Technologies, Security, and Privacy in the Post-9/11 European Information Society
Zotero / D&S Group / Top-Level Items 2015-08-19
Type
Journal Article
Author
Michael Levi
Author
David S. Wall
URL
http://onlinelibrary.wiley.com/doi/10.1111/j.1467-6478.2004.00287.x/abstract
Volume
31
Issue
2
Pages
194-220
Publication
Journal of Law and Society
ISSN
1467-6478
Date
June 1, 2004
DOI
10.1111/j.1467-6478.2004.00287.x
Accessed
2015-08-19 18:32:03
Library Catalog
Wiley Online Library
Language
en
Abstract
Since 11 September 2001, many ‘hard’ and ‘soft’ security strategies have been introduced to enable more intensive surveillance and control of the movement of `suspect populations'. Suicide bombings have since generated a step-change in asymmetric threat analysis and public perceptions of risk. This article reviews how post-9/11 ‘security’ issues intersect with existing and emerging technologies, particularly those relating to identity, location, home, and work that will form the backbone of the European Information Society. The article explores the complexities generated by the way that these technologies work, sites of nationalist resistance, and formal bureaucratic roles. Many of the planned surveillance methods and technologies are convergence technologies aiming to bring together new and existing data sources, but are unable to do so because of poor data quality and the difficulty of using the integrated data to reduce serious crime risks. The delay may enable legal compliance models to be developed in order to protect the principles of privacy that are set out in the ECHR and the EC Data Protection Directive. Though (moral) panics produce changes in law, the article emphasizes the constraining effects of law.