Free Essay

You Are Being Watched

In:

Submitted By marin351
Words 5798
Pages 24
The unsettling thing about living in a surveillance society is not just that you are being watched. It is that you have no idea.

M a r i n e D r o u a r t

L E A 3

L a e t i t i a F o u r e u r

INDEX

Introduction

3

I. A. B.

You are Being Watched in Popular Culture The Firm by John Grisham Surveillance in Other Works

3 3 4

II. A. B. C.

Surveillance in Daily Lives History Different Kinds of Surveillance Regulation of The Surveillance

5 5 7 14

III. A. B.

Reversal of The Situation: Everyone can Watch One Another Exhibitionism Voyeurism

17 17 19

Conclusion

21

SOURCES

22

2

Introduction: Our freedom is always under electronic surveillance. Computer technologies have increased; this is what specialists call "traceability". Our operations, our conversations, our tastes and interests leave traces in the multiple computer systems that manage our daily lives. All these data are collected, centralized and stored by public or private organizations that can know at any time the "profile" of each individual. Every day in so many ways we are being watched. We are told it is for our own good, our own protection, to make our lives better, but is it? Until recently all of this would have been considered as science fiction but now the evidence is all around us. There is no denying that we live in a surveillance society. No matter what we do, there is no turning back.

I. A.

You are Being Watched in Popular Culture The Firm by John Grisham

In the book, Mitch is always under surveillance, he is being watched by both the FBI and the firm. The firm uses the DeVasher team to track him. They use big arms to threaten him. At the head of the surveillance process, we find Oliver Lambert (senior partner at the firm). They are watching him to know everything about his past; they dig really deep in his background. They want to know everything about his family, they investigate on Ray, his brother who is in jail, and they also investigate on his mother who is really poor. According to Abby, his wife, there is a true intrusion in their private life. And she is right. To watch him they use different techniques: He is followed by car, for example in the Grand Caymans, they also use cameras, microphone they bugged his phone, they take photos of him for example in Grand Cayman when he is with another woman cheating on his wife. They are watching him because they want to be superior to him and control everything about him so that the lawyers in the firm are not caught because of the illegal means they use. They also watch him to know if everything he does or says to whether keep him in the firm or to kill him like the 3 others lawyers. At 1/3 of the book, Mitch contacts a private detective because he has some

3

doubts about the firm, and he knows that he is being watched, he clearly said it to Eddie Lomax in the office. He also says it to Barry Abanks, the father of the pilot who died in the Cayman boat “accident”. From now on, Mitch and Abby who are aware of the truth start to act very carefully. But it is not just in the firm that we can talk about surveillance, indeed, the surveillance seems to be an exciting subject for authors or director because it is present in a lot of movies and books. B. Surveillance in Other Works

For example, we can talk about the movie “The Truman Show” (Peter Weir, 1998): Truman Burbank has lived his entire life, since before birth, in front of cameras for The Truman Show, although he himself is unaware of this fact. Truman's life is filmed through thousands of hidden cameras, 24 hours a day and broadcast live around the world, allowing executive producer Christof to capture Truman's real emotion and human behaviour when put in certain situations. Then, Truman realizes that he had been constantly watched by everyone and the audience is glad to see that he is free but still disappointed that their favourite show is over. Joel Gold, a psychiatrist at the Bellevue Hospital Centre, revealed that by 2008, he had met five patients with schizophrenia who believed their lives were reality television shows. Gold named the syndrome "The Truman Show Delusion". Now we call this disease “ The Truman syndrome”

There are other movies such as “The Eye of Evil (Fritz Lang, 1960): Dr. Mabuse develops a device located inside a large hotel in Berlin, with way mirrors and many cameras connected to a control station that allows control and voyeurism by both members of the management and some customers.

We can also see this impact of the surveillance in many books. For example we have “1984”, written by George Orwell. It is a precursor novel. The author was inspired by Stalin and turns him into his "Big Brother" and to depict the totalitarian society.

4

“The black-moustachioʼd face gazed down from every commanding corner. There was one on the house-front immediately opposite. BIG BROTHER IS WATCHING YOU, the caption said, while the dark eyes looked deep into Winstonʼs own. (…) In the far distance a helicopter skimmed down between the roofs, hovered for an instant like a bluebottle, and darted away again with a curving flight. It was the police patrol, snooping into peopleʼs windows. The patrols did not matter, however. Only the Thought Police mattered.”

We also have the book “L'Œil de Caine,” written by Patrick Bauwen. It is a story where 10 candidates thought they are going to participate to a show but there is a change of plan and now every candidate is trapped by one man: Caine who watch them all day long.

II. A.

Surveillance in Daily Lives History

Our period is characterized by an unprecedented acceleration of the history of technique. This development has considerable anthropological implications. The extreme speed with which these upheavals are developing and “penetrate” our environment is a new characteristic. The width and the density of these changes cause fear and anxiety and tetanize the spirit of initiative, in aid of an instinctive aspiration to maintain situations, to protect ourselves from possible dangers coming from outside. It is likely that the expansion of monitoring technologies in our environment represents a kind of collective unconscious which would seek to reinforce the temptation of control. The fall of the Berlin Wall in 1989 inaugurates the end of a bipolar organization which governed the relations between nations, and which impregnated many conceptual, political, economic outlines… The last decade of the 20th century testifies to a dispersion of the points of power towards an expansion of the number of territories now autonomous (bursting of the Soviet Union, of Yugoslavia, of Czechoslovakia). The event of September 11th, 2001 – the attack of the first economic and military power by a group of religious extremists – proves one of the new basic facts of our age: the extreme fragmentation of the power struggles between political or ideological entities. The beginning of the 21st century is marked by the extent and dispersion of the risks of any nature. The spectrum of the threats contributes to the

5

installation – sometimes legitimate, sometimes hysterical – of devices and to the acceleration of the design of new protocols, with a political and legal decision-making often hasty.

 For example, the speed with which has been adopted the legal arsenal named Patriot Act, voted in October 2001, six weeks only after September 11th. The act dramatically reduced restrictions on law enforcement agencies' ability to search telephone, e-mail communications, medical, financial, and other records.

One of the major functions of the monitoring consists in trying to identify the threat before it materialized: in being able to get ready accordingly and to counter it: the evidence recovery which would warn us of all dangers before they can occur. For example, the American rout of Pearl Harbour in December 1941 is due to a failure of the monitoring system, which did not know to detect the implementation of a surprise attack. The soldiers were caught off guard facing the enemy. The fact of having to supervise belongs to the need for nations and authorities to be able to protect territories and to maintain a stable political base (it is a matter of avoiding infiltrations, destabilization attempts, wars, revolts, plots, coups dʼétat). Monitoring technologies are not used only by the authorities, centres of power, or by those supposed to care about the application of the law, but also by those who wish to make offenses: illegal connections to cameras circuits, violation of secure files, interception of codes on the networks, collect strategic information, disturbance of electronic protocols… Sometimes, “supervisors” and “supervised” spy on one another, which may lead to a growing paranoia (cf The Firm). What form new control mechanisms take today? Indeed, by means of processes that we relieve or supply without our knowledge – video surveillance, geo-localization, databases, RFID chips, behaviour analysis software, etc., a disembodied Big Brother, of which we are at the same time victims and accomplices, operates now on each one of us.

6

B.

Different Kinds of Surveillance

Computer files, cell phones, Internet, association of credit card and the barcode, Echelon network, here are the ways in which our freedom has become very guarded…

Files: Government files and private companies collect personal data on many millions of citizens or consumers. These data are harmless until they are scattered, spread across multiple systems. But by using these techniques, very familiar to hackers', some "organizations" which have a lot of means can easily penetrate these systems to collect and centralize all the information. Many companies founded lately (mainly in the U.S.) are specialized in the collect of personal data, officially for commercial purposes. But these private files begin to gather millions of individual profiles located throughout the West. The information in these files are sold to anyone who wants to buy.

The credit card associated with the bar code: Expenditures made with a credit card can track our movements, but also to know accurately which product has been purchased. To optimize inventory management and accounting, store computer systems memorize jointly card numbers and bar codes of purchased products. For example, if the product is a book, the barcode indicate which book this is, and so everyone can know the cultural and political profile of the buyer. The combination of barcode and credit card number means the automatic association of identified products with identified consumers.

7

Mobile phones: Everyone knows that with receptor like a scanner (whose use is illegal, but its sale is allowed), it is very easy for anyone to make wiretaps on the phones. What is less known is that the cell can locate the owner at any time, even outside communication, in standby mode. Because to receive a call, it is essential that the operator system can locate the customer, to determine the local cell which will transmit the call. Cell phones emit continuously a signal to indicate their presence to the closest cells. All data about your location are stored by operators and are transmitted on demand to the police and information services of the States. It is thus possible to trace automatically every single move that you make on a map. A German politician, Malta Spitz has sued Deutsche Telecom to know what data had been registered. He discovered that the latitude and longitude of his cell had been registered 35.000 times in the last 6 months. It is the same for every citizen in all Western countries. GPS integrated into smartphone provide the location with an accuracy of one meter. The mobile phone is a true electronic collar. A necklace voluntary and paid by the wearer. Finally, we must know that the cell's microphone can be activated remotely by the police with a simple 4-digit code, even when the cell is off. Anyone can be spied at any time and without even notice it.

The Echelon network: The Echelon is an automated system for intercepting communications, regardless of their support: telephone, fax, e-mail, satellites. The Echelon network was established for 20 years and in the utmost secrecy by five English-speaking countries: the United States, Britain, Canada, Australia and New Zealand. The Echelon network is primarily managed by the NSA, the U.S. electronic intelligence agency.

8

The idea of Echelon is to use voice recognition technology to identify automatically key words in the recorded conversations. The keywords to find are chosen by Echelon officers based on news and current objectives. The technique of listening being automated, a large number of communications in the world can be stored and processed every day. Only communications containing keywords are selected for a human listening. Echelon can analyse 2 million conversations per minute. Every day, Echelon catches 4.3 billion communications, almost the half of the 10 billion daily conversations exchanged worldwide. The existence of this network has only been revealed in 1998 by media, during a European Parliament report, which alleged Echelon to violate "the privacy of communications of non-Americans, including governments, companies and citizens."

Video surveillance: Always under the pretext of security, the number of surveillance cameras is still increasing in most cities. In Great Britain there are over 4 million surveillance cameras, installed in the streets, train stations, subways, in front of public buildings or buildings. In addition to these cameras we can see speed-control cameras on the roads. Technically, nothing prevents them from being used for a systematic identification of all vehicles. The identification of individuals in a crowd is now possible by connecting the camera to face recognition software. This software can identify many faces at a time in a crowd by comparing them with faces whose image is stored in a

9

database. Thus, the monitoring process can be fully automated, and then systematized. Initially, the image of the cameras will be compared with the faces of people present in the policeʼs files: terrorists, criminals, but also political or trade union activists, journalists, etc. With the widespread use of biometric identity cards, the face of every person will be digitally recorded in a database. In a near future, the face of every citizen will be identified by surveillance cameras and it will be entirely possible to follow the movement of a person in a city (the computer automatically switching from one camera to another to always keep the person present on the screen).

A function even more dangerous is now integrated into the software of image analysis. In the United States and in Europe, research centres are editing software that can identify "suspicious behaviour" of individuals in a crowd, and automatically send an alert to the police. The software can notice people who are gathering in one place, a person who is leaving something on the floor (that could be a potential bomb), or even a person who is waiting by herself/himself. We can imagine the consequences of alerts triggered by this type of software. Anyone who has a behaviour a little different from the "herd" could be killed by the police who has been giving the order to fire directly at the head to avoid any risk of attack, as was the case in London in July 2005 (when the anti terrorist police in London had executed an innocent wrongly identified as potential terrorist with 6 bullets in the head).

10

We can also imagine the uses made with this software by companies to spies on their employees.

Chips RFID: Chips RFID are incorporated by the multinationals in some their products to ensure the traceability of it. The chip then makes it possible to locate the product during its distribution, but also after its purchase. Chip RFID being identified at the time of the passage to the case of the supermarket, it can be associated the credit card or the cheque of the purchaser, and thus its identity. Each bought product becomes then an "electronic informer" who allows locating his user. In addition on certain versions of the RFID, the drawings formed by the circuits of the chip are rather strange, with a kind of swastika, or a quadruple "Tau" (a symbol freemason which one finds in the film Equilibrium).

 swastika

 quadruple "Tau"

The chip was already used in particular by Gillette, "to trace" its disposable razors. It is manufactured by an American company called… Matrics, like by the Japanese companies NEC and Hitachi. It was invented by Gemplus, a French company repurchased by American investors. Chips RFID measure a little less than 1 millimetre. In spite of this miniaturization, they integrate a memory of 1 Kbit and an antenna which emits in the frequency band of the 2,5 GHz.

Implants – the “Digital Angel” and “Verichip” chips: Manufactured by the US company Applied Digital Solutions, the “Digital Angel” chip allows the identification and the satellite positioning of the individuals. It is an electronic chip of the size of a grain of rice and which is established under the skin. It is also able to return biological information on its owner (temperature of the body, heart rate, etc.).

11

Another version of the chip called “Veripay” was presented in November 2003 at the ID World International Congress in Paris. It makes it possible to register personal data in order to be used as identity card or credit card. A third version of the chip, Verichip, is already established on cattle to ensure the traceability of it. Soon, the human cattle also will be perfectly “identifiable”, as soon as a new September 11th provides the excuse to make the chip obligatory, in the name of safety. Multiple means are currently used to prepare the public opinion to accept chip, and to reduce the instinctive repulsion to the intrusion of material objects in the body. Hence the media and culture industry efforts to popularize piercings, silicone implants, or gastric rings (as solution against obesity). To make chip desirable and tendency, a disco of Barcelona directed by an American already proposes to his customers to implant under their skin a microchip for 100 euros in order to be able to pay consumption to the bar without money. But the method most largely used is to popularize chip thanks to medical pretexts. American hospitals already encourage patients to resort to a chip containing their personal medical information (blood group, treatments already in progress, etc.), in order to avoid the risks of error in the identification and the treatment of patients. Implants will be also proposed for a medical supervision at a distance with automatic sending of an alert to the doctor in case of problem. This chip is the next stage for an absolute control of individuals by the “Masters of the World”. Sooner or later, electronic implants will make it possible to directly control spirits by modifying the brain working, and consequently, the mood, the emotions, the thoughts and the behaviour (cf film Ultimate Game).

Internet: Nothing is more transparent than the Internet network. With adequate software, anybody can track information consulted by a Net surfer. Moreover, Internet user is easily recognizable thanks to personal data stored by the browser and the system.

12

The data about our identity on the Internet are “questionable from a distance”, as well as the contents of the famous “magic cookie”. This backup file keeps trace information of some websites visited which register information in order to identify the users and to memorize their profile. Moreover, since the attacks of September 11th, 2001, most Western countries adopted laws which authorize the monitoring of the whole of the communications online: e-mails, but also websites visited, pages consulted, time spent on each site, or participations in forums. The information memorized is extremely detailed, much more than the fight against possible terrorists would require it. On the other hand, the information collected corresponds exactly to what would be necessary to establish the “profile” of each citizen.

Microsoft and Intel: The Big Brother palm electronic returns unquestionably Microsoft with its Windows and its Internet Explorer browser, which contain an identification number of the user, the GUID (Globally Unique Identifier). This identification number is then entered in all documents created with Microsoft Office applications. It can be accessed remotely via the Internet through special commands provided by Microsoft. The Windows and Internet Explorer include other special commands that allow probing the contents of the hard disk of the user, without his knowledge during his connections to the Internet. Microsoft has acknowledged the existence of these special orders and the GUID. According to a report in 1999 for the French Ministry of Defence, there would be links between Microsoft and U.S. intelligence services, and members of the NSA (National Security Agency) would work in teams at Microsoft. The report also spoke of the presence of spyware programs (“back doors”) in Microsoft software. For its part, Intel has also put an identification number with remote access in the Pentium III and Xeon chips. The solution to protecting your privacy and your data using a Macintosh (or Linux), and surf the Net with a browser other than Internet Explorer (Firefox for example).

13

The “Total Awareness Information System”: The attacks of September 11th, 2001 were the excuse of an immense operation to reduce public freedoms. In November 2002, a new step was taken by George W. Bush, in the name of “internal security”. The Bush administration will establish a monitoring system named Total Awareness Information System, which will legalize what has already been practiced illegally for a number of years. The system must explore all the databases of the world to join together all information concerning private life of all American citizens, and probably also of the citizens of all the countries of the world. None of what we will do and read will be ignored anymore by this super Big Brother: e-mail, fax, telephone calls, bank accounts, medical care, plane tickets purchases, subscriptions to newspapers or magazines, websites consultations… But following public critics, saying that the application of these technologies could possibly lead to a mass monitoring system, the Congress of the United States decided to cut funding to the Information Awareness Office in 2003, but several projects maintained by the Information Awareness Office were continued by using other funds. C. Regulation of The Surveillance

There are different surveillance.

Acts

to

regulate

the



In USA:

- "Title III" Wiretap Act  Wiretaps can also be ordered in suspected cases of terrorist bombings, hijackings and other violent activities are crimes  Electronic surveillance involves the traditional laws  States have extended these laws to cover data communications

14

- Foreign Intelligence Surveillance Act of 1978 Wiretapping of aliens and citizens in the U.S. is allowed. There are no legislative limits on U.S. government electronic eavesdropping carried out overseas. - The Electronic Communications Privacy Act of 1986 This Act sets standards for access to cellphones, email and other electronic communications and to transactional records. - Communications Assistance for Law Enforcement Act This Act preserves law enforcement wiretapping capabilities by requiring telephone companies to design their systems to ensure a basic level of government access. USA PATRIOT Act



In UK:

Directed surveillance is covered by the Regulation of Investigatory Powers Act 2000, and the Terrorism Act 2000. They update the powers of the state to tap communications and to infiltrate networks or organisations. These laws require that: - Any directed surveillance must be properly authorised by a person empowered to do so; - This authorisation must be subjected to scrutiny to ensure that it was justified under the relevant law, and that it was correctly applied. Some kinds of directed surveillance controls are enabled primarily through general powers given to the police to 'maintain order'. The use of surveillance in policing demonstrations is something of a grey area in terms of regulation; although the type of surveillance used does not necessarily target specific individuals, the Security Services Act 1996 and the Police Act 1997 state that concerted action by many people, even if in itself not illegal, may be investigated as 'serious crime'. The Anti-Terrorism, Crime and Security Act 2001 strengthens the powers of the state to hold traffic data (see glossary). It also allows government departments to pool their information on terrorism and serious crime as part of their investigations. Controls over the monitoring of

15

communications data are less restrictive than those for directed surveillance. Communications data is accessible to local government agencies as well as the police or security services. The Regulation of Investigatory Powers (RIP) Act widened the scope of powers for surveillance. It introduced a new requirement for telecommunications service providers to install special taps to facilitate blanket surveillance based around the automated collection of traffic data.

The RIP Act provides that communications data may be intercepted: - In the interests of public safety; - For the protection of public health; - The collection of tax or charges payable to a government department; or - For preventing death or injury. It requires that message contents, on the other hand, should only be read in cases involving: - National security; - The prevention of serious crime; - The protection of the ʻeconomic well-beingʼ of the UK. The European Cybercrime Convention permits communications data to be routinely databased and held for many years and shared with other states that are signatories to the Convention. Safeguards for the rights of individuals in terms of the use of their personal data come under data protection laws. The rights of individuals to privacy are defined by the Human Rights Act 1998, which implements the European Convention on Human Rights. Article 8 of the Convention states that: - Everyone has the right to respect for his(/her) private and family life, his(/her) home and his(/her) correspondence. - There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the prevention of disorder or crime, for the protection of health or morals, or for the protection of the rights and freedoms of others. Under UK law, therefore, a person has no absolute privacy rights. They are all subject to the exceptions above, so there is a wide range of circumstances in which government and other bodies may argue for such exceptions to be made.

16

Does the use of electronic surveillance threaten civil liberties? In situations where data has been used (even where information is erroneous) in a way that damages a person's private life, individuals have limited legal rights to prevent further disclosure or to seek redress for the damage caused. Many Internet privacy activists believe that there may be significant cause for concern on the privacy implications in the use of, for example: - Data profiling; - The growing number of software tools that can only be registered online; - Internet firewalls and cookies; - Communications traffic data which identifies the source of requests, names of files supplied, dates, times, etc. This can enable the generation of profiles of the activities of groups or individuals; - The databasing and archiving of that information.

III.

Reversal of The Situation: Everyone can Watch One Another

We live in a world under surveillance: nobody any more would dare to doubt it. But how do they modify our relationship to the world and to other individuals? Do they go until threatening the right to private life? Because it is not only any more a matter of ensuring monitoring surveillance in order to detect deviant behaviours and to punish them, it is a matter of preventing any drift by establishing a permanent and generalized tracing. It is not a matter any more of observing public space, but of penetrating spaces deprived to accumulate data on each individual, considered if not as a potential terrorist, at least as a marketing target, or a neighbour to spy on. Thus organize yourself an uninterrupted scanning of acts and desires gets itself organized, abolishing the border between supervisor and supervised, between physical world and virtual world. Two concepts can be developed: the one of exhibitionism and the one of voyeurism. A. Exhibitionism

 Reality shows: How to explain the success of reality shows where participants sell their privacy for money, whereas privacy is in theory right which can not be contracted?

17

First reality show which knew a loud success: Big Brother, imagined by Endemol, a Dutch-based production company which put 12 single people in the same house, isolated from the outside world but continuously watched by television cameras. Their daily activities were being broadcasted almost nonstop and excited public curiosity and voyeurism. TV ratings attracted such a large audience that the “concept” was exported and has been taken by 70 channels in the world.  Social networks: Social networks have the same principle than reality shows. It is a matter of revealing his life to everyone, in the same exhibitionist and voyeuristic movement: photos, videos, geo-localisation… There are many sites in full expansion such as Facebook, MySpace, Google+, Twitter or Viadeo for professionals. We can even find our childhood or teenage friends on “Copains dʼavant” and its many equivalents, which inform in particular about the academic background and the CV. Besides, the proliferation of blogs intensifies in other forms the publication of thoughts, opinions… Moreover, the CIA is closely interested in the social networks. The CIA set up a cell named “Open Source Centre”. Called the “vengeful librarians”, the members of this cell supervise various discussion forums, but also the local media (newspapers, radios and televisions websites). It is the occasion to follow in live crises, as at the time of Arab Spring, and “to measure” the impact of the American actions abroad. According to Doug Naquin, director of the Open Source Centre at CIA headquarters, “social media in places like Egypt could be a game-changer and a threat to the regime”.

18

B. Voyeurism

The new technologies developed are easily accessible for private individuals which can bring voyeurism. The recent commercialization of controllable and zoomable camera through the Internet leads to a densification and a change in the nature of the video, not pointed out by public or private institutions anymore, but offered to individuals now able to observe from their computers or phones inside their homes, to check for example the good performance of the nurse, the maid or spouse.

 Another example is the marketing of accessories for mobile Parrot AR.Drone. This quadricopter has 2 cameras (one frontal that can see what is happening in front of the machine, and the other vertical can watch what's going on down) with back/return with live video on the screen of the iPhone / iPod touch and allows movements in reality. This accessory even has an automatic stabilizer in flight and a steering assistance.

Everyone now has the opportunity to become witness; the witness said what he has attended to, as he also may report facts that would have remained hidden without him. He can inform as well as he can lead to a doubtful denunciation. The individual may feel a mission that requires a certain ethical consciousness, or rather be excited by the unhealthy illusion to participate individually in the common order, as a "sheriff". For example, after September 11, 2001, the FBI used many TV shows and radio to encourage every American to report "suspicious behaviour from friends, relatives, acquaintances and strangers." The government has been heard since 700.000 neighbours, shopkeepers and employees have been denunciated in just two months until the end of November 2001. The neighbourhood watch, with over 5.500 neighbourhood associations, is the most important contribution the LAPD for the development of a police area. A vast network of neighbours participates to the safety of everyone.

19

A reversal occurred recently: these aren't just the authorities who monitor the population anymore, but the people who watch the authorities. Here we can mention sites: • Copwatch: The copwatching is to legally submit activities of the police to volunteer observer teams expected to attend and film conversations between police and citizens in round or arrests. The challenge is to see the excesses or deficiencies in the law and to disseminate them as appropriate on the Internet or to forward the documents to television channels. This reinforces the principle of general suspicion. • WikiLeaks: WikiLeaks is an uncensored version of Wikipedia. This website discloses document and analyses them in order to make transparent the activities of governments. This is to reduce corruption, improve the government and strengthening democracies.

It can also refer to the site Note2be.com explicit slogan: "Grade your teacher!” Which encourages pupils and students to make judgments with respect to their teachers, both supposed to provide information tools for parents and heard as a kind of "right to reciprocity." The same type of site exists for physicians (Note2bib.com, demedica.com): This is to submit his doctor to evaluate hygiene, comfort, waiting time, and behaviour…

20

Conclusion:

To conclude we can say that it exists two types of surveillance, a positive one and a negative one. For the positive aspects we can say that the surveillance is very useful to protect people, to make people feel comfortable and safe, and make the world a better place to live in. But we can also say that there are negative aspects such as an intrusion in everyone's private life. We can also talk about a general suspicion between people and about a limitation of freedom. The main thing to keep in mind is the idea of using surveillance for good things; it is a precious instrument that we should use with caution to serve the people of all nations.

21

SOURCES

http://www.legislation.gov.uk/ukpga/2000/23/contents http://www.theregister.co.uk/2010/05/20/surveillance_human_rights_ruling/ http://www.parliament.uk/business/publications/research/key-issues-for-thenew-parliament/security-and-liberty/surveillance-society/ http://fr.wikipedia.org/wiki/1984_(roman) http://www.allocine.fr/film/fichefilm_gen_cfilm=18671.html http://fr.wikipedia.org/wiki/L'Œil_de_Caine http://fr.wikipedia.org/wiki/Docteur_Mabuse http://news.bbc.co.uk/2/hi/uk_news/6108496.stm http://www.surveillancetraininguk.co.uk/ http://news.bbc.co.uk/2/hi/uk_news/2071496.stm http://www.dailymail.co.uk/news/article-1362493/One-CCTV-camera-32people-Big-Brother-Britain.html http://en.wikipedia.org/wiki/USA_PATRIOT_Act http://www.syti.net/BigBrother.html http://www.youtube.com/watch?v=Xb1EN-pwJro

Book: Surveillance globale – Enquête sur les nouvelles formes de contrôle Eric Sadin

22

Similar Documents

Free Essay

You Are Being Watched, Essay

...2. You are being watched To Daily News Att: Nate Hastings I’ve read the article “You are being watched” in the paper Daily news. The topic and the content of the article, made me think a lot, so I decided to write this letter, with my opinion on this topic. It kind of surprised me, that so many CCTV cameras were estimated in Britain. Four million is a lot of cameras! As I continued my reading, I came across all the pros and cons about the cameras. Surveillance in stores and public places makes completely sense to me. If stores didn’t have cameras, I think there would be a higher risk of stealing. Mostly because there wouldn’t be any credible evidence, that he or she actually stole this thing. The stealer could in theory just contradict, if someone had seen the person steal the object. I don’t think an eyewitness would be proof enough, in something as harmless, as an unarmed shoplifting. Assault and blatant or armed stealing are on the other hand, situations where an eyewitness maybe could be trustworthy. Here is surveillance at public places also a really good thing. If someone got assaulted, the cameras could help you identify the assailant. In that way it helps the police fighting crime. I think it makes a lot of people feel safe, when they socialize in public places. Because when there are cameras everywhere, you don’t want to do something illegal, because you know you are being watched. I’m sure we all once in our lifetime have spotted a surveillance...

Words: 537 - Pages: 3

Premium Essay

Are You Being Watched Analysis

...Is anything once shared online still private? No. Nothing online that is once shared is never private again. The articles “Could You Become A mean Mean” and “Are You being Watched” both written by Kristin Lewis and Jane porter prove that nothing online is truly private. It is proven that colleges will look at your social media and if they find offensive things towards a person's self and others he won’t accept that person. Possible employers later in life will do the same. “Harvard University canceled admission offers to at least 10 students who shared offensive images in what they thought was a private Facebook group… An inappropriate photo or video could cost you a job, wethers it’s the babysitting gig you’re going to land next week or the...

Words: 351 - Pages: 2

Premium Essay

Could You Become A Mean Meme Analysis

...1. In the articles, "Could You Become a Mean Meme" and "Are You Being Watched?," by Kristin Lewis, it shows the advantages and disadvantages of using social media. One disadvantage of social media is that whatever you post is being tracked. According to the article, "Are You Being Watched," by Kristin Lewis, it states, "When you go online, there's a good chance that tracking technology is recording your activity-sites you visit, what you share in social media accounts, YouTube videos you watch" (Lewis 15). This shows that what you do online is being watched without your permission. A advantage of using social media is that you can stay in touch with friends and family. According to the article "Could You Become a Mean Meme," by Kristin Lewis,...

Words: 452 - Pages: 2

Premium Essay

Panopticism

...According to the book “Ways of Reading” by Bartholomae, Petrosky, and Waite, panopticism in Foucault’s paper is the all Seeing Eye. He starts his essay of by talking about the plague in the seventeenth century. There was a closing of the town and its outer lying districts. Each street was placed under the authority of a syndic, who keeps it under surveillance. Each house was watched over by the syndic who would come to lock each door from the outside of the house. Everyone was quarantined into their homes. The severity of this lack of freedom was expressed in Foucault’s essay when he said inspection functions ceaselessly. The gaze is alert everywhere, and a considerable body of militia, commanded by good officers and men of substance, guards everyone, everywhere, to prompt the obedience of the people. Foucault discussed the rise of lepers, which also gave rise to disciplinary projects. Rather than separating people into groups, like they did during the plague, multiple distinctions were used to separate people. The plague-stricken town was, as Foucault states, traversed throughout the hierarchy, surveillance, writing, the town immobilized by the functions of extensive power. In order to have the perfect disciplinary functioning, one would put themselves in the place of the syndic during the plague.  This control over people functioned to cut them off from all contact with each other. According to the reading, Foucault talked about the Panopticon, a building that was separated...

Words: 1386 - Pages: 6

Premium Essay

Importance Of Privacy In 1984

...Privacy. What does that mean? The dictionary definition says it is the condition of being free from being observed or bothered by others. Besides what privacy means, the real question is if we have it? Should we also give up the privacy we have now for greater good of society? In the book, 1984, it shows the readers a world where everyone is being watched and controlled all the time, a place with no privacy nor freedom. Our society should not have to give up certain aspects of privacy just for the safety of others, especially when it has not been proven that spying on us can prevent life threatening events.How much does our society have incommon with this Orwellian country? In 1984, basically every move you make is being watched, “In the far distance a helicopter skimmed down between the roofs, hovered for an instant like a bluebottle, and darted away again with a curving flight. It was the police patrol, snooping into people's windows.”(Orwell, pg 4). This is...

Words: 889 - Pages: 4

Premium Essay

Totalitarian Government In 1984 By George Orwell

...Is our society changing into one of those societies led by a totalitarian government found in the futuristic books and movies? Many seem to agree since technology has advanced to point where it can do as much or even more as the aged books have foretold. In the novel, 1984, the author, George Orwell, wrote about a distant future where everything was controlled by one person known as Big Brother. The main protagonist in Orwell's story, Winston Smith, believes that things are not as they should be and explains how they were always being watched by the Inner Party which consisted of less than 2% of the entire population. Proles, as they were named, consisted about 80% of all the population, including the Party. The Outer Party, where Winston is,...

Words: 1006 - Pages: 5

Premium Essay

1984 Mood

...1984 Chapter 1 Mood Paragraph In the first chapter of the novel of 1984 by George Orwell, the overall mood developed is depressing. The mood is developed through society in 1984 being constantly under surveillance, through the slogans of the Party, and through the description of the setting. Firstly, the feeling of being always watched leads to the reader to feel depressed. The feeling of being watched is evident in the novel when Winston Smith says, “There was of course no way of knowing whether you were being watched at any given moment”(Orwell 4). The condition of depression is usually diagnosed when a person is unable to fully express him or herself. The sense of being constantly watched helps lead to the condition of depression as it restricts people from fully expressing themselves. This is illustrated in the first chapter in 1984,creating a depressing mood. Secondly, the slogans of the Party create an element of depression for the reader. The slogan of “freedom is slavery” (Orwell 6) further creates the mood of depression. In today’s society, freedom is valued. Placing something that is so valued with something so cruel creates a depressed mood for the reader. Lastly, Orwell’s description of the setting of the first chapter creates a depressed mood. An example of Orwell’s depressing setting occurs when he describes the world as cold (Orwell 4). The feeling of cold usually foreshadows something bad to come. When Orwell sets the setting as cold, it associates a negative/depressed...

Words: 281 - Pages: 2

Free Essay

Freedom Writers

...Erin Gruwell, author of “The Freedom Writers Diary” and founder of the Freedom Writers Foundation, spoke on encouraging diversity and understanding in a lecture titled “Teaching Tolerance” in Moreau Hall’s Little Theater on Friday. Penn High School sophomore Katie Laiman approached Saint Mary’s with the idea to invite Gruwell to speak as a part of Girls Scout Gold Award project. “I think this talk was really impactful, and I hope everyone that was here takes a lot from it,” Laiman said. Gruwell said she became a teacher because she wanted to stand up for kids who did not have a voice. “Before there was a book, before there was a movie, there was a group of students who were tired of being invisible, tired of being on the fringe and just wanted to matter, just wanted to be heard,” she said. Gruwell said when she was in graduate education classes she noticed a disconnection between theory and practice. “I realized this when I walked into my first classroom and my students could care not less about stories, and books, and Shakespeare and tales about Homer,” she said. “My students cared about would I make it home alive, am I gonna get home and see my hardworking mom with those cockroaches and those rats in that tiny one bedroom housing project, and will there be dinner, would their be food on the table, are those cupboards going to be bare again.” Gruwell said all of her students buried friends due to senseless gang violence by the age of 14, and it made...

Words: 672 - Pages: 3

Free Essay

Secrets of Shopping

...Caught your eye yet? : The connection of how spending money comes and its tricky disguises. Ever walked in to a store and saw that huge highlighter colored sign announcing “Big Blowout SALE”? They are pulling you in with things that attract you the most. From posters, human advertising, to the most innocent thing, the Barbie Doll, they are catching your eye and reeling you in and you’re unaware. Many businesses have learned the “Science” of how to arrange items so they may catch your attention. Paco Underhill, a retail anthropologist and an urban geographer, studies shopping behavior and has become valuable guides to store managers who look for the best ways to sell items. I am shocked to know that there are people who watch others for a living. As you approach a store look around and see if there is someone suspicious. Look around to see if you are being watched. Have you ever felt as if you were being watched? That is because they are watching you! Everything you are doing in the store is being observed. Strange is it? Yes but that is someone’s job. What you pick out and how you take in the item is all a part of their plan. Your choices matter in a study that you have no idea about. Your facial expression, happiness, and your disappointment makes a big deal also. The Credit Card Barbie is another marketing disguise. Barbie is, in a way advertising to younger age group. This is catching the eyes of your children and showing the fun and happy side spending...

Words: 1192 - Pages: 5

Premium Essay

Police Officer Research Paper

...We live in a society that is run by technology. Our society has advanced so much that we can do almost anything from our cell phones. You can order a pizza, text your grandma happy birthday and pay your mortgage in 5 minutes all by using a small device in your pocket. And while the advancement of our society is a great thing, it has caused some unintended consequences. It seems that everyone in the world these days’ views themselves as a director because they have a camera on their phone. Everyday I see numerous videos on social media created by someone using their smartphone. These videos can be anything from street fights to practical jokes. However, a popular idea that has circulated over the past few years involves these cell phone directors...

Words: 1510 - Pages: 7

Premium Essay

Powers of Panopoticism

...the surveillance system is there, but others will decide to go along with their bad decisions. With this kind of security system it makes the job of an investigator easier when we have the action on video. Therefore, sending a higher power signal. We are being watched no matter where we are, in hopes that actions we might be doing will come to a halt. Michel Foucault seeks through his work, “Panopticisim”, to analyze how contemporary society is differently structured from the society that preceded us and to explain the experiments executed on the human mind through panoptic powers. The structure of Panopticon can be applied in any formal setting as a form of discipline and power. Do we comply with these rules to be accepted within society? Some would say that sounds reasonable, a set of universally set rules for everyone to follow in order for society to run in a better manor. After all, one must find their place in society in order to survive. Foucault introduces Jeremy Betham’s architectural realization of the Panopticon, as a prison for society and those who inhabit it. Betham proposed a building with a main purpose that would allow an observer to view prisoners without having the prisoners notice if they are being watched. In the center of the building would be a tower, “ pierced with wide...

Words: 1236 - Pages: 5

Premium Essay

1984

...Manojlovic 1  Milana Manojlovic   Ms. Miminas  ENG 3U  Tuesday, June 14th, 2016  Dystopian Society in George Orwell's Nineteen Eighty-Four  The citizens in Nineteen Eighty-Four live in a world polar opposite of perfect. They are constantly being watched and oppressed by big brother and the thought police. The citizens live an unorthodox life due to the totalitarian government. The theme of dystopia is evident in nineteen eighty-four because information, independent thought and freedom are restricted, a figurehead is worshipped by citizens, and they are under constant surveillance.   Firstly, Nineteen Eighty- Four emulates the theme of dystopia because information, independent thought, and freedom are restricted. The citizens in Oceania live in a world where they are not allowed to feel human emotions. They are constantly being watched by the thought police and are forced to live in constant fear. They must show that they are abiding Big Brothers orders constantly to avoid being annihilated. The citizens are blind to Big Brothers plans because all information from the past is erased and all information for the future is kept secret. The proles are the only people in their world who do not look up to Big Brother. Although they live in a lower class compared to the people in the party, the proles are able to do whatever they want because Big Brother does not control them. The people in the party may have a more secure home and Manojlovic 2 material items;...

Words: 1182 - Pages: 5

Premium Essay

Examples Of Dehumanization In Night By Elie Wiesel

...feared the Lord. Who was transported to concentration camps, and became just a number who questioned life. To finally, being liberated at the age of 16 and starting his life over as a dead man walking. During the Holocaust, Elie Wiesel and his peers experienced dehumanization that changed Elie’s outlook, identity, and attitude in life. Arriving at Auschwitz, Elie experiences dehumanization for the first time. “A truck drew close and unloaded its hold. Small children. Babies! Yes, I did see this, with my own eyes...children thrown into the flames” (Wiesel 32). Elie sees the small children being thrown into the crematorium and starts to see what is really going on. Another instance Elie...

Words: 757 - Pages: 4

Free Essay

Immigration

...place we get privacy is when we are at home, everywhere else there are cameras hidden watching you, without even noticing. At shopping malls, there are hidden cameras. The reason why they exist is simple: to prevent shopliftings, or in some cases, to catch shoplifters. Most customers realize that they are being watched and try to act properly, though there are some who fail to recognize or decide to ignore this fact and take the wrong path. It is not just shopping malls that have surveillance watching over people. Even when you’re driving on the street there is a hidden camera somewhere watching you to make sure you run a red light. Foucault starts Panopticism with a talk on the plague. After the explanatory introduction, Foucault presents an analysis of the prison system created by a famous economist Betham, Panopticon Readers could perceive a different conclusion as to what Panopticism is. According to my point of view Panopticism is the idea that schools are similar to prisons, and it is emphasized as well as stated throughout in the reading multiple times. The text gives a variety of examples to help the readers understand as well as analyze what the author is trying to portray. I concur with most of the ideas displayed in the text. Schools are similar to prisons due to the fact that individuals waiting for an education sit there for hours, enclosed within four walls, watched by supervisor in this case a professor. “Each individual in his place is securely confined to...

Words: 1271 - Pages: 6

Free Essay

Sociology Journal

...winder group of acquaintances who have an enormous socializing influence…” (Kimmel and Aronson 2012:502). Lastly I observed Anticipatory Socialization which can be defined as “The process of learning and adopting the beliefs, values and behaviors of groups that one anticipates joining in the future ” (Kimmel and Aronson 2012:491). I observed Gender Socialization while I was at work this boy was told he needed to clean the bathrooms by his female manager and he told her in reply that “that’s not my job I am a male and that is a women’s job”. I also watched a little girl pick up a toy fire truck and tell her the women she was with that could be described as her grandma because she was older with gray hair and looked to be in her late 70’s. The little girl about 10 told the women that she was going to be a fire man one day and just as soon as the women heard the little girl I heard her tell the girl “you shouldn’t do that it’s a man’s job you should be a nurse because that’s what girls do”. This woman also went on to explain that it is also a male’s job because it is in the job title. I also...

Words: 872 - Pages: 4