Surveillance & Society <p>The international, interdisciplinary, open access, peer-reviewed journal of Surveillance Studies.</p> en-US <p><img src="" alt="Creative Commons License"> <em>Surveillance &amp; Society</em> uses a <a title="CC-BY-NC-ND-4.0" href="" target="_blank">Creative Commons Attribution-Noncommercial-No Derivative Works 4.0 License</a>.</p> <ol> <li>The author. The author licenses the article to the Surveillance Studies Network (SSN) for inclusion in <em>Surveillance &amp; Society (S&amp;S)</em>, right of first publication. The copyright to the article remains with the author and any subsequent commercial reuse must be agreed by both parties.</li> <li>Non-commercial Users. SSN authorises all persons to use material published in <em>S&amp;S</em> in any manner that is not primarily intended for or directed to commerical advantage or private monetary compensation, also provided that it is not modified and retains all attribution notices.</li> <li>Commercial Users. SSN retains the right to benefit from commerical reuse, in each specific case subject to the agreement of the author, and payment to SSN of a standard per-page fee (set by a vote of the Network and Editorial Board) by the Commercial User.</li> <li><em>Surveillance &amp; Society</em> supports open access archives and the free distribution of the results of academic work. Authors are encouraged to place copies of the final published version of their article in their university and / or other open access archives. We only ask that you make sure to include a link to the original published version on the <em>Surveillance &amp; Society</em> website.</li> </ol> (Prof. Torin Monahan) (OJS Administrator) Tue, 03 Apr 2018 19:50:43 -0400 OJS 60 Algorithmic Fetishism <p>Surveillance-infused forms of algorithmic discrimination are beginning to capture public and scholarly attention. While this is an encouraging development, this editorial questions the parameters of this emerging discussion and cautions against algorithmic fetishism. I characterize <em>algorithmic fetishism</em> as the pleasurable pursuit of opening the black box, discovering the code hidden inside, exploring its beauty and flaws, and explicating its intricacies. It is a technophilic desire for arcane knowledge that can never be grasped completely, so it continually lures one forward into technical realms while deferring the point of intervention. The editorial concludes with a review of the articles in this open issue.&nbsp;&nbsp;&nbsp;&nbsp;</p> Torin Monahan ##submission.copyrightStatement## Sun, 01 Apr 2018 15:11:05 -0400 It’s the Camera! A Special One: The Smartboxing of Image Processing Algorithms and their Uncertainties in Media Representations of Surveillance Technology <p>This paper presents an analysis of media articles and publicly available documents on one of Austria’s first nationwide surveillance systems in operation that makes use of image processing, pattern recognition technology: the “Automatic Toll Sticker Checks” on Austrian motorways. A recurring narrative makes the camera, not the silent image processing algorithms (IPAs), the centre of attention. IPAs and their inevitable uncertainties are completely disregarded and “smartboxed” in favour of the special camera that appears as magic technology. As such, the ready-made smart box is not contested at all. Instead, its economic success and standing as a moral agent is emphasised.</p> Christoph Musik ##submission.copyrightStatement## Sun, 01 Apr 2018 15:21:08 -0400 Crowdsourced Countersurveillance: A Countersurveillant Assemblage? <p>Speed camera ‘traps’, random breath testing (RBT) stations, and other forms of mobile traffic surveillance have long been circumvented by motorists. However, as technologies for traffic surveillance have developed, so too have technologies enabling individuals to monitor and countersurveil these measures. One of the most recent forms of these countersurveillance platforms can be found on Facebook, where dedicated regional and national RBT and ‘police presence’ pages publicly post the locations of various forms of police surveillance in real-time. In this article, we argue that Facebook RBT pages exemplify a new form of social media facilitated countersurveillance we term crowdsourced countersurveillance: the use of knowledge-discovery and management crowdsourcing to facilitate surveillance discovery, avoidance, and countersurveillance. Crowdsourced countersurveillance, we argue, represents a form of countersurveillant assemblage: an ensemble of individuals, technologies, and data flows that, more than the sum of their parts, function together to neutralize surveillance measures. Facilitated by affordances for crowdsourcing, aggregating, and crowdmapping geographical data information on surveillance actors, crowdsourced countersurveillance provides a means of generating ‘hybrid heterotopias’: mediated counter-sites that enable individuals to contest and circumvent surveilled spatial arrangements.</p> Mark Andrew Wood, Chrissy Thompson ##submission.copyrightStatement## Sun, 01 Apr 2018 15:24:02 -0400 Security against Surveillance: IT Security as Resistance to Pervasive Surveillance <p>This paper examines Five Eyes surveillance programs as a threat to IT (Information Technology) security and IT security as resistance to these programs. I argue that the most significant of Snowden's disclosures have been the Five Eyes agencies’ systematic compromise of the technologies, networks, and standards in use within their own countries and abroad. Attacks on domestic infrastructure contradict the defensive posture of these agencies but are consistent with the project of cyber security as defined by the Five Eyes. The cyber security project of the Five Eyes nations is expansive in scope and has proceeded along dangerous lines. By assigning signals intelligence agencies the dual role of exploiting IT systems as well as securing them, a contradiction has been baked into our evolving notion of cyber security. A comprehensive response should include political and legal reforms, disentangling the Five Eyes' offensive and defensive roles, and narrowing the scope of the cyber security project. However, the most effective forms of resistance for individuals and institutions so far have been through an increased emphasis on IT security practices.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;</p> Mike Zajko ##submission.copyrightStatement## Sun, 01 Apr 2018 00:00:00 -0400 The Eyes of Law Enforcement in the New Panopticon: Police-Community Racial Asymmetry and the Use of Surveillance Technology <p>This study examines the relationship between police-community racial asymmetry and the use of surveillance technology by local law enforcement. The data come from a nationally representative survey of law enforcement agencies, with supplementary information provided by the Law Enforcement Management and Administrative Statistics Survey, the Census, and the Uniform Crime Reports. Results indicate that police departments that underrepresent African Americans in the community are more likely to use or plan to implement surveillance technology, controlling for a range of agency-and contextual-level factors. One potential explanation for these findings is that surveillance technology operates as a form of social control that is differentially applied to racial minorities to manage what is perceived to be a greater proclivity toward criminal behavior. The implications of these findings are discussed.</p> Josh A. Hendrix, Travis A. Taniguchi, Kevin J. Strom, Kelle A. Barrick, Nicole J. Johnson ##submission.copyrightStatement## Sun, 01 Apr 2018 15:20:25 -0400 The All-Seeing Eye of State Surveillance in the Italian Football (Soccer) Terraces: The Case Study of the Football Fan Card <p>The football (soccer) stadium in Italy has been, since its origin, not only a ludic space but also a symbolic setting that has often reflected national socio-political issues such as the country’s north/south economic and political divide, the existence of organized crime, the promotion of radical political ideologies, and, concomitantly, racism and homophobia. In such a milieu, the spectacle of football can suddenly shift to symbolic and factual violence. One of the main tools of the complex Italian counter hooliganism model (CHM) is the <em>Tessera del tifoso</em>, a compulsory fan ID scheme adopted in 2009 to curb football spectator violence. This paper attempts to systematically evaluate this scheme for the first time, adopting as its conceptual frame Giorgio Agamben’s concepts of the state of exception, bare life, the (concentration) camp, and <em>dispositivo</em> (apparatus). It is argued that the <em>Tessera del tifoso</em> serves as a most prominent example of a CHM based on a permanent state of exception manifested by an increase in State surveillance, control, and regulation of fans’ lives with potential implications for their civil liberties and freedom.</p> Alberto Testa ##submission.copyrightStatement## Sun, 01 Apr 2018 15:21:48 -0400 Soiveillance: Self-Consciousness and the Social Network in Hideaki Anno’s Love & Pop <p>This article analyses the surveillance aesthetic of Hideaki Anno’s 1998 film <em>Love &amp; Pop</em>. It is proposed that the film communicates the concept of “soiveillance”—a watching (<em>veillance</em>) that is of one’s self (<em>soi</em>). What underpins soiveillance is the paranoia associated with social surveillance (Marwick 2012), specifically the self-consciousness involved in the image sharing that constructs the virtual self of the social media user (Willett 2009). With its theme of <em>enjo kosai</em>—or “paid-dates” between adult males and female teenagers—<em>Love &amp; Pop’s</em> communication of soiveillance further illuminates the impact of one’s gender status within the social network, and the manner in which real-world patriarchy and misogyny pass into the virtual construction of selves. The methodology used to argue these points rests on a reconfigured take on the term “scopophilia” within the study of visual media. Scopophilia, rethought as a love of vision itself, aligns with Murakami’s (2000) theory of the superflat on three key points: the acknowledgment that emerging technologies have created new image-functions and image-structures that require a broadening of our theoretical vocabulary; an atemporal approach to the reading of images, such that a late-nineties film like Anno’s can provide important insights into 21<sup>st</sup> century concerns; and a recognition of intermedial convergence, which allows us to read the activity of online video sharing as a form of narrative equivalent to the sequencing of shots within a cinematic montage.</p> Jeeshan Gazi ##submission.copyrightStatement## Sun, 01 Apr 2018 15:19:09 -0400 Review of Wills' Tug of War: Surveillance Capitalism, Military Contracting, and the Rise of the Security State Gregg Barak ##submission.copyrightStatement## Sun, 01 Apr 2018 15:36:28 -0400 Review of Schneider's Policing and Social Media: Social Control in an Era of New Media Andrew Crosby ##submission.copyrightStatement## Sun, 01 Apr 2018 15:37:45 -0400 Review of Haque's Surveillance, Transparency, and Democracy: Public Administration in the Information Age Ozge Girgin ##submission.copyrightStatement## Sun, 01 Apr 2018 15:39:09 -0400 Review of Wise's Surveillance and Film Steven Kohm ##submission.copyrightStatement## Sun, 01 Apr 2018 15:40:12 -0400 Review of Ferguson's The Rise of Big Data Policing: Surveillance, Race, and the Future of Law Enforcement Aaron Shapiro ##submission.copyrightStatement## Sun, 01 Apr 2018 15:41:27 -0400 Review of Schuilenberg's The Securitization of Society: Crime, Risk, and Social Order James Sheptycki ##submission.copyrightStatement## Sun, 01 Apr 2018 15:42:32 -0400 Review of Molinaro's An Exceptional Law: Section 98 and the Emergency State, 1919-1936 Derek M.D. Silva ##submission.copyrightStatement## Sun, 01 Apr 2018 15:43:31 -0400 Review of Lauer's Creditworthy: A History of Consumer Surveillance and Financial Identity in America Sachil Singh ##submission.copyrightStatement## Sun, 01 Apr 2018 15:44:40 -0400 Review of Sunaina Marr's The 9/11 Generation: Youth, Rights, and Solidarity in the War on Terror Valerie Stam ##submission.copyrightStatement## Sun, 01 Apr 2018 15:45:44 -0400 Review of Dallek's Defenseless under the Night: The Roosevelt Years and the Origins of Homeland Security Gregory S Kealey ##submission.copyrightStatement## Sun, 01 Apr 2018 16:18:41 -0400