Advertisement

Surveillance: Technologies, Techniques and Ramifications

  • Barry G. BlundellEmail author
Chapter
  • 27 Downloads

Abstract

Since the 1990s there has been a rapid growth in the proliferation of an increasingly diverse range of technologies which are often primarily intended to monitor human activity, and determine (or verify) the identity of the individual. Despite the intrusive nature of such systems and the ways in which they have impacted on a range of privacies, their large-scale deployment has raised little public concern. Here we focus on camera-based surveillance together with a range of biometric techniques (and include discussion on RFID technologies). Why, for example, has the British public (who have traditionally placed such value on privacy) been willing to accept (and often welcome) an endemic level of public space surveillance— whereas other European countries have been far more reluctant to follow this route? Similarly why have so many people been willing to provide biometric data to governments and other organisations? What are the risks of current approaches and the dangers that are associated with the ongoing development of sophisticated and automated surveillance systems?

Keywords

Surveillance and privacy Camera based surveillance Biometrics RFID Smart video Surveillance and IoT Human implantable microchips Facial recognition Surveillance and schools Illegal bombing of Cambodia 

References

  1. Ackerman, S., and Ball, J., ‘Optic Nerve: Millions of Yahoo Webcam Images Intercepted by GCHQ’, The Guardian (28th Feb. 2014).Google Scholar
  2. Arthur, C., ‘Google Glass: Is it a Threat to our Privacy’, The Guardian (6th Mar. 2013).Google Scholar
  3. Bacheldor, B., ‘Microsoft Partners with Implantable RFID Chip Maker VeriChip’, RFID Journal, www.rfidjournal.com/articles/view?4477 (2008) [Last accessed 25th Apr 2019].
  4. Bamford, J., ‘The Shadow Factory’, Doubleday, (2008).Google Scholar
  5. Baraniuk, C., ‘Exclusive: UK Police Wants AI to Stop Violent Crime Before it Happens’, New Scientist (26th Nov. 2018).Google Scholar
  6. Barrett, D., ‘One Surveillance Camera for Every 11 People in Britain, says CCTV Survey’, The Telegraph (10th Jul 2013).Google Scholar
  7. BBC, ‘Teachers Warned of ‘Permanent Surveillance’ from CCTV’, 27087936 (20th April 2014).Google Scholar
  8. BBC, ‘CCTV: Too Many Cameras Useless, Warns Surveillance Watchdog Tony Porter’, 30978995 (26th Jan. 2015).Google Scholar
  9. BBC, ‘Malaysia Car Thieves Steal Finger’, 4396831 (31st Mar. 2005).Google Scholar
  10. BBC, ‘Winsconsin Company Three Square Market to Microchip Employees’, 40710051 (24th July 2017).Google Scholar
  11. BBC, ‘Kent Police Stop Using Crime Predicting Software’, 46345717 (26th Nov. 2018).Google Scholar
  12. Berkman Center Report, ‘Don’t Panic, Making Progress on the ‘Going dark’ Debate’, Berkman Center for Internet and Society at Harvard University (2016).Google Scholar
  13. Big Brother Watch Report, ‘The Price of Privacy: How Local Authorities Spent £515m on CCTV in Four Years’, (Feb. 2012).Google Scholar
  14. Big Brother Watch Report, ‘Class of 1984: The Extent of CCTV in Secondary Schools and Academies’, (Sep 2012).Google Scholar
  15. Birmingham City Council, ‘Project Champion: Scrutiny Review into ANPR and CCTV Cameras—A Report from Oversight to Scrutiny’, Birmingham City Council (2010).Google Scholar
  16. Blundell, B. G. ‘3D Displays and Spatial Interaction, Exploring the Science, Art, Evolution and Use of 3D Technologies’, Volume 1, Walker & Wood Ltd (2011).Google Scholar
  17. Bradbury, R., ‘Fahrenheit 451’, Rupert Hart-Davies Ltd (1954).Google Scholar
  18. Brady, B., ‘Prisoners ‘to be chipped like dogs’, The Independent (13th Jan. 2008).Google Scholar
  19. Brown, A., ‘ Smart Barbie Puts Child’s Play in the Cloud’, Information Week (4th May 2015).Google Scholar
  20. Burdea, G., ‘Force and Touch Feedback for Virtual Reality’, John Wiley & Sons Inc. (1996).Google Scholar
  21. Burgess, M., ‘Facial Recognition Tech Used by UK Police is Making a Ton of Mistakes’, Wired (4th May 2018).Google Scholar
  22. Burt, C., ‘Using Facial Recognition to Activate Police Body Cameras Sparks Concern’, www.biometricupdate.com (5th Oct. 2018).
  23. Cain, P., ‘Privacy Risks Lurk in DNA Tests, Experts Warn’, Globalnews.ca (15th Aug. 2016).Google Scholar
  24. Careerbuilder, ‘Number of Employers Using Social Media to screen Candidates has Increased 500% over the Last decade (28th April 2016).Google Scholar
  25. Carlini, N., Mishra, P., Vaidya, T., Zhang. Y., Sherr, M., Shields, C., Wagner, D., and Zhou, W., ‘Hidden Voice Commands’, Proc. 25th USENIX Security Symposium, Austin TX (10–12 Aug. 2016).Google Scholar
  26. Comey, J., ‘Going Dark: Are Technology, Privacy, and Public Safety on a Collision Course?’ Transcript of speech given at Brookings Institution (16th October 2014).Google Scholar
  27. Cornwell, J., ‘Hitler’s Scientists Science War and the Devil’s Pact’, Penguin (2004).Google Scholar
  28. Dormehl, L., ‘Facial Recognition: Is Technology Taking Away Your Identity?’, The Guardian (4th May 2014).Google Scholar
  29. Erlanger, S., ‘London Attack Places Security and Civil Liberties at Center of U.K. Election’, The New York Times (5th June 2017).Google Scholar
  30. Forcinio, H., ‘The Business Value of RFID’, Microsoft Corporation, RFID Journal (2006).Google Scholar
  31. Garner, R., ‘Privacy Concerns Raised as More Than One Million are Fingerprinted in Schools’, The Independent (2nd Jan. 2014).Google Scholar
  32. Garvie, C., and Frankle, J., ‘Facial-Recognition Software Might Have a Racial Bias’, The Atlantic (7th April 2016).Google Scholar
  33. Global Research, ‘Australia Becomes First Country to Begin Microchipping its Population. RFID Implants in the Human Body’, (4th Oct. 2016).Google Scholar
  34. Greenemeier, L., ‘Police Body Camera Use – Not a Pretty Picture’, Scientific American (4th Aug. 2016).Google Scholar
  35. Haggerty, K., ‘One Generation is all they Need: One Day we will all be Happily Implanted with Microchips’, Toronto Star (10th Dec. 2006).Google Scholar
  36. Halamka, J., Juels, A., Stubblefield, A., and Westhues, J., ‘The Security Implications of VeriChip Cloning’, J. Am. Med, Assoc. 13(6) pp. 601–607 (Nov–Dec 2006).Google Scholar
  37. Henley, J., ‘Sweden Scrambles to Tighten Data Security as scandal Claims Two Ministers’, The Guardian (1st August 2017).Google Scholar
  38. Hern, A., ‘Hacker Fakes German Minister’s Fingerprints using Photo of her Hands’, The Guardian (30th Dec. 2014).Google Scholar
  39. Hern, A., ‘Anti-Surveillance Clothing aims to Hide Wearers from Facial Recognition’, The Guardian, (4th Jan. 2017).Google Scholar
  40. Howitt, M., ‘The Spider and the Fly’ (1829).Google Scholar
  41. Human Rights Watch, ‘China: Police Database Threatens Privacy’, (15th May 2017).Google Scholar
  42. IHS Report, ‘Top Video Surveillance Trends for 2016’, (2015).Google Scholar
  43. Isakjee, A., and Allen, C., ‘‘A Catastrophic lack of Inquisitiveness’: A Critical Study of the Impact and Narrative of the Project Champion Surveillance Project I Birmingham’, Ethnicities, 13(6) pp. 751–770 (2013).Google Scholar
  44. Jain, A., Ross, A., and Prabhakar, S., ‘An Introduction to Biometric Recognition’, IEEE Trans. On Circuits and Systems for Video Technology, 14, No.1 (Jan. 2004).Google Scholar
  45. Jones, R.V., ‘Most Secret War’, Hamish Hamilton (1978).Google Scholar
  46. Kafka, F., ‘The Trial’, (1925).Google Scholar
  47. Kennan, G., ‘George F. Kennan: Memoirs 1950–1963’, Pantheon (1983).Google Scholar
  48. Kent, J., ‘Malaysian Car thieves Steal Finger’, BBC News, 4396831 (2005).Google Scholar
  49. Kille, L., and Maximino, ‘The Effect of CCTV on Public Safety: Research Roundup’, Shorenstein Center on Media, Politics and Public Policy, (2014).Google Scholar
  50. Klitou, D., ‘Privacy-Invading Technologies and Privacy by Design’, Asser Press (Springer), (2014).Google Scholar
  51. Lebowitz, J., ‘Physics and Human Rights: Reflections on the Past and the Present’, Physikalische Blätter, 56, Nr. 7/8, Wiley, (2000).Google Scholar
  52. Levin, S., ‘New AI can Guess Whether You’re Gay or Straight from a Photograph’, The Guardian (8th Sep. 2017).Google Scholar
  53. Lewis, P., ‘Police Surveillance of Muslims Set Up with “No Regard for Law”‘, The Guardian (30th Sep. 2010).Google Scholar
  54. Lewis, P., ‘“I Was Shocked it Was so Easy”, Meet the Professor who Says Facial Recognition can Tell if You’re Gay’, The Guardian (7th July 2018).Google Scholar
  55. Low, A.M., ‘Popular Scientific Recreations’, Ward, Lock and Co. (1933).Google Scholar
  56. MacAskill, E., ‘“Extreme Surveillance” becomes UK Law with barely a Whimper’, The Guardian (19th Nov. 2016)Google Scholar
  57. Magee, T., ‘Met Police Choose Microsoft Azure for storing Body-Worn Camera Data’, Computerworld (1st Dec. 2016).Google Scholar
  58. Manyika, J., Chui, M., Bisson, P., Woetzel, J., Dobbs, R., Bughin, J., and Aharon, D., ‘Unlocking the Potential of the Internet of Things’, McKinsey Global Institute Report (June 2015).Google Scholar
  59. Massoudi, A., and Bradshaw, T., ‘Magic Leap Confirms $400 Saudi Investment’, Financial Times (7th Mar. 2018).Google Scholar
  60. Mcardle, E., ‘The New Age of Surveillance’, Harvard Law Today (10th May 2016).Google Scholar
  61. Meek, J., ‘Robo Cop’, The Guardian (13th June 2002).Google Scholar
  62. Meyer, R., ‘Anti-Surveillance Camouflage for your Face’, The Atlantic (24th July 2014).Google Scholar
  63. Minton, A., ‘CCTV Increases People’s Sense of Anxiety’, The Guardian (30th Oct. 2012)Google Scholar
  64. Minton, A., and Aked, J., ‘’Fortress Britain’: High Security, Insecurity and the Challenge of Preventing Harm’, New Economics Foundation (2012).Google Scholar
  65. Mould, N., Regens, J., Jensen III, C., and Edger, D., ‘Video Surveillance and Counterterrorism: The Application of Suspicious Activity Recognition in Visual Surveillance Systems to Counterterrorism’, Journal of Policing, Intelligence and Counter Terrorism, 9, No. 2, pp. 151–175 (2014).Google Scholar
  66. Murdock, J., ‘Philippines: 55m Voters Exposed as Fingerprint and Passport Data Stolen’, ibtimes.co.uk (7th April 2016).Google Scholar
  67. Nussbaum, E., ‘Kids, the Internet and the End of Privacy: The Greatest Generation Gap Since Rock and Roll’, New York Magazine (12th Feb. 2007).Google Scholar
  68. Okolosie, L., ‘I would Never Wear a Body Camera while Teaching in School. Here’s Why’, The Guardian (9th February 2017).Google Scholar
  69. Oltermann, P., ‘German Parents Told to Destroy Doll that can Spy on Children’, The Guardian (17th Feb. 2017).Google Scholar
  70. Opray, M., ‘Cybersecurity: Is the Office Coffee Machine Watching You?’, The Guardian (28th April 2017).Google Scholar
  71. Orcutt, M., ‘If You Get Your Face Scanned the Next Time You Fly, Here’s What You Should Know’, MIT Technology Review (13th July 2017).Google Scholar
  72. Paton, G., ‘School Children “Routinely Monitored” by CCTV’, The Telegraph (15th Mar 2010).Google Scholar
  73. Paton, G., ‘Classrooms Put Under “Permanent Surveillance” by CCTV’, The Telegraph (20th Apr. 2014).Google Scholar
  74. Peachey, P., ‘How the Police’s Body-Worn Camera Technology is Changing the Justice System’, The Independent (1st Mar. 2016).Google Scholar
  75. Peterson, A., ‘OPM Says 5.6 Million Fingerprints Stolen in Cyberattack, Five Times as many as Previously Thought’, (23rd Sep. 2015).Google Scholar
  76. Popular Science, ‘Why Did I Implant a Chip in my Hand?’, (May 24 2016).Google Scholar
  77. Priks, M., ‘The Effects of Surveillance Cameras on Crime: Evidence from the Stockholm Subway’, The Economic Journal 123, F289–F305 (2015).Google Scholar
  78. Rieback, M.R., Crispo, B., ‘The Evolution of RFID Security’, IEEE Pervasive Computing (Jan.–Mar. 2006).Google Scholar
  79. Robb, G., ‘Police Use of CCTV Surveillance: Constitutional Implications and Proposed Regulations’, U. Mich. J. L. Reform, 571 (1979–1980).Google Scholar
  80. Roberts, J., ‘Banks are using Biometrics to Detect Scammers’, Fortune.com (22nd Mar. 2016).Google Scholar
  81. Robertson, A., ‘Why do People Keep Giving Magic Leap Money?’, The Verge (22nd Oct. 2017).Google Scholar
  82. Seelig, R., ‘New Technology Provides Urgent Medical Information and Protects Privacy: Providing Important Information in Medical Situations for the Developmentally Disabled’, EP Magazine, pp. 47–51 (May 2006).Google Scholar
  83. Sharff, M., Bhagavatula, S., Bauer, L., and Reiter, M., ‘Accessorize to Crime: Real and Stealthy Attacks on State-of-the-Art Face Recognition’, CCS’16, Vienna (Oct 24th–28th 2016).Google Scholar
  84. Shawcross, W., ‘Sideshow Kissinger, Nixon and the Destruction of Cambodia’, Simon and Schuster (1979).Google Scholar
  85. Siddique, H., ‘Police Force Stored DNA Samples in Fridge with Half-Eaten Takeaway’, The Guardian (4th Aug. 2009).Google Scholar
  86. Spicer, A., ‘Surveillance used to be a Bad Thing. Now we Happily let our Employers Spy on Us’, The Guardian (4th Aug. 2017).Google Scholar
  87. Synetics White Paper, ‘CCTV in the UK. What we can Learn from Public attitudes Towards Surveillance’, (March 2015).Google Scholar
  88. The Campbell Collaboration, ‘Closed Circuit Television (CCTV) as a Crime Prevention Tool’, (2016).Google Scholar
  89. Tillmann, G., ‘Opinion: Stolen Fingers: The Case Against Biometric Identity Theft Protection’, Computerworld (27th Oct. 2009).Google Scholar
  90. Van der Hoogen, S., ‘Perceptions of Privacy and the Consequences of Apathy: Biometric Technologies in the 21st Century’, Dalhousie Journal of Interdisciplinary Management, 4 (Spring 2009).Google Scholar
  91. Van der Linden, S., ‘How the Illusion of Being Observed Can Make You a Better Person’, Scientific American (3rd May 2011).Google Scholar
  92. Vincent, J., ‘The UK Now Wields Unprecedented Surveillance Powers – Here’s What It Means’, The Verge (29th Nov. 2016).Google Scholar
  93. Walsh, B., and Farrington, D., ‘Closed-Circuit Television Surveillance and Crime Prevention A Systematic Review’, Swedish Council for Crime Prevention (2007).Google Scholar
  94. Weaver, M., ‘UK Public must Wake Up to Risks of CCTV Says Surveillance Commissioner’, The Guardian (6th Jan. 2015).Google Scholar
  95. Weissert, W., ‘Mexican Attorney General Personally goes High-Tech for Security’, USA Today (14th July 2004).Google Scholar
  96. Woodhouse, J., ‘CCTV and Its Effectiveness in Tackling Crime’, House of Commons Library, Section Home Affairs, (2010).Google Scholar

Copyright information

© Springer Nature Switzerland AG 2020

Authors and Affiliations

  1. 1.ManchesterUK

Personalised recommendations