Surveillance from all angles? Some observations and comments

Abstract

Surveillance activity may take the form of visual surveillance using CCTV, electronic surveillance of people (e.g. tagging of offenders) and items of property (e.g. tracking devices in vehicles) and voice surveillance (e.g. voice recognition software). Surveillance can also be targeted at individuals (potential victims of crime, offenders), items of property worn or carried by individuals (e.g. clothing, bags), other property (e.g. buildings, vehicles, goods) and places (towns centres, residential areas). The effective deployment of surveillance in crime prevention involves a complex set of interrelationships between the technical capabilities of the equipment (e.g. facial recognition CCTV, prediction of behaviour from peoples’ gesture and gait, automatic flagging of suspicious objects), contextual factors (e.g. terrain, land use, social environment), management and training and crucially the response of those subjected to surveillance (offenders, victims, bystanders, local residents). Then there is the crucial area of how the recipients of surveillance data interpret what they see and hear (cognition) and how they use this knowledge to communicate with other agencies (e.g. the police and emergency services). Consideration of civil liberties and human rights pervade all stages of the surveillance process and implicitly bring with them new and largely unexplored concepts and notions such as ‘ethical targeting’ and responsible surveillance. This presentation will explore some of the assumptions that underpin surveillance from a crime prevention perspective. It will discuss the feasibility of developing a theoretical framework for the deployment, response and evaluation of surveillance activity aimed at deterring and preventing crime. Particular attention will be paid to the role theory plays in different stages of the surveillance process (problem diagnosis, choice of technology, targeting, use, response and evaluation)

Similar works

This paper was published in University of Huddersfield Repository.

Having an issue?

Is data on this page outdated, violates copyrights or anything else? Report the problem now and we will take corresponding actions after reviewing your request.