Technologies, Security, and Privacy in the Post-9/11 European Information Society

Zotero / D&S Group / Top-Level Items 2015-08-19

Type Journal Article Author Michael Levi Author David S. Wall URL http://onlinelibrary.wiley.com/doi/10.1111/j.1467-6478.2004.00287.x/abstract Volume 31 Issue 2 Pages 194-220 Publication Journal of Law and Society ISSN 1467-6478 Date June 1, 2004 DOI 10.1111/j.1467-6478.2004.00287.x Accessed 2015-08-19 17:33:21 Library Catalog Wiley Online Library Language en Abstract Since 11 September 2001, many ‘hard’ and ‘soft’ security strategies have been introduced to enable more intensive surveillance and control of the movement of `suspect populations'. Suicide bombings have since generated a step-change in asymmetric threat analysis and public perceptions of risk. This article reviews how post-9/11 ‘security’ issues intersect with existing and emerging technologies, particularly those relating to identity, location, home, and work that will form the backbone of the European Information Society. The article explores the complexities generated by the way that these technologies work, sites of nationalist resistance, and formal bureaucratic roles. Many of the planned surveillance methods and technologies are convergence technologies aiming to bring together new and existing data sources, but are unable to do so because of poor data quality and the difficulty of using the integrated data to reduce serious crime risks. The delay may enable legal compliance models to be developed in order to protect the principles of privacy that are set out in the ECHR and the EC Data Protection Directive. Though (moral) panics produce changes in law, the article emphasizes the constraining effects of law.