Sousveillance






A drawing by Mann's six-year-old daughter, illustrating surveillance versus sousveillance




Surveillance as compared with sousveillance


Sousveillance (/sˈvləns/ soo-VAY-lənss) is the recording of an activity by a participant in the activity, typically by way of small wearable or portable personal technologies.[14] The term "sousveillance", coined by Steve Mann,[15] stems from the contrasting French words sur, meaning "above", and sous, meaning "below", i.e. "surveillance" denotes the "eye-in-the-sky" watching from above, whereas "sousveillance" denotes bringing the camera or other means of observation down to human level, either physically (mounting cameras on people rather than on buildings), or hierarchically (ordinary people doing the watching, rather than higher authorities or architectures doing the watching).[16][22]


While surveillance and sousveillance both generally refer to visual monitoring, the terms also denote other forms of monitoring such as audio surveillance or sousveillance. In the audio sense (e.g. recording of phone conversations), sousveillance is referred to as "one party consent".[23]


Undersight (inverse oversight) is sousveillance at high-level, e.g. "citizen undersight" being reciprocal to a congressional oversight committee or the like.[24][25][26]


Inverse surveillance is a subset of sousveillance with a particular emphasis on the "watchful vigilance from underneath" and a form of surveillance inquiry or legal protection involving the recording, monitoring, study, or analysis of surveillance systems, proponents of surveillance, and possibly also recordings of authority figures and their actions. Inverse surveillance is typically an activity undertaken by those who are generally the subject of surveillance, and may thus be thought of as a form of an ethnography or ethnomethodology study (i.e. an analysis of the surveilled from the perspective of a participant in a society under surveillance).[27]


Sousveillance typically involves community-based recording from first person perspectives, without necessarily involving any specific political agenda, whereas inverse-surveillance is a form of sousveillance that is typically directed at, or used to collect data to analyze or study, surveillance or its proponents (e.g., the actions of police or protestors at a protest rally).[28][29][30]


Sousveillance is not necessarily counter-surveillance; i.e. sousveillance can be used to "counter" the forces of surveillance, or it can also be used together with surveillance to create a more complete "veillance" ("Surveillance is a half-truth without sousveillance"[31]). The question of "Who watches the watchers" is dealt with more properly under the topic of metaveillance[32] (the veillance of veillance) than sousveillance.




Contents






  • 1 Inverse surveillance


  • 2 Personal sousveillance


  • 3 Alibi sousveillance


  • 4 Police use


  • 5 Sousveillance cultures


  • 6 In art


    • 6.1 Invisibility/Aposematic Suit




  • 7 In fiction


  • 8 Sousveillance efficiency or efficacy


  • 9 See also


  • 10 References


  • 11 External links





Inverse surveillance


Inverse surveillance is a type of sousveillance. The more general concept of sousveillance goes beyond just inverse surveillance and the associated twentieth century political "us versus them" framework for citizens to photograph police, shoppers to photograph shopkeepers, or passengers to photograph taxicab drivers. Howard Rheingold commented in his book Smart Mobs that this is similar to the pedestrian−driver concept, i.e. these are roles that many of us take both sides of, from time to time. Many aspects of sousveillance were examined in the general category of "reciprocal accountability" in David Brin's 1997 non-fiction book The Transparent Society, and also in Brin's novels. The first International Workshop on Inverse Surveillance, IWIS, took place in 2004,[33] chaired by Dr. Jim Gemmell, (MyLifeBits), Joi Ito, Anastasios Venetsanopoulos, and Steve Mann, among others.


One of the things that brought inverse surveillance to light was the reactions of security guards to electric seeing aids and similar sousveillance practices. It seemed, early on, that the more cameras that were in an establishment, the more the guards disliked the use of an electric seeing aid, such as the EyeTap eyeglasses. It was through simply wearing electric seeing aids, as a passive observer, that it was discovered that surveillance and sousveillance can cause conflict and sometimes confrontation. This led some researchers to explore why the perpetuators of surveillance are suspicious of sousveillance, and thus defined the notion of inverse surveillance as a new and interesting facet of studies in sousveillance.[27]


Since the year 2001, December 24 has been World Sousveillance Day with groups of participants in New York City, Toronto, Boston, Florida, Vancouver, Japan, Spain and the United Kingdom. However, this designated day focuses only on hierarchical sousveillance, whereas there are a number of groups around the world working on combining the two forms of sousveillance.


An essay from Wired magazine predicts that sousveillance is an important development that will be on the rise in 2014.[34]


Sousveillance of a state by its citizens has been credited with addressing many problems such as election fraud or electoral misdeeds, as well as providing good governance. For example, mobile phones were used in Sierra Leone and Ghana in 2007 for checking malpractices and intimidation during elections.[35]


A recent area of research further developed at IWIS was the equilibrium between surveillance and sousveillance. Current "equiveillance theory" holds that sousveillance, to some extent, often reduces or eliminates the need for surveillance. In this sense it is possible to replace the Panoptic God's eye view of surveillance with a more community-building ubiquitous personal experience capture. Crimes, for example, might then be solved by way of collaboration among the citizenry rather than through the watching over the citizenry from above. But it is not so black-and-white as this dichotomy suggests. In particular, citizens watching over their neighbors is not necessarily "better" than the alternative: an increase in community self-reliance might be offset by an uncomfortable "nosy neighbor" effect. "Personal sousveillance" has been referred to as "coveillance" by Mann, Nolan and Wellman.


Copwatch is a network of American and Canadian volunteer organizations that "police the police." Copwatch groups usually engage in monitoring of the police, videotaping police activity, and educating the public about police misconduct. Fitwatch is a group who photograph Forward Intelligence Teams (police photographers) in the United Kingdom.[36]


In 2008, Cambridge researchers (in the MESSAGE project) have teamed with bicycle couriers to measure and transmit air pollution indicators as they travel the city.[37]


In 2012 the Danish daily newspaper and online title Dagbladet Information crowdmapped the positions of surveillance cameras by encouraging readers to use a free Android and iOS app to photograph and geolocate CCTV cameras.[38][better source needed]



Personal sousveillance





Steve Mann's Visual Filter for continuous live webcast as well as viewing (i.e. visual reality modification in realtime).




Sousveillance devices for ACM's CFP2005 conference attendees.




One of the 250 "LANYARDome" name badge neck wallets manufactured for each attendee of the IEEE ISTAS 2013 conference, http://veillance.me


Personal sousveillance is the art, science, and technology of personal experience capture, processing, storage, retrieval, and transmission, such as lifelong audiovisual recording by way of cybernetic prosthetics, such as seeing-aids, visual memory aids, and the like. Even today's personal sousveillance technologies like camera phones and weblogs tend to build a sense of community, in contrast to surveillance that some have said is corrosive to community.[39]


The legal, ethical, and policy issues surrounding personal sousveillance are largely yet to be explored, but there are close parallels to the social and legal norms surrounding recording of telephone conversations. When one or more parties to the conversation record it, it is called "sousveillance", whereas when the conversation is recorded by a person who is not a party to the conversation (such as a prison guard violating a client-lawyer relationship), the recording is called "surveillance".


"Targeted sousveillance" refers to sousveillance of a specific individual by one or more other individuals. Usually, the targeted individual is a representative or proponent of surveillance, so targeted sousveillance is often inverse surveillance or hierarchical sousveillance. "Hierarchical sousveillance" refers, for example, to citizens photographing police, shoppers photographing shopkeepers, or taxicab passengers photographing cab drivers. So, for example, targeting former White House security official Admiral John Poindexter with sousveillance follows this more political narrative.


Classy's Kitchen describes sousveillance as "another way to add further introspection to the commons that keeps society open but still makes the world smaller and safer".[40] In this way sousveillance may be regarded as a possible replacement for surveillance. In this sur/sousveillance replacement, one can consider an operative social norm that would require cameras to be attached to a human operator. Under such a scenario, any objections to the camera could be raised by another human more easily than it would be to interact with a lamp post upon which is mounted a surveillance camera. Thus, the argument is that cameras attached to people ought to be less offensive than cameras attached to inanimate objects, because there is at least one responsible party present to operate the camera. This responsible-party argument is analogous to that used for operation of a motor vehicle, where a responsible driver is present, in contrast to remote or automated operation of a motor vehicle.


Beyond the political or breaching of hierarchical structure explored in academia, the more rapidly emerging discourse on sousveillance within industry is "personal sousveillance", namely the recording of an activity by a participant in the activity.


As the technologies get smaller and easier to use, the capture, recording, and playback of everyday life gets that much easier to initiate spontaneously in unexpected situations. For example, David Ollila, a manufacturer of video camera equipment, was trapped for four hours aboard a Comair plane at JFK Airport in New York City. When he recorded an interview with the pilot about the situation, the pilot called the police who then removed Ollila for questioning and removed everyone from the plane.[41]


Recording a situation is only part of the sousveillance process. Communicating is also important. Video-sharing sites such as YouTube and photo-sharing sites such as Flickr play a vital role. For example, police agents provocateur were quickly revealed on YouTube when they infiltrated a demonstration in Montebello, Quebec, against the leaders of Canada, Mexico and the United States (August 2007). When the head of the Quebec police publicly stated that there was no police presence, a sousveillance video showed him to be wrong. When he revised his statement to say that the police provocateurs were peaceful observers, the same video showed them to be masked, wearing police boots, and in one case holding a rock.[42]


There are many similar examples, such as the widely viewed YouTube video of UCLA campus policemen tasering a student. In Russia, as well as in some other countries where road users trust neither each other nor police, onboard cameras are so ubiquitous that thousands of videos of automobile accidents and near-miss incidents have been uploaded. The unanticipated 2013 Russian meteor event was well documented from a dozen angles via the use of these devices.[43] Similarly, in February 2015, dashcams caught valuable footage of the crash of TransAsia Airways Flight GE235.[44]



Alibi sousveillance




Cameras can easily be mounted on bicycles, to record sports activities — or record acts of road rage.


Alibi sousveillance is a form of sousveillance activity aimed at generating an alibi as evidence to defend against allegations of wrongdoing.[45]


Hasan Elahi, a University of Maryland professor, has produced a sousveillance for his entire life, after being detained at an airport because he was erroneously placed on the US terrorist watchlist. Some of his sousveillance activities include using his cell phone as a tracking device, and publicly posting debit card and other transactions that document his actions.[46]


One specific use of alibi sousveillance is the growing trend of police officers wearing body cameras while on patrol. Well-publicized events involving police-citizen altercations (such as the case of Michael Brown in Ferguson, Missouri) have increased calls for police to wear body-cameras and so capture evidence of the incidents, for the benefit of them personally plus the criminal justice system as a whole.[47] By having officers use sousveillance, police forces can generate hours of video evidence to be used in cases like that of Michael Brown, and the video evidence can act as an important alibi in the judicial proceedings in regards to who is truly at fault.[47] Regardless of the outcome of such events, contemporaneous audio-video evidence can be extremely valuable in respect of compliance- and enforcement-related events.



Police use


Use of wearable cameras by police officers combined with video streaming and recording in an archive results in a record of the interactions of the officer with civilians and criminals. The small cameras are made by Axon, Looxcie, and probably other firms. Experiments with police use in Rialto, California in 2012 to 2013 resulted in a reduction of both complaints against officers and reduction in use of violence by officers. The public is shielded from police misconduct and the police officer from bogus complaints.[48]


Because these body cameras are turned on for every encounter with the public, privacy issues have been brought up with specific emphasis on special victim cases such as rape or domestic violence. Police worry that with a camera right in front of the victim, they will not feel comfortable in revealing all the information that they know.[49] There have been two case studies done in the United States that have revealed that police officers who have cameras have fewer encounters with citizens than officers who do not have cameras, due to fear of being reprimanded for committing a mistake.[47]



Sousveillance cultures


In the era of web-based participatory media and convergence cultures, non-governmental and non-state actors, with their own virtual communities and networks that cut across national borders, use what Bakir (2010)[50] calls the sousveillant assemblage to wield discursive power. The sousveillant assemblage comprises Haggerty & Ericson's (2000)[51] surveillant assemblage (or loosely linked, unstable, systems of data flows of people's activities, tracked by computers, and data-mined so that we are each reconfigured as (security) risks or (commercial) opportunities, but data-fattened by the proliferation of web-based participatory media and personal sousveillance that we willingly provide online).


Features of sousveillance cultures:


  • Dissent, and holding power-holders to account, is easier

Undoubtedly, the urge and practice of dissent has always been with us, and people exploit the participatory media technologies at hand to mark and spread their dissent.[citation needed] However, the rise of web-based participatory media and sousveillance cultures have made it easier for many more to record and spread this dissent globally, unimpeded by traditional media's commercial distribution restrictions such as pre-defined circulation runs or paid-for airtime, or the need for expert knowledge in media production. Mann has long maintained that the 'informal nature of sousveillance, with its tendency to distribute recordings widely, will often expose inappropriate use to scrutiny, whereas the secret nature of surveillance will tend to prevent misuse from coming to light' (Mann, 2005, p. 641).[52]
Just as Foucault's Panopticon operates through potential or implied surveillance, so sousveillance might also operate through the credible threat of its existence. As the ubiquity and awareness of sousveillance widens, it is this that may most empower citizens – by making officials realise that their actions may, themselves, be monitored and exposed at any time. The permanent potential for sousveillance from so many (as opposed to more formalised exposés at the hands of investigative reporters, a small media elite) raises the likelihood that power abuses will be captured on record which can then be used to hold power-abusers and manipulators to account, providing of course, that there is a functioning legal system and/or public sphere (with mechanisms in place to translate popular demands and moral outrage into real-world change).


  • Emancipation, resistance and social change are unpredictable.

In the case of police body camera implementation in the US, there are multiple responses and social implications to this form of sousveillance. The case against police brutality and the Black Lives Matter movement has garnered an immense and impassioned following in a very short amount of time. There are two different social movements that have arisen in response to police body cameras. One school of thought that has manifested support is that police body cameras are necessary in fighting and ending police brutality. The other is the opposing stance to this one that raises the issue of privacy that police body cameras may violate. There have not been many case studies that have taken place in implementing police body cameras.[53] This means that police worn body cameras have not been proven as a definite method to solve the problem of police brutality.[54] Studies have also shown that people, both policemen and civilians, act differently when they are aware that they are being surveilled on camera.[54] This leaves a lot of room for unpredictability surrounding the consequences of the use of this form of sousveillance.


In Mann's original conception, sousveillance had an emancipatory political thrust, with hierarchical sousveillance a conscious act of resistance to surveillance. Yet, the nature of the social change generated is unpredictable, and dependent on the sousveillant content, the context of its subsequent sharing, and, of course, the strength of the traditions of deliberation for democratic purposes. ISIS' use of sousveillance, then, may result in social change, but not in a progressive fashion.[citation needed]


  • Sousveillers' anonymity is crucial.

Given the lack of secrecy inherent in placing sousveillant content online, the anonymity of the sousveillers is of prime importance if hierarchical (politically or legally motivated) sousveillance is to proliferate. There is a real need for spaces online that are willing to protect users' anonymity and keep their subversive content online despite political or corporate pressure. With this sort of situation in mind, whistle-blowing web sites have been set up that guarantee anonymity, such as Wiki-leaks, launched in December 2006. More such sites are needed.


  • Agenda-building power comes from the searchable and recirculated, semi-permanent, eyewitness archive.

Social media provide what could be described as a semi-permanent, and easily accessible, database of eyewitness accounts. Given that the web can be used and searched in the manner of a database to find examples of sousveillance; and given the recirculation of sousveillant footage in memes and in mainstream media, ever-hungry for new content in a media environment of convergence and expanding capacity, the longevity of sousveillant footage is perhaps what gives sousveillance its agenda-building power. It allows journalists, citizens, activists, insurgents, strategic communicators and researchers the opportunity to discover and partially relive both the eye-witnessed, sousveillant account, and the discourse surrounding specific moments of sousveillance, as well as reflecting on, and marshalling, their significance.



In art




HeartCam, wearable interactive art to reverse the male gaze, inventor: S. Mann, July 2001.[55]


Referred to as an early proponent of lifelogging[56] and perhaps the most extreme example of self-tracking[57] since 2003, conceptual media artist Alberto Frigo has embarked on an ambitious project, 2004–2040, to understand himself.[58] Starting with tracking everything his right (dominant) hand has used, he's slowly added on different tracking and documentation projects. Keeping the focus on himself and his surrounding has helped him connect to himself and the world around him.[59]


Artist, scientist, and inventor S. Mann also created a wearable interactive art piece, the HeartCam, July 2001[60] in order to reverse the male gaze. Others, including Nestle, have built upon this concept of reversing the "male gaze" using a bra as a point-of-view for a camera.[61]



Invisibility/Aposematic Suit


@media all and (max-width:720px){.mw-parser-output .tmulti>.thumbinner{width:100%!important;max-width:none!important}.mw-parser-output .tmulti .tsingle{float:none!important;max-width:none!important;width:100%!important;text-align:center}}


Front view showing a man wearing a computerized multisensory suit with video display.

Invisibility + Aposematic Suit, front view.



Back view showing the man facing away. Here we see the backwards facing video display on the jacket.

Back view, Aug. 17, 2001.




Invisibility/Aposematic Suit, S. Mann, 2001, is a wearable art piece that has two modes of operation: it either (1) becomes "transparent", suggestive of a chameleon's invisibility cloak (to hide from predators).[1] In this mode of operation the video displays show what is behind the wearer, as if we can see through the wearer from both front and back; or
(2) reflective like a mirror, thus aposematic, to deter predators (i.e., to let them know they're being watched by the many hidden wearable cameras). In this mode the wearer becomes like a two-sided video mirror. A potential attacker, whether approaching the wearer from the front, or sneaking up behind the wearer, sees themselves displayed on the aposematic suit, in a manner similar to the way that department stores often place large video displays of their surveillance camera feed at the entrance to let potential shoplifters know they are being watched.[1]


Other similar projects include the work of Shinseungback Kimyonghun: "[the] Aposematic Jacket is a wearable computer for self-defense. The lenses on the jacket give off the warning signal, " ... I can record you"..., to prevent possible attack. When the wearer pushes a button under threat, the jacket records the scene in 360 degrees and sends the images to the Web."



In fiction


David Brin's 1989 novel Earth portrays citizens equipped with both augmented reality gear ("Tru-Vu Goggles") and cameras exercising reciprocal accountability, with each other and with authority figures, discussing effects on crime and presaging today's "cop cam" developments. Elites are allowed only temporary, cached secrecy. In Robert Sawyer's Neanderthal Parallax trilogy, the Homo neanderthalensis occupying a parallel universe have what are called companion implants. These are comprehensive recording and transmission devices, mounted in the forearm of each person. Their entire life is constantly monitored and sent to their alibi archive, a repository of recordings that are only accessible by their owner, or by the proper authorities when investigating an infraction, and in the latter case only in circumstances relevant to the investigation. Recordings are maintained after death; it is not made clear what the reasoning is for this and under what circumstances and or by whom a deceased person's archive can be accessed.


The plot of the 1995 movie Strange Days is based on a future where sousveillance recordings are made and sold as entertainment. The plot of the movie revolves around the murder of a celebrity by police officers that is recorded by a person secretly wearing one of the devices. In the movie, the recordings are made by a flat array of sensors that pick up signals from the brain stem. The sensors are usually hidden under a wig, and they record everything the person wearing them sees and hears. Recordings made while the person making them dies are called "blackjack" tapes.


The plot of the 1985 John Crowley short story Snow revolves around a suspended camera recording the whole of a subject's life being sold as a consumer product.


The 2007 novel Halting State by Charles Stross and its sequel Rule 34 depict a 2020s Scotland in which wearable computing has a level of ubiquity similar to that of 2013's cell phones. The implications of a society in which anyone might be recording anything at any time are explored at length, particularly with respect to policing.


The open source science fiction role-playing game Eclipse Phase has sousveillance as a common part of life in the setting, as a result of data storage technology and high definition digital cameras becoming commonplace and often integrated into any and all objects.



Sousveillance efficiency or efficacy


There is a need for efficacy, efficiency or effectiveness of sousveillance,
which can be met by social media, such as through widespread dissemination on social media, and when used as an output modality in conjunction with sousveillance as an input modality,
is called "swollag", or gallows spelled backwards.[62][63][64] For example, filming or streaming an abusive situation, like police abuse, doesn't always lead to justice and punishment of the abuser without some means (i.e. swollag) for sousveillance to take effect. For example, in 2014, a man named Eric Garner was choked to death by a police officer in Staten Island after being arrested on suspicion of selling loose cigarettes. "Garner's death was documented by his friend Ramsey Orta, and the video was widely disseminated. Despite the video evidence, a grand jury declined to indict Garner's killer, leading to widespread outrage and protest. (In an ironic twist, the only person indicted in connection with Garner's death was Orta, who came under police scrutiny and was arrested on an "unrelated" weapons possession charge. Orta is now in prison in New York. Sousveillance is not without its costs.)"[65]


However, it appeared that a filmed abusive behavior is more likely to be punished if the video is widely spread. This makes sousveillance more efficient and politically meaningful , insofar it shows to a significant proportion of the population the abuses of the authority. Thus, the development of video platforms, like Youtube and Snapchat, and streaming platforms like Periscope and Twitch, are key components to sousveillance's efficiency. This was shown during French demonstrations against the "Loi Travail" in 2016, during which a Periscope stream showing authority forces, called abusive by one part of the demonstrants, was watched by 93,362 people.[66] This video was posted on Twitter.[67] Nevertheless, it can be considered whether this creates a dangerous dependence on private platforms, often ruled by Internet giants (like Google, for YouTube) which have common interests with governments, and who adapt their content through algorithms users don't have control on.


In addition, some argue that sousveillance may aid in state surveillance, despite being conducted by the people. Examples include mobile apps used to help people signal public threats, such as the Israeli app c-Now (previously known as Reporty). In January 2018, c-Now was tested in Nice by mayor Christian Estrosi, sparking virulent public debates, with security advocates reporting spyware associated with the app[68] Furthermore, the director of c-Now is Ehud Barack, former prime minister of Israel, who is suspected to have kept close links with Israeli and American governments.[69] For these reasons, security advocates consider the app to serve America's global surveillance program (revealed by Edward Snowden in 2013), and raise the question of whether sousveillance really serves as "inverse surveillance".



See also



  • Surveillance capitalism

  • Body worn video

  • Eyetap

  • Helmet camera

  • Lifelogging

  • Memoto

  • Quis custodiet ipsos custodes?



References





  1. ^ abc "Sousveillance: Inventing and Using Wearable Computing Devices... Archived 2009-03-25 at the Wayback Machine", by Steve Mann, Jason Nolan and Barry Wellman, in Surveillance & Society 1(3), 2003


  2. ^ ab "Sousveillance: Inverse Surveillance in Multimedia Imaging, by Steve Mann, in ACM Multimedia 2004, pp. 620–627


  3. ^ "Keeping a Close Watch", by Kingsley Dennis, Sociology Department, Lancaster University, Lancaster, UK, 2008 July 30th, in The Sociological Review


  4. ^ Sousveillance, not just surveillance, in response to terrorism, 2002 March 1st, Metal and Flesh, Volume 6, No. 1


  5. ^ Vol. 31, Issue 2 – April 1998 "Reflectionism' and 'Diffusionism': New Tactics for Deconstructing the Video Surveillance Superhighway", in Leonardo, pp. 93–102


  6. ^ "Sousveillance, Media and Strategic Political Communication", by Dr. Vian Bakir, .mw-parser-output cite.citation{font-style:inherit}.mw-parser-output .citation q{quotes:"""""""'""'"}.mw-parser-output .citation .cs1-lock-free a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/6/65/Lock-green.svg/9px-Lock-green.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .citation .cs1-lock-limited a,.mw-parser-output .citation .cs1-lock-registration a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/d/d6/Lock-gray-alt-2.svg/9px-Lock-gray-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .citation .cs1-lock-subscription a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/a/aa/Lock-red-alt-2.svg/9px-Lock-red-alt-2.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration{color:#555}.mw-parser-output .cs1-subscription span,.mw-parser-output .cs1-registration span{border-bottom:1px dotted;cursor:help}.mw-parser-output .cs1-ws-icon a{background:url("//upload.wikimedia.org/wikipedia/commons/thumb/4/4c/Wikisource-logo.svg/12px-Wikisource-logo.svg.png")no-repeat;background-position:right .1em center}.mw-parser-output code.cs1-code{color:inherit;background:inherit;border:inherit;padding:inherit}.mw-parser-output .cs1-hidden-error{display:none;font-size:100%}.mw-parser-output .cs1-visible-error{font-size:100%}.mw-parser-output .cs1-maint{display:none;color:#33aa33;margin-left:0.3em}.mw-parser-output .cs1-subscription,.mw-parser-output .cs1-registration,.mw-parser-output .cs1-format{font-size:95%}.mw-parser-output .cs1-kern-left,.mw-parser-output .cs1-kern-wl-left{padding-left:0.2em}.mw-parser-output .cs1-kern-right,.mw-parser-output .cs1-kern-wl-right{padding-right:0.2em}
    ISBN 978-0-8264-3009-0



  7. ^ Ryan, Mary. "Sousveillance as a Tool in US Civic Polity." In Spaces of Surveillance, pp. 211-227. Palgrave Macmillan, Cham, 2017.


  8. ^ university course on sousveillance
    Home › Courses › Course Catalog › 290. Surveillance, Sousveillance, Coveillance, and Dataveillance
    290. SURVEILLANCE, SOUSVEILLANCE, COVEILLANCE, AND DATAVEILLANCE



  9. ^ International conferences on sousveillance: "Archived copy". Archived from the original on 2012-09-05. Retrieved 2010-08-15.CS1 maint: Archived copy as title (link) and [1]


  10. ^ WiReD magazine, Clive Thompson, "Establishing Rules in the Videocam Age", 2011 June 28


  11. ^ Reflections on the Vancouver Riots, Vancouver Observer, 2011 June 28


  12. ^ Michael, Katina; Michael, MG. "No Limits to Watching?". cacm.acm.org.


  13. ^ Michael, K. (2015). Sousveillance: Implications for Privacy, Security, Trust, and the Law. Consumer Electronics Magazine, IEEE, 4(2), 92-94.


  14. ^ [1][2][3][4][5][6][7][8][9][10][11][12][13]


  15. ^ Monahan, Torin (2006). Surveillance And Security: Technological Politics And Power in Everyday Life, p.158.
    ISBN 9780415953931.



  16. ^ Course developed by New York based artist Joy Garnett and taught initially at the City College of New York's Digital and Interdisciplinary Art Practice MFA program (DIAP): "Sousveillance: The Art of Networked Surveillance: Decoding the Social and the Private"[2]


  17. ^ S. Mann; J. Nolan; B. Wellman. (2002). "Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments". Surveillance & Society. 1 (3): 331–355.


  18. ^ K. Michael and M. G. Michael. Sousveillance and point of view
    technologies in law enforcement: An overview. 2012.



  19. ^ J. Bradwell and K. Michael. Security workshop brings 'sousveillance'
    under the microscope. 2012.



  20. ^ S. Mann. Veillance and Reciprocal Transparency: Surveillance versus Sousveillance, AR Glass, Lifeglogging, and Wearable Computing. IEEE ISTAS 2013, Pages 1-12


  21. ^ "MSNBC". MSNBC. 2012-06-04. Retrieved 2013-11-26.


  22. ^
    Alternative definitions of both sur- and sous- veillance (the act of watching), in addition to the definition above, include:


    • Surveillance is defined as cameras (or other sensors) affixed to property (real-estate, e.g. land, by way of posts or poles, or buildings), whereas sousveillance is defined as cameras (or other sensors) borne by people.[17][18][19][20]

    • Surveillance is the veillance of the authority (i.e. the veillance that has the capacity to prohibit other veillances), whereas sousveillance is the veillance of plurality (i.e. "crowd veillance" or watching, sensing, or the like, done by non authorities)[4].

    • Sousveillance has also been described as "inverse surveillance",[2][21] based on the word surveillance (from the French sur, "from above", and veiller, "to watch"), and substituting the prefix sous, "from below".




  23. ^ "blogging On the Identity Trail". www.anonequity.org.


  24. ^ CACR (Centre For Applied Cryptographic Research), 8th CACR Information Security Workshop & 2nd Annual Privacy and Security Workshop, The Human Face of Privacy Technology, November 1–2, 2001, The University of Toronto, Ontario, Canada; Slides and recordings.


  25. ^ "Sousveillance: Wearable Computing and Citizen "Undersight"", h-Plus Magazine, 2009jul10


  26. ^ "When Is "Undersight" Unconstitutional?", Ian Ayres, Yale Law School, New York Times, January 5, 2011


  27. ^ ab "Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments, Surveillance & Society 1(3): 331–355" (PDF). Retrieved 2013-11-26.


  28. ^ Sousveillance, direct action and the anti-corporate globalization movement. Elizabeth A. Bradshaw. Critical Criminology, 21(4):447–461, 2013.


  29. ^ Fernback J (2013) Telematics and Informatics 30(1): 11–21


  30. ^ Reilly P (2013) Every little helps? YouTube, sousveillance and the 'anti-Tesco' riot in Stokes Croft. New Media & Society. Epub ahead of print 21 November. DOI:10.1177/1461444813512195.


  31. ^ [Mann, Steve, et al. "Declaration of Veillance (Surveillance is Half-Truth)." in Games Entertainment Media Conference (GEM), 2015 IEEE. IEEE, 2015.]


  32. ^ ["Surveillance (oversight), Sousveillance (undersight), and Metaveillance (seeing sight itself)", IEEE CVPR 2016, pages 1408-1417, http://wearcam.org/kineveillance.pdf]


  33. ^ IWIS Website, http://wearcam.org/iwis/


  34. ^ Richards, Neil M., Watching the Watchers (November 4, 2013). Wired Magazine [3]


  35. ^ Ghana puts faith in humble text message Matthew Green, Financial Times, December 8, 2008


  36. ^ When all video all Finlo Rohrer, BBC News Magazine April 21, 2009


  37. ^ Cyclists' cellphones help monitor air pollution Tom Simonite, New Scientist, January 2, 2008 Archived May 16, 2008, at the Wayback Machine


  38. ^ "Crowdmapping Denmark's CCTV cameras". 12 October 2012. Retrieved 6 January 2017.


  39. ^ Fletcher, Gordon; Marie Griffiths; Maria Kutar (7 September 2011). "A day in the digital life: a preliminary sousveillance study". SSRN 1923629.


  40. ^ "Avoiding Big Brother". Classy's Kitchen. February 26, 2003. Retrieved July 1, 2013.


  41. ^ Douglas McArthur, "Flights of Fancy", Toronto Globe and Mail, December 29, 2007, p. R16.


  42. ^ Clark, Campbell; Ingrid Peritz; Ian Bailey (2007-08-25). "Sûreté du Québec to review practices". Globe and Mail. pp. A5. Archived from the original on September 30, 2007. Retrieved 2007-08-31.


  43. ^ "Russian Dash Cam Craze". Ghost Theory. 2013-02-19. Retrieved 2013-11-26.


  44. ^ http://www.cbc.ca/news/world/transasia-airways-flight-ge235-taiwan-plane-crash-caught-by-dashcam-1.2944464 |accessdate=2015-03-04


  45. ^ "Sousveillance: Wearable Computing and Citizen "Undersight"", by: Steve Mann, hplus magazine, Published: July 10, 2009


  46. ^ Clive Thompson (May 2007). "The Visible Man: An FBI Target Puts His Whole Life Online". Wired.com. Archived from the original on September 13, 2013. Retrieved 2013-11-26.


  47. ^ abc Nunes, Iesha S. (2015). "Hands up, Don't Shoot: Police Misconduct and the Need for Body Cameras". Florida Law Review.


  48. ^ Randall Stross (April 6, 2013). "Wearing a Badge, and a Video Camera". The New York Times. Retrieved April 7, 2013.


  49. ^ Pearce, Matt (September 27, 2014). "Growing use of police body cameras raises privacy concerns" – via LA Times.


  50. ^ Bakir, V. Sousveillance, Media and Strategic Political Communication: Iraq, USA, UK. Continuum: New York (2010). Available at: http://www.bloomsbury.com/us/sousveillance-media-and-strategic-political-communication-9780826430083/


  51. ^ Haggerty, K.D. & Ericson, R.V. (2000). The surveillant assemblage. British Journal of Sociology, 51(4), 605-622.


  52. ^ Mann S. (2005). Sousveillance and cyberglogs. A 30-year empirical voyage through ethical, legal and policy issues. Presence: Teleoperators and Virtual Environments, 14(6), 625–646.


  53. ^ Scheindlin, Shira A. (2015). Will the widespread use of police body cameras improve police accountability?. Peter K. Manning. pp. 24–27.


  54. ^ ab Friedman, Uri (December 3, 2014). "Do Police Body Cameras Actually Work?" – via The Atlantic.


  55. ^ Leonardo 36(1), 2003, pp19-26. (This article was given the 2004 Leonardo Award for Excellence.)


  56. ^ Alex Preston (August 3, 2014). "The death of privacy". The Guardian.


  57. ^ "How safe is your quantified self?" (PDF). 2014.


  58. ^ "Website of the records generated for 36 years". 2014.


  59. ^ "Alberto Frigo: A 36-year Tracking Project". 2014.


  60. ^ Leonardo 36(1), 2003, pp19-26.


  61. ^ This 'Bra Cam' Shows How Often Women's Breasts Get Ogled, TIME, 2014 oct 01


  62. ^ Mann, Steve, and Joseph Ferenbok. "New media and the power politics of sousveillance in a surveillance-dominated world." Surveillance & Society 11, no. 1/2 (2013): 18.


  63. ^ Holland, Janet, ed. Wearable Technology and Mobile Innovations for Next-Generation Education. IGI Global, 2016. Page 115, in Chapter 6, Wearable Cameras, Alessio Drivet, University of Turin, Italy


  64. ^ Mehdi Khosrow-Pour, DBA; Steve Clarke; Murray E. Jennex; Annie Becker; and Ari-Veikko Anttiroiko, Wearable Technologies: Concepts, Methodologies, Tools, and Applications, IGI Publishing Hershey, PA, USA 2018, Page 509,
    ISBN 9781522554844



  65. ^ Zuckerman, Ethan. "How citizen surveillance could reform a broken American police system". MIT Technology Review. Retrieved 2018-03-18.


  66. ^ Alloing, Camille (2016). La sousveillance. Vers un renseignement ordinaire ?. Hermès. pp. 68–76.


  67. ^ Sousveillance on Twitter


  68. ^ Durand, Corentin (2018-01-18). "Application Reporty : la Mairie de Nice va demander le retrait des mouchards dans son application - Politique - Numerama". Numerama (in French). Retrieved 2018-03-19.


  69. ^ "Cinq questions pour tout savoir sur Reporty, la nouvelle appli sécurité qui fait polémique à Nice". Nice-Matin (in French). 2018-01-20. Retrieved 2018-03-19.




External links







  • Over and under the Valences of Veillance (Exploring Equiveillance)

  • Cyborglogging with Camera Phones: Steps Toward Equiveillance, Proceedings of the ACM Multimedia 2006, Santa Barbara, California, Oct. 23–27, 2006.

  • CARPE 2004, Continuous Archival and Retrieval of Personal Experiences

  • University of Ottawa Cyborg Law Project, Sousveillance Workshop, and Special Issue on Cyborg Law, etc.

  • "MIT Media Lab are doing their bit to help make ours a sousveillance society" (Reason online)


  • Mann, Steve; Nolan, Jason; Wellman, Barry (2003). "Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments" (PDF). Surveillance & Society. 1 (3): 331–355. Archived from the original (PDF) on 2009-03-25.


  • Verde Garrido, Miguelángel (2015). "Contesting a biopolitics of information and communications: The importance of truth and sousveillance after Snowden". Surveillance & Society. 13 (2): 153–167. Archived from the original on 2016-02-23.


  • Existential Technology, Leonardo 36(1), 2003, pp19–26, explores the fundamental philosophical question of inverse bureaucracy, i.e. "Can humans being clerks make clerks be human?".

  • 2013 IEEE International Symposium on Technology and Society – The Veillances

  • Microsoft is also exploring cyborglogs

  • Joi Ito's use of the camera phone

  • International Workshop on Inverse Surveillance


  • Satire of the sousveillance industry. Archived from the original on 2005-11-03. Retrieved 2012-08-18.

  • World Sousveillance Day

  • shootingblind

  • Performance Art (The Surveillance Camera Players and others)

  • The First ACM Workshop on Continuous Archival and Retrieval of Personal Experiences

  • Sousveillance Blog: Thought and images from Stefanos and the NYC sousveillance crew.

  • Association for Computing Machinery (ACM) CFP 2005, opening keynote (plenary panel) on equiveillance, along with the Bell Canada Sousveillance Tour, April 2005

  • Free-running sousveillance program for camera phones

  • Open-source DIY mobile time-lapse camera


  • Find The Cameras – A student-run sousveillance project at SUNY Purchase College.


  • Surveillance, Sousveillance, Coveillance, and Dataveillance Berkeley School of Information




Popular posts from this blog

Florida Star v. B. J. F.

Danny Elfman

Retrieve a Users Dashboard in Tumblr with R and TumblR. Oauth Issues