Wednesday, June 5, 2019

Surveillance Technology And Monitoring Criminology Essay

Surveillance Technology And Monitoring Criminology EssayPost 9/11, it seems many people be content to accept increase monitoring, care and incursions into their semiprivate lives to support what is sold as enhanced safeguards to individual and national security. Yet, there are lurking dangers in such tacit acceptance. Critically discerp with illustrations, contrasting different criminological viewpoints in your answer.Surveillance engine room and monitoring has been increasing, especially in the wake of 9/11, however it has two faces,1on the unity hand providing sanctuary and security to protect the public and aiding national security, but on the other hand it provides an intrusive interference into peoples private lives and it can trim rights, creating a division within company. There has been a change in criminological ideologies and the way that law-breaking is dealt with. We now live in what is called a surveillance society.2In Discipline and Punish,3Foucault wrote ab out the brutal system of punishment, which foc utilize on the infliction of pain on the body that existed in the 1700s, which was replaced by the prison house, eighty days later.4This was seen as an efficient way of punishing as it is based on the technology of world power. Foucault referred to this as discipline based around surveillance, which uses a variety of sagacious techniques to run and manage the offender in ever much finely graded ways.5Foucault used Benthams panopticon prison design as a metaphor, to describe the map that surveillance played inside the prison. The circular prison design, featuring a central guards tower from which a guard can see into every single prison cell while themselves remaining hidden, separates out the prisoners, thus helping control instal in the prison, but likewise generates turn inledge and expends relating to the prisoners by dint of facilitating study of them as individuals.6It was thought that this constant visibility would brin g about a sense of vulnerability in the prisoners, which, in turn, would lead them to control themselves and increasingly the exercise of power over the inmate should be fall out un undeniable as they exercise self discipline.7A contemporary example is provided by Shearing and Stenning,8in relation to control within Disney World, which they termed instrumental discipline. The control structures and activities brook other functions which are highlighted so that the control function is overshadowed. For example, employees wish visitors a happy day and a just time from the moment they arrive as well as maintaining order, so that the control and surveillance is unnoticed but its effects are ever present. dominance trouble is anticipated and prevented by the surveillance of omnipresent employees who detect and rectify the slightest deviation. As a consequence the control becomes consensual, effected with the willing co-operation if those being controlled, which allows compulsion to be reduced to a minimum, much like Foucaults description of Benthams panopticon. It is an extraordinarily effective form of control where people conform due to the pleasures of consuming the goods that merged power has to offer. Surveillance is pervasive and it is not in the form of the Big Brother state, it is defined by private authorities knowing to further the absorb of the Disney Corporation than a moral discipline which shapes and sustains a particular order. Within Disney World the control is embedded, preventative, subtle and co-operative and requires no knowledge of the individual, therefore it is not intrusive or invading peoples privacy as they continue to enjoy the time spent at Disney World, without realising that they are subject to control.Since the 1970s fear of crime has come to be regarded as a problem quite distinct from actual crime and victimization, and distinctive policies have been developed that aim to reduce fear levels, kind of than to reduce crime.9Fouc ault was concerned about knowledge-production,10which is now more readily available and more easily accessible through news on the television and the internet. This has condition rise to an information society,11which led to an increase of fear but also earlier and accurate predictions of current and future criminal behaviour and methods in order to safeguard against them as crime has been re-dramatised in the media. Media may construct groups who are feared and seen as outsiders e.g. paedophiles and terrorists and not only does their exclusion increase their insecurity but also everyone else feels more insecure because of the assay they have been told these groups pose. The rest of the population needs to be protected from these dangerous people who should be controlled by fairly knock-down(prenominal) authoritarian State action.12This is how and why surveillance is sold to consumers by governments and commercial organisations as benign and in society best interest and it is why1 3there is a lack of resistance to and largely complacent acceptance of, surveillance systems by society in general.During the twentieth-century there was a shift from normalising individual offenders (post crime) to pre-crime14 concern by reducing opportunities of risks posed by actual and would-be offenders. This was represented in Feeley and Simons New Penology,15which concerned actuarialism and anticipating the future and assessed risks to prevent crime. A range of risk calculation techniques that underpin crime control policies which seek to severalize and manage groups of people according to their assorted levels of dangerousness16were developed. Within the theory of managerialism, developed a practice of targeting resources (on crime hot-spots, career criminals, repeat victims, and high risk offenders) gate-keeping to exclude trivial or low-risk cases (except where these are deemed to be linked to more serious public safety issues) and a generalised cost-consciousness in the allocation of criminal justice resources.17This was seen as economic, efficient and effective within the public sector, where strategies were employed by police organisations including the increase use of surveillance, proactive targeting of people and places, and the rise of problem-oriented policing and intelligence-led policing,18which was prominent with the application of scarce resources for the worse risks.A modern example of this is the airport security system, which now uses biometric sensors to reach various measurements of biological features unique to each individual, such as iris pattern, fingerprint or handprint, and comparing this data to previously depicted data of the same type in a database.19These screening techniques are then used to identify typical offender characteristics, where it is important to maintain security and to flag-up certain passengers as being high risk based on simple calculations. Passengers scoring above a certain threshold can be searched, questioned or investigated further, or discretely put under surveillance within the airport terminal.20Another example includes the use of automatic number plate recognition (ANPR), which works by examine passing vehicle registration plates and checking them against various relevant digitised databases, to ensure that the vehicle has insurance and to check any document irregularity with the driver. This form of surveillance is more intrusive than foot-traffic by closed-circuit television (CCTV) that normally leaves those observed anonymous.21Critics of such risk checklists claim that this can lead to social sorting,22which may involve stereotypes of race, ghostly faith, nationality and gender, for example, to be aggregated to define target markets and risky populations, which can have far reaching impact on life chances, and of social exclusion and discrimination.23It could be argued that the aforementioned are only present in poorly researched and implemented screening systems, and that properly researched, evidence-based screening systems that have been properly evaluated and revised as necessary are a useful additional tool.24However, the airport security system relates back to Benthams Panopticon as individuals are being watched but do not know the extent to which they are being watched, if at all, but may modify their behaviour nevertheless. This disciplinary surveillance manifests in all areas of social life, including health and medicine, education, the army and factories.25Advanced security and surveillance technologies may help to curtail feelings of insecurity amongst the public but the degree of interference should reflect the level of the risk or dangerousness that the surveillance is monitoring and trying to prevent. This intrusion may seem to be justified within airport security due to recent dangers relating to terrorism, importing and exporting of illegal drugs and illegal immigration. Protecting the public has become the dominant theme o f penal policy.26Deleuze27points to electronic tagging of offenders rather than being detained in a prison, thus todays society is able to punish and control even while setting free. Today, many offenders being electronically monitored are not in fact offenders whom a chat up has so sentenced, but are actually prisoners who early conditional release from their medium-term prison sentences who would be monitored at home for the remainder of the time that they would have been in prison.28Tracking tags, like electronic access cards, can permit/disallow or warn against entry to a particular zone or place, by chance at a particular time or day. The first generation of electronic tags did not have any capability of tracking an individual label offenders movement.29In recent years, a second generation of electronic tags, look set to supersede and replace the earlier generation tags. The GPS technology enables the tag to identify its exact geographical position, while the mobile cell ph one technology enables the tag to relay this positional data back to a monitoring centre. Tags and detect cards leave a little digital record in an archive each time they are used which can be used as a way to reconstruct events should something go awry. Tags can modulate a given offenders daily unremarkable, thus there is potential to combine this host of stored data to build up a picture of a persons activities, communications, interests, financial transactions, and so on.30Cohen31talked about a blurring of boundaries so that it is sometimes difficult to tell where the prison ends and the community begins, due to the use of custody and electronic monitoring. This type of technology is extremely intrusive on part of the offender and may seek to discriminate them from the community and also affects the family of the offender. However, it does not seem to affect the public at large.Jones32points out that intelligence agencies use of surveillance practices (i.e. spying) and their use of on overtaking monitoring systems designed to alert them to certain circumstances of interest or concern. CCTV can also be combined with facial recognition software to match facial epitome data stored on databases of known individuals.33Even though this may be seen as intrusive, there would be a reason behind why the suspects symbol was held in the first place. This would flag-up known offenders which, would make it a simpler task for police investigation if such technologies existed. The inescapability of surveillance and compliance with it is something that many people find offensive for many reasons, such as, loss of privacy, autonomy, trust or control and may thus actively resist or seek to subvert it. However, it is more original if the information obtained is recognised as being legitimate.34If cameras are pointing in the correct direction and images are being recorded then a visual record of the offence is made which could be used to apprehend the offender and/or se cure a conviction in a court, as it may be available in evidence, thereby justifying the use of CCTV. Poor image and recording quality seem likely to become less significant as technology improves.35However, this may not act as a deterrent as crime may be displaced so that offenders simply commit crimes where there are no cameras. There was belief that CCTV would deter people from committing crimes, however, research shows that CCTV schemes were not as effective at crime reduction as hoped. Welsh and Farrington36 instal that improved street light was more effective in reducing crime in city centres, that both were more effective in reducing property crimes than violent crimes, and that both measures were far more effective in reducing crime. They also noted that in Britain city centres CCTV cameras generally appear best-selling(predicate) with the public.In 1991, Foucault37concentrated on the art of government where conduct was not controlled or governed by the criminal justice sys tem alone but through a plethora of organisations, many of them private and many with a central role in other spheres such as commerce.38These include local authorities, health services and voluntary agencies.39Individuals are also expected to take responsibility for their own security. Each of these adds to the process of responsibilisation which has become part of modern control of crime and disorder.40Foucaults discussion of governmentality41included the rise of neo-liberalism, which recast the ideal role of the State from one as guarantor of security to one in which rule is progressively undertaken at a distance from the State. Cohen42talked about dispersal of discipline and stated that boundaries have also been blurred between the public and the private as the private sector comes to play an ever-larger role. Privatised ownership of data raised anxiety of expandable mutability43and function creep,44which are concepts meaning that technology designed for one heading can take on other functions, and data collected for one purpose can migrate for use in other ways that have potential to be deployed in broader contexts.45An example of this is where Transport for London will allow bulk data from its ANPR cameras used to log vehicles for congestion charging purposes to be viewed in real time by anti-terrorist officers of the Metropolitan Police for intelligence purposes.46The sharing of intelligence information between agencies could well be liable to unauthorised escape valve47and potential abuse of data sharing. This may lead to breaches of the data guard, human rights and the erosion of privacy, as the public are unaware that data collected in relation to them is being used for unknown purposes, even though they may be legitimate. One way the law has sought to deal with this is through the entropy Protection Act 1998, which requires that those who operate CCTV systems (data controllers) and who record images from which individuals can be identified, must register with the Information Commissioner and ensure that the system is operated in accordance with the data protection principles, however this legislation does not apply for intelligence purposes as described above.To conclude, procedural safeguards included surveillance cameras have come to be a routine presence on city streets and the risk of unrestrained State authorities, of arbitrary power and the violations of civil liberties seem no longer to figure so prominently in public concern.48Corbett49argues that increased surveillance is defensible if the data collected is used strictly for state security purposes, crime prevention and crime detection, to tug deterrence and encourage compliance of potential offenders, and when this fails, sanction them in the hope of future individual deterrence. For the time being, surveillance technologies are here to stay it is the monetary value that people need to pay in order to have improved national security for the safety and security of the mass population. However, is the State surveillance going too far with the form of surveillance on the roads, where cameras are permitted to reach into the private interior space of vehicles to photograph a driver as a safeguard against penalty point fraud or where proposals have been made for mandatorily fitting cars with black boxes that can locate them in the event of a road crash?50A balance needs to be struck so that the State does not abuse its power, otherwise it will be responsible to Article 8.51Word count 2, 498Bibliography Question 2BooksGarland, D. 2001. The Culture of Control Crime and Social Order in Contemporary Society, Oxford University Press Oxford.Hale, C., Hayward, K., Wahidin, A., Wincup, E., 2005. Criminology, Oxford University Press OxfordNewburn, T., 2007. Criminology, Willan create Devon.Williams, K.., 2008. Textbook on Criminology, 6th edition, Oxford University Press OxfordArticlesCorbett, C. 2008. Techno-Surveillance of the Roads High Impact an d Low Interest, Crime Prevention and Community Safety, 10, 1-18Shearing, C. Stenning, P. 1987. Say Cheese The Disney Order that is not so Mickey Mouse, Private Policing, Newbury Park, CA Sage. PP.317-323

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.