Results by Title   
32 books about Electronic surveillance
Sort by     
 

Abuse of Power: How Cold War Surveillance and Secrecy Policy Shaped the Response to 9/11
Authored by Athan Theoharis
Temple University Press, 2011
Library of Congress TK7882.E2T47 2011 | Dewey Decimal 363.32516

Athan Theoharis, long a respected authority on surveillance and secrecy, established his reputation for meticulous scholarship with his work on the loyalty security program developed under Truman and McCarthy. In Abuse of Power, Theoharis continues his investigation of U.S. government surveillance and historicizes the 9/11 response.

Criticizing the U.S. government's secret activities and policies during periods of "unprecedented crisis," he recounts how presidents and FBI officials exploited concerns about foreign-based internal security threats.

Drawing on information sequestered until recently in FBI records, Theoharis shows how these secret activities in the World War II and Cold War eras expanded FBI surveillance powers and, in the process, eroded civil liberties without substantially advancing legitimate security interests.

Passionately argued, this timely book speaks to the costs and consequences of still-secret post-9/11 surveillance programs and counterintelligence failures. Ultimately, Abuse of Power makes the case that the abusive surveillance policies of the Cold War years were repeated in the government's responses to the September 11 attacks.

Expand Description

Age Factors in Biometric Processing
Michael Fairhurst
The Institution of Engineering and Technology, 2013
Library of Congress TK7882.B56A39 2013

As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly important to consider more carefully issues relating to reliability, usability and inclusion. One factor which is particularly important in this context is that of the relationship between the nature of the measurements extracted from a particular biometric modality and the age of the sample donor, and the effect which age has on physiological and behavioural characteristics invoked in a biometric transaction.
Expand Description

American Surveillance: Intelligence, Privacy, and the Fourth Amendment
Anthony Gregory
University of Wisconsin Press, 2016
Library of Congress KF4850.G74 2016 | Dewey Decimal 342.730858

To defend its citizens from harm, must the government have unfettered access to all information? Or, must personal privacy be defended at all costs from the encroachment of a surveillance state? And, doesn’t the Constitution already protect us from such intrusions? When the topic of discussion is intelligence-gathering, privacy, or Fourth Amendment protections against unreasonable search and seizure, the result is usually more heat than light.
            Anthony Gregory challenges such simplifications, offering a nuanced history and analysis of these difficult issues. He highlights the complexity of the relationship between the gathering of intelligence for national security and countervailing efforts to safeguard individual privacy. The Fourth Amendment prohibiting unreasonable searches and seizures offers no panacea, he finds, in combating assaults on privacy—whether by the NSA, the FBI, local police, or more mundane administrative agencies. Given the growth of technology, together with the ambiguities and practical problems of enforcing the Fourth Amendment, advocates for privacy protections need to work on multiple policy fronts.

“This fascinating review of the shifts and accretions of American law and culture is filled with historical surprises and twenty-first-century shocks, so beneficial in an era of gross American ahistoricality and cultural acquiescence to the technological state. Every flag-waving patriot, every dissenter, every judge and police officer, every small-town mayor and every president should read America Surveillance. We have work to do!”—Lt. Col. Karen U. Kwiatkowski, (Ret.), former Senior Operations Staff Officer, Office of the Director, National Security Agency
Expand Description

Anonymity
Alison Macrina
American Library Association, 2019
Library of Congress Z678.93.P83M33 2019 | Dewey Decimal 025.00285

Captivating Technology: Race, Carceral Technoscience, and Liberatory Imagination in Everyday Life
Ruha Benjamin, editor
Duke University Press, 2019
Library of Congress HV9471.C2825 2019

The contributors to Captivating Technology examine how carceral technologies such as electronic ankle monitors and predictive-policing algorithms are being deployed to classify and coerce specific populations and whether these innovations can be appropriated and reimagined for more liberatory ends.
Expand Description

Computers, Surveillance, and Privacy
David Lyon and Elia Zureik, Editors
University of Minnesota Press, 1996
Library of Congress TK7882.E2C66 1996 | Dewey Decimal 303.4834

Computers, Surveillance, and Privacy was first published in 1996. Minnesota Archive Editions uses digital technology to make long-unavailable books once again accessible, and are published unaltered from the original University of Minnesota Press editions.

From computer networks to grocery store checkout scanners, it is easier and easier for governments, employers, advertisers, and individuals to gather detailed and sophisticated information about each of us. In this important new collection, the authors question the impact of these new technologies of surveillance on our privacy and our culture.

Although surveillance-literally some people "watching over" others-is as old as social relationships themselves, with the advent of the computer age this phenomenon has acquired new and distinctive meanings. Technological advances have made it possible for surveillance to become increasingly global and integrated-both commercial and government-related personal data flows more frequently across national boundaries, and the flow between private and public sectors has increased as well.

Addressing issues of the global integration of surveillance, social control, new information technologies, privacy violation and protection, and workplace surveillance, the contributors to Computers, Surveillance, and Privacy grapple with the ramifications of these concerns for society today. Timely and provocative, this collection will be of vital interest to anyone concerned with resistance to social control and incursions into privacy.

Contributors: Jonathan P. Allen, Colin J. Bennett, Simon G. Davies, Oscar H. Gandy Jr., Calvin C. Gotlieb, Rob Kling, Gary T. Marx, Abbe Mowshowitz, Judith A. Perrolle, Mark Poster, Priscilla M. Regan, James B. Rule.

David Lyon is professor of sociology at Queen's University, Canada. His previous books include The Electronic Eye: The Rise of Surveillance Society (Minnesota, 1994). Elia Zureik is also professor of sociology at Queen's University, Canada, and coedited (with Dianne Hartling) The Social Context of the New Information and Communication Technologies (1987).

Expand Description

Crisis Vision: Race and the Cultural Production of Surveillance
Tom Monahan
Duke University Press, 2022
Library of Congress HV7936.T4M66 2022

In Crisis Vision, Torin Monahan explores how artists confront the racializing dimensions of contemporary surveillance. He focuses on artists ranging from Kai Wiedenhöfer, Paolo Cirio, and Hank Willis Thomas to Claudia Rankine and Dread Scott, who engage with what he calls crisis vision—the regimes of racializing surveillance that position black and brown bodies as targets for police and state violence. Many artists, Monahan contends, remain invested in frameworks that privilege transparency, universality, and individual responsibility in ways that often occlude racial difference. Other artists, however, disrupt crisis vision by confronting white supremacy and destabilizing hierarchies through the performance of opacity. Whether fostering a recognition of a shared responsibility and complicity for the violence of crisis vision or critiquing how vulnerable groups are constructed and treated globally, these artists emphasize ethical relations between strangers and ask viewers to question their own place within unjust social orders.
Expand Description

Dark Matters: On the Surveillance of Blackness
Simone Browne
Duke University Press, 2015
Library of Congress E185.86.B76 2015

In Dark Matters Simone Browne locates the conditions of blackness as a key site through which surveillance is practiced, narrated, and resisted. She shows how contemporary surveillance technologies and practices are informed by the long history of racial formation and by the methods of policing black life under slavery, such as branding, runaway slave notices, and lantern laws. Placing surveillance studies into conversation with the archive of transatlantic slavery and its afterlife, Browne draws from black feminist theory, sociology, and cultural studies to analyze texts as diverse as the methods of surveilling blackness she discusses: from the design of the eighteenth-century slave ship Brooks, Jeremy Bentham's Panopticon, and The Book of Negroes, to contemporary art, literature, biometrics, and post-9/11 airport security practices. Surveillance, Browne asserts, is both a discursive and material practice that reifies boundaries, borders, and bodies around racial lines, so much so that the surveillance of blackness has long been, and continues to be, a social and political norm. 
 
Expand Description

Digitize and Punish: Racial Criminalization in the Digital Age
Brian Jefferson
University of Minnesota Press, 2020
Library of Congress HV7412.4.J44 2020 | Dewey Decimal 364.9730285

Tracing the rise of digital computing in policing and punishment and its harmful impact on criminalized communities of color

 

The U.S. Bureau of Justice Statistics estimates that law enforcement agencies have access to more than 100 million names stored in criminal history databases. In some cities, 80 percent of the black male population is registered in these databases. Digitize and Punish explores the long history of digital computing and criminal justice, revealing how big tech, computer scientists, university researchers, and state actors have digitized carceral governance over the past forty years—with devastating impact on poor communities of color.

Providing a comprehensive study of the use of digital technology in American criminal justice, Brian Jefferson shows how the technology has expanded the wars on crime and drugs, enabling our current state of mass incarceration and further entrenching the nation’s racialized policing and punishment. After examining how the criminal justice system conceptualized the benefits of computers to surveil criminalized populations, Jefferson focuses on New York City and Chicago to provide a grounded account of the deployment of digital computing in urban police departments.

By highlighting the intersection of policing and punishment with big data and web technology—resulting in the development of the criminal justice system’s latest tool, crime data centers—Digitize and Punish makes clear the extent to which digital technologies have transformed and intensified the nature of carceral power.

Expand Description

Discipline and Desire: Surveillance Technologies in Performance
Elise Morrison
University of Michigan Press, 2016
Library of Congress NX180.E44M67 2016 | Dewey Decimal 709.04

Discipline and Desire examines how surveillance technologies, when placed within the frames of theater and performance, can be used to critique and reimagine the politics of surveillance in everyday life. The book explores how rapidly proliferating surveillance technologies, including drones, CCTV cameras, GPS tracking systems, medical surveillance equipment, and facial recognition software, can be repurposed through performance to become technologies of ethical witnessing, critique, and action.

While the subject of surveillance continues to provoke fascination and debate in mainstream media and academia, opportunities to critically reflect upon and, more importantly, to imagine alternative, creative responses to living in a rapidly expanding surveillance society have been harder to find. Author Elise Morrison argues that such opportunities are being created through the growing genre of “surveillance art and performance,” defined as works that centrally employ technologies and techniques of surveillance to create theater, installation, and performance art. Introducing readers to a broad range of surveillance art works, including the work of artists and activists such as Surveillance Camera Players, Jill Magid, Steve Mann, Hasan Elahi, Wafaa Bilal, Blast Theory, Electronic Disturbance Theater, George Brant, Janet Cardiff, Mona Hatoum, and Zach Blas, Discipline and Desire provides a practical and analytical framework that can aid the diverse pursuits of new media-arts practitioners, performance scholars, activists, and hobbyists interested in critical and creative uses of surveillance technologies.
Expand Description

Feminist Surveillance Studies
Rachel E. Dubrofsky and Soshana Amielle Magnet, eds.
Duke University Press, 2015
Library of Congress HQ1426.F4735 2015

Questions of gender, race, class, and sexuality have largely been left unexamined in surveillance studies. The contributors to this field-defining collection take up these questions, and in so doing provide new directions for analyzing surveillance. They use feminist theory to expose the ways in which surveillance practices and technologies are tied to systemic forms of discrimination that serve to normalize whiteness, able-bodiedness, capitalism, and heterosexuality. The essays discuss the implications of, among others, patriarchal surveillance in colonial North America, surveillance aimed at curbing the trafficking of women and sex work, women presented as having agency in the creation of the images that display their bodies via social media, full-body airport scanners, and mainstream news media discussion of honor killings in Canada and the concomitant surveillance of Muslim bodies. Rather than rehashing arguments as to whether or not surveillance keeps the state safe, the contributors investigate what constitutes surveillance, who is scrutinized, why, and at what cost. The work fills a gap in feminist scholarship and shows that gender, race, class, and sexuality should be central to any study of surveillance.

Contributors. Seantel Anaïs, Mark Andrejevic, Paisley Currah, Sayantani DasGupta, Shamita Das Dasgupta, Rachel E. Dubrofsky, Rachel Hall, Lisa Jean Moore, Yasmin Jiwani, Ummni Khan, Shoshana Amielle Magnet, Kelli Moore, Lisa Nakamura, Dorothy Roberts, Andrea Smith, Kevin Walby, Megan M. Wood, Laura Hyun Yi Kang
Expand Description

The Future of Digital Surveillance: Why Digital Monitoring Will Never Lose Its Appeal in a World of Algorithm-Driven AI
Yong Jin Park
University of Michigan Press, 2021
Library of Congress HM846.P36 2021 | Dewey Decimal 005.8

Are humans hard-wired to make good decisions about managing their privacy in an increasingly public world? Or are we helpless victims of surveillance through our use of invasive digital media? Exploring the chasm between the tyranny of surveillance and the ideal of privacy, this book traces the origins of personal data collection in digital technologies including artificial intelligence (AI) embedded in social network sites, search engines, mobile apps, the web, and email. The Future of Digital Surveillance argues against a technologically deterministic view—digital technologies by nature do not cause surveillance. Instead, the shaping of surveillance technologies is embedded in a complex set of individual psychology, institutional behaviors, and policy principles.

Expand Description

Going Stealth: Transgender Politics and U.S. Surveillance Practices
Toby Beauchamp
Duke University Press, 2018
Library of Congress HV7936.T4B43 2018

In Going Stealth Toby Beauchamp demonstrates how the enforcement of gender conformity is linked to state surveillance practices that identify threats based on racial, gender, national, and ableist categories of difference. Positioning surveillance as central to our understanding of transgender politics, Beauchamp examines a range of issues, from bathroom bills and TSA screening practices to Chelsea Manning's trial, to show how security practices extend into the everyday aspects of our gendered lives. He brings the fields of disability, science and technology, and surveillance studies into conversation with transgender studies to show how the scrutinizing of gender nonconformity is motivated less by explicit transgender identities than by the perceived threat that gender nonconformity poses to the U.S. racial and security state. Beauchamp uses instances of gender surveillance to demonstrate how disciplinary power attempts to produce conformist citizens and regulate difference through discourses of security. At the same time, he contends that greater visibility and recognition for gender nonconformity, while sometimes beneficial, might actually enable the surveillance state to more effectively track, measure, and control trans bodies and identities.
Expand Description

The Infrastructures of Security: Technologies of Risk Management in Johannesburg
Martin J. Murray
University of Michigan Press, 2022
Library of Congress HV7434.S62 | Dewey Decimal 364.409682215

Much of the South African government’s response to crime—especially in Johannesburg—has been to rely increasingly on technology. This includes the widespread use of video cameras, Artificial Intelligence, machine-learning, and automated systems, effectively replacing human watchers with machine watchers. The aggregate effect of such steps is to determine who is, and isn’t, allowed to be in public spaces—essentially another way to continue segregation.

In The Infrastructures of Security, author Martin J. Murray concentrates on not only the turn toward technological solutions to managing the risk of crime through digital (and software-based) surveillance and automated information systems, but also the introduction of somewhat bizarre and fly-by-night experimental “answers” to perceived risk and danger. Digitalized surveillance is significant for two reasons: first, it enables monitoring to take place across wide "geographical distances with little time delay"; and second, it allows for the active sorting, identification, and "tracking of bodies, behaviors, and characteristics of subject populations on a continuous, real-time basis." These new software-based surveillance technologies represent monitoring, tracking, and information gathering without walls, towers, or guards.
Expand Description

Intelligent Distributed Video Surveillance Systems
Sergio A. Velastin
The Institution of Engineering and Technology, 2006
Library of Congress TA1634.I56 2006 | Dewey Decimal 006.37

There is a growing interest in the development and deployment of surveillance systems in public and private locations. Conventional approaches rely on the installation of wide area CCTV (Closed Circuit Television), but the explosion in the numbers of cameras that have to be monitored, the increasing costs of providing monitoring personnel and the limitations that humans have to maintain sustained levels of concentration severely limit the effectiveness of these systems. Advances in information and communication technologies, such as computer vision for face recognition and human behaviour analysis, digital annotation and storage of video, transmission of video/audio streams over wired and wireless networks, can potentially provide significant improvements in this field.
Expand Description

The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Age
Edited by Kirstie Ball and Frank Webster
Pluto Press, 2003
Library of Congress JC596.I58 2003 | Dewey Decimal 363.252

John le Carré’s Post–Cold War Fiction
Robert Lance Snyder
University of Missouri Press, 2017
Library of Congress PR6062.E33Z874 2017 | Dewey Decimal 823.914

This is an analysis of the first 10 post—Cold War  novels of one of the most significant ethicists in contemporary fiction.

This book challenges distinctions between “popular” and “serious” literature by recognizing le Carré as one of the most significant ethicists in contemporary fiction, contributing to an overdue reassessment of his literary stature. Le Carré’s ten post–Cold War novels constitute a distinctive subset of his espionage fiction in their response to the momentous changes in geopolitics that began in the 1990s. Through a close reading of these novels, Snyder traces how—amid the “War on Terror” and transnationalism—le Carré weighs what is at stake in this conflict of deeply invested ideologies.

Expand Description

The Listeners: A History of Wiretapping in the United States
Brian Hochman
Harvard University Press, 2022
Library of Congress HV7936.T4H63 2022 | Dewey Decimal 363.252

They’ve been listening for longer than you think. A new history reveals how—and why.

Wiretapping is nearly as old as electronic communications. Telegraph operators intercepted enemy messages during the Civil War. Law enforcement agencies were listening to private telephone calls as early as 1895. Communications firms have assisted government eavesdropping programs since the early twentieth century—and they have spied on their own customers too. Such breaches of privacy once provoked outrage, but today most Americans have resigned themselves to constant electronic monitoring. How did we get from there to here?

In The Listeners, Brian Hochman shows how the wiretap evolved from a specialized intelligence-gathering tool to a mundane fact of life. He explores the origins of wiretapping in military campaigns and criminal confidence games and tracks the use of telephone taps in the US government’s wars on alcohol, communism, terrorism, and crime. While high-profile eavesdropping scandals fueled public debates about national security, crime control, and the rights and liberties of individuals, wiretapping became a routine surveillance tactic for private businesses and police agencies alike.

From wayward lovers to foreign spies, from private detectives to public officials, and from the silver screen to the Supreme Court, The Listeners traces the long and surprising history of wiretapping and electronic eavesdropping in the United States. Along the way, Brian Hochman considers how earlier generations of Americans confronted threats to privacy that now seem more urgent than ever.

Expand Description

Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy
John Gilliom
University of Chicago Press, 2001
Library of Congress KF3720.G55 2001 | Dewey Decimal 342.730858

In Overseers of the Poor, John Gilliom confronts the everyday politics of surveillance by exploring the worlds and words of those who know it best-the watched. Arguing that the current public conversation about surveillance and privacy rights is rife with political and conceptual failings, Gilliom goes beyond the critics and analysts to add fresh voices, insights, and perspectives.

This powerful book lets us in on the conversations of low-income mothers from Appalachian Ohio as they talk about the welfare bureaucracy and its remarkably advanced surveillance system. In their struggle to care for their families, these women are monitored and assessed through a vast network of supercomputers, caseworkers, fraud control agents, and even grocers and neighbors.

In-depth interviews show that these women focus less on the right to privacy than on a critique of surveillance that lays bare the personal and political conflicts with which they live. And, while they have little interest in conventional forms of politics, we see widespread patterns of everyday resistance as they subvert the surveillance regime when they feel it prevents them from being good parents. Ultimately, Overseers of the Poor demonstrates the need to reconceive not just our understanding of the surveillance-privacy debate but also the broader realms of language, participation, and the politics of rights.

We all know that our lives are being watched more than ever before. As we struggle to understand and confront this new order, Gilliom argues, we need to spend less time talking about privacy rights, legislatures, and courts of law and more time talking about power, domination, and the ongoing struggles of everyday people.





Expand Description

Passwords: Philology, Security, Authentication
Brian Lennon
Harvard University Press, 2018
Library of Congress QA76.9.A25L485 2018 | Dewey Decimal 005.824

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.

Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.

Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.

Expand Description

Performance, Transparency, and the Cultures of Surveillance
James M. Harding
University of Michigan Press, 2018
Library of Congress NX180.S6H3185 2018 | Dewey Decimal 700.1030973

Placing the disciplines of performance studies and surveillance studies in a timely critical dialogue, Performance, Transparency, and the Cultures of Surveillance not only theorizes how surveillance performs but also how the technologies and corresponding cultures of surveillance alter the performance of everyday life. This exploration draws upon a rich array of examples from theatre, performance, and the arts, all of which provide vivid illustration of the book’s central argument: that the rise of the surveillance society coincides with a profound collapse of democratic oversight and transparency—a collapse that, in turn, demands a radical rethinking of how performance practitioners conceptualize art and its political efficacy. The book thus makes the case that artists and critics must reexamine—indeed, must radically redefine—their notions of performance if they are to mount any meaningful counter to the increasingly invasive surveillance society.
Expand Description

Principled Spying: The Ethics of Secret Intelligence
David Omand and Mark Phythian
Georgetown University Press, 2018
Library of Congress JF1525.I6O42 2018 | Dewey Decimal 172.42

Intelligence agencies provide critical information to national security and foreign policy decision makers, but spying also poses inherent dilemmas for liberty, privacy, human rights, and diplomacy. Principled Spying explores how to strike a balance between necessary intelligence activities and protecting democratic values by developing a new framework of ethics.

David Omand and Mark Phythian structure this book as an engaging debate between a former national security practitioner and an intelligence scholar. Rather than simply presenting their positions, throughout the book they pose key questions to each other and to the reader and offer contrasting perspectives to stimulate further discussion. They demonstrate the value for both practitioners and the public of weighing the dilemmas of secret intelligence through ethics. The chapters in the book cover key areas including human intelligence, surveillance, acting on intelligence, and oversight and accountability. The authors disagree on some key questions, but in the course of their debate they demonstrate that it is possible to find a balance between liberty and security. This book is accessible reading for concerned citizens, but it also delivers the sophisticated insights of a high-ranking former practitioner and a distinguished scholar.

Expand Description

Privacy at Risk: The New Government Surveillance and the Fourth Amendment
Christopher Slobogin
University of Chicago Press, 2007
Library of Congress KF4558 4th.S56 2007 | Dewey Decimal 342.730858

Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e-mail logs, and sometimes even our medical histories can be readily accessed by law enforcement officials. As Christopher Slobogin explains in Privacy at Risk, these intrusive acts of surveillance are subject to very little regulation.

Applying the Fourth Amendment’s prohibition on unreasonable searches and seizures, Slobogin argues that courts should prod legislatures into enacting more meaningful protection against government overreaching.  In setting forth a comprehensive framework meant to preserve rights guaranteed by the Constitution without compromising the government’s ability to investigate criminal acts, Slobogin offers a balanced regulatory regime that should intrigue everyone concerned about privacy rights in the digital age.
Expand Description

Privacy Matters: Conversations about Surveillance within and beyond the Classroom
Estee Beck
Utah State University Press, 2020
Library of Congress PE1404.P656 2021 | Dewey Decimal 808.0420711

Privacy Matters examines how communications and writing educators, administrators, technological resource coordinators, and scholars can address the ways surveillance and privacy affect student and faculty composing, configure identity formation, and subvert the surveillance state.
 
This collection offers practical analyses of surveillance and privacy as they occur within classrooms and communities. Organized by themes—surveillance and classrooms, surveillance and bodies, surveillance and culture—Privacy Matters provides writing, rhetoric, and communication scholars and teachers with specific approaches, methods, inquiries, and examinations into the impact tracking and monitoring has upon people’s habits, bodies, and lived experiences.
 
While each chapter contributes a new perspective in the discipline and beyond, Privacy Matters affirms that these analyses remain inconclusive. This collection is a call for scholars, researchers, activists, and educators within rhetoric and composition to continue the scholarly conversation because privacy matters to all of us.
 
Contributors: Christina Cedillo, Jenae Cohn, Dànielle Nicole DeVoss, Dustin Edwards, Norah Fahim, Ann Hill Duin, Gavin P. Johnson, John Peterson, Santos Ramos, Colleen A. Reilly, Jennifer Roth Miller, Jason Tham, Stephanie Vie
 
Expand Description

Profit over Privacy: How Surveillance Advertising Conquered the Internet
Matthew Crain
University of Minnesota Press, 2021
Library of Congress HF6146.I58C74 2021 | Dewey Decimal 659.144

A deep dive into the political roots of advertising on the internet

The contemporary internet’s de facto business model is one of surveillance. Browser cookies follow us around the web, Amazon targets us with eerily prescient ads, Facebook and Google read our messages and analyze our patterns, and apps record our every move. In Profit over Privacy, Matthew Crain gives internet surveillance a much-needed origin story by chronicling the development of its most important historical catalyst: web advertising.

The first institutional and political history of internet advertising, Profit over Privacy uses the 1990s as its backdrop to show how the massive data-collection infrastructure that undergirds the internet today is the result of twenty-five years of technical and political economic engineering. Crain considers the social causes and consequences of the internet’s rapid embrace of consumer monitoring, detailing how advertisers and marketers adapted to the existential threat of the internet and marshaled venture capital to develop the now-ubiquitous business model called “surveillance advertising.” He draws on a range of primary resources from government, industry, and the press and highlights the political roots of internet advertising to underscore the necessity of political solutions to reign in unaccountable commercial surveillance.

The dominant business model on the internet, surveillance advertising is the result of political choices—not the inevitable march of technology. Unlike many other countries, the United States has no internet privacy law. A fascinating prehistory of internet advertising giants like Google and Facebook, Profit over Privacy argues that the internet did not have to turn out this way and that it can be remade into something better.

Expand Description

Schools Under Surveillance: Cultures of Control in Public Education
Monahan, Torin
Rutgers University Press, 2009
Library of Congress LB3013.3.S363 2010 | Dewey Decimal 371.782

Schools under Surveillance gathers together some of the very best researchers studying surveillance and discipline in contemporary public schools. Surveillance is not simply about monitoring or tracking individuals and their dataùit is about the structuring of power relations through human, technical, or hybrid control mechanisms. Essays cover a broad range of topics including police and military recruiters on campus, testing and accountability regimes such as No Child Left Behind, and efforts by students and teachers to circumvent the most egregious forms of surveillance in public education. Each contributor is committed to the continued critique of the disparity and inequality in the use of surveillance to target and sort students along lines of race, class, and gender.
Expand Description

The Seventies Now: Culture as Surveillance
Stephen Paul Miller
Duke University Press, 1999
Library of Congress E855.M56 1999 | Dewey Decimal 973.92

Most would agree that American culture changed dramatically from the 1960s to the 1980s. Yet the 1970s, the decade “in between,” is still somehow thought of as a cultural wasteland. In The Seventies Now Stephen Paul Miller debunks this notion by examining a wide range of political and cultural phenomena—from the long shadow cast by Richard Nixon and the Watergate scandal to Andy Warhol and the disco scene—identifying in these phenomena a pivotal yet previously unidentified social trend, the movement from institutionalized external surveillance to the widespread internalization of such practices.
The concept of surveillance and its attendant social ramifications have been powerful agents in U.S. culture for many decades, but in describing how during the 1970s Americans learned to “survey” themselves, Miller shines surprising new light on such subjects as the women’s movement, voting rights enforcement, the Ford presidency, and environmental legislation. He illuminates the significance of what he terms “microperiods” and analyzes relevant themes in many of the decade’s major films—such as The Deer Hunter, Network, Jaws, Star Wars, and Apocalypse Now—and in the literature of writers including John Ashbery, Toni Morrison, Adrienne Rich, and Sam Shepard. In discussing the reverberations of the 1969 Stonewall riots, technological innovations, the philosophy of Michel Foucault, and a host of documents and incidents, Miller shows how the 1970s marked an important period of transition, indeed a time of many transitions, to the world we confront at the end of the millennium.
The Seventies Now will interest students and scholars of cultural studies, American history, theories of technology, film and literature, visual arts, and gay and lesbian studies.
Expand Description

Spying with Maps: Surveillance Technologies and the Future of Privacy
Mark Monmonier
University of Chicago Press, 2002
Library of Congress TK7882.E2M65 2002 | Dewey Decimal 621.38928

Maps, as we know, help us find our way around. But they're also powerful tools for someone hoping to find you. Widely available in electronic and paper formats, maps offer revealing insights into our movements and activities, even our likes and dislikes. In Spying with Maps, the "mapmatician" Mark Monmonier looks at the increased use of geographic data, satellite imagery, and location tracking across a wide range of fields such as military intelligence, law enforcement, market research, and traffic engineering. Could these diverse forms of geographic monitoring, he asks, lead to grave consequences for society? To assess this very real threat, he explains how geospatial technology works, what it can reveal, who uses it, and to what effect.

Despite our apprehension about surveillance technology, Spying with Maps is not a jeremiad, crammed with dire warnings about eyes in the sky and invasive tracking. Monmonier's approach encompasses both skepticism and the acknowledgment that geospatial technology brings with it unprecedented benefits to governments, institutions, and individuals, especially in an era of asymmetric warfare and bioterrorism. Monmonier frames his explanations of what this new technology is and how it works with the question of whether locational privacy is a fundamental right. Does the right to be left alone include not letting Big Brother (or a legion of Little Brothers) know where we are or where we've been? What sacrifices must we make for homeland security and open government?

With his usual wit and clarity, Monmonier offers readers an engaging, even-handed introduction to the dark side of the new technology that surrounds us—from traffic cameras and weather satellites to personal GPS devices and wireless communications.
Expand Description

SuperVision: An Introduction to the Surveillance Society
John Gilliom and Torin Monahan
University of Chicago Press, 2012
Library of Congress TK7882.E2G55 2012 | Dewey Decimal 363.1063

We live in a surveillance society. Anyone who uses a credit card, cell phone, or even search engines to navigate the Web is being monitored and assessed—and often in ways that are imperceptible to us. The first general introduction to the growing field of surveillance studies, SuperVision uses examples drawn from everyday technologies to show how surveillance is used, who is using it, and how it affects our world.      

Beginning with a look at the activities and technologies that connect most people to the surveillance matrix, from identification cards to GPS devices in our cars to Facebook, John Gilliom and Torin Monahan invite readers to critically explore surveillance as it relates to issues of law, power, freedom, and inequality. Even if you avoid using credit cards and stay off Facebook, they show, going to work or school inevitably embeds you in surveillance relationships. Finally, they discuss the more obvious forms of surveillance, including the security systems used at airports and on city streets, which both epitomize contemporary surveillance and make impossibly grand promises of safety and security.
 
Gilliom and Monahan are among the foremost experts on surveillance and society, and, with SuperVision, they offer an immensely accessible and engaging guide, giving readers the tools to understand and to question how deeply surveillance has been woven into the fabric of our everyday lives.
Expand Description

Surveillance in the Time of Insecurity
Monahan, Torin
Rutgers University Press, 2010
Library of Congress HV6432.M647 2010 | Dewey Decimal 363.3251630973

Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse—all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability.

Surveillance in the Time of Insecurity fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show 24, Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.
Expand Description

Under Surveillance: Being Watched in Modern America
By Randolph Lewis
University of Texas Press, 2017
Library of Congress TK7882.E2L49 2017 | Dewey Decimal 363.1063

Never before has so much been known about so many. CCTV cameras, TSA scanners, NSA databases, big data marketers, predator drones, “stop and frisk” tactics, Facebook algorithms, hidden spyware, and even old-fashioned nosy neighbors—surveillance has become so ubiquitous that we take its presence for granted. While many types of surveillance are pitched as ways to make us safer, almost no one has examined the unintended consequences of living under constant scrutiny and how it changes the way we think and feel about the world. In Under Surveillance, Randolph Lewis offers a highly original look at the emotional, ethical, and aesthetic challenges of living with surveillance in America since 9/11.

Taking a broad and humanistic approach, Lewis explores the growth of surveillance in surprising places, such as childhood and nature. He traces the rise of businesses designed to provide surveillance and security, including those that cater to the Bible Belt’s houses of worship. And he peers into the dark side of playful surveillance, such as eBay’s online guide to “Fun with Surveillance Gadgets.” A worried but ultimately genial guide to this landscape, Lewis helps us see the hidden costs of living in a “control society” in which surveillance is deemed essential to governance and business alike. Written accessibly for a general audience, Under Surveillance prompts us to think deeply about what Lewis calls “the soft tissue damage” inflicted by the culture of surveillance.

Expand Description

Windows into the Soul: Surveillance and Society in an Age of High Technology
Gary T. Marx
University of Chicago Press, 2016
Library of Congress HM846.M27 2016 | Dewey Decimal 303.483

We live in an age saturated with surveillance. Our personal and public lives are increasingly on display for governments, merchants, employers, hackers—and the merely curious—to see. In Windows into the Soul, Gary T. Marx, a central figure in the rapidly expanding field of surveillance studies, argues that surveillance itself is neither good nor bad, but that context and comportment make it so.

In this landmark book, Marx sums up a lifetime of work on issues of surveillance and social control by disentangling and parsing the empirical richness of watching and being watched. Using fictional narratives as well as the findings of social science, Marx draws on decades of studies of covert policing, computer profiling, location and work monitoring, drug testing, caller identification, and much more, Marx gives us a conceptual language to understand the new realities and his work clearly emphasizes the paradoxes, trade-offs, and confusion enveloping the field. Windows into the Soul shows how surveillance can penetrate our social and personal lives in profound, and sometimes harrowing, ways. Ultimately, Marx argues, recognizing complexity and asking the right questions is essential to bringing light and accountability to the darker, more iniquitous corners of our emerging surveillance society.

For more information, please see www.garymarx.net.
Expand Description

READERS
Browse our collection.

PUBLISHERS
See BiblioVault's publisher services.

STUDENT SERVICES
Files for college accessibility offices.


SEARCH

ADVANCED SEARCH

BROWSE

by TOPIC
  • by BISAC SUBJECT
  • by LOC SUBJECT
by TITLE
by AUTHOR
by PUBLISHER
WANDER
RANDOM TOPIC
ABOUT BIBLIOVAULT
EBOOK FULFILLMENT
CONTACT US

More to explore...
Recently published by academic presses

                   


home | accessibility | search | about | contact us

BiblioVault ® 2001 - 2023
The University of Chicago Press

BiblioVault A SCHOLARLY BOOK REPOSITORY
Results
  • PUBLISHER LOGIN
  • ADVANCED SEARCH
  • BROWSE BY TOPIC
  • BROWSE BY TITLE
  • BROWSE BY AUTHOR
  • BROWSE BY PUBLISHER
  • ABOUT BIBLIOVAULT
  • EBOOK FULFILLMENT
  • CONTACT US
32 books about Electronic surveillance
Abuse of Power
How Cold War Surveillance and Secrecy Policy Shaped the Response to 9/11
Authored by Athan Theoharis
Temple University Press, 2011

Athan Theoharis, long a respected authority on surveillance and secrecy, established his reputation for meticulous scholarship with his work on the loyalty security program developed under Truman and McCarthy. In Abuse of Power, Theoharis continues his investigation of U.S. government surveillance and historicizes the 9/11 response.

Criticizing the U.S. government's secret activities and policies during periods of "unprecedented crisis," he recounts how presidents and FBI officials exploited concerns about foreign-based internal security threats.

Drawing on information sequestered until recently in FBI records, Theoharis shows how these secret activities in the World War II and Cold War eras expanded FBI surveillance powers and, in the process, eroded civil liberties without substantially advancing legitimate security interests.

Passionately argued, this timely book speaks to the costs and consequences of still-secret post-9/11 surveillance programs and counterintelligence failures. Ultimately, Abuse of Power makes the case that the abusive surveillance policies of the Cold War years were repeated in the government's responses to the September 11 attacks.

[more]

Age Factors in Biometric Processing
Michael Fairhurst
The Institution of Engineering and Technology, 2013
As biometrics-based identification and identity authentication become increasingly widespread in their deployment, it becomes correspondingly important to consider more carefully issues relating to reliability, usability and inclusion. One factor which is particularly important in this context is that of the relationship between the nature of the measurements extracted from a particular biometric modality and the age of the sample donor, and the effect which age has on physiological and behavioural characteristics invoked in a biometric transaction.
[more]

American Surveillance
Intelligence, Privacy, and the Fourth Amendment
Anthony Gregory
University of Wisconsin Press, 2016
To defend its citizens from harm, must the government have unfettered access to all information? Or, must personal privacy be defended at all costs from the encroachment of a surveillance state? And, doesn’t the Constitution already protect us from such intrusions? When the topic of discussion is intelligence-gathering, privacy, or Fourth Amendment protections against unreasonable search and seizure, the result is usually more heat than light.
            Anthony Gregory challenges such simplifications, offering a nuanced history and analysis of these difficult issues. He highlights the complexity of the relationship between the gathering of intelligence for national security and countervailing efforts to safeguard individual privacy. The Fourth Amendment prohibiting unreasonable searches and seizures offers no panacea, he finds, in combating assaults on privacy—whether by the NSA, the FBI, local police, or more mundane administrative agencies. Given the growth of technology, together with the ambiguities and practical problems of enforcing the Fourth Amendment, advocates for privacy protections need to work on multiple policy fronts.

“This fascinating review of the shifts and accretions of American law and culture is filled with historical surprises and twenty-first-century shocks, so beneficial in an era of gross American ahistoricality and cultural acquiescence to the technological state. Every flag-waving patriot, every dissenter, every judge and police officer, every small-town mayor and every president should read America Surveillance. We have work to do!”—Lt. Col. Karen U. Kwiatkowski, (Ret.), former Senior Operations Staff Officer, Office of the Director, National Security Agency
[more]

Anonymity
Alison Macrina
American Library Association, 2019

Captivating Technology
Race, Carceral Technoscience, and Liberatory Imagination in Everyday Life
Ruha Benjamin, editor
Duke University Press, 2019
The contributors to Captivating Technology examine how carceral technologies such as electronic ankle monitors and predictive-policing algorithms are being deployed to classify and coerce specific populations and whether these innovations can be appropriated and reimagined for more liberatory ends.
[more]

Computers, Surveillance, and Privacy
David Lyon and Elia Zureik, Editors
University of Minnesota Press, 1996

Computers, Surveillance, and Privacy was first published in 1996. Minnesota Archive Editions uses digital technology to make long-unavailable books once again accessible, and are published unaltered from the original University of Minnesota Press editions.

From computer networks to grocery store checkout scanners, it is easier and easier for governments, employers, advertisers, and individuals to gather detailed and sophisticated information about each of us. In this important new collection, the authors question the impact of these new technologies of surveillance on our privacy and our culture.

Although surveillance-literally some people "watching over" others-is as old as social relationships themselves, with the advent of the computer age this phenomenon has acquired new and distinctive meanings. Technological advances have made it possible for surveillance to become increasingly global and integrated-both commercial and government-related personal data flows more frequently across national boundaries, and the flow between private and public sectors has increased as well.

Addressing issues of the global integration of surveillance, social control, new information technologies, privacy violation and protection, and workplace surveillance, the contributors to Computers, Surveillance, and Privacy grapple with the ramifications of these concerns for society today. Timely and provocative, this collection will be of vital interest to anyone concerned with resistance to social control and incursions into privacy.

Contributors: Jonathan P. Allen, Colin J. Bennett, Simon G. Davies, Oscar H. Gandy Jr., Calvin C. Gotlieb, Rob Kling, Gary T. Marx, Abbe Mowshowitz, Judith A. Perrolle, Mark Poster, Priscilla M. Regan, James B. Rule.

David Lyon is professor of sociology at Queen's University, Canada. His previous books include The Electronic Eye: The Rise of Surveillance Society (Minnesota, 1994). Elia Zureik is also professor of sociology at Queen's University, Canada, and coedited (with Dianne Hartling) The Social Context of the New Information and Communication Technologies (1987).

[more]

Crisis Vision
Race and the Cultural Production of Surveillance
Tom Monahan
Duke University Press, 2022
In Crisis Vision, Torin Monahan explores how artists confront the racializing dimensions of contemporary surveillance. He focuses on artists ranging from Kai Wiedenhöfer, Paolo Cirio, and Hank Willis Thomas to Claudia Rankine and Dread Scott, who engage with what he calls crisis vision—the regimes of racializing surveillance that position black and brown bodies as targets for police and state violence. Many artists, Monahan contends, remain invested in frameworks that privilege transparency, universality, and individual responsibility in ways that often occlude racial difference. Other artists, however, disrupt crisis vision by confronting white supremacy and destabilizing hierarchies through the performance of opacity. Whether fostering a recognition of a shared responsibility and complicity for the violence of crisis vision or critiquing how vulnerable groups are constructed and treated globally, these artists emphasize ethical relations between strangers and ask viewers to question their own place within unjust social orders.
[more]

Dark Matters
On the Surveillance of Blackness
Simone Browne
Duke University Press, 2015
In Dark Matters Simone Browne locates the conditions of blackness as a key site through which surveillance is practiced, narrated, and resisted. She shows how contemporary surveillance technologies and practices are informed by the long history of racial formation and by the methods of policing black life under slavery, such as branding, runaway slave notices, and lantern laws. Placing surveillance studies into conversation with the archive of transatlantic slavery and its afterlife, Browne draws from black feminist theory, sociology, and cultural studies to analyze texts as diverse as the methods of surveilling blackness she discusses: from the design of the eighteenth-century slave ship Brooks, Jeremy Bentham's Panopticon, and The Book of Negroes, to contemporary art, literature, biometrics, and post-9/11 airport security practices. Surveillance, Browne asserts, is both a discursive and material practice that reifies boundaries, borders, and bodies around racial lines, so much so that the surveillance of blackness has long been, and continues to be, a social and political norm. 
 
[more]

Digitize and Punish
Racial Criminalization in the Digital Age
Brian Jefferson
University of Minnesota Press, 2020

Tracing the rise of digital computing in policing and punishment and its harmful impact on criminalized communities of color

 

The U.S. Bureau of Justice Statistics estimates that law enforcement agencies have access to more than 100 million names stored in criminal history databases. In some cities, 80 percent of the black male population is registered in these databases. Digitize and Punish explores the long history of digital computing and criminal justice, revealing how big tech, computer scientists, university researchers, and state actors have digitized carceral governance over the past forty years—with devastating impact on poor communities of color.

Providing a comprehensive study of the use of digital technology in American criminal justice, Brian Jefferson shows how the technology has expanded the wars on crime and drugs, enabling our current state of mass incarceration and further entrenching the nation’s racialized policing and punishment. After examining how the criminal justice system conceptualized the benefits of computers to surveil criminalized populations, Jefferson focuses on New York City and Chicago to provide a grounded account of the deployment of digital computing in urban police departments.

By highlighting the intersection of policing and punishment with big data and web technology—resulting in the development of the criminal justice system’s latest tool, crime data centers—Digitize and Punish makes clear the extent to which digital technologies have transformed and intensified the nature of carceral power.

[more]

Discipline and Desire
Surveillance Technologies in Performance
Elise Morrison
University of Michigan Press, 2016
Discipline and Desire examines how surveillance technologies, when placed within the frames of theater and performance, can be used to critique and reimagine the politics of surveillance in everyday life. The book explores how rapidly proliferating surveillance technologies, including drones, CCTV cameras, GPS tracking systems, medical surveillance equipment, and facial recognition software, can be repurposed through performance to become technologies of ethical witnessing, critique, and action.

While the subject of surveillance continues to provoke fascination and debate in mainstream media and academia, opportunities to critically reflect upon and, more importantly, to imagine alternative, creative responses to living in a rapidly expanding surveillance society have been harder to find. Author Elise Morrison argues that such opportunities are being created through the growing genre of “surveillance art and performance,” defined as works that centrally employ technologies and techniques of surveillance to create theater, installation, and performance art. Introducing readers to a broad range of surveillance art works, including the work of artists and activists such as Surveillance Camera Players, Jill Magid, Steve Mann, Hasan Elahi, Wafaa Bilal, Blast Theory, Electronic Disturbance Theater, George Brant, Janet Cardiff, Mona Hatoum, and Zach Blas, Discipline and Desire provides a practical and analytical framework that can aid the diverse pursuits of new media-arts practitioners, performance scholars, activists, and hobbyists interested in critical and creative uses of surveillance technologies.
[more]

Feminist Surveillance Studies
Rachel E. Dubrofsky and Soshana Amielle Magnet, eds.
Duke University Press, 2015
Questions of gender, race, class, and sexuality have largely been left unexamined in surveillance studies. The contributors to this field-defining collection take up these questions, and in so doing provide new directions for analyzing surveillance. They use feminist theory to expose the ways in which surveillance practices and technologies are tied to systemic forms of discrimination that serve to normalize whiteness, able-bodiedness, capitalism, and heterosexuality. The essays discuss the implications of, among others, patriarchal surveillance in colonial North America, surveillance aimed at curbing the trafficking of women and sex work, women presented as having agency in the creation of the images that display their bodies via social media, full-body airport scanners, and mainstream news media discussion of honor killings in Canada and the concomitant surveillance of Muslim bodies. Rather than rehashing arguments as to whether or not surveillance keeps the state safe, the contributors investigate what constitutes surveillance, who is scrutinized, why, and at what cost. The work fills a gap in feminist scholarship and shows that gender, race, class, and sexuality should be central to any study of surveillance.

Contributors. Seantel Anaïs, Mark Andrejevic, Paisley Currah, Sayantani DasGupta, Shamita Das Dasgupta, Rachel E. Dubrofsky, Rachel Hall, Lisa Jean Moore, Yasmin Jiwani, Ummni Khan, Shoshana Amielle Magnet, Kelli Moore, Lisa Nakamura, Dorothy Roberts, Andrea Smith, Kevin Walby, Megan M. Wood, Laura Hyun Yi Kang
[more]

The Future of Digital Surveillance
Why Digital Monitoring Will Never Lose Its Appeal in a World of Algorithm-Driven AI
Yong Jin Park
University of Michigan Press, 2021

Are humans hard-wired to make good decisions about managing their privacy in an increasingly public world? Or are we helpless victims of surveillance through our use of invasive digital media? Exploring the chasm between the tyranny of surveillance and the ideal of privacy, this book traces the origins of personal data collection in digital technologies including artificial intelligence (AI) embedded in social network sites, search engines, mobile apps, the web, and email. The Future of Digital Surveillance argues against a technologically deterministic view—digital technologies by nature do not cause surveillance. Instead, the shaping of surveillance technologies is embedded in a complex set of individual psychology, institutional behaviors, and policy principles.

[more]

Going Stealth
Transgender Politics and U.S. Surveillance Practices
Toby Beauchamp
Duke University Press, 2018
In Going Stealth Toby Beauchamp demonstrates how the enforcement of gender conformity is linked to state surveillance practices that identify threats based on racial, gender, national, and ableist categories of difference. Positioning surveillance as central to our understanding of transgender politics, Beauchamp examines a range of issues, from bathroom bills and TSA screening practices to Chelsea Manning's trial, to show how security practices extend into the everyday aspects of our gendered lives. He brings the fields of disability, science and technology, and surveillance studies into conversation with transgender studies to show how the scrutinizing of gender nonconformity is motivated less by explicit transgender identities than by the perceived threat that gender nonconformity poses to the U.S. racial and security state. Beauchamp uses instances of gender surveillance to demonstrate how disciplinary power attempts to produce conformist citizens and regulate difference through discourses of security. At the same time, he contends that greater visibility and recognition for gender nonconformity, while sometimes beneficial, might actually enable the surveillance state to more effectively track, measure, and control trans bodies and identities.
[more]

The Infrastructures of Security
Technologies of Risk Management in Johannesburg
Martin J. Murray
University of Michigan Press, 2022
Much of the South African government’s response to crime—especially in Johannesburg—has been to rely increasingly on technology. This includes the widespread use of video cameras, Artificial Intelligence, machine-learning, and automated systems, effectively replacing human watchers with machine watchers. The aggregate effect of such steps is to determine who is, and isn’t, allowed to be in public spaces—essentially another way to continue segregation.

In The Infrastructures of Security, author Martin J. Murray concentrates on not only the turn toward technological solutions to managing the risk of crime through digital (and software-based) surveillance and automated information systems, but also the introduction of somewhat bizarre and fly-by-night experimental “answers” to perceived risk and danger. Digitalized surveillance is significant for two reasons: first, it enables monitoring to take place across wide "geographical distances with little time delay"; and second, it allows for the active sorting, identification, and "tracking of bodies, behaviors, and characteristics of subject populations on a continuous, real-time basis." These new software-based surveillance technologies represent monitoring, tracking, and information gathering without walls, towers, or guards.
[more]

Intelligent Distributed Video Surveillance Systems
Sergio A. Velastin
The Institution of Engineering and Technology, 2006
There is a growing interest in the development and deployment of surveillance systems in public and private locations. Conventional approaches rely on the installation of wide area CCTV (Closed Circuit Television), but the explosion in the numbers of cameras that have to be monitored, the increasing costs of providing monitoring personnel and the limitations that humans have to maintain sustained levels of concentration severely limit the effectiveness of these systems. Advances in information and communication technologies, such as computer vision for face recognition and human behaviour analysis, digital annotation and storage of video, transmission of video/audio streams over wired and wireless networks, can potentially provide significant improvements in this field.
[more]

The Intensification of Surveillance
Crime, Terrorism and Warfare in the Information Age
Edited by Kirstie Ball and Frank Webster
Pluto Press, 2003

John le Carré’s Post–Cold War Fiction
Robert Lance Snyder
University of Missouri Press, 2017

This is an analysis of the first 10 post—Cold War  novels of one of the most significant ethicists in contemporary fiction.

This book challenges distinctions between “popular” and “serious” literature by recognizing le Carré as one of the most significant ethicists in contemporary fiction, contributing to an overdue reassessment of his literary stature. Le Carré’s ten post–Cold War novels constitute a distinctive subset of his espionage fiction in their response to the momentous changes in geopolitics that began in the 1990s. Through a close reading of these novels, Snyder traces how—amid the “War on Terror” and transnationalism—le Carré weighs what is at stake in this conflict of deeply invested ideologies.

[more]

The Listeners
A History of Wiretapping in the United States
Brian Hochman
Harvard University Press, 2022

They’ve been listening for longer than you think. A new history reveals how—and why.

Wiretapping is nearly as old as electronic communications. Telegraph operators intercepted enemy messages during the Civil War. Law enforcement agencies were listening to private telephone calls as early as 1895. Communications firms have assisted government eavesdropping programs since the early twentieth century—and they have spied on their own customers too. Such breaches of privacy once provoked outrage, but today most Americans have resigned themselves to constant electronic monitoring. How did we get from there to here?

In The Listeners, Brian Hochman shows how the wiretap evolved from a specialized intelligence-gathering tool to a mundane fact of life. He explores the origins of wiretapping in military campaigns and criminal confidence games and tracks the use of telephone taps in the US government’s wars on alcohol, communism, terrorism, and crime. While high-profile eavesdropping scandals fueled public debates about national security, crime control, and the rights and liberties of individuals, wiretapping became a routine surveillance tactic for private businesses and police agencies alike.

From wayward lovers to foreign spies, from private detectives to public officials, and from the silver screen to the Supreme Court, The Listeners traces the long and surprising history of wiretapping and electronic eavesdropping in the United States. Along the way, Brian Hochman considers how earlier generations of Americans confronted threats to privacy that now seem more urgent than ever.

[more]

Overseers of the Poor
Surveillance, Resistance, and the Limits of Privacy
John Gilliom
University of Chicago Press, 2001
In Overseers of the Poor, John Gilliom confronts the everyday politics of surveillance by exploring the worlds and words of those who know it best-the watched. Arguing that the current public conversation about surveillance and privacy rights is rife with political and conceptual failings, Gilliom goes beyond the critics and analysts to add fresh voices, insights, and perspectives.

This powerful book lets us in on the conversations of low-income mothers from Appalachian Ohio as they talk about the welfare bureaucracy and its remarkably advanced surveillance system. In their struggle to care for their families, these women are monitored and assessed through a vast network of supercomputers, caseworkers, fraud control agents, and even grocers and neighbors.

In-depth interviews show that these women focus less on the right to privacy than on a critique of surveillance that lays bare the personal and political conflicts with which they live. And, while they have little interest in conventional forms of politics, we see widespread patterns of everyday resistance as they subvert the surveillance regime when they feel it prevents them from being good parents. Ultimately, Overseers of the Poor demonstrates the need to reconceive not just our understanding of the surveillance-privacy debate but also the broader realms of language, participation, and the politics of rights.

We all know that our lives are being watched more than ever before. As we struggle to understand and confront this new order, Gilliom argues, we need to spend less time talking about privacy rights, legislatures, and courts of law and more time talking about power, domination, and the ongoing struggles of everyday people.





[more]

Passwords
Philology, Security, Authentication
Brian Lennon
Harvard University Press, 2018

Cryptology, the mathematical and technical science of ciphers and codes, and philology, the humanistic study of natural or human languages, are typically understood as separate domains of activity. But Brian Lennon contends that these two domains, both concerned with authentication of text, should be viewed as contiguous. He argues that computing’s humanistic applications are as historically important as its mathematical and technical ones. What is more, these humanistic uses, no less than cryptological ones, are marked and constrained by the priorities of security and military institutions devoted to fighting wars and decoding intelligence.

Lennon’s history encompasses the first documented techniques for the statistical analysis of text, early experiments in mechanized literary analysis, electromechanical and electronic code-breaking and machine translation, early literary data processing, the computational philology of late twentieth-century humanities computing, and early twenty-first-century digital humanities. Throughout, Passwords makes clear the continuity between cryptology and philology, showing how the same practices flourish in literary study and in conditions of war.

Lennon emphasizes the convergence of cryptology and philology in the modern digital password. Like philologists, hackers use computational methods to break open the secrets coded in text. One of their preferred tools is the dictionary, that preeminent product of the philologist’s scholarly labor, which supplies the raw material for computational processing of natural language. Thus does the historic overlap of cryptology and philology persist in an artifact of computing—passwords—that many of us use every day.

[more]

Performance, Transparency, and the Cultures of Surveillance
James M. Harding
University of Michigan Press, 2018
Placing the disciplines of performance studies and surveillance studies in a timely critical dialogue, Performance, Transparency, and the Cultures of Surveillance not only theorizes how surveillance performs but also how the technologies and corresponding cultures of surveillance alter the performance of everyday life. This exploration draws upon a rich array of examples from theatre, performance, and the arts, all of which provide vivid illustration of the book’s central argument: that the rise of the surveillance society coincides with a profound collapse of democratic oversight and transparency—a collapse that, in turn, demands a radical rethinking of how performance practitioners conceptualize art and its political efficacy. The book thus makes the case that artists and critics must reexamine—indeed, must radically redefine—their notions of performance if they are to mount any meaningful counter to the increasingly invasive surveillance society.
[more]

Principled Spying
The Ethics of Secret Intelligence
David Omand and Mark Phythian
Georgetown University Press, 2018

Intelligence agencies provide critical information to national security and foreign policy decision makers, but spying also poses inherent dilemmas for liberty, privacy, human rights, and diplomacy. Principled Spying explores how to strike a balance between necessary intelligence activities and protecting democratic values by developing a new framework of ethics.

David Omand and Mark Phythian structure this book as an engaging debate between a former national security practitioner and an intelligence scholar. Rather than simply presenting their positions, throughout the book they pose key questions to each other and to the reader and offer contrasting perspectives to stimulate further discussion. They demonstrate the value for both practitioners and the public of weighing the dilemmas of secret intelligence through ethics. The chapters in the book cover key areas including human intelligence, surveillance, acting on intelligence, and oversight and accountability. The authors disagree on some key questions, but in the course of their debate they demonstrate that it is possible to find a balance between liberty and security. This book is accessible reading for concerned citizens, but it also delivers the sophisticated insights of a high-ranking former practitioner and a distinguished scholar.

[more]

Privacy at Risk
The New Government Surveillance and the Fourth Amendment
Christopher Slobogin
University of Chicago Press, 2007
Without our consent and often without our knowledge, the government can constantly monitor many of our daily activities, using closed circuit TV, global positioning systems, and a wide array of other sophisticated technologies. With just a few keystrokes, records containing our financial information, phone and e-mail logs, and sometimes even our medical histories can be readily accessed by law enforcement officials. As Christopher Slobogin explains in Privacy at Risk, these intrusive acts of surveillance are subject to very little regulation.

Applying the Fourth Amendment’s prohibition on unreasonable searches and seizures, Slobogin argues that courts should prod legislatures into enacting more meaningful protection against government overreaching.  In setting forth a comprehensive framework meant to preserve rights guaranteed by the Constitution without compromising the government’s ability to investigate criminal acts, Slobogin offers a balanced regulatory regime that should intrigue everyone concerned about privacy rights in the digital age.
[more]

Privacy Matters
Conversations about Surveillance within and beyond the Classroom
Estee Beck
Utah State University Press, 2020
Privacy Matters examines how communications and writing educators, administrators, technological resource coordinators, and scholars can address the ways surveillance and privacy affect student and faculty composing, configure identity formation, and subvert the surveillance state.
 
This collection offers practical analyses of surveillance and privacy as they occur within classrooms and communities. Organized by themes—surveillance and classrooms, surveillance and bodies, surveillance and culture—Privacy Matters provides writing, rhetoric, and communication scholars and teachers with specific approaches, methods, inquiries, and examinations into the impact tracking and monitoring has upon people’s habits, bodies, and lived experiences.
 
While each chapter contributes a new perspective in the discipline and beyond, Privacy Matters affirms that these analyses remain inconclusive. This collection is a call for scholars, researchers, activists, and educators within rhetoric and composition to continue the scholarly conversation because privacy matters to all of us.
 
Contributors: Christina Cedillo, Jenae Cohn, Dànielle Nicole DeVoss, Dustin Edwards, Norah Fahim, Ann Hill Duin, Gavin P. Johnson, John Peterson, Santos Ramos, Colleen A. Reilly, Jennifer Roth Miller, Jason Tham, Stephanie Vie
 
[more]

Profit over Privacy
How Surveillance Advertising Conquered the Internet
Matthew Crain
University of Minnesota Press, 2021

A deep dive into the political roots of advertising on the internet

The contemporary internet’s de facto business model is one of surveillance. Browser cookies follow us around the web, Amazon targets us with eerily prescient ads, Facebook and Google read our messages and analyze our patterns, and apps record our every move. In Profit over Privacy, Matthew Crain gives internet surveillance a much-needed origin story by chronicling the development of its most important historical catalyst: web advertising.

The first institutional and political history of internet advertising, Profit over Privacy uses the 1990s as its backdrop to show how the massive data-collection infrastructure that undergirds the internet today is the result of twenty-five years of technical and political economic engineering. Crain considers the social causes and consequences of the internet’s rapid embrace of consumer monitoring, detailing how advertisers and marketers adapted to the existential threat of the internet and marshaled venture capital to develop the now-ubiquitous business model called “surveillance advertising.” He draws on a range of primary resources from government, industry, and the press and highlights the political roots of internet advertising to underscore the necessity of political solutions to reign in unaccountable commercial surveillance.

The dominant business model on the internet, surveillance advertising is the result of political choices—not the inevitable march of technology. Unlike many other countries, the United States has no internet privacy law. A fascinating prehistory of internet advertising giants like Google and Facebook, Profit over Privacy argues that the internet did not have to turn out this way and that it can be remade into something better.

[more]

Schools Under Surveillance
Cultures of Control in Public Education
Monahan, Torin
Rutgers University Press, 2009
Schools under Surveillance gathers together some of the very best researchers studying surveillance and discipline in contemporary public schools. Surveillance is not simply about monitoring or tracking individuals and their dataùit is about the structuring of power relations through human, technical, or hybrid control mechanisms. Essays cover a broad range of topics including police and military recruiters on campus, testing and accountability regimes such as No Child Left Behind, and efforts by students and teachers to circumvent the most egregious forms of surveillance in public education. Each contributor is committed to the continued critique of the disparity and inequality in the use of surveillance to target and sort students along lines of race, class, and gender.
[more]

The Seventies Now
Culture as Surveillance
Stephen Paul Miller
Duke University Press, 1999
Most would agree that American culture changed dramatically from the 1960s to the 1980s. Yet the 1970s, the decade “in between,” is still somehow thought of as a cultural wasteland. In The Seventies Now Stephen Paul Miller debunks this notion by examining a wide range of political and cultural phenomena—from the long shadow cast by Richard Nixon and the Watergate scandal to Andy Warhol and the disco scene—identifying in these phenomena a pivotal yet previously unidentified social trend, the movement from institutionalized external surveillance to the widespread internalization of such practices.
The concept of surveillance and its attendant social ramifications have been powerful agents in U.S. culture for many decades, but in describing how during the 1970s Americans learned to “survey” themselves, Miller shines surprising new light on such subjects as the women’s movement, voting rights enforcement, the Ford presidency, and environmental legislation. He illuminates the significance of what he terms “microperiods” and analyzes relevant themes in many of the decade’s major films—such as The Deer Hunter, Network, Jaws, Star Wars, and Apocalypse Now—and in the literature of writers including John Ashbery, Toni Morrison, Adrienne Rich, and Sam Shepard. In discussing the reverberations of the 1969 Stonewall riots, technological innovations, the philosophy of Michel Foucault, and a host of documents and incidents, Miller shows how the 1970s marked an important period of transition, indeed a time of many transitions, to the world we confront at the end of the millennium.
The Seventies Now will interest students and scholars of cultural studies, American history, theories of technology, film and literature, visual arts, and gay and lesbian studies.
[more]

Spying with Maps
Surveillance Technologies and the Future of Privacy
Mark Monmonier
University of Chicago Press, 2002
Maps, as we know, help us find our way around. But they're also powerful tools for someone hoping to find you. Widely available in electronic and paper formats, maps offer revealing insights into our movements and activities, even our likes and dislikes. In Spying with Maps, the "mapmatician" Mark Monmonier looks at the increased use of geographic data, satellite imagery, and location tracking across a wide range of fields such as military intelligence, law enforcement, market research, and traffic engineering. Could these diverse forms of geographic monitoring, he asks, lead to grave consequences for society? To assess this very real threat, he explains how geospatial technology works, what it can reveal, who uses it, and to what effect.

Despite our apprehension about surveillance technology, Spying with Maps is not a jeremiad, crammed with dire warnings about eyes in the sky and invasive tracking. Monmonier's approach encompasses both skepticism and the acknowledgment that geospatial technology brings with it unprecedented benefits to governments, institutions, and individuals, especially in an era of asymmetric warfare and bioterrorism. Monmonier frames his explanations of what this new technology is and how it works with the question of whether locational privacy is a fundamental right. Does the right to be left alone include not letting Big Brother (or a legion of Little Brothers) know where we are or where we've been? What sacrifices must we make for homeland security and open government?

With his usual wit and clarity, Monmonier offers readers an engaging, even-handed introduction to the dark side of the new technology that surrounds us—from traffic cameras and weather satellites to personal GPS devices and wireless communications.
[more]

SuperVision
An Introduction to the Surveillance Society
John Gilliom and Torin Monahan
University of Chicago Press, 2012

We live in a surveillance society. Anyone who uses a credit card, cell phone, or even search engines to navigate the Web is being monitored and assessed—and often in ways that are imperceptible to us. The first general introduction to the growing field of surveillance studies, SuperVision uses examples drawn from everyday technologies to show how surveillance is used, who is using it, and how it affects our world.      

Beginning with a look at the activities and technologies that connect most people to the surveillance matrix, from identification cards to GPS devices in our cars to Facebook, John Gilliom and Torin Monahan invite readers to critically explore surveillance as it relates to issues of law, power, freedom, and inequality. Even if you avoid using credit cards and stay off Facebook, they show, going to work or school inevitably embeds you in surveillance relationships. Finally, they discuss the more obvious forms of surveillance, including the security systems used at airports and on city streets, which both epitomize contemporary surveillance and make impossibly grand promises of safety and security.
 
Gilliom and Monahan are among the foremost experts on surveillance and society, and, with SuperVision, they offer an immensely accessible and engaging guide, giving readers the tools to understand and to question how deeply surveillance has been woven into the fabric of our everyday lives.
[more]

Surveillance in the Time of Insecurity
Monahan, Torin
Rutgers University Press, 2010
Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse—all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability.

Surveillance in the Time of Insecurity fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show 24, Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.
[more]

Under Surveillance
Being Watched in Modern America
By Randolph Lewis
University of Texas Press, 2017

Never before has so much been known about so many. CCTV cameras, TSA scanners, NSA databases, big data marketers, predator drones, “stop and frisk” tactics, Facebook algorithms, hidden spyware, and even old-fashioned nosy neighbors—surveillance has become so ubiquitous that we take its presence for granted. While many types of surveillance are pitched as ways to make us safer, almost no one has examined the unintended consequences of living under constant scrutiny and how it changes the way we think and feel about the world. In Under Surveillance, Randolph Lewis offers a highly original look at the emotional, ethical, and aesthetic challenges of living with surveillance in America since 9/11.

Taking a broad and humanistic approach, Lewis explores the growth of surveillance in surprising places, such as childhood and nature. He traces the rise of businesses designed to provide surveillance and security, including those that cater to the Bible Belt’s houses of worship. And he peers into the dark side of playful surveillance, such as eBay’s online guide to “Fun with Surveillance Gadgets.” A worried but ultimately genial guide to this landscape, Lewis helps us see the hidden costs of living in a “control society” in which surveillance is deemed essential to governance and business alike. Written accessibly for a general audience, Under Surveillance prompts us to think deeply about what Lewis calls “the soft tissue damage” inflicted by the culture of surveillance.

[more]

Windows into the Soul
Surveillance and Society in an Age of High Technology
Gary T. Marx
University of Chicago Press, 2016
We live in an age saturated with surveillance. Our personal and public lives are increasingly on display for governments, merchants, employers, hackers—and the merely curious—to see. In Windows into the Soul, Gary T. Marx, a central figure in the rapidly expanding field of surveillance studies, argues that surveillance itself is neither good nor bad, but that context and comportment make it so.

In this landmark book, Marx sums up a lifetime of work on issues of surveillance and social control by disentangling and parsing the empirical richness of watching and being watched. Using fictional narratives as well as the findings of social science, Marx draws on decades of studies of covert policing, computer profiling, location and work monitoring, drug testing, caller identification, and much more, Marx gives us a conceptual language to understand the new realities and his work clearly emphasizes the paradoxes, trade-offs, and confusion enveloping the field. Windows into the Soul shows how surveillance can penetrate our social and personal lives in profound, and sometimes harrowing, ways. Ultimately, Marx argues, recognizing complexity and asking the right questions is essential to bringing light and accountability to the darker, more iniquitous corners of our emerging surveillance society.

For more information, please see
www.garymarx.net.
[more]




home | accessibility | search | about | contact us

BiblioVault ® 2001 - 2023
The University of Chicago Press