28.12.2013 Views

Theories of the Information Society, Third Edition - Cryptome

Theories of the Information Society, Third Edition - Cryptome

Theories of the Information Society, Third Edition - Cryptome

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

INFORMATION, REFLEXIVITY AND SURVEILLANCE<br />

to ensure security from <strong>the</strong> enemy. Thus is constructed an anonymous and unexaminable,<br />

national and worldwide web <strong>of</strong> surveillance and transmission <strong>of</strong> messages<br />

between defence agencies (Burrows, 1986). The security services assume<br />

<strong>the</strong>mselves to be continually under attack from enemies and malcontents.<br />

Constantly wary, <strong>the</strong>y come easily to be pervaded by suspicion and fear <strong>of</strong> disclosure,<br />

characteristics which reinforce <strong>the</strong>ir impenetrability and distance <strong>the</strong>m<br />

fur<strong>the</strong>r from public accountability (Knightley, 1986).<br />

The surveillance machine is not only directed against external enemies.<br />

Given <strong>the</strong> nation state’s susceptibility to internal assault (imagine <strong>the</strong> ease<br />

with which a nation might fall if, say, power stations were occupied by fifth<br />

columnists), <strong>the</strong>re is a powerful impulse towards searching out ‘subversives’<br />

(Campbell and Connor, 1986, p. 274). In <strong>the</strong> UK, leaks and occasional exposés<br />

have revealed that surveillance can be exercised on trade unionists, Labour MPs,<br />

CND (Campaign for Nuclear Disarmament) activists, educationalists and media<br />

personnel, environmental campaigners, animal rights activists, as well as on those<br />

who might be thought to be more obvious candidates (Leigh, 1980; Massiter,<br />

1985; Hollingsworth and Norton-Taylor, 1988). MI5 works in association with <strong>the</strong><br />

Special Branch <strong>of</strong> <strong>the</strong> police force, <strong>the</strong>reby extending its information-ga<strong>the</strong>ring<br />

network nationwide. The security services also have access on request to an array<br />

<strong>of</strong> databanks, including <strong>the</strong> Police National Computer, Inland Revenue records,<br />

British Telecom files, and data held by <strong>the</strong> Department <strong>of</strong> Health.<br />

Terrorist assaults on democracies, from New York and Washington in<br />

September 2001, to Bali and Madrid shortly afterwards, to London in July 2005,<br />

have accelerated and legitimated this search for ‘enemies within’ (Ball and<br />

Webster, 2003). They contribute an important rationale for <strong>the</strong> introduction <strong>of</strong><br />

identity cards in <strong>the</strong> United Kingdom that will feature <strong>the</strong> latest computer technologies<br />

and incorporate biometric data that will make individuals more easily<br />

identified and tracked when necessary.<br />

In sum, what we witness is a powerful force impelling <strong>the</strong> growth <strong>of</strong> surveillance<br />

systems that emanates from <strong>the</strong> nation state’s duty to safeguard its<br />

frontiers. In a world divided by national frontiers <strong>the</strong>re is, unavoidably, a built-in<br />

pressure towards <strong>the</strong> construction <strong>of</strong> effective defence machines. And, because<br />

nations are <strong>of</strong>ten in situations <strong>of</strong> at least potential conflict, what ‘effective’ means<br />

is always subject to change. However, what remains constant is <strong>the</strong> impulse to<br />

garner, adapt and act upon <strong>the</strong> best-possible information about real and putative<br />

enemies within and without. This impels <strong>the</strong> spread <strong>of</strong> what David Lyon (2001)<br />

terms a major form <strong>of</strong> surveillance, categorical suspicion, whereby threats to order,<br />

real and potential, are placed under scrutiny.<br />

Human rights regimes<br />

The development <strong>of</strong> information war, and <strong>the</strong> centrality to it <strong>of</strong> ‘perception<br />

management’, has paradoxical effects. On <strong>the</strong> one hand, it has led to more sophisticated<br />

techniques <strong>of</strong> propaganda. On <strong>the</strong> o<strong>the</strong>r hand, however, this is strikingly<br />

difficult to achieve satisfactorily because media and means <strong>of</strong> communication<br />

218

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!