M. G. Michael

Personal Homepage
http://ro.uow.edu.au/mgmichael
Employer
Uberveillance.org (http://www.uberveillance.org)
Email
mgm@uow.edu.au

M.G. Michael coined the term "überveillance" in 2006 to denote omnipresent electronic surveillance embedded beneath the skin. The term was entered into the official dictionary of Australia, the Macquarie Dictionary in 2008.

Michael received a PhD from the School of Theology at the Australian Catholic University in 2003 in Brisbane, Queensland, and a Master of Arts Honors from the School of Philosophy, History and Politics at Macquarie University in 1999 in Sydney, New South Wales. Michael also completed a Master of Theology from the University of Sydney in 1991 in New South Wales, a Bachelor of Theology from Saint Andrew's Theological College (SCD) in 1990 in New South Wales, and a Bachelor of Arts from the University of Sydney in 1984.
Between 2004 and 2010 he was tutor, lecturer, course coordinator and then honorary senior fellow at the School of Information Systems and Technology at the University of Wollongong, NSW. During this post his responsibilities ranged from coordinating Information and Communication Security, introducing a strong applied ethics component into guest lectures he delivered for subjects in the Social Policy major in the Bachelor of Information and Communication Technology. He was a member of the Centre for Business Services Science (CBSS) and the Institute for Innovation in Business and Social Research (IIBSOR), contributing to a variety of grants on the theme of Location-Based Services.

Dr Michael is a member of the American Academy of Religion. He is also an Affiliate Member of the IEEE Society for the Social Implications of Technology (SSIT, '11) and the Research Network for a Secure Australia (RNSA) 2005-2010. In 2010, Dr Michael co-guest edited a special section on the theme of Uberveillance for IEEE Technology and Society Magazine, and in 2011 he co-guest edited a special issue on the Fallout of Emerging Technologies for the same publication. Dr Michael was partly responsible for bringing the International Symposium on Technology and Society to Australia having published widely in numerous IEEE conferences. Dr Michael has edited three books for the RNSA on the topic of the social implications of national security technologies.

Publication Statistics

Publication period start
9223372036854775807
Publication period end
0
Number of co-authors
1

Co-authors
Number of publications with favourite co-authors

Productive Colleagues
Most productive colleagues in number of publications

Publications

Michael, Katina, Michael, M. G.

23.10 Commentary by Katina Michael and M. G. Michael

23.10.1 About Steve Mann

In Professor Steve Mann - inventor, physicist, engineer, mathematician, scientist, designer, developer, project director, filmmaker, artist, instrumentalist, author, photographer, actor, activist - we see so much of the paradigmatic classical Greek philosopher. I recall asking Steve if technology shaped society or society shaped technology. He replied along the lines that the question was superfluous. Steve instead pointed to praxis, from which all theory, lessons or skills stem, are practiced, embodied and realized. Steve has always been preoccupied by the application of his ideas into form. In this way too, he can be considered a modern day Leonardo Da Vinci.

It is not surprising that Professor Mann was awarded the 2004 Leonardo Award for Excellence (Leonardo, 2004). In his winning article he presented “Existential Technology” as a new category of in(ter)ventions and as a new theoretical framework for understanding privacy and identity (Mann, 2003). At the time, Mann had written more than 200 research publications already, and was the keynote speaker at numerous industry symposia and conferences. His work had also been shown in museums globally, including the Museum of Modern Art in New York, the Stedelijk Museum in Amsterdam and the Triennale di Milano (Quillian, 2004).

I embarked on my PhD in 1997, the same year in which Steve graduated with a PhD in Media Arts and Sciences from MIT under the supervision of Professor Rosalind Picard and MIT Media Lab creator and director Professor Nicholas Negroponte. I remembered being amazed by the research Steve was engaged in, particularly his insights into wearable computing, and thinking all at once what incredible uses the technologies he was developing could have but also what they might mean in terms of the social implications. At that time I was working for Nortel Networks as a network planner and strategically positioning big pipes throughout the world in anticipation of the big data that was coming through IP-based applications. Few, however, could possibly have imagined that people would be willingly creating lifelogs (or cyborg logs) through the act of glogging (PCMag, 2012), another Mann discovery, and uploading them in real-time through wireless technology, every minute of every hour of every day (Mann, 1995). 4G will make glogging even easier. Presently, there are over 165,000 gloggers at http://glogger.mobi.

23.10.2 Corresponding with Professor Mann about Sousveillance in the Educational Context

At the beginning of 2009, my close collaborator Dr MG Michael and I decided to explore the idea of glogging, inspired by correspondence with Steve on his notion of existential education (ExistEd), Figure 23.1, first officially demonstrated in 1998 (Mann, 1998). We asked our class of 163 undergraduate and postgraduate students in a compulsory computer ethics course to take part in some personal field work through the use of glogger.mobi. Examples from this class can be found in Table 1. We wanted to see sousveillance acted out before us, what its limits were, if any, and we wanted to attempt it without having sought prior Human Research Ethics Committee approval.

Figure 23.1 A-B-C: Professor Steve Mann’s Existential Learning = “Learn by being [a photoborg]”
Storyboard Title

Creator

Date Uploaded

Computer Ethics Sock Puppet Theatre

kshuntley

20 April 2009

Nanny Cams

watguy

20 April 2009

In the 'hood: Identity theft from your home

randomisations

20 April 2009

Photography and privacy

Jiang

20 April 2009

Cameras and Privacy

ls013

23 April 2009

Invasion of Location Privacy

akarin

23 April 2009

Nanotech Future

Jeesper

23 April 2009

Mobile phone privacy

ml733

19 April 2009

Identity Fraud

Hooka69

20 April 2009

RFID Issues

tlc91

20 April 2009

DNA

seven3one

20 April 2009

Health Insurance

cjal073

20 April 2009

Bluetooth - The phone is mightier than the handgun

rt902

4 May 2009

Australian Government 'Cleanfeed' Internet Filtering Scheme

ha766

24 April 2009

Life inside a camera

skt999

20 April 2009

2 guys one camera

ads32

19 April 2009

Table 23.1: Storyboards Created by University of Wollongong Students during the Course IT and Citizen Rights, Session 1, 2009
 

It was interesting to observe that in our class of 163 there were:

  • a handful of students who claimed their parents would not allow them to upload their own image, or images of others online;
  • about fifteen students who refused to take any photographs themselves using any camera device and instead downloaded images from the public domain (many of them copyrighted);
  • a handful of students who did not wish to participate in a public glog without any privacy controls but who would have otherwise considered participation;
  • dozens of students who thought it was inappropriate to film others without asking their permission in a public setting even if they were in the point of view or fellow participants in events they were engaged in;
  • about a dozen students who thought it would be better to use cartoon characters or puppets instead of humans in their storyboards;
  • a handful of students who did not wish to disclose their identity and so wore a hood or hat or high collar;
  • about a dozen students (mostly internationals) who removed their storyboards the same day assessment results were returned to them; and
  • a handful of students who possibly went too far and filmed or photographed sensitive data such as Automatic Teller Machines (ATMs) at point blank, or other very personal activities they were engaged in.

We cannot claim that in all cases our students were ‘learning by being’ (a step beyond ‘learning by doing’), but some did become true photoborgs, whilst others took on the persona of a photoborg, even if it was for a few short weeks. It takes nerve for someone to actually wear a camera, not just carry it, to admit to it recording when questioned, and to cope with the responses that that kind of activity might provoke in a setting like a regional centre in Australia. But as Steve plainly emphasizes, “[w]hat really matters, much more than whether the technology is implanted, worn, carried, or non-existent, is the degree to which the educational paradigm embodies an epistemology of personal choice, and the metaphysics of personal freedom, growth, and development” (Mann, 2006). Furthermore, Mann writes about deconstructionist learning: “As a “cyborg” in the sense of long-term adaptation, body-borne technologies, etc., one encounters a new kind of existential self-determination and mastery over one's own destiny, that can be learned, in the postmodern (posthumanism) context one might think of as the “cyborg age” in which many of us now live.”

Increasingly, photoborgs are now everywhere, and as they increase in numbers over the next decade, comfort levels of photoborg presence will also likely increase as it becomes commonplace. However, there are still laws for instance, that are in direct conflict with photoborgology. See, for example, the Surveillance Devices Act in the state of Western Australia, in Australia (WA, 1998):

SURVEILLANCE DEVICES ACT 1998 - SECT 6

  • 6. Regulation of use, installation and maintenance of optical surveillance devices
    • (1) Subject to subsections (2) and (3), a person shall not install, use, or maintain, or cause to be installed, used, or maintained, an optical surveillance device
      • (a) to record visually or observe a private activity to which that person is not a party; or           
      • (b) to record visually a private activity to which that person is a party.
    • Penalty:
      • (a) for an individual: $5 000 or imprisonment for 12 months, or both;
      • (b) for a body corporate: $50 000.

As Roger Clarke (2012b) has pointed out, this act: “seems to mean that, although you can audio-record your own conversations with other people, you can't video-record them... That has serious implications for sousveillance, i.e. the use of surveillance by the less powerful, when dealing with the more powerful”.

It was in preparation for our class that we discussed the ultimate trajectory of wearables and implantables with Steve, finding his work on the existentiality axis (Figure 23.2) to be critical (Mann, 2001; Mann, 1998). It just so happened at the time we were corresponding, that Steve was working on a project with the Eyeborg Man, Rob Spence (Spence, 2008) and we were in full preparation to host the International Symposium on Technology and Society (ISTAS10) at the University of Wollongong which had as one of its major themes microchip implants for humans (UOW, 2010; Michael, 2011). Researcher Mark Gasson and Mr Amal Graafstra, both bearers of chip implants spoke on their experience of being radio-frequency identification (RFID) implantees at the symposium.

Wearability/Portability versus Existentiality
Figure 23.2: Wearability/Portability versus Existentiality

It was during this time that the interface between sousveillance and überveillance began to emerge. On the one hand, you had camera technologies that people wore to conduct surveillance “from below”, and on the other we had proposed in 2006 that embedded systems, such as implantables, would one day do the surveilling “from within”. It was in the Eyeborg’s ‘implantable’ camera that sousveillance came face-to-face with überveillance (Michael and Michael, 2009). In Figure 23.3, the various veillances are depicted in a triquetra by Mr Alexander Hayes.

The überveillance Triquetra by Mr Alexander Hayes
Figure 23.3: The überveillance Triquetra by Mr Alexander Hayes

23.10.3 Sousveillance Outside the Context of Existential Education

Taken away from the context of learning and reflection, a wearable (or implantable) camera worn by any citizen carries with it significant and deep personal and societal implications. The photoborg may feel entirely free, a master of his/her own destiny; they may even feel safe that their point of view is being noted for re-use, if needed at a later time. Indeed, the power the photoborg presumes when they put on the camera or bear the implant, can be considered even more powerful than the traditional CCTV overhead gazing in an unrestricted manner. But no matter how one looks at it, others will inevitably be in the field of view of the wearer or bearer of technology, and unless these fellow citizens also become photoborgs themselves, there will always be inequality. Professor Mann’s sousveillance carries with it huge political, educational, environmental and spiritual overtones. The narrative which informs sousveillance is more relevant today due to the proliferation of new media, than ever before. But wherein sousveillance grants the citizen the ability to combat the powerful using their own strategic game, it also grants other citizens the ability to put on the guise of the powerful. Sousveillance is here in the eye of the beholder, the one wearing the camera. In the end it comes down to lifeworld and context and stakeholder types. What we all agree on however, is the pervasiveness of the camera, that sees everything, hears everything but comes endowed with obvious limitations such as the potential for the impairment of data, through data loss, data manipulation, or misrepresentation.

MG and Steve had similar conceptions of where the surveillance capability of the powerful is going, expressed so eloquently during the Singularity Summit in San Francisco where Steve described his Ladder Theory (Mann, 2010). MG Michael likewise referred to the idea of the “axis of access” in 2010, which Steve noted would be more correct if written “axes of access”. It was unsurprising to us, in conducting research for this article on Steve’s wearable computing history, that we stumbled across the following Wired article written in 2003 by Shachtman:

The Pentagon is about to embark on a stunningly ambitious research project designed to gather every conceivable bit of information about a person's life, index all the information and make it searchable... The embryonic LifeLog program would dump everything an individual does into a giant database: every e-mail sent or received, every picture taken, every Web page surfed, every phone call made, every TV show watched, every magazine read... All of this -- and more -- would combine with information gleaned from a variety of sources: a GPS transmitter to keep tabs on where that person went, audio-visual sensors to capture what he or she sees or says, and biomedical monitors to keep track of the individual's health... This gigantic amalgamation of personal information could then be used to "trace the 'threads' of an individual's life.
 

It simply goes to show how any discovery can be tailored toward any ends. Glogging was meant to sustain the power of the individual, to enable growth, maturity and development in the person. Here, it has been hi-jacked by the very same stakeholder it was created to gain protection from. Many would ask are we playing into the hands of such initiatives as DARPA’s Lifelog program by researching sousveillance and überveillance. The answer to this is not difficult- the natural trajectory of these emerging technologies would have propelled us there regardless. Arthur (2009, p. 15) speaks of an evolution of technology which is “the process by which all objects of some class are related by ties of common descent from the collection of earlier objects.” If it were not Steve Mann, then someone else would have at some given point in time discovered the true capabilities of sousveillance -- better for it to have been Mann who embraces genuine discussion on issues related to privacy, identity, and human rights.

23.10.4 International Workshop in Recognition of Steve Mann's Sousveillance Research

Mid-way through 2011, MG and I decided we would host an international workshop on Sousveillance and Point of View (POV) Technologies in Law Enforcement as our sixth workshop in the Social Implications of National Security series (Michael and Michael, 2012b) which started as an initiative under the Australian Research Council’s (ARC) Research Network for a Secure Australia (RNSA). The workshop was hosted on the 22 February 2012, exactly 17 years after Mann uploaded his wearable webcam images of MIT’s east campus fire as a “roving reporter.” But rather than just focusing on sousveillance, the workshop also emphasised the rise of crowd-sourced sousveillance, citizen rights, body-worn technologies and just-in-time policing. The workshop investigated the use of sousveillance by law enforcement for evidence-based gathering as well as its use against law enforcement by everyday citizens. The ways in which we have witnessed the proliferation of overt and covert surveillance technologies has set the stage for the re-evaluation of existing laws and practices.

The International Workshop on Sousveillance and Point of View (POV) Technologies in Law Enforcement was held exactly 17 years after Mann uploaded his wearable webcam images of MIT’s east cam
Figure 23.4: The International Workshop on Sousveillance and Point of View (POV) Technologies in Law Enforcement was held exactly 17 years after Mann uploaded his wearable webcam images of MIT’s east campus fire as a “roving reporter.”

Over 50 delegates attended (Figure 23.5) including former Privacy Commissioners of Australia, prosecutors and barristers of the high court, members of the Queensland and Victorian police, private investigators, spy equipment vendors (Figure 23.6), National Information and Communications Technologies Australia (NICTA) representatives, educational technologists (Figure 23.7), the Commissioner for Law Enforcement Data Security, members of the Australian Privacy Foundation, artists (Figure 23.8) and academics from across the country. A highlight of the workshop was the attendance of well-known Canadian sociologists Professors Kevin Haggerty and David Lyon, who gave a keynote address and invited paper (Figure 23.6). Professor Haggerty spoke on the ‘Monitoring of Police by Police’ and Professor Lyon on the concept of the ‘Omniscient Gaze’ (Bradwell, 2012) (Figure 23.9).

Delegates at the International Workshop on Sousveillance in Australia
Figure 23.5: Delegates at the International Workshop on Sousveillance in Australia
DUSS Pty Ltd. Demonstrating the eWitness Wearable Camera
Figure 23.6: DUSS Pty Ltd. Demonstrating the eWitness Wearable Camera
Mr Alexander Hayes speaking about Professor Steve Mann and sousveillance during his presentation on POV and Education
Figure 23.7: Mr Alexander Hayes speaking about Professor Steve Mann and sousveillance during his presentation on POV and Education
Mr Tim Burns. Western Australian Artist speaking at the Workshop
Figure 23.8: Mr Tim Burns. Western Australian Artist speaking at the Workshop
Professor Kevin Haggerty (keynote), Professor David Lyon (invited speaker), and Mr Mark Lyell (plenary speaker) at the International Workshop on Sousveillance
Figure 23.9: Professor Kevin Haggerty (keynote), Professor David Lyon (invited speaker), and Mr Mark Lyell (plenary speaker) at the International Workshop on Sousveillance

In addressing the audience with opening remarks on the workshop’s conception, I began with defining sousveillance and then went on to demonstrate its use. I could think of no better example of sousveillance-at-work than to show a short five minute clip taken by Mann himself in Downtown Toronto (Figure 23.10). In this clip you will note that Steve is exercising his civil rights and pointing out to the police officer on duty that there is a risk of someone getting electrocuted because cables are exposed to pedestrians on the sidewalk. The officer on duty rejects being a subject of Mann’s visual recording. He stops Steve as he is nearing him and exclaims: “Sir, you cannot take a picture!” To this Steve questions: “Oh. Why not?” Again, the officer exhorts Steve to stop recording. To this Steve replies- “Ok, I photograph my whole life, I always have...” To this the officer says: “I don’t want to be a part of your life through a photograph. Can you erase that photo please?” Steve does not have a chance to reply at this point and again the officer interjects growing in impatience: “Did you take a picture of me?” Steve replies: “I record my life.” Again the officer extorts: “Did you take a picture of me?” To this Steve makes a correction: “I’m recording video.” The officer interjects several times: “It’s a simple question, did you take a picture of me? Answer the question, yes or no.” Steve admits to taking footage and the officer replies: “Okay, I need you to erase that.” Steve provocatively then says: “Okay, I’ll need to call my lawyer then...” The officer is disgruntled at this point and tells Steve to call his lawyer and to give him his number. The officer continues by insisting: “Do you understand the ramifications of what is going to happen here? Don’t you realise what can happen here?” Steve tells the officer to fill out an incident report about what happened.

Code violation and physical assault. Full video at http://wearcam.org/password-66-450.htm
Figure 23.10: Code violation and physical assault. Full video at http://wearcam.org/password-66-450.htm

A struggle over the camera occurs for a good thirty seconds with Steve refusing to let go of it... Steve reassures the officer that he is just recording his whole life. To this the officer replies: “I don’t care about your entire life.” At this point Steve wishes to seek assistance from another officer but he does not wish to do so by leaving his camera behind. Some thirty seconds later after trying to reason with Steve the officer says: “You don’t get it do you... you just don’t get it... What you have on this thing here is me, do you understand that?... Doing this job, I don’t want other people to know what I look like and what I do. Now, I don’t know where these pictures are going. They can get on the Internet, they can get somewhere like that and someone can recognise me. And I’ve got a family, and so then my family is in jeopardy. That’s what I’m telling you.” At this point of the exchange, Steve points to the film set camera to try to explain why he is recording. The officer again retorts: “I don’t care about that camera, I care about this thing pointed at my face.” Steve continues to try to convince the officer about the danger of the film set wiring and that he needs the recording for evidence. He suggests going to the police station with the officer but still this does not appease the officer who by this stage is bewildered: “You just don’t get it do you, you don’t, because if you did there wouldn’t be a problem.” To this Steve replies, “I get it... I’ve been recording my life for 20 years.” Again, the officer is adamant: “I’m not a part of your life.” Steve replies, “Well everything that I pass is a part of my life.” The struggle continues and Steve is asked if he has been in trouble with the police before and whether or not he is on any medication. There is no resolution. Steve is hurt in the incident. One week prior to this he had been electrocuted by an above-ground cable exposure in a similar context while a crew was filming at as nearby locale.

This is not the first time that Mann has been the subject of investigation. On a return flight from the United States to Canada, Mann was required by security guards to turn his machine on and off and put it through the X-ray machine while they tugged on his wires and electrodes. The New York Times reported: “the guards took him to a private room for a strip-search in which, he said, the electrodes were torn from his skin, causing bleeding, and several pieces of equipment were strewn about the room” (Guernsey, 2002). Mann was quoted as saying: “We have to make sure we don't go into a police state where travel becomes impossible for certain individuals.” At the time, Mann described suffering as a result from the sudden detachment of technology he had worn for decades.

This encounter, and others like it, cut to the core of the implications of sousveillance but also about its everyday role. When we asked Steve what we would do if participants in our glogger assessment were questioned about why they were recording others without their permission, Steve pointed us to his Request for Deletion (RFD) page (Mann, 2009). This is admittedly only a part of the solution. In the future off-the-shelf products might exist to blank out the images of people and car number plates in everyday films, just like in the realm of Google StreetView but for now this is a real issue, as seen in the encounter with the Toronto police officer. No matter how one looks at it however, the increasing use of in-car video recording cameras by law enforcement, business and civilian vehicles, helmet mounted cameras used by motorbike riders, cyclists and extreme sportsmen, roads and traffic authority cameras, embedded cameras in apparatus (e.g. cricket stumps, tazer guns) and the like, mean that through the adoption of sousveillance techniques, the average citizen can reclaim at least some of that asymmetry they have lost. Steve’s RFD approach acknowledges however, that an opt-out approach is much more realistic than an opt-in approach. Expecting everyone in my field of view (FOW) to sign a consent form allowing me to film them because I decide to walk the streets wearing a camera is just impossible. But deleting an image or film based on an individual request can be satisfied although it may not always be practical.

We are certain that as social media platforms like glogger proliferate, many will ask:

  • To be let alone;
  • In what context the footage being taken will be used;
  • How the footage taken will be validated and stored; and
  • To whom the footage will belong.

These questions are particularly pertinent in the insurance industry as in-car video recording is now widely commercialised (Figure 23.11). Wearables that record like Helmet Cams are becoming plentiful, widely used in the military, extreme sports, the mining sector, and film industry. And we now even have Taser cams, perhaps predated by the stump cam in the game of cricket over a decade ago. Some of these devices, e.g. audio listening spy glasses, are even marketed to minors through school book clubs (Figure 23.12). This raises some interesting questions about how devices used for sousveillance might be misused contra to law in a given jurisdiction. Offences may in fact be committed based on the current law but the law is not yet being enforced to curb activities related to sousveillance. On the other hand, point of view technologies more broadly may even be misused in a stalking capacity or other voyeuristic manner. See for instance, online games marketed to minors that require a webcam to be switched on for play (Figure 23.13). There are also purported borderline cases where a camera is worn by an individual who decides to take footage in a store owned by another person. While it is not a private setting per se, the store owner may not wish for his/her goods and services to be filmed. What are the rights of individuals in public spaces when it comes to private activities? How do we go about a framework for the analysis of any type of surveillance (Clarke, 2012a)?

Autovision Mobile Media Van in New South Wales, specialising in in-car vehicle tracking, navigation and recording solutions
Figure 23.11: Autovision Mobile Media Van in New South Wales, specialising in in-car vehicle tracking, navigation and recording solutions
..E_USER_ERROR [2] getimagesize(/usr/www/users/mads/www.interaction-design.org/images/encyclopedia/wearable_computing/mfig12_Spy glasses_for_minors.jpg) [function.getimagesize]: failed to open stream: No such file or directory (in line 3670 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utility_functions_publishing.php)
Backtrace:
Function getCallStack called on line 104 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utilty_functions_debugging_and_errorhandling.php
Function getimagesize called on line 3670 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utility_functions_publishing.php
Function createThumbnailForAuthorOrIllustration called on line 481 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/image.php
Function createThumbnails in class image
Function invokeArgs in class ReflectionMethod called on line 11 of file /usr/www/users/mads/www.interaction-design.org/source/php/super_controller.php
Function __call in class super_controller
Function createThumbnails in class image_controller called on line 47 of file /usr/www/users/mads/www.interaction-design.org/source/php/view/image_view.php
Function displayIllustration in class image_view called on line 475 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/image.php
Function displayIllustration in class image called on line 647 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/illustration.php
Function displayIllustration in class illustration called on line 2748 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utility_functions_publishing.php
Function displayIllustration called on line 550 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/illustration.php
Function displayIllustration in class illustration called on line 2748 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utility_functions_publishing.php
Function displayIllustration called on line 2 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/publication.php(712) : eval()'d code
Function eval called on line 712 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/publication.php
Function evalHTML in class publication called on line 87 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/commentary.php
Function getCommentaryFormatted in class commentary called on line 151 of file /usr/www/users/mads/www.interaction-design.org/migrate_to_idf2.html
Function migrateBodyColumn called on line 32 of file /usr/www/users/mads/www.interaction-design.org/migrate_to_idf2.html
..E_USER_ERROR [2] getimagesize(/usr/www/users/mads/www.interaction-design.org/images/encyclopedia/wearable_computing/mfig12_Spy glasses_for_minors.jpg) [function.getimagesize]: failed to open stream: No such file or directory (in line 3670 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utility_functions_publishing.php)
Backtrace:
Function getCallStack called on line 104 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utilty_functions_debugging_and_errorhandling.php
Function getimagesize called on line 3670 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utility_functions_publishing.php
Function createThumbnailForAuthorOrIllustration called on line 483 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/image.php
Function createThumbnails in class image
Function invokeArgs in class ReflectionMethod called on line 11 of file /usr/www/users/mads/www.interaction-design.org/source/php/super_controller.php
Function __call in class super_controller
Function createThumbnails in class image_controller called on line 47 of file /usr/www/users/mads/www.interaction-design.org/source/php/view/image_view.php
Function displayIllustration in class image_view called on line 475 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/image.php
Function displayIllustration in class image called on line 647 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/illustration.php
Function displayIllustration in class illustration called on line 2748 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utility_functions_publishing.php
Function displayIllustration called on line 550 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/illustration.php
Function displayIllustration in class illustration called on line 2748 of file /usr/www/users/mads/www.interaction-design.org/source/php/utility_functions/utility_functions_publishing.php
Function displayIllustration called on line 2 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/publication.php(712) : eval()'d code
Function eval called on line 712 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/publication.php
Function evalHTML in class publication called on line 87 of file /usr/www/users/mads/www.interaction-design.org/source/php/model/commentary.php
Function getCommentaryFormatted in class commentary called on line 151 of file /usr/www/users/mads/www.interaction-design.org/migrate_to_idf2.html
Function migrateBodyColumn called on line 32 of file /usr/www/users/mads/www.interaction-design.org/migrate_to_idf2.html
Image not found
Figure 23.12: Image not found
“Angelina Balerina” online dancing game that requires the use of a webcam
Figure 23.13: “Angelina Balerina” online dancing game that requires the use of a webcam

23.10.5 Sousveillance and Point of View Technologies in Law Enforcement

The reality is that those supplying point of view (POV) equipment, some specialising in spy equipment, have undergone a massive uptake in demand. This surge is witnessed by the number of organisations that are now dealing in this kind of covert and overt new media and franchising of some of these companies. The statistics indicate that many citizens are now taking matters into their own hands and most probably at the expense of existing legislation to do with Surveillance Devices and Listening Devices Acts. In addition, members of the police force are acquiring their own technology for safety related reasons and incidence/complaint handling in an attempt to reduce the on the job stress they undergo on a daily basis.

In Australia, there were accounts of police officers some 7 years ago, purchasing video camera units and using Velcro to place these cameras in police wagons that had not come equipped with high tech gadgetry to film roadside incidences. But today we are talking about new camera kits that are just not used for in-car recording but for body-worn recording by the police. Police today may wear helmet cams, ear cams, chest cams with audio capability, GPS locators, taser cams etc.

But how much evidence gathering is too much? In the last 12 months we have seen several riots take place -- e.g. the Vancouver Riots and the London Riots. For the first time crowdsourced surveillance played second fiddle to crowdsourced sousveillance. The police called for footage to be submitted for use in convicting rioters for crimes committed. So many thousands of minutes were presented to the police -- above and beyond footage they had taken. One could consider cross-correlation of sorts taking place.

It is predicted however that with time, crowdsourced surveillance will overwhelm the limited resources employed by the police to look at such video evidence -- in many cases potentially thousands of hours worth. Professor Andrew Goldsmith of the Centre for Transnational Crime Prevention at the University of Wollongong, has written about this new visibility with respect to the Tomlinson case. It is the commentators’ opinion, as recently recorded in a special guest edited issue of the Journal of Location Based Services (Michael and Michael, 2011), that the police will be moving away from intelligent led policing and toward an IT led policing in near real-time, if not real-time. It will be the ability by the police to say that if you are currently in a zone of public disturbance, or riot, that access to real-time engineering information will be used to denote your location. Additional smartphone modalities will then be harnessed to ascertain whether or not you are a potential perpetrator- for instance accelerometer information that can denote whether you are going up or down stairs or jolting around smashing windows. To borrow from Roger Clarke, this is a form of dataveillance “on the move” (Clarke, 2009).

No doubt this kind of scenario will mean that momentarily people will decide to live off the grid- leave their mobiles behind- or use mobiles on secure and secret platforms like the Blackberry device. But it is exactly this type of scenario that may herald in the age of überveillance- a tiny onboard implant that is injected into the translucent layer of the skin, and records everything as it sees it... implants cannot be left behind... implants are always with you... and implants allegedly do not allow for tampering... the iplant as we have termed it, is that ‘shock and awe’ instrument we have been waiting for to be commercialised in all its spectre. It will supposedly be the answer to all of our electronic health record problems, our social security and tax file numbers, our real-name Internet identity, and secure mobile payments (Michael and Michael, 2012a).

The pitfalls with POV, no matter how many cameras are recording, and no matter from how many perspectives and stakeholders, is that visual evidence has limitations. What is a whole incident? How can we denote past provocation or historical data not available during a given scene? How can we ensure that data on mobile transmission has not been intercepted? How can we ensure data validation? We might well be on another road similar to that of DNA as admissible evidence in a court of law in terms of “eyewitness” recording of events. The key question to ask here is whether or not we can ever achieve “omniscience” through the use of seemingly “omnipresent” new media?

23.10.6 References