![]() |
![]() |
Your cart is empty |
||
Books > Business & Economics > Industry & industrial studies > Service industries > Security services > Surveillance services
One day in the spring of 2013, a box appeared outside a fourth-floor apartment door in Brooklyn, New York. The recipient, who didn't know the sender, only knew she was supposed to bring this box to a friend, who would ferry it to another friend. This was Edward Snowden's box-printouts of documents proving that the US government had built a massive surveillance apparatus and used it to spy on its own people-and the friend on the end of this chain was filmmaker Laura Poitras. Thus the biggest national security leak of the digital era was launched via a remarkably analog network, the US Postal Service. This is just one of the odd, ironic details that emerges from the story of how Jessica Bruder and Dale Maharidge, two experienced journalists but security novices (and the friends who received and ferried the box) got drawn into the Snowden story as behind-the-scenes players. Their initially stumbling, increasingly paranoid, and sometimes comic efforts to help bring Snowden's leaks to light, and ultimately, to understand their significance, unfold in an engrossing narrative that includes emails and diary entries from Poitras. This is an illuminating essay on the status of transparency, privacy, and trust in the age of surveillance.
This book is about explaining surveillance processes and practices in contemporary society. Surveillance studies is a relatively new multi-disciplinary enterprise that aims to understand who watches who, how the watched participate in and sometimes question their surveillance, why surveillance occurs, and with what effects. This book brings together some of the world's leading surveillance scholars to discuss the why question. The field has been dominated, since the groundbreaking work of Michel Foucault, by the idea of the panopticon and this book explores why this metaphor has been central to discussions of surveillance, what is fruitful in the panoptic approach, and what other possible approaches can throw better light on the phenomena in question. Since the advent of networked computer databases, and especially since 9/11, questions of surveillance have come increasingly to the forefront of democratic, political and policy debates in the global north (and to an extent in the global south). Civil liberties, democratic participation and privacy are some of the issues that are raised by these developments. adequate understanding of how, how well and whether or not surveillance works. This book explores the theoretical questions in a way that is grounded in and attuned to empirical realities.
Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.
A compelling firsthand investigation of how social media and big data have amplified the close relationship between privacy and inequality  Online privacy is under constant attack by social media and big data technologies. But we cannot rely on individual actions to remedy this—it is a matter of social justice. Alice E. Marwick offers a new way of understanding how privacy is jeopardized, particularly for marginalized and disadvantaged communities—including immigrants, the poor, people of color, LGBTQ+ populations, and victims of online harassment.  Marwick shows that few resources or regulations for preventing personal information from spreading on the internet. Through a new theory of “networked privacy,†she reveals how current legal and technological frameworks are woefully inadequate in addressing issues of privacy—often by design. Drawing from interviews and focus groups encompassing a diverse group of Americans, Marwick shows that even heavy social media users care deeply about privacy and engage in extensive “privacy work†to protect it. But people are up against the violation machine of the modern internet. Safeguarding privacy must happen at the collective level.
Casino and Gaming Resort Investigations addresses the continued and growing need for gaming security professionals to properly and successfully investigate the increasing and unique types of crime they will face in their careers. As the gaming industry has grown, so has the need for competent and highly skilled investigators who must be prepared to manage a case of employee theft one day to a sophisticated sports book scam the next. This book provides the reader with the fundamental knowledge needed to understand how each gaming and non-gaming department functions and interacts within the overall gaming resort, allowing the investigator to determine and focus on the important elements of any investigation in any area. Each chapter delivers a background of a department or type of crime normally seen in the gaming environment, and then discusses what should be considered important or even critical for the investigator to know or determine in the course of the investigation. Likely scenarios, case histories, and tips, as well as cautions for investigators to be aware of, are used throughout the book. This book was written for and directed at gaming security and surveillance professionals, including gaming regulators, and tribal gaming authorities, who are almost daily confronted by the ingenious and the most common scams, theft, and frauds that are perpetrated in the gaming world.
Today, public space has become a fruitful venue for surveillance of many kinds. Emerging surveillance technologies used by governments, corporations, and even individual members of the public are reshaping the very nature of physical public space. Especially in urban environments, the ability of individuals to remain private or anonymous is being challenged. Surveillance, Privacy, and Public Space problematizes our traditional understanding of 'public space'. The chapter authors explore intertwined concepts to develop current privacy theory and frame future scholarly debate on the regulation of surveillance in public spaces. This book also explores alternative understandings of the impacts that modern living and technological progress have on the experience of being in public, as well as the very nature of what public space really is. Representing a range of disciplines and methods, this book provides a broad overview of the changing nature of public space and the complex interactions between emerging forms of surveillance and personal privacy in these public spaces. It will appeal to scholars and students in a variety of academic disciplines, including sociology, surveillance studies, urban studies, philosophy, law, communication and media studies, political science, and criminology.
In spite of Edward Snowden's disclosures about government abuses of dragnet communication surveillance, the surveillance industry continues to expand around the world. Many people have become resigned to a world where they cannot have a reasonable expectation of privacy. The author looks at what can be done to rein in these powers and restructure how they are used beyond the limited and often ineffective reforms that have been attempted. Using southern Africa as a backdrop, and its liberation history, Jane Duncan examines what an anti-capitalist perspective on intelligence and security powers could look like. Are the police and intelligence agencies even needed, and if so, what should they do and why? What lessons can be learnt from how security was organised during the struggles for liberation in the region? Southern Africa is seeing thousands of people in the region taking to the streets in protests. In response, governments are scrambling to acquire surveillance technologies to monitor these new protest movements. Southern Africa faces no major terrorism threats at the moment, which should make it easier to develop clearer anti-surveillance campaigns than in Europe or the US. Yet, because of tactical and strategic ambivalence about security powers, movements often engage in limited calls for intelligence and policing reforms, and fail to provide an alternative vision for policing and intelligence. Surveillance and Intelligence in Southern Africa examines what that vision could look like.
One day in the spring of 2013, a box appeared outside a fourth-floor apartment door in Brooklyn, New York. The recipient, who didn't know the sender, only knew she was supposed to bring this box to a friend, who would ferry it to another friend. This was Edward Snowden's box-printouts of documents proving that the US government had built a massive surveillance apparatus and used it to spy on its own people-and the friend on the end of this chain was filmmaker Laura Poitras. Thus the biggest national security leak of the digital era was launched via a remarkably analog network, the US Postal Service. This is just one of the odd, ironic details that emerges from the story of how Jessica Bruder and Dale Maharidge, two experienced journalists but security novices (and the friends who received and ferried the box) got drawn into the Snowden story as behind-the-scenes players. Their initially stumbling, increasingly paranoid, and sometimes comic efforts to help bring Snowden's leaks to light, and ultimately, to understand their significance, unfold in an engrossing narrative that includes emails and diary entries from Poitras. This is an illuminating essay on the status of transparency, privacy, and trust in the age of surveillance.
The United Kingdom has more than 4.2 million public closed-circuit
television (CCTV) cameras-one for every fourteen citizens. Across
the United States, hundreds of video surveillance systems are being
installed in town centers, public transportation facilities, and
schools at a cost exceeding $100 million annually. And now other
Western countries have begun to experiment with CCTV to prevent
crime in public places. In light of this expansion and the
associated public expenditure, as well as pressing concerns about
privacy rights, there is an acute need for an evidence-based
approach to inform policy and practice.
Featuring chapters authored by leading scholars in the fields of criminology, critical race studies, history, and more, The Cambridge Handbook of Race and Surveillance cuts across history and geography to provide a detailed examination of how race and surveillance intersect throughout space and time. The volume reviews surveillance technology from the days of colonial conquest to the digital era, focusing on countries such as the United States, Canada, the UK, South Africa, the Philippines, India, Brazil, and Palestine. Weaving together narratives on how technology and surveillance have developed over time to reinforce racial discrimination, the book delves into the often-overlooked origins of racial surveillance, from skin branding, cranial measurements, and fingerprinting to contemporary manifestations in big data, commercial surveillance, and predictive policing. Lucid, accessible, and expertly researched, this handbook provides a crucial investigation of issues spanning history and at the forefront of contemporary life.
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.
What our health data tell American capitalism about our value-and how that controls our lives. Afterlives of Data follows the curious and multiple lives that our data live once they escape our control. Mary F. E. Ebeling's ethnographic investigation shows how information about our health and the debt that we carry becomes biopolitical assets owned by healthcare providers, insurers, commercial data brokers, credit reporting companies, and platforms. By delving into the oceans of data built from everyday medical and debt traumas, Ebeling reveals how data about our lives come to affect our bodies and our life chances and to wholly define us. Investigations into secretive data collection and breaches of privacy by the likes of Cambridge Analytica have piqued concerns among many Americans about exactly what is being done with their data. From credit bureaus and consumer data brokers like Equifax and Experian to the secretive military contractor Palantir, this massive industry has little regulatory oversight for health data and works to actively obscure how it profits from our data. In this book, Ebeling traces the health data-medical information extracted from patients' bodies-that are digitized and repackaged into new data commodities that have afterlives in database lakes and oceans, algorithms, and statistical models used to score patients on their creditworthiness and riskiness. Critical and disturbing, Afterlives of Data examines how Americans' data about their health and their debt are used in the service of marketing and capitalist surveillance.
In the 2020 CBC Massey Lectures, bestselling author and renowned technology and security expert Ronald J. Deibert exposes the disturbing influence and impact of the internet on politics, the economy, the environment, and humanity. Digital technologies have given rise to a new machine-based civilization that is increasingly linked to a growing number of social and political maladies. Accountability is weak and insecurity is endemic, creating disturbing opportunities for exploitation. Drawing from the cutting-edge research of the Citizen Lab, the world-renowned digital security research group which he founded and directs, Ronald J. Deibert exposes the impacts of this communications ecosystem on civil society. He tracks a mostly unregulated surveillance industry, innovations in technologies of remote control, superpower policing practices, dark PR firms, and highly profitable hack-for-hire services feeding off rivers of poorly secured personal data. Deibert also unearths how dependence on social media and its expanding universe of consumer electronics creates immense pressure on the natural environment. In order to combat authoritarian practices, environmental degradation, and rampant electronic consumerism, he urges restraints on tech platforms and governments to reclaim the internet for civil society.
This volume examines the relationship between privacy, surveillance and security, and the alleged privacy-security trade-off, focusing on the citizen's perspective. Recent revelations of mass surveillance programmes clearly demonstrate the ever-increasing capabilities of surveillance technologies. The lack of serious reactions to these activities shows that the political will to implement them appears to be an unbroken trend. The resulting move into a surveillance society is, however, contested for many reasons. Are the resulting infringements of privacy and other human rights compatible with democratic societies? Is security necessarily depending on surveillance? Are there alternative ways to frame security? Is it possible to gain in security by giving up civil liberties, or is it even necessary to do so, and do citizens adopt this trade-off? This volume contributes to a better and deeper understanding of the relation between privacy, surveillance and security, comprising in-depth investigations and studies of the common narrative that more security can only come at the expense of sacrifice of privacy. The book combines theoretical research with a wide range of empirical studies focusing on the citizen's perspective. It presents empirical research exploring factors and criteria relevant for the assessment of surveillance technologies. The book also deals with the governance of surveillance technologies. New approaches and instruments for the regulation of security technologies and measures are presented, and recommendations for security policies in line with ethics and fundamental rights are discussed. This book will be of much interest to students of surveillance studies, critical security studies, intelligence studies, EU politics and IR in general. A PDF version of this book is available for free in open access via www.tandfebooks.com. It has been made available under a Creative Commons Attribution-Non Commercial 3.0 license.
The challenges to humanity posed by the digital future, the first detailed examination of the unprecedented form of power called "surveillance capitalism," and the quest by powerful corporations to predict and control our behavior. In this masterwork of original thinking and research, Shoshana Zuboff provides startling insights into the phenomenon that she has named surveillance capitalism. The stakes could not be higher: a global architecture of behavior modification threatens human nature in the twenty-first century just as industrial capitalism disfigured the natural world in the twentieth. Zuboff vividly brings to life the consequences as surveillance capitalism advances from Silicon Valley into every economic sector. Vast wealth and power are accumulated in ominous new "behavioral futures markets," where predictions about our behavior are bought and sold, and the production of goods and services is subordinated to a new "means of behavioral modification." The threat has shifted from a totalitarian Big Brother state to a ubiquitous digital architecture: a "Big Other" operating in the interests of surveillance capital. Here is the crucible of an unprecedented form of power marked by extreme concentrations of knowledge and free from democratic oversight. Zuboff's comprehensive and moving analysis lays bare the threats to twenty-first century society: a controlled "hive" of total connection that seduces with promises of total certainty for maximum profit -- at the expense of democracy, freedom, and our human future. With little resistance from law or society, surveillance capitalism is on the verge of dominating the social order and shaping the digital future -- if we let it.
This is a volume of original contributions from scholars in eight different humanities and social science disciplines. The aim of the book is to present a range of surveillance technologies used in everyday life and investigate the politics of their use. It is truly an interdisciplinary project that will find purchase in courses on security studies and the sociology of culture and the sociology of science. Courses on security studies and its impact on culture can be found in a variety of academic departments including STS, criminology, sociology, women's studies, anthropology, political science and justice studies.
In 2013, former U.S. National Security Agency (NSA) contractor Edward Snowden leaked secret documents revealing that state agencies like the NSA had spied on the communications of millions of innocent citizens. International outrage resulted, but the Snowden documents revealed only the tip of the surveillance iceberg. Apart from insisting on their rights to tap into communications, more and more states are placing citizens under surveillance, tracking their movements and transactions with public and private institutions. The state is becoming like a one-way mirror, where it can see more of what its citizens do and say, while citizens see less and less of what the state does, owing to high levels of secrecy around surveillance. In this book, Jane Duncan assesses the relevance of Snowden’s revelations for South Africa. In doing so she questions the extent to which South Africa is becoming a surveillance society governed by a surveillance state. Duncan challenges members of civil society to be concerned about and to act on the ever-expanding surveillance capacities of the South African state. Is surveillance used for the democratic purpose of making people safer, or is it being used for the repressive purpose of social control, especially of those considered to be politically threatening to ruling interests? She explores the forms of collective action needed to ensure that unaccountable surveillance does not take place and examines what does and does not work when it comes to developing organised responses. This book is aimed at South African citizens, academics as well as the general reader, who care about our democracy and the direction it is taking.
A practical, user-friendly handbook for understanding and protecting our personal data and digital privacy. Our Data, Ourselves addresses a common and crucial question: What can we as private individuals do to protect our personal information in a digital world? In this practical handbook, legal expert Jacqueline D. Lipton guides readers through important issues involving technology, data collection, and digital privacy as they apply to our daily lives. Our Data, Ourselves covers a broad range of everyday privacy concerns with easily digestible, accessible overviews and real-world examples. Lipton explores the ways we can protect our personal data and monitor its use by corporations, the government, and others. She also explains our rights regarding sensitive personal data like health insurance records and credit scores, as well as what information retailers can legally gather, and how. Who actually owns our personal information? Can an employer legally access personal emails? What privacy rights do we have on social media? Answering these questions and more, Our Data, Ourselves provides a strategic approach to assuming control over, and ultimately protecting, our personal information.
With thorough analysis and balanced reporting, Ghost Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution is an essential resource for readers seeking to understand the rise of homemade firearms and future options for managing them. For more than a century, strict gun control was possible because firearms were produced in centralized industrial factories. Today, the Fourth Industrial Revolution, combining old and new technologies, threatens to upend this arrangement. An increasing number of hobbyists, "makers," technology provocateurs, and sophisticated criminals are proving that you don't need a factory to make guns anymore. The security challenges of this transformation are increasingly apparent, but the technologies behind it hold tremendous potential, and while ignoring the security implications would entail risks, the costs of new policies also must be evaluated. "Do-it-yourself," or DIY, weapons will bring significant ramifications for First and Second Amendment law, international and homeland security, crime control, technology, privacy, innovation, and the character of open source culture itself. How can a liberal society adjust to technologies that make it easier to produce weapons and contraband? Informative and thought-provoking, Ghost Guns: Hobbyists, Hackers, and the Homemade Weapons Revolution carefully analyzes the technical, legal, social, political, and criminological trends behind this challenging new area of illicit weapons activity. Provides readers with informative background on DIY gun laws and legislative trends and fascinating descriptions of legal and illegal practices with homemade weapons around the world Presents in-depth explanations of the consumer appeal, technology, economics, politics, and enforcement challenges behind America's quickly growing DIY gun-making phenomenon Evaluates the current and future appeal of homemade weapons for differing types of crime and terrorism Offers a series of forward-looking recommendations for weapons control and security policy in an increasingly "post-industrial" 21st century |
![]() ![]() You may like...
Commodity Supply Management by Producing…
Alfred Maizels, Robert Bacon, …
Hardcover
R2,125
Discovery Miles 21 250
The Art of Measuring in the Thermal…
Josua Meyer, Michel De Paepe
Hardcover
R4,604
Discovery Miles 46 040
|