Back to Main Menu | References | Notes
Gilliom, John. Overseers of the Poor. Chicago: University of Chicago Press, 2001. P.186.
McCahill, Mike. The Surveillance Web. Devon: Wilan Publishing, 2002. P. 219.
Newburn, Tim and Hayman, Stephanie. Policing, Surveillance and Social Control. Devon: Willan Publishing, 2002. PP. 198.
Tunnell, Ken. Pissing on Demand. New York: New York University Press, 2004. PP. 208.
By Gary T. Marx
Gary T. Marx is Professor Emeritus, MIT, and an electronic (garymarx.net), and occasionally itinerant, scholar. His most recent itinerancies have been in law and society programs and law schools at the University of Illinois, West Virginia University, University of Washington, UC Berkeley, and Northwestern. He is author of the forthcoming Windows into the Soul: Surveillance and Society in an Age of High Technology (University of Chicago). He is a founding member of the Scottsdale and Bainbridge Island Bike and Kayak Club. This review continues an interest in the complexities of social control that began when as a graduate student in a civil rights group (CORE), he learned that the treasurer who had absconded with the group’s funds was also a police informer. That event radically contrasted with earlier positive experiences in a Boy Scout troop sponsored by the Los Angeles Police Department.
I am very appreciative of the critical suggestions of Albrecht Funk, Jim Horning, and Karl Shoemaker and the editorial encouragement to write an essay rather than a book report.
I hope you do not assume yourselves infallibilitie of judgment when the most learned of the apostles confesseth that he knew but in parts and saw but darkly through a glass.Sir Richard Saltonstall
Recent Studies of Surveillance
Those writing about surveillance technology and social control issues in the 1970s and early 80s were frequently asked, “Why would you want to study that?” The topic was seen as atheoretical, marginal, and even tainted by its proximity to the forces of darkness and dystopia. The field was viewed as more the province of science fiction writers, the sky-is-falling journalists and ACLU activists than of serious scholars (at least of the professionally certified kind). Studies of technology and society also had to deal with the ever-present suspicions of technological determinism.
Certainly the growth of computers with centralized databases and revelations regarding Watergate and the FBI’s COINTEL program suggested areas of public policy concern, but the Freedom of Information Act and related legislation such as the 1974 Privacy Protection Act (which grew out of the Presidential Privacy Protection Study Commission), new FBI Guidelines and local law enforcement reforms dealt with these problems.
The field received minimal social science attention. For almost two decades legal scholars Samuel Dash, R. Schwartz, and K. Knowlton (1959) and Arthur Miller (1971), political scientist Alan Westin (1967), and sociologists Stanton Wheeler (1969) and Jim Rule (1974) had little company. In the early 1980s attention to the topic increased with work such as that by journalist David Burnham (1983), philosophers Sissela Bok (1978, 1982) and Fred Schoenman (1984), and sociologist Ken Laudon (1986). A small social and environmental psychology literature also existed (Altman 1975; Margulis 1977; Ingram 1978). In addition, there were some classic law articles reviewed cases and asserted central principles or values. (Fried 1968; Bloustein 1979; Gavison 1980). Finally, the topic also received some attention from those in management, labor, and communications studies.
In general the ardor of the surveillance studies bibliophile could be easily and responsibly sated. Yet over the past two decades as the man in the film said, “things change”, and contrary to the French aphorism, in important ways they did not remain the same. 1
Today, contemporary scholars, no matter how conscientious, technologically supported, and sleep deprived, cannot begin to keep up. The number of articles, books, and reports is vast and rapidly expanding. From 1960-1970 Sociological Abstracts listed just 10 articles that included the concept surveillance, this increased to 87 and 156 in the next two decades: From 1990-2000 577 such articles appeared, and in just the next three years, more than half that number. 2 Using the concept privacy, the search engine LegalTrac reported only 37 law-related articles using the concept privacy in 1980, 275 by 1990, and 649 in 2002. 3
There are new journals (e.g., Surveillance and Society; Ethics and Information Technology; The Information Society; Communications, Law, and Policy; New Media and Society, special issues of traditional journals (e.g., Jermier 1998; Mack 2001; Marx, 2002a; Marguiles 2003; Van Harten and Van Est 2003; Hillyard 2004, and even a new interdisciplinary, international area of surveillance studies greatly encouraged by the work of David Lyon and his colleagues at Queens University in Ontario. The topic touches an ever-expanding number of fields from public health concerns with epidemics (e.g., AIDS and SARS), management concerns with hiring, work monitoring and productivity, marketing and media concerns with sales and persuasion, and the emergent crosscutting area of risk assessment --whether involving insurance, mortgages, credit cards, criminal justice, or national security.
The continuing surge in surveillance interest following 9/11 is a factor here (e.g., Lyon 2003; Ball and Webster 2003; Cate 2004), but the breadth and depth of this interest preceded, and go far beyond, security issues, even as these issues accelerate developments within the other areas and seek to encompass them. For better and worse, social inquiry is much driven by contemporary social issues and newsworthy events.
Central to this expansion, particularly for traditions of social control, law and society, and criminology are theoretical essays drawing on and extending Foucault (although he was writing about earlier centuries); further in the background, Taylor, Weber, Neitzsche, Marx, Bentham, and Hobbes; and even further in the background the watchful and potentially wrathful eye of God in the Bible. Work such as that by Cohen (1985), Giddens (1990), Poster (1990), Gandy (1993), Lyon (1994), Bogard (1996), Brin (1998), and Staples (2000) in general tend to draw on newsworthy accounts and secondary empirical data and sweep across technologies in offering macro-theoretical accounts. Journalists take even more license (Davis 1990; Sykes 1999; Garfinkle 2000; Parenti 2003).
Among central ideas found in much recent literature involving the rise of scientific and technical approaches to social control are the following: 1) Surveillance is about the exercise of power, 2) knowledge is central to the exercise of power, 3) the technical ability to know and use knowledge has undergone profound quantitative and qualitative changes, 4) data collection vastly expands in breadth and depth continuously (or routinely if episodicly) covering (and recovering) ever more areas of life, often giving meaning to what previously was meaningless, 5) the internal and external connectivity of various forms of knowledge increases, enhancing the power of the center but not requiring it to be directly on the scene, 6) the surveillance of subordinates spills beyond the organization and specific cause to the decentralized, categorical examination of routine activities, 7) data collection is ever more embedded and automated as it becomes a part of the activity itself (e.g., credit cards, communication, driving, room temperature) rather than being imposed upon it, 8) the classification of subjects becomes ever more precise and differentiated, 9) a bright line separates controllers from the controlled and the guilty from the innocent, 10) the power to act of the state and organizations grows ever greater and this is matched by lessened visibility 4 and accountability and the weakening of those controlled, 11) surveillance subjects are passive, indifferent, or even cooperative as a result of ignorance, manipulation, deception, or seduction, 12) surveillance phenomena (whether characteristics of the means, data collected, users, goals, or settings) are generally treated in an undifferentiated fashion as monolithic and unidimensional, 13) things work as planned, and 14) if we are not careful (and, even then, perhaps), dystopia is just around the corner, or at best a few blocks away.
These ideas have been central to framing current popular and academic perspectives and debate. 5 They were reflected in concerns about surveillance, Big Brother and Sister, and the latest spying technology even prior to 9/11. Given the field’s importance both socially and theoretically and its neglect until recently, surveillance essays were very welcome in alerting us to the changes. They generally simply assert and selectively illustrate their claims rather than assessing and documenting them with primary data. Not surprisingly then, this work often seems unduly general and sweeping. Being insufficiently bounded by systematic empirical data, it gives abundant room for the play of argument by example whose representativeness is unknown. That such work generally lacks testable propositions and does not adequately analyze variation may also reflect the field’s infancy. The energy of a youthful argument is rarely the friend of nuance.
Four Recent Empirical Surveillance Studies
The four books reviewed here grow out of this tradition. But they also extend it and make clear the need for frameworks that can organize and integrate the rich empirical findings that they and subsequent studies will uncover as the field matures and moves on the continuum from social speculation toward social science. These works are important because they are among the first book-length systematic empirical studies of particular kinds of new surveillance technology in the last decade. 6 They suggest a more variegated world with respect to what needs to be explained and judged, although their focus is generally on documentation and illustration rather than explanation. Their data require qualification and a hearty “yes, but” to many claims of the previously dominant surveillance essays.
The books treat three surveillance techniques: computer matching, video cameras, and drug testing. In contrast to many studies of the law, surveillance, and privacy, the focus is not on legal doctrine, judicial decisions, or even much on the behavior of traditional judicial agents of the state. Rather these books refreshingly study the behavior and experiences of those involved (whether as watched, watcher, or both) with new surveillance means. They call attention to the behavior of “private” (if border-blurred) agents, such as the guards watching mall video monitors and those not usually thought of as control agents such as welfare workers.
Writing from political science and sociology perspectives, the books, like most social studies of contemporary newsworthy topics, are more focused on social problem or behavior than discipline-focused. Their empirical data tend to be qualitative, or when quantitative, minimally analyzed with multivariate and statistical techniques. Here they contrast with the more quantitative, discipline based propositional approaches that tend to characterize the work of economists, geographers, psychologists, and administrative scientists dealing with personal information questions.
The books are rather atheoretical, or at best moderately theoretical, emphasizing descriptive questions and findings. Each study is placed within a context of larger ideas, but this is by way of illustrating the data’s consistency with, or opposition to, these rather than an explicit effort to test them. While occasionally flirting with the symbolic and interpretive, they are also distinct from cultural studies of surveillance and control (e.g., Marx 1996; Groombridge 2002; Doyle 2003; Mann, Nolan, and Wellman, 2003; McGrath 2003; Scher 2004). After a summary and comment on the books’ questions, methods and central findings, I look across the studies and consider some broader implications and ideas that can help integrate their findings and advance the field conceptually.
Seeing Over and Under the Poor
In Overseers of the Poor, John Gilliom continues his empirical research program on elite social control efforts through technology, admirably begun with his earlier book on employee drug testing (Gilliom 1994). In that book he considered the results of a survey of union members about drug testing and analyzed federal court decisions. The current book also involves a small survey. However, the focus is not on legal doctrine, but rather on the failure to draw upon it. In Overseers he studies the application of a computerized client-information system to females receiving Aid for Families with Dependent Children (AFDC).
Welfare mothers have faced increasing surveillance over time. In Ohio this culminated in a computerized client information system called CRIS-E (an acronym for Client Registry and Information System- Enhanced, which might also be read to refer to a crisis, whether for the surveilled or the state). The computer-enhanced means of data collection and analysis narrowed the mesh of the social control net in gathering new kinds of information and matching diverse data bases. The study is based on 48 semi-structured interviews (or in his terms “conversations”) carried out by interviewers who had themselves previously been recipients.
He asks three descriptive questions: What goes on in the politics of surveillance? What effects does sustained surveillance have on people’s lives? and “what is it that people say and do as they struggle with new policies of surveillance? He answers these not with the “agendas and vocabularies of lawyers, academics and policymakers,” which dominate so much public discussion, but in terms of the accounts of those subjected to the techniques. As with other recent field-expanding studies (e.g., Ewick and Silbey 1998), his method is that of the empiricist venturing beyond the confines of the courthouse and legislature to look at the law in everyday lives.
Welfare surveillance is viewed as characteristic of “the reductive and authoritarian ways of knowing that mark modern bureaucracies.” 7 Recipients “live with a system of laws that is threatening, confusing, and mean-spirited” (p. 41). 8 Rights and legal action for such persons are seen as mythical, if not outright deceptive. The routine use of systematic personal data is viewed as the primary means through which elites exercise power over the poor.
The new welfare surveillance, as with other contemporary types, shows a more abstract, centralized, formal, and reductionist form of state power resting less on the uniqueness of the local situation and the judgments of the welfare agent than previously. Here technology restricts discretion and constricts the space to negotiate.
The system of knowledge generated by the computer is seen as a form of domination. While extreme, the welfare example reflects the standard deal offered by modern society that legitimizes intrusions into private realms: Give us your information in exchange for [fill in the blanks] welfare, employment, a license, insurance, a loan, tax reductions and various privileges, subsidies, exemptions, and identities.
Gilliom subtitles his book, Surveillance, Resistance, and the Limits of Privacy. He convincingly argues that the catchall phrase “right to privacy” is inadequate to describe the anger, powerlessness, domination, and fear that surveillance may generate in its subjects, nor does it offer adequate means of protection. Beyond material consequences the new system of record keeping is a “fearsome presence” (p. 113) with implications for how the mothers see and feel about themselves in view of the state’s simplification of their identity and lowering of their self-esteem. Attention to the subjective and longer term consequences of surveillance is vital for our understanding.
Gilliom says that “behind, betwixt, or beside the public discourse of privacy rights were other ways of speaking and thinking about surveillance that could and should inform our confrontation with these issues” (p. xii). He finds these ways in the seldom-heard accounts of the “often sad, sometimes frightening, and frequently quite noble lives [of those] attempting to mother below the poverty line in rural Appalachia” (p. xi).
As would be expected, the mothers don’t like this degree of surveillance, especially when eligibility requirements and the linked data collection involve areas of family, sexual behavior, income, and expenditures. Beyond the sense of intrusion, the information, with its implied threat of finding rule violations, is used by the state to manage important economic and social aspects of recipients’ lives.
But rather than responding with the language and formal actions of rights to privacy and other legal and political claims, their individualistic challenges involved something much more basic –protection of their families’ needs via creative violations of the rules, such as those restricting income and the presence of male partners. 9 Instead of seeing little acts of everyday resistance (such as bartering or hiding income) as nonpolitical and generally futile, he argues that these advance important values and ends, and reaffirm “admirable and widely shared principles of human responsibility” (p.16). 10 The law for those studied is not a means of empowerment but an obstacle to be overcome in pursuit of the higher socially responsible values associated with caring for one’s family and fending off state intrusions, which however legitimated by procedure and reference to other values, are seen to go too far into personal realms.
Gilliom takes as a central problematic the failure of those studied to resist a system that is seen to invade the legal right to privacy. The lack of legal consciousness and rights mobilization suggest a problem to be explained: Why is there an absence of “complaints about how surveillance measures invade an existing legal right to privacy?” 11 He notes how need and dependence, powerlessness, fear of sanctions, lack of information, the complexity of AFDC’s rules, and ignorance of rights work against the bold formal assertion of complaints regarding the welfare system. The mothers’ need was great, and their resources to both conceptualize and literally offer legal challenges were minimal. Rather than a tool to pursue justice, the law is a roadblock to be detoured around.
His findings are consistent with the literature on political mobilization in that the poorest off are usually too weak and overwhelmed to organize in traditional ways. This finding is also related to the larger question of why privacy issues, as salient as they are in the United States, do not usually generate broad political mobilization.
The politics of surveillance is hardly restricted to the poor. In an epilogue Gilliom reports on his serendipitous visceral encounter with some involuntary participant-observation data. The book moves from surveillance of welfare recipients, who for the practical purposes of everyday life are seemingly beyond the legal system, to a surveillance episode involving those thoroughly within it–a law and society professor and his wife, the head of the local ACLU. The incident involved a fruitless search (complete with a black helicopter) of the Gilliom rural home and land for marijuana cultivation based on an imprecisely drawn warrant (marijuana was being grown in a nearby federal forest).
The social scientist surveilling the lives of his subjects becomes the subject of unwarranted state surveillance. 12 Innocent of any wrongdoing, Gilliom movingly reports the sense of shock, anger, and powerlessness that accompanied the armed intrusion of his home:
“the doors of our home were opened and our dressers, beds, desks, toy closets, jewelry and medicine cabinets were all thrown open to the pawing hands of the deputies. Letters, family photos, underwear, jewelry, even our children’s toys were tossed, dumped, and rifled. I hope that the reader can pause and imagine absolutely every nook and cranny of your home ransacked not just by strangers, but by strangers who would probably like nothing more than to hang you out to dry.” (P. 145)He further reports concern over possible intimidation, planted evidence, and harassment, as he pondered, and was hesitant to aggressively pursue, the legal remedies available to him.
Gilliom writes clearly, locates his quest within the literatures of legal mobilization and surveillance, and engages issues that matter intellectually and socially. 13 He is one of relatively few empirical political scientists or lawyers whose work is grounded in the life situations of those studied, rather than in the free-floating and free good quality of the unqualified abstraction, whether offered by those fearful (or less frequently those supportive) of the new surveillance. In a world where the megaphones and language are dominated by the more powerful (however internally varied they may be), the scholar needs to seek out voices of the less powerful, 14 although of course, with the same critical skepticism brought to any voice (or even greater attentiveness if the observer is in sympathy with the accounts of the observed).
In illustrating the domination and dignity impugning aspects of welfare surveillance as experienced by his subjects, Gilliom writes in the critical dystopian tradition. Yet by their nature, all stories are partial. Arguments about surveillance as domination need conceptual elaboration and to be located alongside of more benign uses as documented in the studies by Newburn and Hayman and MaCahill considered next.
Mirrors in Front of Mirrors: Who’s Watching?
In Policing, Surveillance, and Social Control, Tim Newburn and Stephanie Hayman report on their interviews and observations of the use of CCTV (closed circuit television) 15 in “custody suites,” the lovely laundered British term for what in the United States would be temporary holding cells. As in the United States within the last decade CCTV cameras have been installed in many booking areas in England and Wales and within a limited number of cells designated for holding prisoners deemed to be particularly vulnerable.
Following a tragic death in police custody under unclear circumstances, the police authority created an experiment (although it was a trial program rather than a true experiment) that put cameras in all cells in the Kilburn Police Station in a lower-income, ethnically varied section of north London. The book reports on an “external academic evaluation” requested by the Metropolitan police. It raises “sociological questions and issues about how we use and how we think and talk about the use of CCTV” (p. 170).
Newburn and Hayman describe the problem of deaths in police custody and the case that gave rise to the experiment, analyze records and report interviews with 29 police, 73 detainees, 16 and mediating persons (e.g., medical personnel and lawyers) who enter the suites. Many of the police interviews were within audio-linked CCTV camera rooms and were thus inadvertently recorded. In spite of that, officers “spoke remarkably frankly” (p. 57). The authors locate their findings within broader surveillance issues involving risk in policing and social control, the “management” of subject populations, and police accountability, and they offer sensible policy recommendations.
They ask how the tactic should be viewed, “mainly as a further extension and elaboration of contemporary forms of social control? Or, given what we know about the history of mistreatment of prisoners by the police, particularly those from minority ethnic communities, should CCTV be understood as a means of protecting the vulnerable from harm?” (p. 157). The answer is both.
Their central descriptive finding is that on balance, both guards and the guarded are supportive and even welcoming of the lens. 17 Those questioned perceived that video had led to more restrained behavior on the part of both police and detainees. They agree with David Lyon (1994) that “not only does electronic surveillance have ‘two faces’ –one that intrudes and impacts on privacy, and one that watches and, potentially protects –but both may be visible simultaneously” (p. 3). Their call to focus on “both faces of CCTV” is very welcome. However, rather than Janus (double), it is best seen as polyheaded.
Consistent with most complex and dynamic human endeavors, goals were often in conflict and unclear. There was a (perhaps functional) lack of specificity about what the goals of the program were and how they might be prioritized in different contexts. Among major goals were protection, more effective management, and enhanced police legitimacy through the light the camera is presumed to bring to literally and behaviorally dark carceral corners.
The (1) protection goals --“it’s for your own good” whether for inmates (harm from themselves, other inmates, or staff), or staff (harm from inmates, protection against false accusations) and (2) management goals (accountability, performance evaluation, documentation, and enhanced public confidence) clearly took priority over other concerns, such as privacy or employee expectations regarding limits on observing and recording their behavior. The cost to these values was generally seen as a necessary price to pay as reflected in the following detainee’s words:
“Privacy? That’s not so important. Once you’ve been in prison, you realize toilets don’t have to be private, though that’s not very nice. If it stops police kicking someone about, then going to the toilet doesn’t matter too much” (p. 113).
Still, hanging over the main goals was an uneasiness about an undefined “privacy” and a desire not to be seen as going too far. Clearly some of the watching they were expected to do made the watchers and the watched uncomfortable. Guards also expressed some concern that supervisors might misuse the records, saving minor incriminating material taken out of context for cumulative sanctioning long after the fact. Information can be squirreled away and suspended as a guillotine over the employee.
Interviewees and the authors spoke of “the need for balance”. 18 Here we see the fascinating revelation-concealment, security-liberty dynamic found in all surveillance and control settings in democratic rule of law societies. 19 It is interesting to imagine how much further video might be taken (e.g., there could be many more cameras, they could be attached to or inside persons–in some places they are now worn on police helmets-as well as fixed in building structures, and images could be made available on the internet) and why these actions don’t occur. Apart from the law, there are practical and moral limits on absolute goal attainment, no matter how desirable the goal. Such limits may involve competing values (in this case an inchoate sense of decency and that some actions that go too far), politics (fear of backfire and reciprocity), and logistical and resource limitations.
Also reflective of the goal haze is some blurring of the distinction between, “those being ‘watched’ and those doing the ‘watching” (p. 156). The watchers are themselves watched in their routine interactions with inmates and each other. 20 This introduces some alteration in the power relations usually attributed to this form of surveillance. As the authors, suggest CCTV as a new technique can certainly tell us about contemporary policing.
Yet change has multiple dimensions. Here we see the common pattern of a change in means to a greater extent than a change in goals. In addition, these new means of police accountability reflect changes in form more than function. The new means-whether video in police stations, during interrogations or on patrol cars, or whether cell phones, electronic location devices or computer audit trails fit well with the modern history of policing as a continual process involving efforts to increase accountability (and efforts by subordinates to undermine it), whether this involves the early time boxes, two-way radios, or telephones (Fogelson 1977, Erickson and Haggerty 1996; Meehan 1998).
I particularly appreciated that the authors unpacked some of the complexity around introducing a new tactic such as video surveillance-even within a juridical and clearly demarcated organization and physical location in which customary expectations of the right to be left alone is obviously lessened.
The book shows that one can’t in any satisfactory fashion answer the simplistic question so often put by legislators and journalists (and, sadly, too often facetiously answered by on-the-make politicians, technologists, and social pseudoscientists), “Is it good or bad?” The answer of course is yes and then it depends. The seemingly direct question, “Should CCTV be used in police custodial settings?” turns out to be a series of questions.
Beyond questions dealing with the technical capacities of the equipment chosen 21 are question such as where are the cameras? On the street leading up to the facility and on the building’s exterior perimeter? Are they restricted to the central booking area and in the hallways? Are they also in all cells, or only in those with inmates deemed to be at high risk? 22
How does (and should) the nature of the behavior or interaction affect camera use? Should the camera be off when an inmate is examined by medical personnel or interviewed by external auditors? What of the bath and shower rooms? (Recordings were made but not without reservations on the part of both agents and subjects). 23 What of the cells where suspects are interrogated by police or meet with attorneys? The kind of inmate may matter as well. Should children be subjected to different rules of observation? Should gender of the watcher and watched be matched? Lack of female police meant that it often was not and there were no rules against cross-gender observation via camera.
Should the cameras always be on (whether as a matter of policy or engineered in), and if so, always monitored by an observer? Should the camera be on when there is a strip search? It was. If a camera is not monitored (which for reasons of resource limitation or design is often the case) should a record always be made? 24 When a monitor is present, should a record be made only if there are some grounds for recording such as a disturbance or evidence of self-harm? If made, how long should the records be kept? Who should the monitors be - police or nonpolice? Who should be granted access to the records, and under what conditions? Lay visitors were not routinely entitled to see them. What is their legal status? Who do they “belong” to? 25 How much (if any) and in what form is notice of the camera, its location, and capabilities given?
The authors do not offer systematic means of answering these questions, but they consider them in identifying the topic’s complexity and in discussing in clear prose what is at stake. In a politically charged area such as this, where access to the inner police environment is rarely available and common sense and self-interest too often substitute for empirical knowledge, it is vital to have their observations and interview data. 26
Smile You’re On Candid and Uncandid Camera
The Surveillance Web by Mike McCahill is an empirically informed and wise analysis of video surveillance in an English city. In offering fresh and varied (both in method and content) data, balance, and thoughtful theoretical ordering, this insightful book makes a strong contribution to our understanding of the new surveillance. The book grew out of a Ph.D. thesis and is based on observational, interview, document, and statistical data. Would that all such pedagogical ventures that become books demonstrated this breadth and depth.
McCahill locates his study in contrast to the “very general, abstracted narratives of change” characterizing the surveillance essays that fail to examine “how people in contemporary society experience these changes (p. xvi). He studies the construction and workings of a varied public-private surveillance network in three contexts -shopping malls, industrial work settings, and a housing project in “Northern City.”
No Computer Is an Island
The book’s title is well chosen. A key element of the new surveillance is its systemic and comprehensive nature, at least relative to prior forms. It “sees” in new ways and sees more, and more easily, than ever before --both in what it visually depicts and how much it connects physically, temporally, and culturally separated settings, persons and kinds of information. It also permits replaying and merging present, “real time” sound and data images with those that existed before in delayed electronic form (and before that, only in more easily contested memory, narrative, or drawing). 27 Moreover, it allows the construction of new, simulated categories of the person based on biometric and other data.
The unreflective may view a visible surveillance camera or video display terminal at the entrance to a mall as an isolated stand-alone action, not unlike the taking of a family photo. Yet as McCahill’s data suggest, that is not the case. Images from multiple cameras in a given store are merged and can be saved and sent from the control room. Video surveillance is part of an intricate web with a variety of data potentially flowing back and forth between distinct spatial, social, legal, and technical systems. This technology in turn reflects a broader process of the “assemblage” of previously discrete forms of data and the “invention” or “generation” of new forms. (Deleuze and Guattari 1987; Haggerty and Ericson 2000).
Despite the absence of formal legislation, Northern City has an extensive technical and social surveillance network consisting of electronic linkages between 30 CCTV control rooms. In the book, figure 3.1 (p. 71) usefully depicts the complex latticework of primary, secondary, and tertiary control rooms. While the details are something only a specialist could love, the broader point regarding the degree of integration (and potential integration) among very diverse control systems is powerfully made.
There is of course variation. The highest level of integration is in the “shopnet” public-private system involving 196 internal and 39 external cameras in two shopping centers, four major department stores, seven high-street retailers, and the local police station. In addition varying degrees of connection are seen within and between the video surveillance systems of housing projects.
Public and private CCTV systems are interwoven with pagers, panic alarms, motion and infrared detectors, radio links, fax machines, and mobile and fixed telephone networks. McCahill studied the interaction between those in the video control room directing the cameras and guards in the field. The latter play an important role in giving direction to camera operators. Cameras carried by guards or on dogs and robots can also transmit images back. In turn once something suspicious or in need of amelioration (e.g., an injured customer) is discovered by the central monitor, guards can be sent to the scene via radio messages. Yet while the transmission may be automatic, human behavior is not, a disparity that keeps us in business.
Another strand of the web (or tentacle of the octopus depending on your perspective) connects to databases or knowledgeable others that can give additional meaning to the visual. This might involve zooming in to capture a signature or watching which numbers a suspected drug dealer or client dials from a public phone and matching that with subscription records, identifying drivers by license plate images that will be linked to vehicle records, showing video-generated photos of suspects to police in the hope of identification, and asking a pharmacist dispensing methadone for the name and address of a suspicious person seen on video going into a drugstore.
Variations in Surveillance Behavior
Both the Newburn and Hayman book, and that of McCahill attend to variation in need of ordering and explanation. The former give greater attention to variation in the physical structures and policies of video surveillance, while McCahill emphasizes variation in the surveillance behavior of the monitors in different contexts. McCahill’s chapter contrasting two kinds of shopping mall is very rich. One was within a large, low-income housing project (“one of the most deprived estates”), and the other, a more upscale mall in the city’s center. Although they use the same technology, in the same city, within the same type of entity, there are striking differences in the sources and reasons for targeted video surveillance.
How do individuals come to be targets of mall video surveillance (defined as being observed for more than 30 seconds)? In about half the cases, the CCTV operator is the initiator, and in the remaining half, initiation is based on “transmitted suspicion” via a report from a patrol guard, store detective, store employee, CCTV operative from another system, or police. Five types of suspicion are identified: categorical, personalized, behavioral, protectional, and locational.
The basis for the suspicion depends on the setting and type of clientele and determines how the exclusionary potential of the mall is carried out. The main sanction these control agents can apply is exclusion from the mall-whether for a fixed period up to a year or simply on a given occasion.
Suspicion is constructed very differently in the two sites. In the housing project mall, it tends to focus on a certain kind of person, while in the upscale mall it focuses more on behavior. For the former, 80% of the surveillance is personalized, rooted in local knowledge of the person watched who is perceived to be either (and frequently both) a shoplifter or a drug user/dealer. Three-quarters of cases in this mall involved issues of possible drugs or theft. The clientele are local people who must visit the mall daily for basic needs. A security manager said, “We’re in the middle of a residential estate. You don’t travel to it and you don’t travel from it like City Centre Mall. Our problems are 24 hours a day problems” (p. 111). The security officers are also local people with knowledge of the locale and its inhabitants.
The upscale mall had a more transitory clientele. Authorities, lacking localized knowledge, allocated suspicion 41% of the time based on actual behavior and only 28% on personalized knowledge. They most often focused on behavior that suggested non-consumption or disruption of the commercial image desired by the mall (lounging, walking a dog or a bicycle, sitting on the floor or lying down, 28 being in a prohibited area).
The differing grounds for suspicion in the two malls raise issues of effectiveness and justice. When suspicion is based on inferences from behavior rather than detailed knowledge of the person and context, fairness in the form of universal treatment may be more likely, but so too may be errors, given acontextuality and the distance of watchers from the watched. The latter is a major problem with the new surveillance in which data, taken from their immediate geographical and temporal context and used in probability models, automatically lead to action (eviction from a mall, denial of credit or insurance). This kind of behavior may be rational in the abstract but not necessarily when you get down to cases. Here the modern ideas of economic and administrative rationality as against individualized justice are on an accelerating collision course.
On the other hand the personalized suspicion based on deep local knowledge characterizing the mall adjacent to the housing project can avoid problems of context-information deficiency, At the same time, it may be conducive to collusion and corruption, favoritism and discrimination, privacy invasions and the violation of expectations of being judged on the basis of what you do rather than who you are (or are perceived to be). There is no adequate solution to this reoccurring tension other than awareness of it and the tradeoffs between focusing on kinds of behavior vs. kinds of person, on central (read removed) vs. decentralized (on scene) authority, and on formal rules vs. discretion. 29
Of course more than suspicion can be involved in targeting. Bentham long ago identified entertainment value as a perk of carrying out surveillance. Some male monitors may disproportionately focus on female patrons --a kind of “sport” or “recreational” targeting. If correct, on balance this is likely less socially harmful than focusing on ethnic minorities or youth. 30 In the latter cases, absent grounds for suspicion, an assumption of fairness is violated and may have the consequence of discovering violations among these groups that will not be found in groups less closely regarded. Given the general absence of adequate data on either who is targeted or what the true (vs. discovered) rate of violations is by social characteristics, claims here must be speculative (although analysis of video records relative to the size and behavior of the relevant populations could answer this). It might even be argued that without anything alarming to focuse on, observers disproportionately watching those they find sexually or otherwise interesting (particularly if the observed are unaware) may contribute to higher morale and lessened boredom among monitors.
Purging Drugs From the System
Employers who test for drugs seek to purge their system of drugs –whether by deterrence or discovery and exclusion, termination, or rehabilitation. According to Ken Tunnell’s comprehensive and engaging study, many employees also seek to purge their system of drugs. 31 However, the time frame for purging differs: for employers, it is forever, for employees, only to pass the next urine test.
Drug testing highlights several characteristics of the new surveillance. 32 The test is modern in that it probatively goes beneath surfaces and confidently seeks supposedly scientific evidence. It is largely (and may soon) be fully automated. 33 In the workplace, it is usually used as a form of mass surveillance. As with video it can be applied in a categorical fashion, not simply when suspicions justify crossing a personal border. In reflecting a surveillance non-society, it communicates distrust, reversing any presumption of innocence or need for authorities to prove guilt. Rather the job (or other) applicants have an obligation to prove their innocence via body remnants showing that they do not use drugs and therefore may more broadly be presumed to be a certain kind of person.
The tactic can be a passive form of self-incrimination. It coercively peers into aspects of the body independent of the subject’s will, although some degree of will is required in offering the sample (assuming the use to which a urine sample will be put is known). However since providing the sample is tied to things the person needs such as employment, the meaning of voluntary is open to discussion. 34
While concrete and precise in yielding biochemical data (e.g., relative to many psychological tests that also claim to peer within to reveal the hidden or true person), the drug test is still inferential, relying on indirect correlational evidence presumed to be predictive, rather than on direct measurement or on observation of the literal presence of drugs or impairment. In one way it is also curiously premodern in asking not what the person can do, but what kind of a person the individual is presumed to be.
Much resistance to surveillance involves running away or blocking visibility-whether by wearing masks or gloves or by exploiting natural weaknesses such as dead spots that block radio transmissions or columns that block the video lens. Resistance to drug testing is in a sense bolder in directly engaging the data collection apparatus through a kind of surreptitious jujitsu in which the aura of scientific testing is used to validate an invalid claim.
Tunnell’s study is concerned with “drug testing, the products used to subvert it, and the methods used by workers and would be workers (p. 157). The research relies on qualitative interviews with corporate spokespersons, lab officials, and medical review officers responsible for drug testing, as well as manufacturers, retail merchants, and consumers of detox products. Secondary data from government and industry documents are also used to describe a classic social control and deviance (and conflict more broadly) process: the cycle of control, neutralization, and counter-neutralization.
Tunnell describes the social and political changes that have resulted in the emergence of a multi-billion-dollar drug-testing industry and the subsequent rise of an industry to counter this. As with many recent control innovations this trend began with the military. 35 However unlike importations such as night vision and heat-sensing technology, this testing was directed internally rather than at external enemies.
Tunnell convincingly argues that the development of workplace drug testing reflects politics and the actions of moral and economic entrepreneurs generating and responding to public concerns, rather than an objectively measured increase in the severity of drugs as a social problem, or even credible studies directly tying drug abuse per se to broad measures of industrial productivity or workplace illness and accidents. This process of defining a social problem (sometimes bordering on hysteria) apart from objective measures of the harm or trend in the phenomenon is well known to students of other social issues. There is little research documenting that drugs are as serious a problem in the workplace as testing advocates claim, nor comparing them to other sources of problems such as alcohol and fatigue. Nor, when a problem does exist, are there data to suggest that urine testing is the best strategy. The symbolic and political play a much larger role here than with many of the other techniques. Without government incentives and requirements such a massive program would not likely continue in bottom-line profit-making organizations, absent better empirical justification.
What is distinctive and most important about Tunnell’s book is the information he offers on the emergence of the detox industry as a counter to the testing industry. Gilliom’s isolated welfare resisters had to rely largely on their own creativity. Tunnell’s subjects have an entire industry supporting them, numerous web and print publications, and a 24-hour High Times magazine hotline devoted to defeating drug tests. 36 The news is also brought by popular films such as American Beauty, in which an adolescent pot smoker/seller reports that he doesn’t worry about drug testing because he substitutes clean urine for his own.
With names such as Urine Luck (say it slowly), THC Terminator, and Fast Flush, the products are sold from locked compartments in health food stores, head shops, drug stores, and by mail. The detox products are designed to increase urination, disguising and/or flushing drug residue from the body. Users abstain from drug use, drink large quantities of water, and take the product. A distorting substance may also be surreptitiously added to the external sample. The goal is to create a false negative or an otherwise unusable sample (although that can be a giveaway). For the less frequently used hair tests, there are detox creams and shampoos that claim to rinse away residue.
If so much else having a moral quality can be commodified – life itself, the earth’s resources, body parts, sex, crime, fear, and security, so too can the means for countering drug testing. The context offers marketing opportunities for all parties. The drug-testing and detox industries illustrate a paradoxical symbiosis. Some businesses even sell both drug testing and drug detox products, paralleling those that sell both electronic surveillance and counter-surveillance means. Business is business.
The drug-testing industry has an interest in the continuance of perceptions of drugs as a major social problem. The detox industry, while self-righteously low on the war on drugs, also has a strong interest in its continuance. The language used in selling their respective products offers interesting contrasts. The adds for drug detoxification are in general muted and indirect, playing up vague higher values of liberty, freedom, and fairness that legitimate breaking the rule rather than directly attacking the rule or advocating anything illegal. 37 In contrast, drug-testing entrepreneurs market the dangers and risk to companies from the drug problem, ignoring issues of personal border crossing, validity, and other means.
In generating new products, the companies may also need each other. As we will note, the presence of the detox industry has created a market for drug testers to peddle additional tests to determine if a detox product has been used (a crime in some states). This then gives anti-testers the opportunity to offer yet another product to counter the secondary discovery product.
Variation
The book also alerts us to the variation that needs to be understood for social science purposes and to answer the "Is it good or bad?” question. For example: When is testing done (pre-employment, or once employed, transferred, promoted or on exiting the role? 38 If periodically done is this on an announced or random schedule? Who is tested - all or only selected categories – hourly employees, those in “sensitive” positions, those there is some reason to suspect? What is tested for? (drugs, alcohol, steroids, impairment, susceptibility to workplace hazards). Why is the testing ostensibly done? Which specific test(s) are used and on what (urine, hair, saliva, perspiration, blood, fingernails, eyes, breath), and how do they vary, in reliability, and validity, competence of tests and testers? Where is the cutoff point regarding the concentration of metabolites for drawing conclusions? 39 Can the tested challenge results? How are positive results used? 40 What are the correlates of a “one strike and you’re out” policy and with what consequences? Are there equivalent “one hit and you’re hired” assessments? 41
Tunnell’s workplace focus can be usefully contrasted with the drug testing of those in the criminal justice system, athletes, 42 children and candidates for public office. 43 Here we again see the multiplicity of goals that can be attached to a given tactic.
This book overflows with clearly presented historical and descriptive information on drug testing strained through theoretical snippets on postmodernism, mass society, bureaucracy, surveillance, and deviance and social control. 44 Notions such as discipline, dialectic, commodification, role distance, and status degradation are offered to interpret the data and seem plausible. However, explanations are not offered in a form that might be falsified, and the evidentiary base for some of the assertions could be stronger. 45
The study is admirable for its big-picture breadth and focus on both the controllers and the controlled. Such a focus would be unremarkable were it not so rare. For a variety of reasons related to discipline, specialization, professional, sponsorship, access, politics and ideological reasons, researchers tend to statically emphasize one or the other group (most often those doing the surveillance) and ignore their interaction.
In Search of a Better Language: Conceptual Burs and Blurs
Taken together, these books nicely illustrate the need to unpack and disentangle the snarl of surveillance dimensions and related concepts in the face of new technologies and social practices, as well as to synthesize them into a broader framework. Toward this end I will consider some blurred meanings of the terms public and private and some basic characteristics of surveillance structures, goals, social processes, and criteria for judgments.
In linking his surveillance experience with that of his subjects, Gilliom observes, “like Mary, Deliah, and the others, we have a shared condition as subjects of a surveillance society. 46 We are all watched, we are all angry, and we are all afraid. And we are increasingly without a language to speak about it” 47 (p.150).
For sustaining liberty and academic understanding (factors that one hopes are reciprocally related), I am in strong agreement about lacking an adequate language to discuss surveillance. It is vital to appreciate the breadth, power, opportunities, and risks of the new surveillance. We need better ways of conceptualizing, contrasting, and measuring surveillance-whether involving traditional forms, such as searches and informers; those that have become familiar, such as drug testing, computer matching and profiling, Internet monitoring and cell phone cameras; those that will be become familiar such as radio frequency identification chips in consumer goods, people, and animals; or those that might become familiar such as facial recognition, gait, scent and brain waves for identification or as clues to feelings and guilty (and other) knowledge.
I find it useful to begin from a broad sociology-of-information framework that consists of types of access to the person. 48 I start with a strictly behavioral, content-neutral dimension involving whether or not a border of the person is crossed. Border crossings may involve taking information from the person (the topic of these books) or imposing stimuli upon the person. 49 It is difficult to find a neutral term for such border crossings. 50 One aspect of this topic involves notions about the private and public.
The P Words
The terms public and private have both existential and normative meanings. 51 When collectors of surveillance information cross a protective, “hard” physical barrier (e.g., walls, skin, distance or darkness, or a “soft” social and cultural barrier (e.g., a relationship of confidentiality or an individual compelled to disclose information), what had been empirically “private” (as in not known or accessible to the discovery agent) becomes known and to varying degrees “public” in its visibility, apart from the appropriateness or inappropriateness of the information collection. Such crossings are made easier by the increasingly networked nature of previously discrete interactions (whether involving communication or consumption) and by the ability to easily reproduce visual and aural documentation of what previously perished as soon as it occurred.
When Newburn and Hayman note that previous research has focused on “public space,” they appear to mean both space that is publicly viewable and legally public, as in accessible to anyone (e.g., most streets, parks, malls), regardless of whether it is controllable by government or the private sector. In contrast, their study focuses on “a rather different form of ‘space’” (p. 2), one that is not traditionally viewable or accessible to anyone who desires it, even if it involves a “public” as against a “private” institution. 52
Normative personal border crossings may, as in the case of some of the prison surveillance, violate general cultural expectations about how personal information is to be treated. The crossing of a personal border may or may not involve a violation of legal privacy rights. Thus, a legitimate search warrant that results in the discovery of drugs hidden in a home or on, or in, the body certainly enters the private space and goes against the preference of the subject, but it is not an illegal invasion of privacy.
In contrast the search of Gilliom’s home involved both a legal and a cultural crossing of a personal border. The new welfare controls he studied cross a general cultural border (e.g. strangers normally don’t ask and the individual isn’t expected to reveal the kind of information demanded of welfare clients), but not a clearly defined legal border. 53
In both cases the empirical status of what was private is altered, but the moral status of these is not the same. Gilliom’s experience of being subjected to a search once agents learned that the warrant was in error (perhaps, as he suggests, as part of a law-enforcement vendetta), is a clear invasion of legal privacy rights. In contrast his welfare subjects are at least informed of what the rules are and of the kind of surveillance that may be carried out when they seek assistance. There is a contractual element here, and something is received in return for their waiving traditional expectations of privacy, even if this is a duress-filled or seductive “consent” given what is offered in return for it. The pro-social efficiency and eligibility compliance norms (some involving criminal law) that can be used to legitimate the new welfare controls are absent in the ransacking of Gilliom’s home.
Making this distinction helps to contrast the two kinds of surveillance Gilliom considers. He offers no evidence for the illegal crossing of welfare recipient’s personal borders. In applying the narrow standard of procedural legality. Judged by a content standard, however, the rules make it harder for recipients to support their families and to many observers that is harsh and immoral, let alone dumb and self-defeating public policy, given a longer time frame and broader perspective. This distinction of course gets to reoccurring issues about the meaning of legality and justice and higher standards beyond formal laws and policy.
Additional conceptual difficulties result from the appearance of new forms, whether involving technology, as with video, or social arrangements, as with new land-use patterns or forms of work involving telecommuting that may blur the public and the private. We see the former in the location of “public” services and resources (whether those offered by government or those open to the “public”) within private and quasi-private property settings, such as malls or industrial and university complexes (see for example the essays in Shearing and Stenning 1987).
The appearance of omniscient organizations (Marx 1990) with access to ever more elements of the “private” person whether at a geographical workplace or away (e.g., at home) also suggests blurred categories. 54
We see it in the technical and interpersonal information exchanges between public- and private- sector agencies, whether involving linked computers or public-private surveillance associations and personal networks such as those studied by McCahill. It can be seen in joint government/business law-enforcement operations involving insurance fraud and music and video piracy. We see it in greater government access to private databases (e.g., communications, credit card transactions, airlines, libraries) and in private sector repackaging of government data.
We see it when technologies overflow traditional borders, as when a mall camera looks beyond the mall to a “public” street, or a “public” street camera reveals the interior of a “private” shop, home, or car. We see it when here-to-fore meaningless personal data coming from a private (as in legally protected place) come to a public place and are suddenly given meaning through a new technology. Consider, for example thermal imaging technology, in which heat from inside a house is picked up by a device outside the protected area of the house. In the same way, night- vision technology takes what had been existentially private (regardless of whether it is in a legally protected private or public place) and makes its visible. Note also the blurring when partially “private” communication via cell phone or email occurs in public places. Although in “public,” the communicator has withdrawn from interaction with those co-present. Conversely, those in cyberspace as with a posting to a computer discussion (Usnet) group have public access to the message content, but information on the communicator (name, appearance, location) can remain “private.”
Through privatization public powers are also delegated to private contract police. Here private organizations are to serve public goals. There also appears to be increased circulation of personnel, particularly from the public to the private sector as the private security industry has grown.
Consider also increased government efforts to involve citizens in law enforcement. Beyond the local Neighborhood Watch programs we now see the Air Force’s EagleEyes, a police sponsored C.A.T. EYES (Community Anti-Terrorism Training Initiative) 55 and other programs encouraging truckers and taxi drivers to report suspicious activity. Such efforts draw on the higher civic traditions of democratic participation, self-help, and community. Yet these can also blur the lines between the state and civil sectors, an element of the “public” and “private” central to American and secular traditions.
In the current climate these public-private changes are a strand of a broader tapestry of blurred borders involving the-once clearer distinctions between national and international authority, foreign and domestic police, military and police, and intelligence gathering and criminal prosecution. 56 This expanding empirical haze raises vital issues with respect to accountability, legitimacy, public goals, and democratic decision making.
Within this conceptual murk there is clearly a major need to elucidate new meanings for many of our traditional concepts and to study the consequences of these changes and how they are negotiated. The blurring of previously distinct borders and the new access to previously unavailable and/or compartmentalized information involve factors that enhance liberty as well as monkey business, and conclusions about the social consequences of these changes must be careful and qualified.
Apart from questions about the empirically accuracy of Max Weber’s emphasis on the state as having a legitimate monopoly on the means of violence ever was (especially in gun-friendly countries such as the United States), it needs additionally to be reconsidered in light of the new softer forms of domestic control which (at least domestically) push violence to the sidelines and which are increasingly within the purview of the private sector, or some opaque, hybrid, rarely studied private-public form that can easily slip from view.
Surveillance Structures
Several kinds of social structure define surveillance relationships. 57
These four books offer examples of organizational surveillance, involving both internal and external constituencies, which is nonreciprocal and directed at individuals in government and commercial settings. As socially, theoretically, and quantitatively significant as these forms are, they need to be located within a broader framework involving other kinds of surveillance. Both scientific understanding and policy require this.
With respect to the roles that are played, we can identify the surveillance agent (or surveillant, watcher, observer, seeker, inspector, monitor) who desires personal information about a surveillance subject (or watched, target, suspect, person of interest). All persons play both roles, although hardly in the same form or degree, and this shifts depending on the context and over the life cycle, and the roles are sometimes blurred. The roles may also be joined in the increasingly common forms of self-surveillance, whether through technology (e.g., means for checking inebriation, fertility, blood pressure) or in the classic deterrence sense of watching one’s behavior because of the awareness of possible external surveillance and sanctioning.
Within the surveillance-agent category, the surveillance function may be central to the role, as with police, private detectives, spies, work supervisors, and investigative reporters. Or it may simply be a peripheral part of a broader role whose main goals are elsewhere, as with checkout clerks who are trained to also look for shoplifters, or dentists who are encouraged (or required) to report suspected child abuse when seeing bruises on the face. We currently see both ever-greater social control specialization and ever-increasing amendment of a secondary social control function to other roles.
Organizational surveillance is distinct from the nonorganizational surveillance (or personal surveillance) carried about by individuals. In both cases, however, the surveillance subject may be an individual or an organization. This distinction suggests four types for analysis: (surveillance by organizations of individuals or of other organizations, or surveillance by individuals of other individuals or organizations.
The first form receives the most media and research attention and with respect to justice issues may be the most salient, given its implications for life chances (Gandy 1993, Lyon 2003). The interorganizational surveillance playing fields are more level. Individuals commonly watch other individuals outside of their organizational roles. Clearly this type is undeserving of its research neglect. This non-organizational surveillance is encouraged by the widespread accessibility of new surveillance techniques and the perception that they are needed and justified, whether for protection, strategic, or recreational/prurient reasons.
Such personal watching may involve role relationship surveillance as with family members (parents and children, the suspicious spouse) or friends looking out for each other (e.g., monitoring location through a cell phone). Or it can involve non-role relationship surveillance, as with the free-floating activities of the voyeur whose recreational watching does not seek to influence the subject and is unconnected to a legitimate role or instrumental goal as those roles are usually understood. Here, rather, the means and the end are collapsed (Marx 2003).
At the organizational level, formal surveillance involves a constituency. Constituency refers broadly to those with some rule-defined relationship or potential connection to the organization. Two forms can be noted. With internal constituency surveillance we see formal organizational membership, whether as an employee, in a voluntary association, or in a “total institution” of the kind studied by Erving Goffman (1961).
External constituency surveillance involves watching those who have (or might have) some patterned contact with the organization (e.g., as customers, suspects, audiences, and/or persons within the organization’s authority), but who do not “belong” to it the way an employee or inmate does. One form is compliance surveillance, seen when an organization with enforcement responsibilities monitors those within its jurisdiction. It seeks to insure that categories of person (or organizations) subject to its rules are in conformance, (e.g., a government agency charged with enforcing health and safety regulations or non-governmental organizations that audit, grant ratings, licenses and certifications). Another major form is prospecting surveillance, in which subjects are sought-whether for marketing ideas, goods, services or interventions.
Organizations also engage in external non-constituency surveillance, that is monitoring their broader environment by watching other organizations and social trends. The rapidly growing field of business intelligence and related areas such as espionage and many research and planning units fit here.
Delusions of Panopticism in Need of Dilution
The conceptual elaboration in the previous section and the empirical data from these books can serve as a corrective to those who vulgarize the complex and sometimes contradictory Foucaultian perspective of new forms of technical surveillance as having only one major goal and consequence–elite domination. 58 Not only does this wooden view impute far more homogeneity, unity, skill, and power to elites than they generally possess in a democratic society, it ignores differential impacts and the variety of surveillance goals, roles, uses, and contexts–particularly when the technologies are widely available and become ever simpler to use. It further downplays individual and group creativity in resisting new, unwanted control efforts, and it ignores the ironic vulnerabilities found with most complex systems of control.
Those in the broad-brush surveillance-as-domination tradition assume that power differentials are always present and that surveillance necessarily serves the goals of the powerful as against the less powerful. Too often goals are assumed rather than clearly specified. As these studies suggest however, there is rarely only one goal. 59 Moreover the generality of goals permits their applied meaning to be contested, and new goals may appear. Central factors to consider are whether the surveillance is reciprocal or non-reciprocal and whether there is consensus or dissensus with respect to goals on the part of the agent and subject.
Reciprocal surveillance is mutual or bidirectional and tends to be found in contexts where power differences are absent or less significant. Consider the reciprocal surveillance in turn-taking card games, hide and seek, and team sports. In the less-rule-bound settings of business and nation-state rivalries, we see reciprocal (if not necessarily equal) surveillance. Intelligence agents, whether working for rival companies or countries, are often mirror images of each other. They offensively seek to discover their opponent’s information and defensively to protect their own. When the parties are roughly equivalent we can speak of symmetrical reciprocal surveillance. Beyond games, this form characterizes many contractual agreements and treaties (e.g., the mutual deterrence of nuclear arms control).
Nonreciprocal surveillance is one-way surveillance, with personal data going from the watched (subject) to the watcher (agent). In such contexts we may appropriately view surveillance as social control --whether the power differentials involve guards and prisoners, police and suspects, teachers and students, parents and children, psychiatrists and patients, 60 owners and slaves, managers and employees, homeland security agents and travelers or merchants and customers. 61 Surveillance information tends to be onesided and is used to control, manage, affect, and make decisions about the subject.
While such surveillance is more characteristic of bureaucratic organizations (a form partly defined by norms reflecting differential authority), it is hardly restricted to them, nor are these organizations defined only by asymmetry and lack of reciprocity. When surveillance is used as a form of control, we need to differentiate cases of domination in which the interests of the parties diverge, from instances of support/guidance in which they converge. Whether a control situation is seen to involve domination depends on whose goals are intended to be served and the nature of the goals. In considering whose goals are served we can note four broad categories: elites who seek to rationally set policy in pursuit of their interests, surveillance agents who carry it out, subjects/targets of surveillance, and the broader society or community (which is even harder to define). In a given situation we can then ask, “Is the surveillance in the interest of, irrelevant to, or in opposition to the group in question?” Given the multiplicity (and often lack of specificity) of surveillance goals and the variety of surveillance roles played by the same person, answering this can be challenging. 62 What you see partly depends on where you look, as much or more as where you stand depends on where you sit. Surveillance as domination or support may be present serially or simultaneously (and for the same blurred surveillance agent-subjects).
These books and much other evidence suggest the need to counter and qualify a simple, unreconstructed panoptic view. In turning the kaleidoscope we see that serving elite interests is not necessarily always opposed (or opposed in all ways) to the interests of those who are watched. In addition, the technology may diffuse throughout the society, having unintended consequences and serving interests beyond those of the elites who introduce it and may initially have access to it.
New syles of electronic living in some ways alter the traditional relationship between surveillance and stratification. For Orwell it was not the masses but the elites who were most closely watched. 63 As life comes to imitate art, contemporary electronic lifestyles reverse some aspects of the traditional relationship between stratification and surveillance, at least with respect to documentary records of behavior. The deep immersion of the more privileged in remotely mediated forms of communication comes with some new ironic vulnerabilities. Excluding their greater pregnability to being observed in public places, in being unplugged the poor and transitory homeless, are in some ways less subject to surveillance than the more privileged and located. 64 Contrast the latter’s telephone, fax, computer, bank, credit, employment, medical, and travel electronic trail- and tale-leaving behavior. Much of this every-day-life visibility is distinct from the norms and role performances involving insulation from observability for the privileged within bureaucratic organizations studied by Coser (1961). 65
Even just looking to traditional organizational contexts, we see some shared (or at least nonoppositional) goals between watched and watchers. Shoppers seek a comfortable and safe environment and prices not increased by high rates of theft. Identifying safety hazards, finding lost children, and offering aid to injured customers are further social goods offered by mall videos. When doing nothing wrong ,those under 30, raised on video games, computer images, and seeing themselves on TV in countless home videos, may even consider the camera a form of self-validation –not unlike older generations’ watching their reflection in the mirror of a store or car window.
Since the early modern period, asylum has meant a sanctuary offering protection. In that sense inmates want to be protected from each other and from guards and helped if they become ill. In generating documentary records, surveillance can help overcome the tilt toward favoring the accounts of those higher in status (e.g., audio and/or video of police abuse, government corruption, and harrassment). Surveillance as a work-monitoring tool can reward good performance, help in training, and aid efficiency and fairness. A successful business means jobs. Excluding drugged workers may protect fellow workers and the public. Video surveillance may protect employees from customers. And when the interests of surveillance agents and management diverge, the former may sometimes turn the technology to their advantage. As the next section notes, subjects of surveillance may become agents as well, manipulating the tools in opposition to elite interests. Conclusions about the meaning of surveillance must be sought in the context and attend to the interpretations of different actors and audiences.
Effectiveness and Acquiescence?
The panoptic vision of contemporary events in democratic societies, whether inspired by technophilia or technophobia, puts undue emphasis on the technology’s presumed effectiveness and on the passivity of those subjected to it. Yet as these studies suggest, the situation is much more complicated.
The variation they find nicely illustrates the complexity and the mediation of the human in the face of standardized technologies. This variation serves to moderate the pessimism of the theoretical surveillance essays noted in the beginning of this review. Novelists and social scientists who debunk the rhetorical excesses of technological determinists 66 as well as moral and economic surveillance entrepeneurs advocating (or forecasting) technical fixes know that things do not necessarily work as planned. As the Wizard of Oz reminds us, persons behind the curtain (and the microphone) there are persons show varying degrees of competence, motivation and integrity and sometimes the power goes off.
Videorecording, drug testing, and computer matching, like other surveillance forms, grow out of, and enter into, on-going social systems. McCahill is particularly helpful here in documenting the limiting role of social relationships on panoptic systems. Living in the monitored housing project, or having friends or family who work in other security contexts, can condition the effectiveness of the technology and the powerful integrative potential of networks. Tunnell notes how first-line drug testers may treat their job in an indifferent and highly ritualized manner. Newburn and Hayman consider ways that police avoid the camera’s hunger. Gilliom notes the sometimes less than adversarial relationship between welfare agents and recipients.
Whether the full surveillance potential is realized depends on context, interpretation and the kinds of interpersonal ties among control personnel. To reverse the phrase, where there is a way there is not necessarily always a will. The surveillance behavior desired by elites is not automatic and may depend on where and who their agents are. McCahill documents how those who monitor the video screens have their own interests. The technology may be used to further these rather than those of management. When security officers low in status and pay monitor their own locales and persons like themselves (e.g., in the British housing project mall), the results may be other than those promised in advertisements or feared in dystopian accounts. Groucho is sometimes a better guide than Karl.
More generally, considerable research has documented the frequent gap between the potential of a tool and its realization (Manning 1992, 1996; Chan 2003; Haggerty and Ericson 1997; Meehan 1998) on police Machines must be turned on, working, and within the skill range of those who work them –then, for computers, relevant data of good quality must be entered and drawn upon; cameras must be pointed in the appropriate direction and monitored; and a chain of custody must be maintained over uncontaminated biometric evidence. Those applying the technology need the competence, resources, and motivation to use it. The natural organizational tendency to protect information is even more pronounced in conflict settings, and police in particular have traditionally been hesitant to share their information. Even when data of good quality are available, police often lack the resources to put it to maximum use. 67
Beyond complex interdependent systems, multiple goals, and limitations on predicting the future, the characteristics of surveillance technologies such as automaticity and speed that make them appealing to planners are tempered and not infrequently thwarted by humans charged with applying the technologies who have other characteristics (e.g., self-interest, empathy, personal networks, prejudice, and lack of skill or motivation). The technologies may also be undermined by their subjects. These books offer ample evidence of opposition as subjects seek to neutralize or alter the surveillance they face.
Social Dynamics: Neutralization
It may well be doubted whether human ingenuity can construct an enigma of the kind which human ingenuity may not by proper application resolve.Whatever one’s moral position on surveillance-related behaviors or penchant for teasing out underlying structures, it is useful to view them dynamically. Part of the fascination of the study of rule enforcement and rule breaking lies in their fluid and changing nature, as groups in interaction reciprocally and continuously adjust their tactics to each other. These books contribute to our understanding of this process.Edgar Allen Poe, The Gold Bug
I have identified a number of behavioral techniques of neutralization –strategic moves by which subjects of surveillance seek to subvert the collection of personal information (Marx 2003). Some of these concepts can be used to order the examples offered by the books (direct refusal, discovery, avoidance, cooperation, switching, distorting, blocking, masking, counter-surveillance and counter-neutralization). 68
Consider drug testing. One type of refusal move is literally in just saying, “No, I won’t take a urine test.” Or in the immortal words of an early anti-drug activist, “We won’t drop our zipper for the Gipper.” 69 More common is refusal via feigned inability to offer the sample in spite of trying. Having a shaved head when one is expected to provide a hair sample is another, although this can raise suspicion and it is culturally less available to women. Hair can also be requested from other parts of the body.
Social systems often leak, and the date of a supposed random or surprise test or search can sometimes be inferred involving a discovery move. In some work settings, once tested, an employee can’t be tested until all other employees have been. When testing is offsite, employees often receive prior notice of where to go. Such foreknowledge permits avoidance moves involving abstinence, the hiding or destroying of incriminating material, not going to work on that day, or leaving early because one is ill. Avoidance can also be seen in Newburn and Hayman’s report that police who do not wish to be recorded retreated to a room with no electronic surveillance.
A technique that appeared before detox products were available is switching in which drugfree urine (whether purchased commercially in liquid or powdered form, or obtained from a friend) replaces the person’s own. 70
Switching is helped by being unobserved in delivering the sample. Yet even direct observation can be fooled. Consider the enterprising athlete who used a catheter to insert his girlfriend’s drugfree urine into his own system (unfortunately, he was discovered because although the sample showed no sign of drug use, it did indicate a pregnancy). 71 For those males wary of catheters, there is always the re-usable $150 “Whizzinator” available in five different flesh colors --an “easy to conceal, easy to use urinating device using a very realistic prosthetic penis and synthetic urine” (www.thewhizzinator.com). A female version is also available.
Distorting responses manipulate the surveillance-collection process such that while offering technically valid results, invalid inferences are drawn. The would-be evidence is rendered inconsequential, hidden, or eliminated. With diuretics the goal is to flush the system by drinking large quantities of water, thus washing away the evidence. Detox substances (whether garden-variety aspirin or the more expensive products) are intended to disguise drug residue. Various adulterating additives such as bleach, detergent, or salt and other substances can also be added. A positive result may also be defined (explained away as a false positive) as a result of cross-reacting medicines or foods. Those to be tested may eat food or take medications that are known to produce positive results or they may simply indicate on the form filled out before the drug test that they have done this.
Blocking calls explicit attention to the communicative aspects of surveillance, as subjects seek to physically stop the information flow via a barrier. Some of the English prisoners, for example, covered the camera lens with food or toilet paper. In the mall studied by McCahill, a patrol guard reports that he likes to visit the control room because, “you can see where all the blind spots are for when you want to stop and talk” (p. 145). Shoplifters may line their shopping bags with aluminum foil to foil the sensors on electronically tagged goods.
Masking involves blocking, because the original information is shielded, but it goes beyond the former to involve deception with respect to the identity, status, and/or location of the person or material of surveillance interest. Gilliom’s account of how income earned by welfare recipients can be shielded through payment to others illustrates this.
Given empathy and the multiplicity of actors and interests in complex organizations, various cooperative moves in which controllers aid the controlled are common. Thus a coach may indirectly communicate that a drug test is coming. Gilliom reports how some caseworkers helped recipients in evading stringent requirements. McCahill observes the hesitancy of some mall guards to follow up on minor infractions involving people they know. Tunnell notes how minimum-wage drug testers may be less than vigilant as they settle into routine processing of their work material.
Counter-surveillance involves an ironic turning of the tables in which the very technologies used to control others come to be used to advance the interests of those controlled. Thus, facing a urine drug test, employees can first experiment at home, testing themselves with a variety of readily available products like those used in the official test. The timing and amount of drug usage may then be calibrated to meet the threshold for passing the test. Here a tool designed to combat drug use instead serves to protect it through direct engagement with what Moore and Haggerty (2001 p. 390) call, “the particularities of an observational regime.”
The tool may also be turned directly against those in charge. Thus, as a means of eluding supervision, guards may track their supervisors. McCahill, for example, reports an incident in which monitors “…turn the radio up and take it easy while the operations manager and the security manager are off the site” v(p. 145). The wide availability of most of the new surveillance tools (or means of detecting them when used secretly) may offer the surveilled the chance to turn the usual stratification tables. The resulting data can be used defensively or to coerce those in positions of authority.
Responding to demand, the market system increasingly offers technologies and services for protecting personal information, from shredders to tools for finding hidden cameras to home security systems to various software and privacy-protection services. Encryption, for example, offers the potential for a degree of confidentiality in communication as well as enhanced accountability and data protection never before seen.
The commodification found in liberal economic and political societies also adds to the ironies of social control. In such societies individuals and organizations often have the space and resources to legitimately defend themselves against illegitimate surveillance, but they also have the means to pursue socially harmful activities under the guise of competing values, such as economic freedom, freedom of expression, and privacy.
Karl Marx was wrong (at least so far) about capitalist societies containing within them the seeds of their own destruction. Yet a free market economy with civil liberties does contain the seeds for the destruction, or at least limitation of many rules –whether fuzz busters to beat speed limits, kits for indoor illegal drug cultivation, out-of-state purchases to avoid taxes, the easy availability of information on how to convert legal to illegal guns, or the application of duo-use technologies such as software and photocopiers to reproduce proprietary music and videos and create fake documents.
Varieties of Acceptance and Resistance
There is a major need to systematically explore varieties of overt and covert responses to surveillance both within a given form and across forms of surveillance. These responses may involve either, or both, a refusal to participate and efforts to sabotage outcomes, and they may be linked to, or independent of a social movement organization.
We can expand Merton’s (1959) distinction between attitudinal and behavioral conformity with that of “real” and “feigned” conformity to identify/contrast four major empirical groups: true conformists: persons who attitudinally and behaviorally accept the surveillance; intimidated conformists: persons who attitudinally reject, but behaviorally accept, the surveillance; true rebels: persons who attitudinally and behaviorally reject the surveillance; feigned conformists or manipulators: persons who attitudinally reject the surveillance feigning conformity while covertly seeking to defeat/neutralize it. Gilliom’s welfare dissemblers and Tunnell’s drug test resistors are manipulators. A fuller understanding requires knowing about the distribution and correlates of these forms.
We may also ask about the impact of individual responses and whether, and in what ways, they are “political.”. Under what conditions, for example, are nonorganizational forms of resistance effective in meeting material needs and enhancing the individual’s sense of dignity and autonomy? When do such individual actions cumulatively result in unplanned social change, apart from any formal political pressure or legal or policy changes? For example when enough people follow Nancy Reagan’s advice more broadly and just say no to surveillance policies, they are sometimes abandoned as unenforceable, unworkable and unrealistic. 72 But under what conditions does this abandonment occur, as against resistance (if it is known about) being met with increased counter efforts?
How does the presence of a social movement affect such responses and vice versa? Just how individually inventive are these forms of resistance? Do they not often reflect the social currents Blumer (1957) identifies within the ethos of a broader social movement? When do they serve as a form of consciousness raising and pre-politicization in which individual resistance eventually leads to more organized political challenges? And when do they simply remain individualistic responses that inhibit such organized challenges? Under what conditions are individual responses involving subterfuge best seen as political challenges? And when are they dissipating factors that otherwise sustain the status quo? These questions are part of an ongoing debate (e.g., Ewick and Silbey (998; Handler 1992; McCann and March 1995; and Scott 1985). Data on the prior (and subsequent) political behavior of surveillance resistors and their interaction with social movements and policy changes, can shed light on these issues.
One consequence of this concern over surveillance (beyond the availability of offensive and defensive counter-technologies) has been a vast (and barely studied) expansion of laws and policies seeking to limit and regulate the collection of personal information and its subsequent treatment. This is in response to incidents receiving media treatment, 73 and the awareness-raising and lobbying of new organizations such as the Electronic Privacy Information Center and Electronic Frontier Foundation, the Center for Democracy and Technology, Computer Professionals for Social Responsibility, the Privacy Rights Clearing House, and traditional organizations such as the American Civil Liberties Union and Consumers Union. 74 These developments tie to the broader 20th century expansions of civil liberties and civil rights. Whether these changes go far enough, are effective, and how they compare across institutions and cultures are important research questions.
While issues of power and control are central to the kinds of surveillance that become social issues, power is rarely a zero-sum game. Beyond varying degrees of formal and moral normative constraint on power holders, power (whether involving surveillance or other forms) is often limited because it is rooted in conflicting values and interdependency and is expressed on a broad and decentralized scale within a free market economy. A number of factors limit an unleashing of the full potential of the technology: the logistical and economic limits on total monitoring; the interpretive, contextual and indeterminate nature of many human situations; system complexity and interconnectedness; human inventiveness; and the vulnerability of those engaged in surveillance to be compromised or responded to in kind. Neutralization processes such as those suggested in these studies nicely illustrate the complex and changing nature of rule enforcement and rule breaking in a society with an abundance of material and cultural resources for both. In spite of doomsday scenarios with respect to the death of privacy and liberty, in societies with liberal democratic economic and political systems, the advantages of technological and other strategic surveillance developments are sometimes short-lived and contain ironic vulnerabilities.
The above factors should serve as a humbling reminder of the need for skepticism in the face of unreflective paranoia and oversold technical surveillance fixes introduced into heterogeneous social contexts, even as the need for vigilance never ceases. In spite of the presence of countervailing and complicating factors, on balance an asymetricality in formal surveillance and information rights within hierarchical organizations and other stratified settings remains. 75 This asymmetricality (however far from absolute, as the preceeding sections suggest) is not always easy to see because it is so embedded in the physical and cultural environment. Imaginative norm-breaching and -bending experiments such as those by Steve Mann and his colleagues help identify it (Mann, Nolan and Wellman). 76
Empirical Predictions vs. Ideological Warnings
As the discussion in the preceding sections suggests the imminent arrival of the panoptic dystopia seems doubtful. We have suggested concepts that take account of the major forms of surveillance and noted the multiplicity of contending groups, goals, and unintended consequences. Factors such as competing values, resource limitations, neutralization, and inherent ironies limit control efforts, no matter how technically sophisticated or legally supported. While these hardly offer grounds for complacency or for celebrating the arrival of a shining city of dignity and liberty on the hill, they do offer grounds for tempering deep pessimism and indicate areas for research.
Here it is important to differentiate statements about contemporary empirical events from empirically informed predictions about the future. In turn one must keep those distinct from warnings 77 about dangerous potentials and what could 78 happen, given the uncharted moral, legal, and behavioral territory traversed by new technologies and the impact of inequality in resources on the development and use of innovations. These statements with at least some empirical grounding in turn are distinct from works of pure “science fiction” unbounded by known natural laws and social patterns.
George Orwell said that he offered a warning, not a prediction. The social (although not the social scientific) significance of his work is hardly diminished because we have seen the opposite of so many of the things that he warned about. 79 Such warnings may intentionally help create conditions that mitigate potential problems.
The writer, of course, has an obligation to be clear about what game he or she is playing and to keep warnings distinct from empirical findings and firm predictions. This is not always easy to do given the monumental horror of the dystopias we seek to avoid. It is a sad fact of political life that warnings seem more likely to receive public attention when they are offered as resolute empirical predictions, rather than simply as balanced statements about possible futures. This unfortunately works against scholarly moderation.
So Is the Jungle
When operating within the scholarly empirical tradition, a broader view of the prosocial and even antielite domination functions of surveillance and of the complexities of control is certainly required. Yet if the more draconian domination view of surveillance needs to share the stage with other views, that does not mean it ceases to play a leading role, nor that the playing field is adequately horizontal.
The same technology with some benign applications for customers, prisoners, or employees is still applied in nonreciprocal hierarchical settings where goals conflict. 80 The technologies are also applied to employees as a work-monitoring (read control) tool, preserving for management’s use the previously transient flows of temporally and often geographically separated actions of low visibility.
The traditional irony that finds control agents in total institutions imprisoned while at work remains and is enlarged by the potential of the new technology to identify, track, and document whatever it encounters. The prison guards whose actions are watched and recorded are themselves subordinate within the prison bureaucracy. The guards union does not appear to have any say about the cameras.
The “uncertainty of control” ethos regarding whether one is watched, and whether the world is as it appears applies to the monitoring of the guards as well as the guarded. In the high visibility conditions of McCahill’s wired malls, for example, the guards never know whether they are being watched on camera, listened to on the radio network, or secretly tested (e.g., observation of their response to a fake alarm). Such information can be misused by management, being held in abeyance and used cumulatively, perhaps out of context long after it occurs.
George Orwell was once asked, “Isn’t technology neutral?” To which he is said to have replied, “Yes, and so is the jungle.” As with Orwell’s equality in Animal Farm, surveillance is more neutral for some than for others.
In the prison studied by Newburn and Hayman, regardless of the omnivorous potential of the lens, it is unlikely to include a camera or audio recording of what goes on in the warden’s office or recreational room for guards, nor in the bathroom they use. 81 The inmates’ cells have no monitors which permit them to watch the guards, nor can they legally have cell-phone cameras or even cell phones. 82
It is important to acknowledge the sense in which the technology is (and can be) neutral, even if the chances of being caught by it are not. The actual use of a technology needs to be considered apart from its potential use. Part of the neutrality or equality-of-technology argument is equivalent to Anatole France’s observation about the equality of the law with respect to the bridge somnolence of the rich and the poor. Certainly the camera, audio recorder, or motion detector will avoid discrimination based on the usual characteristics and capture whatever is encountered. This can introduce fairness and help sand some of the rough edges of stratification. But this “democractic” potential of the new technology does not mean that all persons and settings have an equivalent chance of being surveilled. 83 Nor are the resources to defend, resist, and challenge (whether cultural or physical) equally or randomly found in stratified societies.
Considering the degree to which actions are observable to outsiders, to what extent are various kinds of personal information aggregated or compartmentalized? One aspect of this central to contemporary controversies involves the ability to merge distinct databases using a universal identifier (whether referring directly to the person’s identity or through pseudonymous or anonymous means). Another aspect involves the literal availability of physical barriers to visibility. Thus the homeless are “in public” not only because they are on city streets, but because they often lack the insulation of walls or vehicles that prevent observation.
Another aspect involves issues of scale and the extent geographical dispersion vs. concentration in the activities of daily life. Consider the differences between the two malls studied by McCahill. The housing project mall was geographically isolated and resources for daily living were highly concentrated (shops, medical facilities, government offices, etc.). In their rootedness and with a lack of insulating resources, residents were more likely than people in the other mall to be under video observation in their daily round (at least by a central monitor) as they shopped, saw a doctor, used the post office, made a telephone call, or sat on a bench. In contrast, the more affluent and mobile patrons of the upscale mall had many more options-vehicles that made transportation to dispersed services easier, backyards for recreation, phones within their homes, and the ability to pay for deliveries.
The rhetoric about the populist democratic arming of subordinates and the public at large with personal computers and recording devices as an antidote or counter to the power of the big guys (an argument Brim 1999 makes more generally) ignores the expanded power found when the same technology is possessed by a giant institutions and that institution can restrict such uses by others. 84
There is also the question of what kind of technology is developed. Consider the following thought experiment. What if those in developing nations, the colonized, workers, the poor, subordinate ethnic groups, the physically and mentally ill, social service agencies, and those in prison had the same resources to develop and implement technologies to serve their needs that are available to developed nations, corporations, the military, and police and corrections? Would we see different technologies and uses? What if the information technology advances we have today had been available during the more idealistic and social reform focus of the early and mid-1960s?
Legal Supports
Beyond the technical developments that permit collecting of personal information involuntarily, there has been a major expansion of laws, policies, and procedures supportive of surveillance. The vast majority of domestic surveillance applications are legal, whether in having been supported by the courts or legislatively mandated (or at least permitted). While, as noted, some of this support is in the form of regulation, much of it serves to legitimate and even require the collection of personal information. Or as with communications legislation, it creates conditions supporting new forms of surveillance. 85 The Patriot Act and related legislation reflect this legitimation.
Other forms remain “legal” in that they are generally unregulated for example, secret videotaping (relative to audiotaping), face recognition, and most forms of work monitoring and testing (e.g., the polygraph is restricted, but equivalent psychological “honesty” tests are not).
Some examples of neutralization noted earlier can be seen as the valiant expression of independence and human contrariness in the face of the control sought by the regimental machine and its sponsors. However, victory may be short-lived. The ironic vulnerabilities of control may also apply to efforts to thwart control.
Identifying neutralization concepts is a static exercise, but in reality the processes are fluid. In conflict, settings Sun Tzu captured this aspect well 2600 years ago: “war has no constant aspect, as water has no constant shape.” Or to continue with that metaphor, control and neutralization efforts are like rocks added to a river –the water seeks a way around them. Neutralization is a dynamic adversarial social dance involving strategic moves and counter-moves.
Just as new means of information collection can lead to innovations in resistance, resistance leads to innovations in the surveillance business. Agents are no more passive than their subjects. Surveillants in turn develop counter-neutralization techniques to discover or otherwise thwart neutralization efforts. Consider, for example, the “unshredder,” a computerized document-reconstruction device that appeared in response to the strip-cut shredder. Athletes taking banned steroids could initially defeat tests by taking thyroid medicine, at least until authorities found a way to check for that. Prisons have accessible traps on toilets that are designed to discover flushed contraband such as weapons, drugs material, and cell phones.
In response to the detox and related drug test neutralization means, controllers have developed counter-neutralization techniques for being sure that the temperature, color, and weight of urine meet an appropriate standard before they are tested for possible drugs. 86 Another test using a simple dipstick claims to identify sample adulteration or substitution (e.g., from bleach, drain cleaners, or look-alike soft drinks). Because such “front end ” screening occurs before the main test for drugs, individuals in a sense must be pre-qualified for the surveillance in question. Those to be tested may be told not to eat certain foods (poppy seed bagels) before the test (although that eliminates the surprise test). As a counter to additives (e.g., salt under the fingernails), those to be drug tested may be required to wash their hands in the presence of an observer. Toilets may be filled with blue dye (an innovation favored by Attorney General Meese) as protection against sample dilution.
Beyond this ability to offer technical counters, authorities may respond with new laws that criminalize the possession of artifacts or activities designed to thwart surveillance. Such rules are intended to deter and punish. Thus, in some states and Canada, it is against the law for drivers to possess a radar detector.
As of 2003 nine states had laws prohibiting the production, distribution, and use of products intended to falsify drug tests (Washington Post 2003). In Texas there have been arrests for using the whizzinator mentioned earlier. The offense consists of possessing a phallic device to provide a false urine sample.
These are forms of secondary deviance involving procedural violations having nothing directly to do with the primary social control goal. These artifactual accretions are a rarely studied contributor to the expansion of law. We also see them with new kinds of violation related to the technology.
Consider the new secondary violation that can be called BUS (behavior unbecoming a shopper). In the less than brave world of the shopping mall, BUS can involve walking a dog or lounging (video-observed activities in McCahill’s study that mobilized corrective action by guards). Or note a new violation that might be termed LUC (lying under camera). Thus, a worker, unaware that he or she has been caught on a hidden camera, who denies a violation such as being in an unauthorized area, is now guilty of being a liar as well as a trespasser. Without the camera the individual would have been less likely to be caught and, if suspected, not given the chance to so easily fail the morality test regarding telling the truth. As with some violations resulting from undercover police practices, this aspect of the infraction is an artifact of the means of control.
In a related example of how the structure of control may affect the nature of the violation, consider the urine drug test. The length of time urine drug metabolites remain in the system varies by type of drug and extent of use (for frequent marijuana use, up to several weeks, while cocaine and heroin wash out in several days or less). Knowledge that only certain drugs are tested for or that drugs remain in the system for varying periods may condition drug behavior. Urine drug testing might have the unintended consequence of encouraging cocaine over marijuana use, since the likelihood of being discovered is much less, and the drug is more quickly expelled. But that is not the case for hair testing since drug metabolites in hair last for several months. Some drug users may also decide to stay with alcohol during the test period (something not usually tested for and requiring a blood or breathanlyzer test) or to take designer drugs for which there is not yet a test.
Finally let us consider the momentum advantage found with inequality in surveillance resources.
Surveillance Creep
A fascinating aspect of surveillance technologies as hegemonic control involves their tendency to expand to new goals, agents, subjects and forms. The surveillance appetite once aroused can be insatiable. A social process of surveillance creep (and sometimes gallop) can often be seen. 87 Here a tool introduced for a specific purpose comes to be used for other purposes, as those with the technology realize its potential and ask, “Why not?”
Surveillance creep can be seen in the social security number (which Congress intended to be used only for employment earnings and contribution data) coming to be used as both a general-purpose universal identification number and in the creeping uses of DNA data as both a means of prediction and expanded identification (Marx 1989, Nelkin and Andrews 2001). 88 Or consider the 1996 National Directory of New Hires intended as a means for states to track parents who failed to pay child support which has been extended to other unpaid debts such as student loans. Note the use of drug tests for factors unrelated to work, such as eligibility for a student loan, public housing and welfare. The bar-coded student photo ID cards initially used only for university business such as the library, have morphed into all purpose building access, debit and credit cards.
It is an easy (and slippery in several senses) move from the consensual work monitoring goals of theft prevention and employee protection to nonconsensual goals involving employee compliance with company rules that are far removed from criminal law (e.g., appropriate greeting of customers, service quality). McCahill documents surveillance creep in noting how cameras introduced to monitor perimeters against uninvited outsiders and to watch shoppers came to be used internally against employees.
When new technologies (by accretion rather than by deliberation and negotiation) come to be used as a general supervisory tool, rather than one for crime prevention or productivity, new issues emerge, such as employee expectations and rights, along with resistance. The camera may be seen as just another management tool to disadvantage workers, rather than as a righteous tactic.
The hunger for more data may generate expanded and more inclusive data base mergers and more powerful data-dredging networks. Consider the National Consumer Telecom Exchange that began in 1998 as a way for telephone companies to exchange information on questionable accounts. By 2002 this had morphed into the much larger National Consumer Telecom and Utilities Exchange which now goes beyond phone service to include the exchange of consumer data on basic utilities, cable, satellite, wireless and internet services. Expansion can also be seen in the increased geographical and temporal reach of tenant screening systems. Data-based forms of surveillance seem particularly prone to the colonization of ever more information and the combining and sharing of databases, although competition among agencies greedy for the data of others, but more hesitant to share their own data, may slow this down.
The means may also require other kinds of surveillance data. Thus, as with fingerprints, the usefulness of DNA as a means of identification requires a population base against which a sample can be compared. To avoid confounding effects, drug testing requires asking a person about medications such as for epilepsy they may take that would otherwise remain private.
As the means become more powerful, they may expand temporally, going farther back in an individual’s past and testing for more things (note a recently developed saliva test for both drugs and alcohol), as well as looking further into the individual’s future (with actions based on predictions relative to ever larger databases). In addition, once a tool is used in a new context other surveillance means may be added. Consider electronic monitoring for those juridically required to remain at home, which began only with locational data and quickly moved to remote audio and video transmissions and telemetric alcohol testing (Corbett and Marx 1991).
Even when goals and technology don’t change, new surveillance agents and subjects may appear. A common process is a progression from use on animals to prisoners, criminal suspects, non-citizens, the ill and children and then throughout the society.
There is a tendency for tactics developed by government for defense and law enforcement to spread to manufacturing and commercial uses and then to uses in interpersonal relations by friends, family and others. Consider the expansion of drug testing from the military to sensitive categories such as transportation workers to the workforce at large, and then even to parents testing their children. The patterning of the use of global positioning satellite data is equivalent.
Asking questions about the process of surveillance creep and possible latent goals should be a central part of any public policy discussion of surveillance before it is introduced. Beyond determining if a proposed tactic is morally and legally acceptable, works relative to alternatives and can be competently applied, it is appropriate to ask, once the foot is in the door, where might it lead? The public legislative and organizational goals of surveillance are generally defensible, often having gone through public relations and political screening. What is often at issue are undisclosed goals and changes and precedents beyond the initial goals.
Stop Hedging and Just Answer the Question, Professor: Is It Good or Bad? 89
The findings of McCahill, and of Newburn and Hayman on how surveillance may serve positive social goals may displease those congenitally disposed to suspicion of authority and technology. Similarly the findings of Gilliom and Tunnell on how resistance to surveillance may serve positive social goals 90 may displease those who are suspicious of authority defiance.
How should the new panoptic forms of surveillance be viewed--as efficient and scientific tools serving society in the face of ever-greater crises, or as crepuscular sugar-coated tools of domination serving only elite interests? 91 This is the counter to asking how should neutralization efforts be viewed --as courageous and inspiring expressions of the human spirit in the face of the soulless domination of the machine, or as destructive anti-social behavior proving the need for ever more stringent controls?
In both cases posing the question in such a general way is misguided, and the only honest answers are yes and no, sometimes and it depends. The empirical and normative tasks for law and policy are to discover what the evaluation of surveillance does, and should, depend on. Elsewhere I have suggested 29 questions to be asked about surveillance behavior and principles relevant to this 92 (Marx 1998, 2004). These involve the characteristics of the means, the data-collection context (both the application of the means and the broader conditions around this), and the uses. Table 1 offers a summary version of the questions.
In general the more these questions can be answered in a way consistent with the underlying principles, the more legitimate the surveillance is. Or conversely, the less they can be answered in this way, the more legitimate neutralization is. Legitimacy in one area need not generalize to others (e.g., a valid tactic may be poorly applied even where the goal is valid, or a valid tactic may be competently applied to an inappropriate goal). Valid means and goals can be found in settings where appropriate authorization procedures are absent or not followed.
TABLE 1: Questions for Judgement and Policy
Whatever action is taken, there are likely costs, gains, and trade-offs. At best we can hope to find a compass rather than a map and a moving equilibrium rather than a fixed point for decision making. As with any value-conflicted and varied-consequence behavior, particularly those that involve conflicting rights and needs, 99 it is essential to keep the tensions ever in mind and to avoid complacency. Occasionally, when wending through competing values the absolutist, no compromise, don’t cross this personal line standard of some privacy advocates is appropriate, even with a compelling case for effectiveness and efficiency, transparency and strong due process protections in place. But more often compromise (if rarely a simplisitic perfect balance) is required. When privacy and civil liberties are negatively effected it is vital to acknowledge, rather than to deny this, as is so often the case. Such honesty can make for more informed decisions and also serves an educational function.
Taken together, these books nicely illustrate the need for unpacking and disentangling the snarl of surveillance dimensions and related concepts in the face of new technologies and social practices, as well as showing the need for synthesis into a broader framework. Of course any contemporary empirical inquiry, no matter how rigorous and thoughtful, will not help in reaching conclusions about the broader ontological and historical questions regarding the nature of power, order, and control in contemporary society and related questions of dignity, democracy, and justice. Such studies cannot tell us where to draw the line between changes in quantity and quality. Nor will they indicate whether what we observe is simply more of the instrumental rationality seen since the Renaissance and Enlightenment --and perhaps as the techno-optimists suggest, even broadly empowering, or whether they instead represent a fundamental shift in the nature of power and social relations supporting the pessimism of so many intellectuals seen since the latter 19th century. Answering that is “somebody else’s nut tree” (a Maurice Sendak phrase in a wonderful children’s tale). However, empirical inquiries of the kind favored here can moderate the debate and offer evidence that may cumulatively (if never totally) tilt in a given direction.
Concluding Thoughts: Yes and No
To return to the opening epigram all looking is of course in parts and of varying degrees of illumination. Whether looking through the glass, or looking at those who look through the glass, we may see haze but hardly darkness. To return to the surveillance essay themes with which we began, if we view “seeing” in its broadest sense beyond the literal ocular, many of the panoptic claims are factually supported and becoming even stronger. In addition to the legislative and cultural changes that followed 9/11, 100 means of data collection, storage, analysis, and communication continue to increase in sophistication, power, scale, speed, integration (of both distinct forms of data and data sets), remote access, 101 and ease of application. They also continue to decline in cost and size.
To take only several examples, through 2003, processing speeds had doubled every 18 months, 102 and disk memory capacity had doubled every year (National Academy of Sciences, forthcoming). It is now less expensive to store information than to discard it, and proportionally ever more is kept rather than culled. Both the future and the past are believed to be more accessible, and statistical reasoning and new data mining techniques play a greater role in informing judgments. New techniques are constantly being developed or moving from military to broader use (drones, face recognition, ion scanners, data mining, GPS). In October of 2004 the FDA approved under-the-skin ID microchips for humans, which previously had been restricted to pets and livestock. 103 Just as national borders have become more fortified, so too have internal borders, whether seen in the vast expansion in gated communities and secure access facilities or in the omnipresent video camera.
Surveillance continues to increase in intensiveness and extensiveness: watching is both ever more generalized or categorical and ever more individuated and detailed. 104 This development can only increase as automated computing becomes ubiquitous, relying on sensors that passively read and send remote signals to the Internet and elsewhere. Chips that can send signals or be read will increasingly be found in objects (e.g., computing and communications devices, switches, groceries, cars, tools, appliances, weapons, clothes, persons, and environments (roads, walls, doors, toilets). 105 Through a “value-added” process, the aggregation and analysis of data collected in varying formats and for varying purposes in turn create new data and models for analysis. 106
Yet, at the same time, counter trends have also become much clearer and stronger, as have the many well-publicized failures of surveillance systems and the failures known to insiders that never become public. It will not be news to students of society that inherent dialectical processes are at work, that tools have multiple uses, 107 and that in a goal-rich, constantly changing environment of human frailty always responding to the past, there are frequent slips ‘twixt desired goals and outcomes. In the dynamic rivers of conflict, it may sometimes seem to surveillants that, as Paul Simon sings, “The nearer your destination, the more you slip slidin’ away,” or at least the nearer to running on a treadmill. The inherent ironies and Achilles’ heals of surveillance as control do not diminish (and in some ways may even increase) the greater the effort. As noted, there is also increased public awareness and concern, some increase in transparency, new legal and policy protections 10 (including means of opting-out of solicitations), new technologies for protecting personal information, and broader availability of many of the means.
While Foucault’s emphasis was on punishment and surveillance moving away from being grand spectacles in public view, the mass communications and public informational expectations and rights that appeared simultaneously in the 19th century (and have in many ways been growing since) bring some aspects of the spectacle and of the workings of the state ever more graphically into public view. This is nicely symbolized by the surveillance camera (whether hidden or not) which delivers crime and social control events to the six o’clock news as well as various forms of notice.
Thus the same video mechanism serves as a means of both surveillance and communication (most frequently, sequentially but sometimes simultaneously as with “live” helicopter video images of car chases or Webtelecasts or videoconferences). 109 Surveillance data feed the mass media’s appetite. This in turn can re-inforce cultural beliefs about crime and control and strengthen public support for surveillance as a result of the need demonstrated by the “news” (Mathiesen 1997; Altheide 2002; Doyle 2003). Mass media communication about surveillance may serve to “normalize” behavior through morality tales of what happens to those caught by panoptic mechanisms. 110
Yet this merging might also moderate surveillance excesses because of fear of being on the news –that is, rather than Bentham’s elite few secretly watching the many, the tables are turned as the many can watch those in authority --with the same logic of visibility bringing deterrence and accountability. The Internet, whose users can be subject to intense new forms of surveillance, also makes everyone a potential publisher independent of the traditional centralized sources and censors (assuming of course that relevant information can be obtained, and from Watergate to Iran Contra to Rodney King, it often can).
This analysis suggests that it is premature to get down with either the pessimists or the optimists and that there is great need for more factual and comparative knowledge, for concepts that can better order the empirical variation, and for using these to disentangle statements of fact, faith, value, and prediction (however difficult). We need, if not marriages, at least more cohabitation involving the empirical analyses of the social sciences with the normative analyses of the law and ethics. Yet in spreading humility and arguing for appreciation of the complexities, we must not become academic eunuchs, nor legitimators of the status quo by default. 111
It was once said of Ireland that there were too many Protestants and Catholics and not enough Christians. It might be said of surveillance commentators that there are too many theorists and ideologues and not enough social researchers and jugglers.
Back to Main Menu | Top | Notes
Allen, A. 2003. Accountability for Private Life. Lanham, MD.:Rowman and Littlefield.
Altman, I. 1975. The Environment and Social Behavior. Monterey. CA: Brooks/Cole.
Altheide, D. 2002. Creating Fear: News and the Construction of Crisis. N.Y. Aldine de Gruyter
American Management Association, 1999. U.S. corporations reduce levels of medical, drug and psychological testing of employees. New York: American Management Association.
Ball, K. and Webster, F. eds. 2003. The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age. London: Pluto Press.
Becker, H. 1966-67. "Whose Side Are We On?" Social Problems. 14, Winter.
Bennett, C. 1992. Regulating Privacy: Data Protection and Privacy in the United States and Europe. Ithaca: Cornell University Press.
Bennett, C. and Grant, R. 1999. Visions of Privacy. Toronto: University of Toronto Press.
Bennett, C. and Raab, C. 2003. The Governance of Privacy. Brookfield, VT.: Ashgate.
Bloustein, E. J. 1979. Individual and Group Privacy. New Brunswick: Transaction Books.
Bogard, B. 1996. The Simulation of Surveillance: Hyper Control in Telematic Societies. New York: Cambridge University Press.
Blumer, H. 1957. "Collective Behavior." In J. Gittler (ed.) Review of Sociology: Analysis of the Decade. New York:Wiley. Bok, S. 1978. Lying: Moral Choice in Public and Private Life. New York: Pantheon.
1982. Secrets On the Ethics of Concealment and Revelation. New York: Pantheon.
Boyne, R. 2000. Post-panopticism Economy and Society. 29: 285-307.
Brin, D. 1998. The Transparent Society. Reading, Ma.: Perseus Books.
Burnham, D. 1983. The Rise of the Computer State. New York: Random House.
Cate, F. 2004. Safeguarding Privacy in the Fight Against Terrorism. Washington DC: Dept. of Defense.
Chan, J. 2003. "Police and New Technologies." In T. Newburn, Handbook of Policing. Cullompton, Devon: Willan Publishing.
Cohen, S. 1985. Visions of Social Control. Cambridge: Polity Press.
Cole, S. 2001. Suspect Identities: A History of Criminal Identification and Fingerprinting. Cambridge: Harvard University Press.
Corbett, R. and Marx, G. 1991. "No Soul in the New Machine: Techno-Fallacies in the Electronic Monitoring Movement." Justice Quarterly. 8: 399-416.
Coser, R. 1961. "Insulation from Observability and Types of Social Conformity." American Sociological Review, 26: 28-39.
Curry, M. 1997. Digital Places: Living With Geographic Information Systems. London: Routledge.
Dash, S. Schwartz, R. and Knowlton, R. 1959. The Eavesdroppers. New Brunswick: Rutgers University Press.
Davis, M. 1990. City of Quartz: Excavating the Future of Los Angeles. London: Verso.
De Lint, W. 2000. Arresting the Eye: Surveillance, Social Control and Resistance. Assemblages: Space and Culture. 7:21-49.
Deflem, M. 2002. Policing World Society. New York: Oxford University Press.
Deleuze, G. and Guttari F. 1987. A Thousand Plateaus. Minneapolis: Univ. of Minn. Press.
Doyle, A. 2003. Arresting Images. Toronto: University of Toronto Press.
Ericson, R. and Haggerty, K. 1997. Policing the Risk Society. Toronto: University of Toronto Press.
Etzioni, A. 1999. The Limits of Privacy. New York: Basic Books.
Ewick P. and Silbey S. 1998. The Commonplace Law: Stories from Everyday Life. Chicago: University of Chicago Press.
Finkin, M. 2002. Menschenbild: The Conception of the Employee as a Person in Western Law. Comparative Labor Law & Policy Journal, 23: 577-637.
Flaherty, D. 1972. Privacy in Colonial New England. Charlottesville: University Press of Virginia.
1989. Protecting Privacy in Surveillance Societies. Chapel Hill. University of North Carolina Press.
Fijnaut, C. and Marx, G. 1995. Undercover: Police Surveillance in Comparative Perspective. The Hague: Kluwer
Fogelson, R. 1977. Big City Police. Cambridge: Harvard University Press.
Foucault, M. 1977. Discipline and Punish: The Birth of the Prison. New York: Vintage.
Fried, C. 1968. "Privacy." The Yale Law Journal, 77:
Froomkin, M. 2000. The Death of Privacy? Stanford Law Review. Vol. 52:
S. Freud, 1949. Collected Papers, Vol. II. London: The Hogarth Press.
Gabriel, Y. 2004. "The Glass Cage." In eds. J. Alexander, G. Marx, C. Williams, Self, Social Structure, and Beliefs. Berkeley: University of California Press.
Gandy, O. 1993. The Panoptic Sort. Boulder: Westview.
Garfinkel, S. 2000. Database Nation. Sebastopol, Ca.: O’Reilly.
Garland, D. 1997. "Governmentality and the Problem of Crime: Foucault, Criminology, Sociology." Theoretical Criminology, 1:173-214.
Gavison, R. 1980. "Privacy and the Limits of Law." The Yale Law Journal, 89.
Giddens, A. 1990. The consequences of Modernity. Cambridge: Polity Press.
Gilliom, J. 1994. Surveillance, Privacy and the Law. Chicago: University of Chicago Press.
Groombridge, N. 2002. "Crime Control or Crime Culture TV?" Surveillance and Society, 1:
Gutwirth, S. 2002. Privacy and the Information Age. Boston: Rowman & Littlefield.
Haggerty, K. and Ericson, R. 2000. "The Surveillant Assemblage." British Journal of Sociology. 51:
Handler, J. 1992. "Postmodernism , Protest, and the New Social Movements." Law and Society Review, 26:697-732.
Helton F. and Fischer. 2003. Video Surveillance on Demand for Various Purposes? Berlin: Berlin Institute for Social Research.
Hillyard, D. 2004. Knowledge, Technology and Policy.17:1-104.
Hillyard, D. and Knight, S. 2004. "Privacy, Technology and Social Change." Knowledge, Technology and Policy, 17:80-101.
Huxley, A. 2000. Brave New World Revisted. New York: Perennial.
Ingram, R. 1978. Privacy and Psychology. New York: John Wiley & Sons.
Jermier, J. 1998. "Critical Perspectives on Organizational Control." Administrative Science Quarterly, 43:235-510.
Laudon, K. 1986. Dossier Society Value Choices in the Design of National Information Systems. New York: Columbia University Press.
Lewis, S. 1993. It Could Happen Here. New York: Signet Classics.
Leyman-Langlois, S. 2002. "The Myopic Panopticon: The Social Consequences of Policing Through the Lens." Policing and Society,13:43-58.
Lyon, D. 1994. The Electronic Eye: The Rise of Surveillance Society. Minneapolis: University of Minnesota Press.
2001. Surveillance Society: Monitoring Everyday Life. Buckingham: Open University Press.
2003. Surveillance After September 11th. Cambridge: Polity Press.
Mack, A. 2001. "Privacy." Social Research, 68:
Mann, S. Nolan, J. and Wellman, B. 2003. "Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments." Surveillance and Society, 1:331-355.
Manning, P. K. 1992. "Information Technologies and the Police." In eds. M. Tonry and N. Morris, Modern Policing: Crime and Justice, A Review of Rsearch. Vol. 15, Chicago: Univ. of Chicago Press, 349-98.
Marx, G. 1987. "Raising Your Hand Won’t Do." Los Angeles Times, April 1, 1987.
1990. "The Case of the Omniscient Organization." Harvard Business Review, March-April.
1996. "Electric Eye in the Sky: Some Reflections on the New Surveillance in Popular Culture." In eds. D. Lyon amd E. Zureik, Computers, Surveillance, and Privacy. Minneapolis: University of Minnesota Press.
1998. "An Ethics for the New Surveillance." The Information Society. 14:171-185.
2001. "Murky Conceptual Waters: The Public and the Private." Ethics and Information Technology, 3:157-169.
2002a. "Technology and Gender: Thomas I. Voire and the Case of the Peeping Tom." The Sociological Quarterly, 407-433.
2002b. "What’s New About the New Surveillance?: Classifying for Change and Continuity." Surveillance and Society, 1:
2003. "A Tack in the Shoe: Neutralizing and Resisting the New Surveillance." Journal of Social Issues, 59:369-390.
forthcoming. "Varieties of Personal Information as Influences on Attitudes Toward Surveillance." In R. Ericson and K. Haggerty, The New Politics of Surveillance and Visibility. Toronto, Univ. of Toronto Press.
Marguilis, S. 1977. "Conceptions of Privacy: Current Status and Next Steps." Journal of Social Issues. 3: 5-21.
2003. "Privacy as a Social Issue and Behavioral Concept." Journal of Social Issues, 51:243-262.
McCann, M. and March, T. "Law and Everyday Forms of Resistance." In ed. A. Sarat and S. Silbey, Studies in Law, Politics, and Society 15. Greenwich, Conn.: JAI Press.
McDonald, W. 1997. Crime and Law Enforcement in the Global Village. Cincinnati: Anderson Publishing.
McGrath, J. 2003. Loving Big Brother. Oxford: Routledge.
Meehan, A.J. 1998. "The Impact of Mobile Data Terminal (MDT) Information Technology on Police Subculture Through the Introduction of Information Technology." Qualitative Sociology, 21: 225-254.
Merton, R. 1959. "Control, Deviation and Opportunity Structures." American Sociological Review, 24: 177-188.
Miller, A. 1971. The Assault on Privacy: Computers, Data Banks, and Dossiers. Ann Arbor. University of Michigan Press.
Mills, C.W. 1943. The Professional Ideology of the Social Pathologist.
Monmonier, M. 2002. Spying With Maps. Chicago: University of Chicago Press.
Moore, D. and Haggerty, K. 2001. "Bring it on Home: Home Drug Testing and the Relocation of the War on Drugs." Social and Legal Studies, 10:378-395.
Murray, H. 2000. "Deniable Degradation: The Finger-Imaging of Welfare Recipients." Sociological Forum, 15.
National Academy of Sciences, forthcoming. Privacy in the Information Age.
Nelkin, D. and Tancredi, L. 1994. The Social Power of Biological Information. Chicago: University of Chicago Press.
Nippert-Eng, C. 1995. Home and Work. Chicago: University of Chicago Press.
Newburn, T. Shiner, M. and Hayman, S. 2004. "Race, Crime and Injustice? Strip Search and the Treatment of Suspects in Custody." British Journal of Criminology, 44: 677-694.
Nissenbaum, H. 1998. "Protecting Privacy in an Information Age: The Problem of Privacy in Public." Law and Philosophy, 17: 559-596, 1998.
Norris, C. Armstrong, G. 1999. The Maximum Surveillance Society. Oxford. Berg.
Norris, C., Moran, J. Armstrong, G. 1998. Surveillance, Closed Circuit Television and Social Control. Aldershot: Ashgate.
Parenti, C. 2003. The Soft Cage. New York: Basic Books.
Poster, M. 1990. The Mode of Information. Chicago: University of Chicago Press.
Regan, P. 1995. Legislating Privacy: Technology, Social Values, and Public Policy. Chapel Hill: University of North Carolina Press.
Roth, P. 2004. The Plot Against America. New York: Houghton Mifflin.
Rule, J. 1973. Private Lives and Public Surveillance. London: Allen Lane.
1983 1984. The Ingredients of Totalitarianism.
I. Howe, 1984 Revisted. New York: HarperCollins.
Scher, J. 2004 Insecurity by Julia
Schoenman, F. ed. 1984. Philosophical Dimensions of Privacy: An Anthology. Cambridge: Cambridge University Press.
Slobogin C. 2002. "Public Privacy: Camera Surveillance of Public Places and the Right to Anonymity." Mississippi Law Journal, 72:213-298.
Scott, J. 1985. Weapons of the Weak: Everyday Forms of Peasant Resistance. New Haven: Yale University Press.
Shamberg, M. 1971. Guerilla Television. New York: Henry Holt.
Smith, H. J. 1994. Managing Privacy. Chapel Hill: University of North Carolina.
Solove, D. 2002. "Conceptualizing Privacy." California Law Review, 90:1087-1156.
Staples, W. 2000. Everyday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham, MD: Rowan and Littlefield.
Sullivan, T.P. 2004. Police Experience with Recording Custodial Interrogations. Evanston: Center for Wrongful Conviction, Northwestern Law School.
Sykes, C. 1999. The End of Privacy. New York: St. Martin’s Press.
Van Harten, D. and Van Est, R. 2003. Special Issue: Privacy in an Information Society. Journal of Contingencies and Crisis Management. 11:1-36. Welsh B.and Farrington, D. 2004. Surveillance for Crime Prevention in Public Space: Results aned Policy Choices in Britain and America. 3:497-526.
Westin, A. 1967. Privacy and Freedom. New York: Columbia University.
Wheeler, S. 1969. On Record: Files and Dossiers in Amerian Life. New York: Russell Sage Foundation.
Wood, D. 2003. Editorial. "Foucault and Panopticism Revisted." Surveillance and Society.
Zerubavel, E. 1996. Social Mindscapes: An Invitation to Cognitive Sociology. Cambridge: Harvard University Press.
Zureik, E. 2003. "Theorizing Surveillance: The Case of the Workplace." In D. Lyon (ed.) Surveillance as Social Sorting. New York: Routledge. Surveillance and Society
Back to Main Menu | References | Top
Hillyard and Knight (2004) analyze the congressional termination of the Total Information Awareness program. They emphasize privacy as an activity involving the rhetoric and politics of opposing claims makers, rather than as a fixed condition to found in legal and ethical principles.
Those noting the clarion limitations of bureaucracy too often fail to take the next step in noting the limitations on non-bureaucratic means and comparing means. Certainly welfare should be humane and policies neither self-defeating, nor informed by a punitive rather than a caring ethos. But should compliance with reasonable eligibility rules be left only to good will and trust or the discretionary assessments of a local caseworker?
With respect to the implied question of “Whose side our we on?” it is well to recall Becker’s (1966-67) observation of being on “our own side” (i.e., the scholar’s side). Note not only the contrast here with Gilliom, but also with C. W. Mills who in a different context argued for studies of elites, not of the powerless (1943). The tune one wishes to play and the subsidizer of the piper can mediate the divergent suggestions re who to study, or at least, to empathize with. The contrast with the 1960s call to study political elites, police and prison officers, teachers, welfare and mental health workers, and medical doctors versus today’s emphasis on studies of the law and ordinary people is striking.
A later before/after article using multivariate analysis by Newburn, Shiner, and Hayman (2004) finds that with other factors equal, those of Afro-Caribbean origin were more likely to be subjected to strip searches both before and after the installation of the cameras in Kilburn. However, the installation of the cameras reduced such searches overall by one-third, suggesting an accountability or hesitancy-to-act factor as a result of the camera’s presence.
In a similar vein the Supreme Court in Wyman v. James (400 U.S. 309 (1971), approved mandatory and warrantless home inspections of New York welfare clients partly on the grounds of voluntarism (recipients don’t have to submit to such searches if they chose not to accept welfare).
As part of the continuing war on drugs and following the recommendation of a Presidential Commission on Organized Crime, President Reagan in 1986 issued Executive Order 12564: Drug Free Federal Workplace. In 1988 Congress passed the Drug-Free Workplace Act which requires employers with large federal contrast to create a comprehensive drug-free workplace program.
Consider workers in gold and diamond (or informationally sensitive equivalent) settings who are searched before they can leave work or nuclear power workers monitored for radiation. The computer’s ability to export information has greatly complicated the task of exit searches.
There are interesting comparisons here between types of sports. The big professional sports until recently seemed concerned with narcotics and the moral luggage they bring for largely symbolic public relations reasons, not the issues of fairness or long-term risks brought by steroids that seem to drive Olympic testing.
Other goals may lurk beneath the publicly stated goals. A striking finding from an American Management Study is that 40% of Fortune 500 companies do drug testing because they “are required to rather than because they believe drug use in the workplace is a significant problem” (p. 6). Note also the requirement of retailers such as Wal-Mart that the goods they purchase must come with RFID tags. Of course this just pushes the explanatory question back a level to, “Why does the government, an insurance company, or merchant require it?” The routinization and even ritualization of much testing and other data collection may also imply a lack of attentiveness and concern among testers.
Imposing on the person can be viewed as a type of communication. Communication and surveillance may be mass (broadly) directed, as with TV ads and video cameras on roads. Or they may be focused with varying degrees of specificity on subjects of interest, as with targeted marketing and court-ordered wiretaps.
Several decades ago Jim Rule (1984) observed that with computing, mass surveillance became possible alongside of mass communication. In recent decades there has been a move from mass to more individualized (targeted or segmented) communication determined by characteristics of the recipient (often as determined by some form of surveillance). But in the case of surveillance, the mass and highly focused forms are both stronger than ever.
Contrasting the undifferentiated with the differentiated forms of communication and surveillance and exploring the varied connections between communication and surveillance are research topics in waiting. For example developments in the surveillance of consumption have been a major boost to targeted forms of communication. The distinction between surveillance and communication may practically disappear when we consider the multiplicity of goals and users for something like the 72 miles of cameras along California coastline sent to lifeguard stations and then to the Web. Surveillance serves as a protection for swimmers, a beach and traffic control and management device, a work monitor, a symbolic reminder of unseen watchers, and a strategic resource for helping viewers decide which beach to go to. This merging of communication and surveillance differs significantly from that involving web viewing and the subsequent receipt of spam or other marketing communications that are imposed on the person.
Beyond ideology, part of the problem is in the multiplicity of things Foucault said over a long career touching many topics and in some imprecision in specifying time periods. To take several examples, he can be selectively read to stress either, or both, the centering and decentering of power and domination with and without clearly differentiated agents (whether state or not), and with and without resistance or certainty and uncertainty with respect to being watched. Related but somewhat different control themes are also expressed in his discussion of the Panopticon and literal vision with the rise of the human sciences and vision as knowledge. My point is not to complain about doctrinal purity, consistency, or whether those who are inspired by Foucault do him a disservice in overemphasizing the domination and coercive aspects. It is to argue for attention to the multiplicity of factors beyond power involved with surveillance and, where power is present, for differentiating legally and morally legitimate forms from illegitimate forms. Yet even doing this, we must note that the availability of surveillance resources for the less powerful rarely makes for a level playing field.
In Marx (forthcoming) I identify 12 major goals of surveillance, including compliance, documentation, management and coordination, discovery, publicity, symbolism, and curiosity. As with the tale of the blind and the elephant, some of the disagreements about surveillance involve not viewing the animal in its totality. A recent assessment of video systems in Berlin shopping malls documents a multiplicity of goals and current limitations on social control and exclusion. Work monitoring and coordination were more significant as goals than surveillance of a particular individual. (Helten and Fischer 2003). The joint Urban Eye European research project is offering a wealth of important data on video (www.urbaneye.net).
Of course in reality, things are often more complex than a simple “higher up means more and better information rights (and information).” The right to observe needs to be contrasted with the ability to do this, note the scale/logistical problem of higher-status persons directly observing what goes on below them in pyramidal stratification systems and their necessary dependence on subordinates to learn what is going on; counter norms that those of high status will announce that they are going to visit; and the necessary reliance on private secretaries, valets, and servants whose job requires a close (and nonreciprocated) observation of their employers. Absent special resources to restrict it, those of higher status are less likely to be anonymous and may thus enjoy less privacy (they may also actively seek media attention –whether as a condition of their work or psychology). As public figures, some of their personal information also has less legal protection (e.g., laws regarding disclosure and mandatory reporting, and lessened protection from torts involving being put in a false light, slander, and libel).
Tunnell (p.115) cites a bumper sticker with the words “The Only Urine You Will Get From Me Is for a Taste Test.”
One of the earliest examples of such work was a 1969 video called Supermarket by Paul Ryan and Michael Shamberg (1971), later of (The Big Chill). Their effort to record a supermarket’s surveillance system (with its sign, “Smile, You Are On Photo-Scan T.V.”) recording them was not met with favor. With no sense of humor or irony, the store manager told them their recording was illegal. A 1971 video, Red Squad, uses video to record some of the activities of a New York City police intelligence unit doing its own recording.
There are settings in which technology is relatively weak and in which there are few restraints on its application as in Europe in the Middle Ages. Conversely there are situations in which technology is very powerful, yet there are significant restraints, as with wiretapping in the United States. This contrasts with many contemporary authoritarian societies in which the technology is strong and the restraints on it application are few. The ratio between what could be known given the means for discovering personal information and what is actually known was probably much smaller in the 19th century than today and smaller still in the middle ages and throughout most of recorded human history.
There may be disagreements on which standard should be applied (e.g., for fingerprints should 2 or 10 fingers be scanned?) and even on the worth of a given means. Note controversy over the polygraph, facial recognition, and handwriting analysis, and recently even fingerprinting (Cole 2001).
In our media-saturated society we want to be seen and to see, yet to be left alone. We value freedom of expression and a free press but do not wish to see individuals defamed or harassed. We desire honesty in communication and also civility and diplomacy. We value the right to know but also the right to control personal information. The broad universalistic treatment citizens expect may conflict with the efficiency- driven specific treatment made possible by fine-honed personal surveillance. Yet the desire to be valued as a distinct individual rather than a member of an abstract category speaks to this very need for rich data and fine-grained analysis.
Back to Main Menu | References | Notes | Top