Theories of the Information Society, Third Edition - Cryptome
Theories of the Information Society, Third Edition - Cryptome
Theories of the Information Society, Third Edition - Cryptome
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
INFORMATION, REFLEXIVITY AND SURVEILLANCE<br />
to ensure security from <strong>the</strong> enemy. Thus is constructed an anonymous and unexaminable,<br />
national and worldwide web <strong>of</strong> surveillance and transmission <strong>of</strong> messages<br />
between defence agencies (Burrows, 1986). The security services assume<br />
<strong>the</strong>mselves to be continually under attack from enemies and malcontents.<br />
Constantly wary, <strong>the</strong>y come easily to be pervaded by suspicion and fear <strong>of</strong> disclosure,<br />
characteristics which reinforce <strong>the</strong>ir impenetrability and distance <strong>the</strong>m<br />
fur<strong>the</strong>r from public accountability (Knightley, 1986).<br />
The surveillance machine is not only directed against external enemies.<br />
Given <strong>the</strong> nation state’s susceptibility to internal assault (imagine <strong>the</strong> ease<br />
with which a nation might fall if, say, power stations were occupied by fifth<br />
columnists), <strong>the</strong>re is a powerful impulse towards searching out ‘subversives’<br />
(Campbell and Connor, 1986, p. 274). In <strong>the</strong> UK, leaks and occasional exposés<br />
have revealed that surveillance can be exercised on trade unionists, Labour MPs,<br />
CND (Campaign for Nuclear Disarmament) activists, educationalists and media<br />
personnel, environmental campaigners, animal rights activists, as well as on those<br />
who might be thought to be more obvious candidates (Leigh, 1980; Massiter,<br />
1985; Hollingsworth and Norton-Taylor, 1988). MI5 works in association with <strong>the</strong><br />
Special Branch <strong>of</strong> <strong>the</strong> police force, <strong>the</strong>reby extending its information-ga<strong>the</strong>ring<br />
network nationwide. The security services also have access on request to an array<br />
<strong>of</strong> databanks, including <strong>the</strong> Police National Computer, Inland Revenue records,<br />
British Telecom files, and data held by <strong>the</strong> Department <strong>of</strong> Health.<br />
Terrorist assaults on democracies, from New York and Washington in<br />
September 2001, to Bali and Madrid shortly afterwards, to London in July 2005,<br />
have accelerated and legitimated this search for ‘enemies within’ (Ball and<br />
Webster, 2003). They contribute an important rationale for <strong>the</strong> introduction <strong>of</strong><br />
identity cards in <strong>the</strong> United Kingdom that will feature <strong>the</strong> latest computer technologies<br />
and incorporate biometric data that will make individuals more easily<br />
identified and tracked when necessary.<br />
In sum, what we witness is a powerful force impelling <strong>the</strong> growth <strong>of</strong> surveillance<br />
systems that emanates from <strong>the</strong> nation state’s duty to safeguard its<br />
frontiers. In a world divided by national frontiers <strong>the</strong>re is, unavoidably, a built-in<br />
pressure towards <strong>the</strong> construction <strong>of</strong> effective defence machines. And, because<br />
nations are <strong>of</strong>ten in situations <strong>of</strong> at least potential conflict, what ‘effective’ means<br />
is always subject to change. However, what remains constant is <strong>the</strong> impulse to<br />
garner, adapt and act upon <strong>the</strong> best-possible information about real and putative<br />
enemies within and without. This impels <strong>the</strong> spread <strong>of</strong> what David Lyon (2001)<br />
terms a major form <strong>of</strong> surveillance, categorical suspicion, whereby threats to order,<br />
real and potential, are placed under scrutiny.<br />
Human rights regimes<br />
The development <strong>of</strong> information war, and <strong>the</strong> centrality to it <strong>of</strong> ‘perception<br />
management’, has paradoxical effects. On <strong>the</strong> one hand, it has led to more sophisticated<br />
techniques <strong>of</strong> propaganda. On <strong>the</strong> o<strong>the</strong>r hand, however, this is strikingly<br />
difficult to achieve satisfactorily because media and means <strong>of</strong> communication<br />
218