Surveillance Society

C O N T E N T S:


  • The book The electronic eye: the rise of surveillance society (1994), by David Lyon, is without a doubt one of the key studies in order to understand surveillance development studies on a global scale.(More…)
  • “These systems reflect advances in sensors and analytics that will have serious repercussions on the integrity of Americans,” said Jay Stanley, senior analyst with ACLU. “The combination can make us a surveillance society where all of our features are tracked.”(More…)
  • The resulting move into a surveillance society is, however, contested for many reasons.(More…)


  • Sousveillance typically involves community-based recording from first person perspectives, without necessarily involving any specific political agenda, whereas inverse-surveillance is a form of sousveillance that is typically directed at, or used to collect data to analyze or study, surveillance or its proponents (e.g., the actions of police or protestors at a protest rally).(More…)


Surveillance Society
Image Courtesy:
description: The Emerging ‘Mark of the Beast’ System: Sleepwalking into the …

The resulting move into a surveillance society is, however, contested for many reasons. [1]


The book The electronic eye: the rise of surveillance society (1994), by David Lyon, is without a doubt one of the key studies in order to understand surveillance development studies on a global scale. [2] Having lived in China I had a chance to witness a next-level surveillance society first hand and wonder if there will be a greater reaction once we take steps further in that direction. [3]

Inverse surveillance is typically an activity undertaken by those who are generally the subject of surveillance, and may thus be thought of as a form of ethnography or ethnomethodology study (i.e. an analysis of the surveilled from the perspective of a participant in a society under surveillance). [4] Welcome to the home of the International Society for Disease Surveillance. [5]

By designing an anti-surveillance society, the public will begin to develop urban tactics that will allow them to evade and hide from the covert surveillance tactics used by the government and large corporations. [6] These are a only a few examples of just the past 2 years of surveillance and its implications on our society. [6] BURLINGAME, Calif., June 14, 2018 /PRNewswire/ — Diabetes Technology Society (DTS) announces the Diabetes Care publication of its article on the findings of its Blood Glucose Monitor System (BGMS) Surveillance Program, entitled “Investigation of the Accuracy of 18 Marketed Blood Glucose Monitors.” [7]

“These systems reflect advances in sensors and analytics that will have serious repercussions on the integrity of Americans,” said Jay Stanley, senior analyst with ACLU. “The combination can make us a surveillance society where all of our features are tracked.” [8] Levin B, Lieberman DA, McFarland B, Smith RA, Brooks D, Andrews KS, et al. Screening and surveillance for the early detection of colorectal cancer and adenomatous polyps, 2008: a joint guideline from the American Cancer Society, the U.S. Multi-Society Task Force on Colorectal Cancer, and the American College of Radiology. [9] Meyerhardt JA, Mangu PB, Flynn PJ, Korde L, Loprinzi CL, Minsky BD, et al. Follow-up care, surveillance protocol, and secondary prevention measures for survivors of colorectal cancer: American Society of Clinical Oncology clinical practice guideline endorsement. [9]

Governments have convinced a majority in society that mass surveillance protects them against terrorism, and that privacy is a worthless personal commodity that should be willingly sacrificed in exchange for security. [10] When it comes to facial recognition, the scarf is a way to draw attention to the creeping growth of new surveillance techniques in Western society and how these mechanisms are imperfect, built from flawed algorithms that can can be fooled, sidestepped, hijacked. [11] International Society for Disease Surveillance added 2 new photos. [12]

The resulting move into a surveillance society is, however, contested for many reasons. [1] The 2018 fall conference of the Center for the History of Business, Technology, and Society will explore the history of commercial surveillance in the United States, from settlement to the present. [13] Snowden, a former technician for the CIA, released all the secrets of government surveillance saying, “I don’t want to live in a society that does these sorts of things.” [14] International civil society organizations and parliamentarians have called for meaningful reform of export regulations to protect human rights against unlawful surveillance. [15] Telescreens of “1984” and the surveillance cameras of 2017 signify the government’s abuse of technology that it exerts on society. [14]


Sousveillance typically involves community-based recording from first person perspectives, without necessarily involving any specific political agenda, whereas inverse-surveillance is a form of sousveillance that is typically directed at, or used to collect data to analyze or study, surveillance or its proponents (e.g., the actions of police or protestors at a protest rally). [4] Mann has long maintained that the ‘informal nature of sousveillance, with its tendency to distribute recordings widely, will often expose inappropriate use to scrutiny, whereas the secret nature of surveillance will tend to prevent misuse from coming to light’ (Mann, 2005, p.641). [4] When one or more parties to the conversation record it, it is called “sousveillance”, whereas when the conversation is recorded by a person who is not a party to the conversation (such as a prison guard violating a client-lawyer relationship), the recording is called “surveillance”. [4]

Even today’s personal sousveillance technologies like camera phones and weblogs tend to build a sense of community, in contrast to surveillance that some have said is corrosive to community. [4] Sousveillance is not necessarily counter-surveillance, i.e. sousveillance can be used to “counter” the forces of surveillance, or it can also be used together with surveillance to create a more complete “veillance” (“Surveillance is a half-truth without sousveillance” ). [4] Veillance and Reciprocal Transparency: Surveillance versus Sousveillance, AR Glass, Lifeglogging, and Wearable Computing. [4]

Some argue that sousveillance may aid in state surveillance, despite being conducted by the people. [4] The more general concept of sousveillance goes beyond just inverse surveillance and the associated twentieth century political “us versus them” framework for citizens to photograph police, shoppers to photograph shopkeepers, or passengers to photograph taxicab drivers. [4] Usually the targeted individual is a representative or proponent of surveillance, so targeted sousveillance is often inverse surveillance or hierarchical sousveillance. [4] Sousveillance has also been described as “inverse surveillance”, based on the word surveillance (from the French sur, “from above”, and veiller, “to watch”), and substituting the prefix sous, “from below”. [4] In this way sousveillance may be regarded as a possible replacement for surveillance. [4] Surveillance is defined as cameras (or other sensors) affixed to property (real-estate, e.g. land, by way of posts or poles, or buildings), whereas sousveillance is defined as cameras (or other sensors) borne by people. [4] Surveillance is the veillance of the authority (i.e. the veillance that has the capacity to prohibit other veillances), whereas sousveillance is the veillance of plurality (i.e. “crowd veillance” or watching, sensing, or the like, done by non authorities). [4]

This constant surveillance, manipulation and control is symbolized through the idea of “Big Brother,” and the phrase, “Big Brother is watching you,” is repeated throughout the novel. [3] In the real world, the reference to “Big Brother,” has come to represent the abuse of government power especially in relation to civil liberties and rights and is often used to refer to instances of mass surveillance of the population. [3] The devices that gather information about others that may subsequently be used for covert surveillance today are not relegated to government alone, as presented in the novel 1984. [3] With government surveillance, surveillance by citizens for fun or to gather information and monitory peoples? activities, store and street video cameras, and private cameras set up outside and inside residences, not to mention surveillance from other countries gathering intelligence of this countries systems, it is hard to imaging anywhere or anytime we might not be under surveillance. [3] According to the American Civil Liberties Organization, (ACLU), the government in this country is an increasing threat to peoples? privacy from growing surveillance technological advantage which is said by them to be justified in order to ensure national security. [3] George Orwell’s novel, 1984, presents what is often considered to be a frightening picture of the use of surveillance data collected by the government. [3] Overall, 52% describe themselves as “very concerned” or “somewhat concerned” about government surveillance of Americans? data and electronic communications, compared with 46% who describe themselves as “not very concerned” or “not at all concerned” about the surveillance. [3] After 9/11 surveillance data was used to indicate potential terrorists so that the CIA could capture them and obtain information that would prevent other terrorist attacks. [3] The rules regarding who has access to this surveillance information and how it can be used can changed and changed again in secret without the public ever becoming aware. [3] Participatory surveillance is engaged in when individuals knowingly allow websites to access personal information entered in profiles and online forms as well as when easily gathered recordings of oneself and others through commonly owned mobile technology. [3] While surveillance and sousveillance both generally refer to visual monitoring, the terms also denote other forms of monitoring such as audio surveillance or sousveillance. [4] Current ” equiveillance theory” holds that sousveillance, to some extent, often reduces or eliminates the need for surveillance. [4] Just as Foucault’s Panopticon operates through potential or implied surveillance, so sousveillance might also operate through the credible threat of its existence. [4] In Mann’s original conception, sousveillance had an emancipatory political thrust, with hierarchical sousveillance a conscious act of resistance to surveillance. [4] In the novel 1984, George Orwell sets up a world whose inhabitants are constantly under surveillance by the government. [3] The ability to not just upload information and images but to share them instantly makes participatory surveillance the largest potential data collection method available. [3] Termed participatory surveillance, individuals using sites such as Facebook voluntarily provide personal information about themselves in a profile and knowingly give permission for other sites to access their profiles in order to gain access to news, weather, and other information or even to be able to play games online. [3]

“How citizen surveillance could reform a broken American police system”. [4] Permanent surveillance, a part of everyday life, by algorithms that capture not only their movements, but also who they talk to; algorithms capable of recognizing a fight, a lover’s embrace, a gesture, that together with social rating systems, are used to create a to classify people according to their political affinity and that can be used to isolate potential dissidents by lowering the social credit score of anybody who has anything to do with them. [16] The Electronic Frontier Foundation has warned of a secretive surveillance tool being used by the FBI which acts as a face cellular tower. [3]

Should we be fearful China’s model will spread to the democracies of the West? China’s surveillance is not limited to its streets and is already in schools, with cameras monitoring how students behave, for example whether they are paying attention in class, as well as in the military, on assembly lines or train cabins to monitor drivers? brain activity. [16] What a few civil associations, funded through public donations, can do to slow down a global surveillance trend is open to question. [16] What can it say to surveillance studies in these days, both in empirical and theoretical terms? The second session has the objective of asking about the cultural dimension of surveillance, how the cultures of surveillance can help to understand the makings of power and solidarity, citizenry and power on a global scale. [2]

The first International Workshop on Inverse Surveillance, IWIS, took place in 2004, chaired by Dr. Jim Gemmell, ( MyLifeBits ), Joi Ito, Anastasios Venetsanopoulos, and Steve Mann, among others. [4] This is a great comparison of Orwell’s “Big Brother” and current U.S. surveillance. [3] Faced with dystopian models such as China or the kind of systematic surveillance now taking place in Sweden supposedly to protect us from terrorists and criminals, bodies like the ACLU or the EFF have launched campaigns to raise awareness of the dangers to civil liberties and outlining strategies to dismantle it, and arguing that mass surveillance is no use in fighting terrorism. [16] Although this surveillance creates anxiety and all but eliminates privacy, no one attempts to overthrow the system. [3] Essential to the advancement of the health surveillance, our committees and workgroups are leaders in advancing policy and practice in public health. [5] Therefore, it is a book that has been exploited intensively, even in critical terms as well, because it sets surveillance as one of the key pieces of society’s modern organization. [2] The concept of constant surveillance is presented at the very beginning the book. [3]

For these reasons, security advocates consider the app to serve America’s global surveillance program (revealed by Edward Snowden in 2013), and raise the question of whether sousveillance really serves as “inverse surveillance”. [4] Inverse surveillance is a subset of sousveillance with a particular emphasis on the “watchful vigilance from underneath” and a form of surveillance inquiry or legal protection involving the recording, monitoring, study, or analysis of surveillance systems, proponents of surveillance, and possibly also recordings of authority figures and their actions. [4]

Initially a way to monitor specific places to prevent crime, such as in banks, the world is now a network of coordinated surveillance cameras capable of watching our every move, while more and more homes are installing cameras programed with algorithms capable of or identifying specific faces. [16] Under such a scenario, any objections to the camera could be raised by another human more easily than it would be to interact with a lamp post upon which is mounted a surveillance camera. [4]

Many aspects of sousveillance were examined in the general category of “reciprocal accountability” in David Brin’s 1997 non-fiction book The Transparent Society, and also in Brin’s novels. [4] Classy’s Kitchen describes sousveillance as “another way to add further introspection to the commons that keeps society open but still makes the world smaller and safer”. [4]

As one of the first of its kind it in a time when many authors were focusing on the hopeful images of utopias, this view into how terribly wrong things can go for a society run by a government who not just alters peoples every behavior through reward (very little of it) and the threat of punishment but even alters their thoughts by changing the past through rewriting documents and thus history. [3] In the novel 1984, Orwell creates a dystopian society in which citizens do what the government commands. [3]

The appearance of this face, simply referred to as Big Brother, is described to impart the sense of an imposing presence which found in every area of the society. [3] The implications of a society in which anyone might be recording anything at any time are explored at length, particularly with respect to policing. [4] The books ends with an account off how Winston becomes a committed member of society, no longer resisting the government’s control. [3]

Diabetes Technology Society is a non-profit educational organization dedicated to promote development and use of technology to help people with diabetes. [7] Diabetes Technology Society developed the first consensus standard with FDA input for verifying the cybersecurity of connected medical devices (DTSec) and the first consensus guidance for mobile phone control of these devices (DTMoSt) and is now working with IEEE and UL to expand their scope from diabetes devices to all medical devices. [7]

In this episode, we explore everything from surveillance, privacy and biometrics to human rights, the government, and how politics is shaping the ways in which technology influences our lives. [17] By establishing a basic understanding of what different views on surveillance means in terms of protection, crime prevention, control, or privacy, architects can learn to either work with our against the grain of surveillance and its advancing technology respectively. [6] FUJITSU Technical Computing Solution GREENAGES Citywide Surveillance provides advanced image analysis that incorporates cutting-edge AI and HPC technology. [18]

If police body cameras, for example, were outfitted with facial recognition, devices intended for officer transparency and accountability would further transform into surveillance machines aimed at the public. [19] I think, on surveillance in particular, if we don?t resist suspicionless surveillance attempts by current governments, whether that is in the form of mass surveillance by the security and intelligence agencies or whether it’s technologies like automated facial recognition on our streets – these are future concerns but they?re present concerns because they?re happening now. [17] South Africa has followed international trends in street-level surveillance and embraced technologies whose affect on crime fighting and intelligence work are, at best, unclear and contested. [20] As with other surveillance technologies, these systems are certain to be disproportionately aimed at minority communities.” [19]

Computer analysis enables CCTV to be turned into “smart dataveillance” devices (that conduct surveillance through the collection and computerised analysis of data), which make individuals and their movements more visible to the state. [20] The varying scales of surveillance — from internet cookies to Google Satellite — the citizens of London are forced to live with the state of mass surveillance. [6] This project offers both architects and citizens of any city the opportunity to learn and engage with surveillance in ways otherwise not available. [6] In this way, GREENAGES Citywide Surveillance realizes “making the invisible, visible;” providing smart protection in our crowded cities. [18]

The not so shocking revelations that Facebook was hacked along with the information of over 50 million people is just another question of how far does surveillance go before it consumes our lives. [6] The agency has agreed with the concept of a surveillance plan and has stated that it will act on information that it receives on low-quality BGM products, including from surveillance testing. [7]

Also, it basically means always-on surveillance, as more images are captured with more cameras, and databases build exponentially. [19] This urban environment sets out to spatialize the amount of surveillance used by London and the world post the legislation. [6] This is an edited excerpt from the author’s latest book, Stopping the Spies: Constructing and Resisting the Surveillance State, published by Wits University Press. [20] DTS, with cooperation by the FDA, developed the most modern error grid for defining the clinical accuracy of blood glucose monitors called the Surveillance Error Grid. [7] I do believe, however, that many people have begun to realise the gravity of the situation and speak out against the future surveillance on our world — ie Edward Snowden. [6] At the time of writing, the City had enacted no requirement for signage at the entrance to an area under CCTV surveillance – a key privacy protection requirement. [20] Everyone has their views on surveillance and its importance on our lives or endangerment to our privacy. [6]

It uses surveillance cameras to detect people and vehicles, and collects various kinds of information, such as congestion and car / human identification information. [18] Installation of surveillance cameras is becoming more commonplace in our cities, but even as the need to effectively use video data grows, there are limits to our ability to visually review such large volumes of video data. [18]

These camera based surveillance systems can capture information about a person’s physical location. [20] “Amazon is handing governments a surveillance system primed for abuse,” Cagle says. [19] The Surveillance Program followed a protocol developed by a Steering Committee and an Advisory Committee consisting of experts in BGMS from academia, medical practice, clinical chemistry, medical organizations, industry, and government, including Food and Drug Administration (FDA), CDC, NIH, and U.S. Army. [7] FDA supports a BGM Surveillance program to protect public health. [7] Funding for the post-market surveillance program were provided by Abbott, the global healthcare company. [7] This surveillance program assessed the accuracy of 18 blood glucose monitoring systems (BGMSs) marketed in the USA across a wide range of blood glucose levels in the hands of trained professionals. [7]

This situation requires that the establishment of a safe and secure society become a global concern. [18]

A joint guideline developed by the American Cancer Society, U.S. Multi-Society Task Force on Colorectal Cancer, and the American College of Radiology recommends that screening for colorectal cancer and adenomatous polyps start at age 50 years in asymptomatic men and women. [9] For average individuals, the recommendations are nearly identical to those of the joint American Cancer Society (ACS), U.S. Multi-Society Task Force on Colorectal Cancer, and American College of Radiology. [9]

Lieberman DA, Rex DK, Winawer SJ, Giardiello FM, Johnson DA, Levin TR, et al. Guidelines for colonoscopy surveillance after screening and polypectomy: a consensus update by the U.S. Multi-Society Task Force on Colorectal Cancer. [9] All four guidelines agree that patients with resected colon cancer (stage II and III) should undergo regular surveillance for at least 5 years following resection, and that surveillance should include regular reviews of medical history, physical examination, and carcinoembryonic antigen assays, as well as colonoscopy and abdominal and chest computed tomography (CT The frequency of the surveillance testing differs as shown in the table below. [9] Patients who have undergone curative resection of either colon or rectal cancer should receive their first surveillance colonoscopy 1 yr after surgery (or 1 yr after the clearing perioperative colonoscopy). [9] In these situations, it is suggested that patients undergo local surveillance with flexible sigmoidoscopy or endoscopic ultrasound (EUS) every 3?6 mo for the first 2?3 yr after surgery. [9]

With no background as a defense contractor, the startup needed a “quick win”; Providing AI-covered surveillance technology to the border patrol was a way to get a foot in the door for public procurement. [8] That was how Amazon described its facial-detection Rekognition technology, months before it found itself at the heart of the dispute around police surveillance in the United States. [11] The overall cost-effectiveness of the surveillance technology that Anduril and Elbit make thanks to the advances in sensor technology and AI coupled with the CPB considering the limit being a 100-mile zone, it is likely to mean even more private interference for border communities. [8] The American College of Gastroenterology has published guidelines for surveillance of patients who have had adenomas detected and removed at colonoscopy. [9] “Surveillance cameras have been installed in about 6,500 taxis out of a total fleet comprising 10,221 cabs. [21] That creates a machine that can supercharge discrimination, turning police body cameras from tools of accountability into partially sighted surveillance engines. [11]

In order to make the best possible standard to improve both Syndromic Surveillance data quality and reporting, we need your input on this. [12] The HL7 May 2018 ballot period for the Implementation Guide for Syndromic Surveillance is now OPEN! Submit your input using our webform to help us make the best possible standard for improving SyS data quality and reporting. [12] Remember to submit your comments on the HL7 Version 2.5.1 Implementation Guide for Syndromic Surveillance, Release 1 before April 30th! If not a member of HL7, ISDS can submit your comments on behalf of the community – simply use our webform to have your comments included. [12] The recording of todays ESSENCE Q & A v2.0 is now available in the Surveillance Repository. [12] A report recently published by the Civil Liberties Union for Europe demonstrates that mass surveillance is ineffective and probably makes the public less secure. [10] Concerns over the misuse of these surveillance technologies are building on a global scale. [11] Activists have lost the debate on privacy and mass surveillance. [10] The project is meant to surface questions around privacy and the politics of surveillance. [11] The test bed for much of this top-of-the-line surveillance over the past few years has been the fringe province of Xinjiang, home of the Uighur Muslim ethnic minority, which the Chinese state has blamed for a string of terrorist activities. [11] “Companies find that they need to pay attention to the ethical problems or risks of employees, h says Stanley, and noted the recent evacuation of Google’s staff about his work with the U.S. military on dental surveillance. [8] “Companies are anticipating they have to compensate courtesy to a reliable concerns of their employees or risk carrying difficulty recruiting,” Stanley said, observant a new exodus of staff during Google over a work with a U.S. troops on worker surveillance. [22]

In the wake of the revelations, Orlando Police Chief John Mina attempted to smooth concerns, emphasizing that plans for drawing footage from body cameras into an Amazon-powered surveillance system were in their infancy: “We would never use this technology to track random citizens, immigrants, activists, or people of color,” Mina assured at a press conference. [11] In return, SenseTime is able to provide its Viper surveillance system, which the company aims to handle 100,000 live video feeds simultaneously, pulling footage from CCTV, ATM cameras, and office face-scanners. [11]

Dubai’s Roads and Transport Authority (RTA) has begun installing surveillance cameras in all taxis affiliated to the Public Transport Agency. [21]

“It is a provocation, bending the imagination to think about the cameras that coexist with us in society and capture our movements with and without our consent,” the collective explains. [11] One project by Hyphen-Labs, led by Ece Tankal, Ashley Baccus Clark, and Carmen Aguilar y Wedge, questions how control could be wrested in a society of real-time tracking and instant facial recognition. [11]

The American Society of Clinical Oncology does not recommend the routine use of adjuvant chemotherapy for patients with stage II colon cancer, and instead recommends encouraging these patients to participate in clinical trials. [9] Benson AB 3rd, Schrag D, Somerfield MR, Cohen AM, Figueredo AT, Flynn PJ, et al. American Society of Clinical Oncology recommendations on adjuvant chemotherapy for stage II colon cancer. [9]

The American Society of Colon and Rectal Surgeons practice parameters for the management of colon cancer recommend colectomy as the primary treatment for localized resectable colon cancer. [9] The American Society of Colon and Rectal Surgeons (ASCRS) defines rectal cancer as cancer located within 15 cm of the anal verge by rigid proctoscopy. [9] The American Society of Colon and Rectal Surgeons recommends that patients with familial adenomatous polyposis (FAP) or with personal or family risk factors for FAP be referred to center registries and genetic counselors with experience in the multidisciplinary management of these individuals. [9]

Stoffel EM, Mangu PB, Gruber SB, Hamilton SR, Kalady MF, Lau MW, et al. Hereditary colorectal cancer syndromes: American Society of Clinical Oncology Clinical Practice Guideline endorsement of the familial risk-colorectal cancer: European Society for Medical Oncology Clinical Practice Guidelines. [9]

RANKED SELECTED SOURCES(22 source documents arranged by frequency of occurrence in the above report)

1. (26) Sousveillance – Wikipedia

2. (22) Similarities in the Surveillance Presented in Orwell’s 1984 Compared to the Present Day and Beyond | Soapboxie

3. (15) Colorectal Cancer Guidelines: Colorectal Cancer Screening, Postpolypectomy Surveillance, Familial Adenomatous Polyposis

4. (10) Fighting AI Surveillance with Scarves and Face Paint

5. (9) The Snoopers Charter | KooZA/rch

6. (9) Diabetes Technology Society Article on Blood Glucose Monitor System (BGMS) Surveillance Program Is

7. (5) International Society for Disease Surveillance – Home | Facebook

8. (5) Are we sliding inevitably into a surveillance society? ~ Self Scroll

9. (5) FUJITSU Technical Computing Solution GREENAGES Citywide Surveillance – Fujitsu Global

10. (5) How CCTV surveillance poses a threat to privacy in South Africa

11. (4) Amazon is selling facial recognition technology to police | Big Think

12. (4) “Surveillance Society”: Has technology at the US-Mexico border gone too far? | Technology

13. (3) RightsCon Toronto 2018: How to win the privacy/surveillance deba.

14. (3) Session: Surveillance Society: Power, Conflict and Solidarity. Thinking through the Electronic Eye (XIX ISA World Congress of Sociology (July 15-21, 2018))

15. (2) Featured New Books | Law Library

16. (2) Is “1984” The New 2017?

17. (2) 4. SURVEILLANCE & THE STATE / Silkie Carlo – Nathalie Nahai

18. (2) RTA to install 6,500 surveillance cameras in Dubai taxis –

19. (2) International Society For Disease Surveillance, Inc

20. (1) Hagley Center Fall Conference “Seeing like a Capitalist: Histories of Commercial Surveillance in America,”

21. (1) EU: States push to relax rules on exporting surveillance technology to human rights abusers | Amnesty International

22. (1) Surveillance society: has technology at the US-Mexico border gone too far? | TUTUZ NEWS * Latest news articles

Leave a comment