Electronic Monitoring Electronic monitoring can take many forms, this happens because technology is becoming cheaper and very.
1 RESEARCH DESIGN: What are you researching? Identifying a researchable question Assignment 1: Reviewing the Literature.
Adolescent Literature Also called Young Adult (YA) Literature And the Panopticon.
Lecture 3 A Theory of Consumer Choice. VPD This is an industry in which vertical product differentiation prevails. Producer/distributors are perpetually.
CCTV AND IT’S FUTURE SAMPLEPRESENTATION CCTV What are we doing with CCTV? What will CCTV be like in 10 Years? How about tomorrow?
Torrington, Hall & Taylor, Human Resource Management 6e, © Pearson Education Limited 2005 Slide 22.1 Protection from Hazards Conflict between needs for.
Videographer Basic Tutorials For the Internet. Materials you should have At least a 150 GB external drive Your camera The proper cables needed to connect.
CRIME PREVENTION AND THE BUILT ENVIRONMENT IN TANZANIA By Ludigija Boniface Bulamile, Lecturer, Department of Architecture, University College of Lands.
Mobile Audio/Video Recording Equipment Policy and Procedure Number PP
Airports Authorities of India Jaipur Airports Authorities of India Jaipur
Massachusetts Digital Government Summit / Session - Smile You're On CameraPage 1.
 The benefits of embryo research come mainly from stem cell usage  it is hoped that stem cells can be stimulated to develop any tissue or organ of the.
Biometric Information Databases To Use, Or Not To Use? With computers, cloud storage, and wireless communications we are pierced upon the horns of a three-pronged.
Copyright © 2012, 2009, 2006, 2001, 1997 by Pearson Education, Inc. Upper Saddle River, New Jersey All rights reserved 0 Criminology: A Sociological.
Halfway through Pinker Seeing the forest despite all those damn trees.
Chapter 7 Sampling Distributions Statistics for Business (Env) 1.
Producing Data: Toward Statistical Inference PSBE Chapters 3.3 © 2011 W.H. Freeman and Company.
BERLIN I.A.Q.G. GENERAL ASSEMBLY KEY NOTES M. PLATONOFF - AIRBUSBerlin 27th June BERLIN I.A.Q.G. - June 2001 GENERAL ASSEMBLY KEY NOTES.
DATA PROTECTION ISSUES PERFORMING VIDEO SURVEILLANCE XIV Case Handling Workshop Athens, November 2006.
PROTECTION OF PERSONAL DATA. OECD GUIDELINES: BASIC PRINCIPLES OF NATIONAL APPLICATION Collection Limitation Principle There should be limits to the collection.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Security in Cloud Computing Zac Douglass Chris Kahn.
So, what’s the “point” to all of this?….
Computer Security The World of Cyber Crime Presentation Details This presentation will explain the purpose of bypassing security or stealing information.
Youth, Crime and Media MEP Surveillance, CCTV and media.
Threat Prevention and Detection (within Critical Infrastructures) under EU Data Protection Legislation– Purpose Specification and Limitation. Laurens Naudts.
Society & Computers PowerPoint
Investigating Career Clusters Agriculture Growing crops and raising animals for human use Food Substance consumed by living things for energy and growth.
ORWELL’S 1984 AND FOUCAULT THURSDAY ORWELL -BORN ERIC ARTHUR BLAIR, AN ENGLISHMAN, BORN IN INDIA IN SERVED WITH INDIAN IMPERIAL POLICE.
Johan HolmqvistProfessional Ethics Mälardalens högskola Västerås,
Contents Expectation Setting and Diagnostic Final Project
The Surveillance Society COM 327 February 5, 2013.
CCTV - Security Cameras
1 Whose Health Is It Anyway Smith & Goldblatt Book 2 Chapter 2 Presentation: Dr. Faisal Al-Qahtani.
By: Sambit Pulak XI-IB. Surveillance is the use of IT to monitor the actions of people. For example, monitoring may be used to track, record and assess.
Video Surveillance Market to Global Analysis and Forecasts by Components and End-user Industry No of Pages: 150 Publishing Date: Jan 2017 Single.
Judicial Training on Data Protection and Privacy Rights
Name Of The College & Dept
Edwin Sutherland Persons of the upper socio-economic class engage in much criminal behaviou; this criminal behaviour differs from the criminal behaviour.
Location Cloaking for Location Safety Protection of Ad Hoc Networks
CCTV for Secured and Safety Living. Close circuit television monitoring system is commonly known as CCTV. It has great importance in the current world.
The Panopticon and The Hunger Games
ELEC4011 Ethics & Electrical Engineering Practice Hugh Outhred
Surveillance Learning Objective:
“Security and self-defense” as a school subject
IT and Society Week 2: Privacy.
Presentation transcript:

"Everyone as Other: Video surveillance and the right to be invisible" CRI5 CRIMINOLOGY -- PROJECT CHRIS MCCORMICK

INTRODUCTION This project looks at the topic of CCTV from the perspective of modern surveillance theory Included are pictures of surveillance cameras around the city of Fredericton These are used for both public and private purposes --they surveil pubic, private, and ‘semi-public’ areas Most cctv employed by private companies for own security, property-loss prevention --yet deployment into space where public is invited (expressly or implied), makes it a public issue --creates physical, mental & emotional spaces

TOPIC video surveillance important due to ubiquity of camera --consequences of everyday life subject to surveillance --feature of daily life in urban Canadian landscape perpetually taping public transactions of private individuals --buying gas, at the bank, and inside commercial stores --surveilled driving through fast-food lines, entering buildings --watched inside hospital and walking around university --taped from inside bank machines and inside elevators Largely innocuous, they are a low-key, but ever-present element of modern urban life Can you identify the Freddy- cam in the picture on the next slide? Click through to see a closeup).

camera

TOPIC, CONT. Used largely by private companies for security reasons --comprise network of video surveillance, ’contains’ public Fredericton public CCTV: Piper's Alley, --but also citycams, university, high school, hospital …. However, there is a vast 'network' of private camerage --eg. gas stations; fast food outlets; banks; grocery stores

Available to police/courts during investigation, prosecution --create network of visual control accessible by the state --downloaded onto private sphere, but usable by state Focus on 'semi-public' areas, largely controlled by private companies, but where public invited (expressly or implied) --also located within public areas (schools), to which the public has less access. NEXT: “Surveillance is the most meticulous when it is directed against the lower class”

GENERAL ISSUES OF SURVEILLANCE Foucault’s metaphor of surveillance Based on Bentham’s panopticon ‘prison’ conceived in 18thC Panopticon circular building with prisoners in cells on rim Dimly lit central tower, few inspectors needed to monitor multitudes of inmates The cells illuminated, thus prisoners found it difficult to tell whether observers were there or watching any particular cell ‘Gaze’ sovereign: prisoners were seen but could not see Coercion not needed because inmates individualized “Power so perfected rendered its practical use unnecessary”

ISSUES, CONT. Social controls dispersed, extended “deeper penetration of control into the social body” New ‘scanscapes’ of control, indirect regulation Based on calculations of risk 1/ Retreat of state in maintenance of order --can’t guarantee safety, security --devolution of crime prevention onto victim 2/ shift from identification of individuals to aggregates --deviance not moralistic but probable-istic

FIN DIN GS Visuals collected from around city --public, private, and semi-public areas --high-density commercial areas Most cameras private, some public However, private/public distinction inadequate Many (private) areas are where public invited 1/ “Semi-public areas”: surveilled as if under suspicion 2/ “Semi-public areas”: physical & mental spaces --anonymous movement through watched spaces --watch oneself because of being watched --management of risk assumes no one can be trusted

ANALYTIC SIGNIFICANCE Video surveillance is an important topic because of: 1/ understanding the organization of public life --control done through modern institutions --the panopticon is the viewing of the public 2/ the development of systems of control --ruling at a distance, temporally and spatially --creates the illusion of safety 3/ theorizing the self in modern society --surveillance makes us feel distrusted --creates urban space as muting personal expression

CONCLUSION Video surveillance situated in use in modern society Illustrations from collection of Fredericton's video cams Theorizing surveillance as expression of power --unintended consequence modifying of emotional life --shaping expression of proper consumer behaviour -- no one is beyond suspicion Two conceptual discoveries made during auto/ethnography --1/ person moves through public, private, & ‘semi-public’ spaces in modern city -- 2/ person moves through spaces physically, mentally, emotionally Public watches itself being watched, moves confident in realization of surveillance, despite being object of suspicion