Surveillance technology: which regulation?

La cyberarme de la police | 23 August 2010

An old post I kept in my mail box until I could process it. It is about softwares (CRUSH standing for Criminal Reduction Utilising Statistical History) that allows mapping of criminality in cities nearly on real-time terms, thus allowing the police to target specific areas of crime.

The idea obviously is not bad as such, but it raises issues of regulation, of control of the technology. How the data is collected? is the response proportionate? Is there not a risk of discrimination and further alienation of the population, especially in cities where difficult areas tend to be easily identifiable?

Those issues were presented by Willem Schinkel at the CLC conference in Utrecht last September. Rotterdam is divided in zones with hot ones where the police is granted exceptional powers, i.e. bypassing the normal safeguards of criminal procedure. As a sociologist, he looked at it from the angle of Agamben. His presentation was fascinating; the importance of his analysis is just highlighted further by the use of softwares.

similar questions arise for Google, here with the particular example of piracy.

Google Won’t Recommend Most Popular Searches If It Thinks It Might Sorta Have Something To Do With Piracy, TechDirt, 2nd December 2010

About Audrey Guinchard

Senior Lecturer @ University of Essex (UK)
This entry was posted in Countries - UK, Countries - US, General - Legal/non legal responses to cybercrime, Investigation-5- Use of technology(ies), Offences - Piracy, Surveillance, Technology - neither good or bad but never neutral. Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s