Advertisement

Transformations of Surveillance: From National Security to Private Security Industry

  • Aleš Završnik
Chapter

Abstract

This chapter outlines the transformations of surveillance in the Central and Eastern European (CEE) countries occurring as a result of profound economic, social and political change in the post-socialist transition. It begins with the socio-economic framework in which new and historically significant technologically enhanced surveillance practices (TESPs) should be understood. This chapter works from the position that flourishing multi- and cross-disciplinary “surveillance studies” have overlooked non-western and non-Anglophone experiences of surveillance. It fills this gap by situating the “surveillance question” within the field of social control theories which were highly elaborated in the CEE region. These theories approached surveillance from a different world view, with different research questions. After putting surveillance within this social control context, this chapter maps the surveillance practices seen in socialist regimes, which used it predominantly for national security purposes with labour-intensive methods and by relying on networks of informers. Some specific features of surveillance during the Balkan war are then addressed. This chapter continues by showing how a growing private sector has challenged and to some extent supplanted state-controlled agencies in carrying out surveillance, not only in the interests of »national security«—a notion long used by government to justify extra-judicial policing—but also of consumerism and profit. It then focuses on the development of this industry and offers examples of transformation in the border surveillance, road surveillance and consumer surveillance domains. After tackling the fundamental question of why surveillance is problematic and giving some examples of counter-surveillance initiatives in the CEE region, the author concludes by demonstrating how public awareness of intensified surveillance is increasing in the region.

Keywords

National Security Crime Control Informal Control Social Control Theory Surveillance Practice 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgments

This book could not have been written without initiative and ongoing enthusiasm and elegance in co-ordinating the research group of co-editor Professor Alenka Šelih. I would like to sincerely thank her for inviting me in the process of drafting and editing the book as well as liaising me with other authors of the book from whom I benefited beyond the chapter produced here. For their help in the course of writing this chapter, I would like to thank the authors of this book for invaluable comments and suggestions to earlier drafts at our meetings, especially Professor Alenka Šelih, Professor of Miklós Lévay, Professor Zoran Kanduč and Professor Vesna Nikolić-Ristanović. The ideas produced would not have any social value whatsoever if not expressed in a precise manner and also in an enjoyably elegant fashion worth focusing on. For going well beyond the words expressed, as many times before, my gratitude goes to John Stubbs.

References

  1. Abe, K. (2004). Everyday policing in Japan. International Sociology, 19(2), 215–231.CrossRefGoogle Scholar
  2. Abrahamsen, R., & Williams, M. C. (2005). The Globalisation of private security. Aberystwyth, Ceredigon: University of Wales.Google Scholar
  3. Andrejevic, M. (2004). Reality TV: The work of being watched. Lanham, MD: Rowman & Littlefield Publishers.Google Scholar
  4. Andrejevic, M. (2007). iSpy: Surveillance and power in the interactive era. Lawrence, KS: University Press of Kansas.Google Scholar
  5. Anželj, D. (1998). Varovanje premoženja s strani zasebnih podjetij in policije [Private Security and Public Police Assets Protection]. In Andrej Anžič (Ed.), Zasebno varovanje in detektivska dejavnost: novi izzivi [zbornik posveta, Portorož, oktober 1998]. Ljubljana: Visoka policijsko-varnostna šola, 1–12Google Scholar
  6. Anžič , A. (1999). Nove možnosti zasebnega varstva v Sloveniji [New Opportunities for private Security in Slovenia]. In A. Anžič (Ed.), Nove možnosti zasebnega varstva v Sloveniji [zbornik]. Ljubljana: Visoka policijsko-varnostna šola, Društvo za zasebno varstvo in državljansko samovarovanjeGoogle Scholar
  7. Brinc, F. & Petrovec, D. (2001). Družbeno vzdušje v zavodih za prestajanje kazni zapora v RS [Social Climate in Slovenian Penitentiary Institutions]. Ljubljana: Institute of Criminology at the Faculty of Law in LjubljanaGoogle Scholar
  8. Brown, I., & Korff, D. (2009). Terrorism and the proportionality of internet surveillance. European Journal of Criminology, 6(2), 119–134.CrossRefGoogle Scholar
  9. Christie, N. (1993). Crime control as industry: Towards Gulags, Western style. London: Routledge.Google Scholar
  10. Clark, R. (1988). Information technology and dataveillance. Communications of the ACM, 31(5), 498–512.CrossRefGoogle Scholar
  11. Cole, D., & Lobel, J. (2007). Less safe, less free: Why we are losing the war on terror. New York: New Press.Google Scholar
  12. Confederation of European Security Services (CoESS, 2008). Private security in Europe. CoESS Facts and Figures 2008. Wemmel: CoESS. Retrieved from www.coess.org/pdf/CoESS_Facts_Figures_2008.pdf. Accessed 20 June 2011.
  13. Cunningham, W. C., Stranch, J. J., & Von Meter, W. C. (1990). Private security trends 1970–2000. Stoneham, MA: Hallcrest Systems, Incorporated.Google Scholar
  14. de Waard, J. (1999). The private security industry in international perspective. European Journal on Criminal Policy and Research, 7(2), 143–174.CrossRefGoogle Scholar
  15. Deleuze, G. (1990). Post-scriptum sur les sociétés de contrôle. L’autre journal, 1, mai.Google Scholar
  16. Deleuze, G., & Guattari, F. (1987). A thousand plateaus. Minneapolis: University of Minnesota Press.Google Scholar
  17. Feeley, M., & Simon, J. (1992). The new penology: Notes on the emerging strategy of corrections and its implications. Criminology, 30(4), 449–474.CrossRefGoogle Scholar
  18. Flaherty, D. (1989). Protecting privacy in surveillance societies: The Federal Republic of Germany, Sweden, France, Canada, and the United States. Chapel Hill, NC: University of North Carolina Press.Google Scholar
  19. Franko Aas, K. (2005). Sentencing in the age of information: From Faust to Macintosh. London: The Glass House Press.Google Scholar
  20. Franko Aas, K., Oppen Gundhus, H., & Mork lomell, H. (Eds.) (2009). Technologies of inSecurity: The surveillance of everyday life. Abingdon, New York: Routledge-Cavendish.Google Scholar
  21. Franko Aas, K. (2011). ‘Crimmigrant’ bodies and bonafide travelers: Surveillance, citizenship and global governance. Theoretical Criminology, 15(3), 331–346.CrossRefGoogle Scholar
  22. Franko Aas, K. (2012). ‘The Earth is one but the world is not’: Criminological theory and its geopolitical divisions. Theoretical Criminology, 16(1), forthcoming.Google Scholar
  23. Frlež, D. (2010). Državljansko samovarovanje v Republiki Slovenijiideologija ali realnost, magistrsko delo [Citizen Self-Protection in SloveniaIdeology or Reality, Masters Thesis]. Ljubljana: D. Frlež.Google Scholar
  24. Ganser, D. (2005). NATO’s secret armies: Operation GLADIO and terrorism in Western Europe. London: Routledge.Google Scholar
  25. Garland, D. (2001). The culture of control: Crime and social order in contemporary society. Oxford, UK: Oxford University Press.Google Scholar
  26. Haggerrty, K. D., & Ericson, R. V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605–622.CrossRefGoogle Scholar
  27. Haggerty, K. D. (2006). Tear down the walls: on demolishing the panopticon. In D. Lyon (Ed.), Theorizing surveillance: The panopticon and beyond (pp. 23–45). Cullompton, UK: Willan Publishing.Google Scholar
  28. Hay, J., & Andrejevic, M. (2006). Introduction: Toward an analytic of governmental experiments in these times: Homeland security as the new social security. Cultural Studies, 20(4–5), 331–348.CrossRefGoogle Scholar
  29. Hempel, L. & Töpfer, E. (2004). CCTV in Europe. Final report. Centre for Technology and Society, Technical University Berlin. Retrieved from http://www.urbaneye.net/results/ue_wp15.pdf. Accessed 10 Dec 2011
  30. Hier, S. P., & Greenberg, J. (2007). The surveillance studies reader. Maidenhead, UK: Open University Press.Google Scholar
  31. Hungarian Civil Liberties Union. Retrieved September 20, 2011 from http://tasz.hu
  32. Jones, T., & Newburn, T. (2006). Plural policing: A comparative perspective. London: Routledge.Google Scholar
  33. Kanduč, Z. (2003). Onkraj zločina in kazni [Beyond Crime and Punishment]. Ljubljana: Študentska založba.Google Scholar
  34. Kanduč, Z. (2007). Subjekti in objekti (ne)formalne socialne kontrole v kontekstu postmodernih tranzicij [Subjects and Objects of (In)formal Control in post-modern transition]. Ljubljana: Institute of Criminology at the Faculty of Law in Ljubljana.Google Scholar
  35. Kempa, M. (2007). Tracing the diffusion of policing governance models from the British Isles and back again: Some directions for democratic reform in troubled times. Policing & Society, 8(2), 107–123.Google Scholar
  36. Kešetović, Ž. (2010). Urbanization, policing and safety in Serbia. In G. Cordner, A. Cordner, & D. K. Das (Eds.), Urbanization, policing and security—global perspectives (pp. 53–67). Boca Raton: CRC Press.Google Scholar
  37. Klauser, F. R. (2009). ‘Lost’ surveillance studies. Surveillance & Society, 6(1), 23–31.Google Scholar
  38. Koskela, H. (2009). Hijacking surveillance? The new moral landscapes of amateur photographing. In K. Franko Aas, H. Oppen Gundhus, & H. Mork Lomell (Eds.), Technologies of in Security: The surveillance of everyday life. Routledge-Cavendish: Abingdon, New York.Google Scholar
  39. Leman-Langlois, S. (2008). Introduction: Technocrime. In S. Leman-Langlois (Ed.), Technocrime: Technology, crime and social control (pp. 1–13). Cullompton, Devon: Willan Publishing.Google Scholar
  40. Lianos, M., & Douglas, M. (2000). Dangerization and the end of deviance. British Journal of Criminology, 40(2), 261–278.CrossRefGoogle Scholar
  41. Loader, I. (2000). Plural policing and democratic governance. Social and Legal Studies, 9(3), 323–345.CrossRefGoogle Scholar
  42. Lyon, D. (2001). Surveillance society: Monitoring everyday life. Buckingham, UK: Open University Press.Google Scholar
  43. Lyon, D. (2002). Editorial. Surveillance studies: Understanding visibility, mobility and the phenetic fix. Surveillance & Society, 1(1), 1–7Google Scholar
  44. Lyon, D. (Ed.). (2003). Surveillance as social sorting: Privacy, risk and digital discrimination. London: Routledge.Google Scholar
  45. Lyon, D. (2007). Surveillance studies: An overview. Cambridge, UK: Polity.Google Scholar
  46. Mann, S., Nolan, J., & Wellman, B. (2004). Sousveillance: Inventing and using wearable computing devices for data collection in surveillance environments. Surveillance & Society, 1(3), 331–355.Google Scholar
  47. Marx, G. T. (1985). The surveillance society: The Threat of 1984-style techniques. The Futurist, June 6, 21–26.Google Scholar
  48. Marx, G. T. (2002). What’s new about the “new” surveillance? Classifying for change and continuity. Surveillance and Society, 1(1), 9–29.Google Scholar
  49. Mathisen, T. (1997). The viewer society: Michel Foucault’s `Panopticon’ revisited. Theoretical Criminology, 1(2), 215–234.CrossRefGoogle Scholar
  50. Meško, G., & Lobnikar, B. (2005). The contribution of local safety councils to local responsibility in crime prevention and provision of safety. Policing, 28(2), 353–373.Google Scholar
  51. Minnaar, A. (2010). Balancing public safety and security demands with civil liberties in a new constitutional democracy: The case of post-1994 South Africa and the growth of residential security and surveillance measures. In K. D. Haggerty & M. Samatas (Eds.), Surveillance and democracy (pp. 195–212). Abingdon, New York: Routledge.Google Scholar
  52. Monahan, T. (2010). Surveillance in the time of insecurity. New Brunswick, NJ: Rutgers University Press.Google Scholar
  53. Murakami Wood, D. (Ed.) (2006). A Report on the Surveillance Society. For the Information Commissioner by the Surveillance Studies Network. Retrieved from June 30, 2011 from http://www.ico.gov.uk/upload/documents/library/data_protection/practical_application/surveillance_society_full_report_2006.pdf
  54. Murakami Wood, D. (2009a). Response: David Murakami Wood’s “situating surveillance studies”. Surveillance & Society, 7(1), 71–75.Google Scholar
  55. Murakami Wood, D. (2009b). The ‘surveillance society’: Questions of history, place and culture. European Journal of Criminology, 6(2), 179–194.CrossRefGoogle Scholar
  56. Murakami Wood, D., & Webster, C. W. R. (2009). Living in surveillance societies: The normalisation of surveillance in Europe and the threat of Britain’s bad example. Journal of Contemporary European Research, 5(2), 259–273.Google Scholar
  57. Nalla, M.K. (2002). Police: private police and industrial security—scope of security work, nature of security work, legal authority, public vis-à-vis private police. Encyclopaedia of Crime and Justice. New York: MacmillanGoogle Scholar
  58. Nikolić-Ristanović, V. (1998). War and crime in the former Yugoslavia. In V. Ruggiero, N. South, & I. Taylor (Eds.), The new European criminology—crime and social order in Europe (pp. 462–479). London: Routledge.Google Scholar
  59. O’Malley, P. (2010). Simulated justice: Risk, money and telemetric policing, new forms of ‘simulated’ justice and policing. British Journal of Criminology, 50(5), 795–807.CrossRefGoogle Scholar
  60. Országos Polgárőr Szövetség (OPSZ) [Nationwide Civil Self-Defence Organizations]. Retrieved from August 20, 2011 from http://www.opsz.hu/
  61. Pečar, J. (1988). Formalno nadzorstvo: kriminološki in kriminalnopolitični pogledi [Formal Control: Criminological and Crime Policy Perspectives]. Ljubljana: Delavska enotnost.Google Scholar
  62. Pečar, J. (1990). Neformalno nadzorstvo: kriminološki in sociološki pogledi [Informal Control: Criminological and Sociological Perspectives]. Radovljica: Didakta.Google Scholar
  63. Pečar, J. (1991). Organizirano samovarovanje [Forms of Civilian Self-Protection]. Revija za kriminalistiko in kriminologijo, 42(4), 325–339.Google Scholar
  64. Pečar, J. (1998). Zasebno varovanje in samovarovanje v lokalni skupnosti [Private Security and Self-Protection in Local Community]. In Andrej Anžič (Ed.), Zasebno varovanje in detektivska dejavnost: novi izzivi [zbornik posveta, Portorož, oktober 1998] [Private Security and Detective Activities: New Challenges]. Ljubljana: Visoka policijsko-varnostna šola, 267–280.Google Scholar
  65. Petrovec, D. (1987). Zapor v funkciji zaščite družbe pred storilci kaznivih dejanj [Imprisonment and the protection of society]. Penološki bilten, 5(2), 64–72Google Scholar
  66. Petrovec, D. (2007). Basic principles of Slovenian penal and prison system. In MASSÉ, Michel (ed.), Un droit pénal postmoderne?: Mise en perspective de certaines évolutions contemporaines. Poitiers: Faculté de droit et des sciences sociales de l’Université de Poitiers, 325–337.Google Scholar
  67. Petrović, P. (2008). The characteristics of privatisation of security in Serbia. In S. Stojanović (Ed.), Private security companies in Serbia—friend or a threat? Belgrade, Serbia: Center for civil-military relations.Google Scholar
  68. Poster, M. (1995). The second media age. Cambridge, UK: Polity.Google Scholar
  69. Poster, M. (2006). Information please: Culture and politics in the age of digital machines. Durham, NC: Duke University Press.Google Scholar
  70. Pratt, J. (1995). Dangerousness, risk and technologies of power. Australian & New Zealand Journal of Criminology , March 1, 28(1), 3–31. Google Scholar
  71. Salecl, R. (1993). Zakaj ubogamo oblast?: nadzorovanje, ideologija in ideološke fantazme. [Why Do We Submit to Power? Control, Ideology, and Ideological Phantasms]. Ljubljana: Državna založba Slovenije.Google Scholar
  72. Samatas, M. (2004). Surveillance in Greece: From anticommunist to consumer surveillance. New York: Pella Publishing Co.Google Scholar
  73. SEESAC (2005). SALW and private security companies in South Eastern Europe: A cause or effect of insecurity?, 2nd ed., SEESAC. Retrieved August 17, 2011 from www.seesac.org/reports/psc.pdf
  74. Sintal (2011). Retrieved July 29, 2011 from http://www.sintal.si/
  75. Solove, D. (2007). The future of reputation: Gossip, rumor and privacy on the internet. New Haven, CT: Yale University Press.Google Scholar
  76. Sotlar, A. (2006). The (non-existent) control over private security companies in Slovenia: The views and attitudes of some members of parliament and private security managers. In G. Meško & B. Dobovšek (Eds.), Past, present and futures: Policing in Central and Eastern Europe (pp. 41–42). Ljubljana, Slovenia: Faculty of Criminal Justice and Security.Google Scholar
  77. Sotlar, A. & Meško, G. (2009). The Relationship between the public and private security sectors in Slovenia—from coexistence towards partnership? Varstvoslovje: revija za teorijo in prakso varstvoslovja, 11(2), 269–285.Google Scholar
  78. TiKam project. Retrieved November 6, 2011 from www.tikam.si
  79. van Buuren, J. (2010). Security as a commodity: The ethical dilemmas of private security services. INEX Policy Brief, 6, March.Google Scholar
  80. van Steden, R. & Sarre, R. (2010). Private Policing in the Former Yugoslavia: A Menace to Society? Varstvoslovje: revija za teorijo in prakso varstvoslovja, 12(4), 424–439.Google Scholar
  81. Vervaele, J. (2005). Terrorism and information sharing between the intelligence and law enforcement communities in the US and the Netherlands: emergency criminal law? Utrecht Law Review, 1(1), 1–27.CrossRefGoogle Scholar
  82. von Hirsch, A. (1985). Past and future crimes: Deservedness and dangerousness in the sentencing of criminals. Oxford: Rutgers.Google Scholar
  83. Wall, D. S. (2007). Cybercrime: The transformation of crime in the information age. Cambridge: Polity Press.Google Scholar
  84. Završnik, A. (2010). Kriminaliteta in tehnologija: uvod [Crime and Technology: Introduction]. In Aleš Završnik (Ed.), Kriminaliteta in tehnologija: kako računalniki spreminjajo nadzor in zasebnost, ter kriminaliteto in kazenski pregon? [Crime and Technology: Computer Challenges to Surveillance, Privacy, Crime and Crime control?]. Ljubljana, Slovenia: Institute of Criminology at the Faculty of Law in Ljubljana, 1–20.Google Scholar
  85. Zedner, L. (2007). Pre-crime and post-criminology? Theoretical Criminology, 11(2), 261–281.CrossRefGoogle Scholar
  86. Zurawski, N. (Ed.). (2007). Surveillance Studies: Perspektiven eines Forschungsfeldes. Leverkusen, Germany: Budrich-Verlag.Google Scholar
  87. Žižek, S. (1994/1995). Superego by Default. Cardozo Law Review, 16, 925–942.Google Scholar
  88. Žižek, S. (1999). The ticklish subject: The absent centre of political ontology. London: Verso.Google Scholar
  89. Žižek, S. (2007). Nasilje [On Violence]. Ljubljana, Slovenia: Društvo za teoretsko psihoanalizo.Google Scholar

Copyright information

© Springer Science+Business Media New York 2012

Authors and Affiliations

  1. 1.Faculty of Law, Institute of CriminologyUniversity of LjubljanaLjubljanaSlovenia

Personalised recommendations