You are currently browsing the tag archive for the ‘cyber-surveillance’ tag.
A 1916 American Mug Shot
For anyone who thinks photography has only recently been abducted by state and corporate power for the purposes of control, think again. For anyone who thinks that high-tech-surveillance was the birth of photography being used to discipline and order humans, think again. Cyborgology recently had a great piece by Liam French lecturer in the Journalism and Media Department at the University of St. Mark & St. John, about the historical connects between image-making and criminal justice. French writes:
The relationship between visual technologies and the criminal justice system can be traced back to the emergence of photography and the invention of the camera as a tool for documenting ‘reality’ in the nineteenth century. The camera was widely believed, even more so than today, to be able to objectively and truthfully record social reality. A photograph was perceived to be like a window on the world – a mechanically produced, impartial and literal representation of the real world.
One such photographic taxonomy was produced by the Italian physician Cesare Lombroso who drew ink portraits depicting ‘criminal types’. Lombroso’s work is an exemplary case of the rise of positivist criminology in the nineteenth century. He argued that criminals possessed more ‘atavistic’ features and shared more characteristics with our evolutionary ancestors than more law-abiding citizens.
Most Wanted: Cameras, Criminal Justice and the Persistence of Vision argues that the breadth of surveilling techniques and technologies has extended to the Internet.
Still and moving ‘visual evidence’ is stored in state archives, used in courtrooms as evidence, and disseminated across almost every major media platform: from the printed press to the World Wide Web.
French references both a 2006 article about Mark Michaelson’s book and collection of mugshots and last years viral pic of Jeremy Meeks‘ mugshot to raise the idea that law enforcement photography (mugshots included) have transcended their forensic roots.
Take, for example, the posting of the police mug-shot of criminal Jeremy Meeks on Stockton Police Force Facebook page resulted in his image going viral and concluding with the offer of a quite lucrative modelling contract. What is interesting about the Jeremy Meeks mug-shot story is that once his photograph was displayed outside of the authoritative domain of the police archive and publicly circulated across different social media platforms and networks it accrued different sets of meanings (sexy, hot, good-looking) along the way despite the attempt to officially encode (or fix) the meaning (criminal, dangerous, wanted by the police) of the photograph.
Furthermore, French argues, that John Fiske’s theory that dominant power uses system to segregate and dominate apply here. Fiske says that authority will rely upon systems and “improve” them all the while facing resistance from the lesser power. Crucially, the lesser power uses the same systems to subvert and counter dominate. Sometimes the lesser power is successful and sometimes the larger power replaces old systems with new ones of greater efficiency or new tactics. In any case there is always a push and pull.
Booking photo of Jeremy Meeks, 30. (June 18, 2014). Credit: Stockton Police Department
So in the case of mugshots, there has always been inherent control attached to state-dominate manufacture and exchange of mugshots. Until social media found a way to interrupt that exchange.
Even Sheriff Joe Arpaio’s mugshot of the day website and the countless mugshot magazines like Busted were examples of larger authorities using the mugshot to their own ends. Arpaio’s use served not the general fraternity of law enforcement but his own ego. Busted wanted to bend the use of mugshots to its own profitable ends but interestingly did so without inconveniencing the state’s power; to the contrary dollar-mugshot magazines enhance the states criminalisation of individuals.
Fiske’s theory was formulated in the late 1980s and so pre-dates the emergence of web 2.0 and social media but his model of culture (and popular culture) does have a resonance with the ways in which social media tools and platforms further open up the terrain of culture for struggles over meaning, semiotic productivity and popular resistance. Imposing official (or dominant) meanings is now much more difficult because there are so many opportunities for contestation.
It would be naïve to cite the Jeremy Meeks example as some kind of paradigm changing moment or as the empowerment of the masses but it does offer an insight into the ways in which the potential for popular resistance is always possible and can surface in the most unlikely of places.
From dusty archives, to venerable vernacular objects, to art-world comedy-fetish, to online consumable, we need to consider deeply our relationship to mugshots. And to the criminal justice systems from which they emerge. Especially as one week we’re approaching them as shallow entertainment and the next we’re demanding a right to them in order to confirm or dispel controversy and conspiracy surrounding in-custody death.
–
Read French’s full piece Most Wanted: Cameras, Criminal Justice and the Persistence of Vision here
Verint Israel and NICE System Monitoring Center, Astana, Kazakhstan 2014.
Much of my weekend was spent putting a final editing-touches on the latest Vantage article Panopticon For Sale. The piece, details trade between authoritarian regimes (such as Uzbekistan, Kazakhstan, Azerbaijan, Bahrain and others) and corporations that manufacture and maintain cyber-surveillance.
The author, Mari Bastashevski, spent 12 months researching this shady industry — trailing paper work, filing FOIA requests, interviewing and protecting sources, and corroborating statements. Many previously unreported (but commonly suspected) business relations uncovered by Bastashevski have been confirmed by information included in the July 5th hack of Hacking Team (a company that manufactures surveillance technologies) when the identities of its clients were posted online.
As Bastashevski writes in her closing statements:
Companies like NICE, Gamma Group, Verint, and Hacking Team, who sell this power to governments for which “watched a YouTube protests video” constitutes criminal behaviour become co-arbiters of what is and isn’t a “wrong act”. Yet for the companies, much like for their clients, their own secrecy remains absolute and proprietary: not something for press consumption, researchers, or advocates.
Private corporations are facilitating the unfettered surveillance of citizens by paranoid rulers.
NICE Systems HQ, Ra’anana, Israel 2014.
The comparatively unregulated republics in the post-Soviet region are proving grounds for the shit that the power hungry can get away with.
I’ll stop yelling now, encourage you to read Bastashevski’s #longread, and leave you with an my editor’s foreword to further convince you to take in Bastashevki’s text and images.
This is a narrative built upon information that’s incredibly difficult to verify. Outside of the community of privacy advocates and cyber-surveillance researchers, no-one really saw this story, or necessarily knew what it was or why it mattered. That’s because everything that Bastashevski was looking at — or looking for — is invisible, confidential or both.
When Hacking Team was itself hacked, Bastashevski felt vindicated. Not only did the hack confirm the presence of Hacking Team in countries she investigated, it also confirmed the presence of other companies she knew were providing surveillance to those countries. The lies and questionable dealings of a catastrophic industry were laid bare.
“To photograph or to look at what exists on the verge of catastrophe,” critic Ariella Azoulay once wrote, “the photographer must first assume she has a reason to be in the place of the nonevent or event that never was, which no one has designated as the arena of an event in any meaningful way. She, or those who dispatch her, must suspend the concerns of the owners of the mass media regarding the ratings of the finished product and with her camera begin to sketch a new outline capable of framing the nonevent. Photographing what exists the verge of catastrophe thus is an act that suspends the logic of newsworthiness.”
By virtue of hackers’ actions, and not the logic of the news industry, I find myself in a position to publish Bastashevski’s remarkable findings. A condensed version of this work was exhibited at Musee de Elysee and published in the Prix Elysee catalogue (Musee de Elysee, December 2014). It has since been expanded to include a review of targets and surveillance in Azerbaijan, and cross references of the recent evidence obtained through Hacking Team leak.
This is not a photo essay but rather an essay with photos. Bastashevki makes photographs, in many ways, to show her stories cannot be photographed. These images are way-markers along roads of discovery.
–
Read the full piece Panopticon For Sale and see more large images.
–
Ministry of Communication Tashkent, Uzbekistan, 2014.
SNB lunch spot, secure Gazalkent district, Tashkent Uzbekistan. 2014.
Monitoring centre (roof) -Tashkent, Uzbekistan. 2014. Location where data obtained with Hacking Team, Nice Systems, and Verint Technologies is analysed and processed.
PU-data collection point Kazakhtelecom-Almaty, Kazakhstan, 2014.
Presidential Palace and MNS HQ, Baku, Azerbaijan 2013.
Inside Verint Israel HQ, Herzliya Pituach, Israel 2014.
Transaction — Dedeman Silk Road Radisson Blu, Tashkent ,Uzbekistan. 2014.
–
All images: Mari Bastashevski