Abstract
How can the law best balance the rights of citizens to enjoy the sort of privacy envisaged by the framers of Article 12 of the Universal Declaration on Human Rights with the legitimate interests that the state (and increasingly the media, corporations, and other private citizens) might have in observing, filming, and monitoring them? What will finding the right balance entail? Will all people be protected equally? These are difficult questions that admit no easy answers. This paper wrestles with the risks to citizens’ privacy when they are confronted by the new surveillance society, and considers the policy consequences of the choices that they may make.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
ACLU (2007). Surveillance Society Clock, 4 September 2007. Retrieved November 11, 2012, from http://www.aclu.org/technology-and-liberty/surveillance-society-clock-more.
Apple (2012). iPhone 5 first weekend sales top five million. Retrieved November 11, 2012, from http://link.amtac.net/tjvn4.
Arnold, B. (2012, October 20). Face off, agenda. The Weekend West.
Arnold, B. (2013, October 10). The Australian public cares about privacy: do politicians? The Conversation.
Atlantic (2012, April 7). Total surveillance society: mobile phones increasingly used by local police for tracking. The Extinction Protocol. Retrieved November14, 2012, from http://www.theextinctionprotocol.wordpress.com/.
Australian Government (2014). House of representatives standing committee on social policy and legal affairs. Eyes in the sky: inquiry into drones and the regulation of air safety and privacy. Retrieved from http://www.aph.gov.au/Parliamentary_Business/Committees/House/Social_Policy_and_Legal_Affairs/Drones/Report
BBC (2011). Sony investigating another hack. Retrieved from http://www.bbc.co.uk/news/business-13636704
Bennett, C., Haggerty, K., Lyon, D., & Steeves, V. (2014). Transparent lives: surveillance in Canada. Canada: Athabasca University Press.
Bracken-Roche, C., Lyon, D., Mansour, M., Molnar, A., Saulnier, A., & Thompson, S. (2014). Surveillance drones: privacy implications of the spread of unmanned aerial vehicles (UAVs) in Canada. A report to the office of privacy commissioner of Canada. Surveillance Studies Centre, Queen’s University, April.
Cohen, E. D. (2010, October 24). Mass surveillance and state control: the total information awareness project, Psychology Today, www.psychologytoday.com.
Draper, R. A., Ritchie, J., & Prenzler, T. (2012). Making the most of security technology. In T. Prenzler (Ed.), Policing and security in practice: challenges and achievements. New York: Palgrave.
Emerson, C. (2013, November 2). No escape from electronic eyes, The Australian. p. 20.
Flick, C. (2013, October 9). Silk road bust unmasks our misconceptions on anonymity. The Conversation.
Fung, B. (2013, August 16). Why drone makers have declared war on the word ‘drone’. Washington Post.
Goldsmith, A. (2015). Disgracebook policing: social media and the rise of police indiscretion. Policing and Society, 25(3), 249–267.
Helgesson, S. (2011). Public-private partners against crime. Surveillance and Society, 8(4), 472–484.
Hern, A. (2015, July 31). Facebook launches Aquila solar-powered drone for internet access. The Guardian. Retrieved from http://www.theguardian.com/technology/2015/jul/31/facebook-finishes-aquila-solar-powered-internet-drone-with-span-of-a-boeing-737
Kearon, T. (2013). Surveillance technologies and the crises of confidence in regulatory agencies. Criminology and Criminal Justice, 13(4), 415–430.
Larsen, B. (2011). Setting the watch: privacy and the ethics of CCTV surveillance. Oxford: Hart Publishing.
Le Grand, C., Gosper, S. (2012, September 28). Meagher’s body found; man charged, The Australian on line. Retrieved from http://www.theaustralian.com.au/news/nation/meaghers-body-found-man-charged/story-e6frg6nf-1226483028702.
Lyon, D., Haggerty, K., & Ball, K. (Eds.). (2012). Routledge handbook of surveillance studies. London: Routledge.
Maiolo, A. (2012). Drones to the rescue. Retrieved from http://www.campusreview.com.au pp. 10–11.
Marcella, A. J., & Stucki, C. (2003). Privacy handbook: Guidelines, exposures, policy implementation and international issues. Hoboken: John Wiley and Sons.
Marks, P. (2012). The surveillance & everyday life research group. University of Sydney, Home page editorial. Retrieved November 11, 2012, from http://sydney.edu.au/arts/research/surveillance/.
Marsden, R. (2015, October 22). Geek mythology. The Independent, p. 35.
Michael, K. & Clarke, R. (2012). Location privacy under dire threat as “uberveillance” stalks the streets. Precedent, January-February, pp. 25–29.
Neuberger, D (2015). Is nothing secret? Confidentiality, privacy, freedom of information and whistleblowing in the internet age. Singapore Academy of Law Annual Lecture 2015, Singapore.
Neyland, D. (2006). Privacy, surveillance and public trust. Houndmills Hants: Palgrave-Macmillan.
Norris, G., & Wilson, P. (2005). Crime prevention and new technologies: The special case of CCTV. In D. Chappell & P. Wilson (Eds.), Issues in Australian crime and criminal justice. Chatswood, NSW: Butterworths.
O’Malley, P. (2008). Neo-liberalism and risk in criminology. In T. Anthony & C. Cunneen (Eds.), The critical criminology companion (pp. 55–67). Sydney: Hawkins Press.
OAIC (2013). Office of the Australian Information Commissioner. Retrieved from https://www.oaic.gov.au/media-and-speeches/speeches/setting-the-scene-privacy-law-in-australia.
Prenzler, T., & Sarre, R. (2012). Public-private crime prevention partnerships. In T. Prenzler (Ed.), Policing and security in practice: Challenges and achievements (pp. 149–167). Houndmills Hampshire: Palgrave Macmillan.
Prunckun, H. (2010). Handbook of scientific methods of inquiry for intelligence analysis. Plymouth UK: Scarecrow.
Rosen, J. (2011, September 12). Protect our right to anonymity, blog on the subject of US v Jones.
Sarre, R. (2014). The use of surveillance technologies by law enforcement agencies: what are the trends, opportunities and threats? In E. Pływaczewski (Ed.), Current problems of the penal law and criminology (pp. 755–767). Białystok, Poland: Temida Publishing House.
Sarre, R. (2015). Eyes in the sky. Drone Magazine, 1, pp. 48–51.
Sarre, R., Brooks, D., Smith, C., & Draper, R. (2014). Current and emerging technologies employed to abate crime and to promote security. In B. Arrigo & H. Bersot (Eds.), The Routledge handbook of international crime and justice studies (pp. 327–349). Abingdon, Oxford: Routledge.
Sarre, R., & Prenzler, T. (2009). The law of private security in Australia (2nd ed.). Pyrmont, NSW: Lawbook Co.
Smith, C. L. (2006). Trends in the development of security technology. In M. Gill (Ed.), The handbook of security (pp. 610–628). Houndmills Hants: Palgrave-Macmillan.
Smith, C. L., & Brooks, D. J. (2013). Security science: Theory and practice of security. Waltham, MA: Elsevier.
Smith, G. J. D. (2012). Constitutional statement and manifesto, the surveillance & everyday life research group. Retrieved November 11, 2012, from: http://sydney.edu.au/arts/research/surveillance/about/index.shtml viewed.
Tassone, C., Martini, B., Choo, K.-K. R., & Slay, J. (2013). Mobile device forensics: a snapshot, Trends and issues in crime and criminal justice, No 460. Canberra: Australian Institute of Criminology.
Welsh, B. C., & Farrington, D. P. (2004). Surveillance for crime prevention in public places: results and policy choices in Britain and America. Crime and Public Policy, 3(3), 497–526.
Woodward, A. (2013, September 20). Pick your battles when fighting financial spying. The Conversation.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Sarre, R. (2017). The Surveillance Society: A Criminological Perspective. In: Viano, E. (eds) Cybercrime, Organized Crime, and Societal Responses. Springer, Cham. https://doi.org/10.1007/978-3-319-44501-4_14
Download citation
DOI: https://doi.org/10.1007/978-3-319-44501-4_14
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-44499-4
Online ISBN: 978-3-319-44501-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)