Michael Ramage s response

Similar documents
Crime, Punishment, Poverty, Health, and Welfare

Session 20: 15 March Networked New Media: Controlling the Flow of Culture From Above

Global Panopticon Peer Review as a Tool of International Governance

GLOBAL STANDARDS FOR POLITICAL PARTIES

INVISIBLE PROPAGANDA 1

Unit 7 - Personal Involvement

In George Orwell s 1984, the entire book is about a time in Oceania when a group has

HOUSE OF REPRESENTATIVES STAFF ANALYSIS REFERENCE ACTION ANALYST STAFF DIRECTOR

Annual National Tracking Survey Analysis

DATA PROTECTION LAWS OF THE WORLD. South Korea

SURVEILLANCE AND SOCIETY SOCI3811/MDST3010 WDE 2017 LAKEHEAD UNIVERSITY

PUBLIC ADMINISTRATION (PUAD)

The Guard s Inspector: Discipline and Anarchy in Hamlet. Discipline is a method of control for those in power, where its complementary functions

Mexico and the global problematic: power relations, knowledge and communication in neoliberal Mexico Gómez-Llata Cázares, E.G.

FSC.EMI/167/18 31 May ENGLISH only

Follow-up Question: How many separate grand juries were used?

The GPS Tracking Case Fourth Amendment United States Constitution

REVISOR XX/BR

Standard &

Colorado Secretary of State Election Rules [8 CCR ]

Consumer Attitudes About Biometric Authentication

Do Voters Have a Duty to Promote the Common Good? A Comment on Brennan s The Ethics of Voting

AFGE Local 12 Washington, DC General Campaign Rules for Electing Officers and Delegates

PERSONAL INFORMATION PROTECTION ACT

Statement on Security & Auditability

Anti-Cyber Crime Law (8 Rabi / 26 March 2007)

Frequently Asked Questions

Disciplinary Moratorium : Post-Colonial Studies, Third Wave Feminism, and Development Studies

Frequently Asked Questions

Understanding Patent Issues During IEEE Standards Development

Analysis of the Workplace Surveillance Bill 2005

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN TASMANIA

Taking the Mystery Out of Voting

Frequently Asked Questions

American Bar Association Criminal Justice Section 2017 William W. Greenhalgh Student Writing Competition Rules

Special Section: Underemployment in Pakistan. Introduction 1. works less than 35 hours (see 15 Figure S1) and may, therefore,

c) Parties: Collectively, the parties to this Agreement (the Company and You) will be referred to as Parties.

ROSWELL POLICE DEPARTMENT INTERNSHIP APPLICATION 1854

Instructions on the processing of personal data in the election process

CONSTITUTIONAL LAW Copyright February 2004 State Bar of California

RUNNING EFFECTIVE MEETINGS GUIDEBOOK

Submission to the United Nations Committee Against Torture The Socialist Republic of Vietnam

Week 3. Dr Selda Dagistanli. Prisons, Punishment & Criminal Justice Spring 2016

CITY OF DELAND FLORIDA REQUEST FOR COMMISSION ACTION OCTOBER Attachments. Approved. City Manager

111th CONGRESS 1st Session H. R. 97. To amend title 18, United States Code, to prohibit certain deceptive practices in Federal

International covenant on civil and political rights CONSIDERATION OF REPORTS SUBMITTED BY STATES PARTIES UNDER ARTICLE 40 OF THE COVENANT

Confronting Biometric Detractors

Twinning Project REPORT. on the results of the study visit to Lithuania and Latvia. Participants of the study visit:

South Korea. Freedom of Expression JANUARY 2018

for fingerprint submitting agencies and contractors Prepared by the National Crime Prevention and Privacy Compact Council

MACKENZIE RAINBOW SWIM CLUB CONSTITUTION

Convention on the Rights of the Child COMMITTEE ON THE RIGHTS OF THE CHILD

LJMU Research Online

LEGAL GUIDE TO RELEVANT CRIMINAL OFFENCES IN WESTERN AUSTRALIA

CHAPTER Council Substitute for Committee Substitute for House Bill No. 325

Study Background. Part I. Voter Experience with Ballots, Precincts, and Poll Workers

Civil Liberties and the Internet. Timothy M. Donoughue July 16, 2004

[Anthropology 495: Senior Seminar, Cairo Cultures February June 2011] [Political Participation in Cairo after the January 2011 Revolution]

Voter Experience Survey November 2016

Case 2:06-cv RSM Document 26 Filed 04/17/2006 Page 1 of 10

MSC TRUSTGATE.COM SDN BHD LICENSE AGREEMENT FOR SYMANTEC SECURED SEAL

F L O R I D A H O U S E O F R E P R E S E N T A T I V E S

CENTRE WILLIAM-RAPPARD, RUE DE LAUSANNE 154, 1211 GENÈVE 21, TÉL

Resistance to Women s Political Leadership: Problems and Advocated Solutions

Travels with John. A comparative study on the function of prisons in Europe

Promotion Period: Sweepstakes begins 12:00:00 pm Eastern Time ( ET ) and ends 4:30:00 pm ET on 1/10/15 (hereafter, Promotion Period ).

Article 4.Federal Electoral District

Convention on the Elimination of All Forms of Discrimination against Women

New Jersey Judiciary Additional Questions for Certain Sexual Offenses

INTERNATIONAL DIALOGUE ON MIGRATION

FEDERAL LAW ON THE ELECTION OF DEPUTIES OF THE STATE DUMA OF THE FEDERAL ASSEMBLY OF THE RUSSIAN FEDERATION *

CRIMES AMENDMENT (SEXUAL OFFENCES) BILL 2008

Lt. Colonel Deng Kuol Deng Director for Information & Communication Technology Directorate of Nationality, Passports & Immigration Ministry of

Prison Industrial Complex. Prison Industrial Complex (PIC) is a phrase employed to define the overlying interests of

CONTACT: Michael L. Slive, chair, NCAA Infractions Appeals Committee UNIVERSITY OF MISSISSIPPI INFRACTIONS APPEALS COMMITTEE REPORT

Criminal History Overview. Law Enforcement Records Management Association 2016 Meeting

Post-Socialist Neoliberalism and the Ethnography of Uncertainty

Cuba. Legal and Institutional Failings

2016-CFPB-0017 Document 26 Filed 01/30/2017 Page 1 of 15 UNITED STATES OF AMERICA CONSUMER FINANCIAL PROTECTION BUREAU

Massachusetts Overhauls Accessibility to Criminal Information of Applicants and Employees

City of Alpharetta Department of Public Safety Ride-Along Program Application Form

From the King s Two Bodies. to the Modern State

THIS PAPER IS NOT TO BE REMOVED FROM THE EXAMINATION HALLS UNIVERSITY OF LONDON LA1031 ZA

ARKANSAS SECRETARY OF STATE

Re: CSC review Panel Consultation

Curriculum Framework for Civics & Citizenship

ACT ON PROMOTION OF INFORMATION AND COMMUNICATIONS NETWORK UTILIZATION AND INFORMATION PROTECTION, ETC.

Circuit Court of the Judicial District, County of, State of Wyoming

THE NATIONAL JUDICIAL COLLEGE

Consideration of reports submitted by States parties under article 40 of the Covenant. Concluding observations of the Human Rights Committee

Federal Elections, Union Publications. and. Union Websites

Table of Contents. 1 Crime and Corrections 1. 2 Corrections and Criminal Justice: An Overview 13. xvii. Preface

Understanding Patent Issues During IEEE Standards Development

Additional Case study UK electoral system

The One-dimensional View

1. Academic Center of Law & Business, Human Rights Division 2. Major General (Retired) Shlomo Twizer 3. Yadin Machnes

Invitation to tender Outsourcing of tasks related to receipt of Schengen visa applications

Technologies of Direct Democracy

Louisiana Justice Reinvestment Package

A Democratic Framework to Interpret Open Internet Principles:

Transcription:

2-2. Inasmuch as Jeremy Bentham's proposal described a concrete proposal for a prison, the French writer Michel Foucault has emphasized that the key innovation of the panopticon lay in the voluntary submission of its participants. Can you give one or two contemporary examples of a panoptical mechanism? Elucidate in detail. (Hint: Airports, Surveillance cameras, university dormitories). Michael Ramage s response If the true innovation of the panopticon is the voluntary submission of its participants, then modern surveillance cameras in cities cannot be considered innovative in the same manner, as submission to their use cannot be considered voluntary. Similarly, can one in fact consider the submission of prisoners in The Penitentiary voluntary? The then-modern panopticon, in its subtle and unseen exercise of voyeurism and power, was to be sure an improvement over the crowded, stale prisons that preceded it. Which already incarcerated individual would not give up some personal freedom for such improved conditions? The same line of reasoning is used in modern surveillance systems. Just last week, in a New York Times article on Chicago s new surveillance system, the police officer in charge, Ron Huberman, was quoted as saying "The value we gain in public safety far outweighs any perception by the community that this is Big Brother who's watching. The feedback we're getting is that people welcome this. It makes them feel safer." The innovation in modern panoptical devices is not the total surveillance of people, but the processing of images allowed by new software. No longer are we just being watched, our behavior is being recorded and studied and, most importantly, compared to what is considered acceptable. As long as we believe that the powers designing and defining normal are a benevolent force, this system can be seen to act in the public good and be a powerful panoptical device that lets them help us. But as soon as those powers become a controlling force, in fact or in perception, the panoptical device moves to become one that lets them help themselves. That line is equally as blurry as the line which separates voluntary submission to surveillance to unavoidable involuntary evil.

Katherine James One peculiar version of the panoptical device in modern society is the Your Speed is roadside sign. This sign, by reflecting one s speed, essentially performs the same function as the dashboard speedometer, but externally and on a very large scale. The strange dichotomy of this device is that it works as an indicator of police omnipresence while simultaneously being an exact replacement of that (human) presence. (One never sees a police officer next to the sign, as the two are redundant). The panopticon here, the all-seeing eye, induces voluntary behavior modification by making drivers understand the external recognition of their speed. Even beyond recognition, the driver s behavior is also judged through the juxtaposition of the actual speed limit and the Your Speed reading. All of this takes place with full knowledge of the lack of human police presence, one that could cause ramifications for misbehaviors. The sign can t take action beyond reflecting behaviors, yet people consistently slow down in its presence. In this way, the sign acts like a shadow the prisoner in the Panopticon prison would see his own misbehavior in. He thereby realizes that this behavior is also seen by others and exposed to judgment. In the Panopticon prison, it is a moot point whether the police are actually present in the shadow or not the fact that they could be is the behavior-guiding principal. With the road sign, the driver is actually quite certain that the police eyes are not present, but the machine is so powerful an indicator of monitoring, that behavior is modified nonetheless. Interestingly, a car radar detector- a seeming way out of the panoptical trap, makes no distinction between an actual police officer monitoring speed and the sign doing the same. This goes to show that devices can fool other devices, and that in fact there is no difference in the monitoring technique and procedure. The difference is the implied consequence. However, this difference seems completely irrelevant in terms of the effectiveness of the behavior modification.

The Voting Booth Catherine Fowlkes Michel Foucault s reading and analysis of Jeremy Bentham s panopticon focused in on the voluntary submission aspect of the design. His observations align with a contemporary society rampant with panoptical mechanisms in our physical space and in cyberspace. One many-layered example of a contemporary panoptical mechanism is the voting booth. Physically, it is an individualized space designed for, and not allowed to be occupied by more than, one person. The body that uses it is well documented through registration of sex, name, location and beliefs (party affiliation), and thus becomes highly individualized. By engaging in the act of voting, an individual is voluntarily submitting themselves to surveillance on several levels. Though they are sequestered from other voters, they are assuming the gaze of a higher authority. This gaze is not direct it is in fact invisible to them - but it is implicit that their actions will eventually be viewed at a removed place and time and will have repercussions. The time and place of this viewing and documenting is not known, but the individual s behavior that of voting assumes that this viewing will take place. Aside from the space of the voting booth, voting itself is the ultimate act of self regulation. It is engaging in the system of government and discourse that exercises authority. It doesn t just engage this system of authority, but supports it, perpetuates it, shapes it, advocates it, demands it. A rejection of this notion would not be to vote for a radical candidate or government, but rather to not register to vote, to not show up and not be accounted for. A voting society is a society that asks to be self regulated and has faith that this surveillance is working. A demonstration of this faith was illustrated by the outrage of Florida voters in the last Presidential election when their actions were not accounted for when they realized no one was watching them.

Spyware Elizabeth Nguyen In Discipline & Punish: The Birth of the Prison Michel Foucault emphasizes that the voluntary submission of its participants is the key innovation of the Jeremy Bentham s Panopticon prison architecture. This submission through fear of surveillance is also true of how we use our electronic communications today. Surveillance of the internet is more insidious than the Panopticon however, for instead of suppressing communication through separation of the subjects, it the surveillance of an intensely communicative apparatus which allows for the separation of the collective crowd into a collection of separated and controlled individualities. In this comparison, the internet is not the new technology; but rather it is the development of increasingly sophisticated spyware that is used to monitor individual behavior for political, military, and commercial enterprises. According to Foucault, it is the formation of a body of knowledge that is highly specific to the individual that allows both the growth of control over masses of people and the mutually dependent growth of capital. Products advertised as data security and management tools allow managers to track keystrokes, email messages, and chat discussions within the private sphere of the office, thus improving the efficiency of the workers. The FBI s leaked memos regarding it s ability to install spyware via an email virus, as well as the legalization of it s email and URL tracking software known as CARNIVORE in the Patriot Act of the U.S. Congress, is part of an overall scare tactic to curb the use of the networked communication devices in the service of political protests that occurs today on a global scale (for example, in 2003 the global day of protests against the U.S. invasion of Iraq). Spyware may also be used by corporations to track the access of URL s of anyone who visits a particular website and allows cookies to be installed. The food metaphors for data collection are indicative of the insatiable appetite for more knowledge, which in turn allows more control. For example, a cookie may instruct a website as to which advertisements you will be shown when you access the site at a later date. Through the above examples, three specific criteria Foucault establishes relate closely with the functioning of internet surveillance by the state and commercial enterprise. These are 1) obtain the exercise of power at the lowest cost economically and politically through its discretion and relative invisibility; 2) bring the effects of this social power to maximum intensity and extend them as far as possible; and 3) link this growth of power with the institutional apparatuses (in this case, commercial enterprise and state control). However, just as Bentham brought light and individual separation to a previously dungeon-based imprisonment system in order to improve discipline, the strategies for internet surveillance must allow communication among the masses. What was once a weakness now becomes the means to expose criminal and/or unethical activity or political dissent. We have come to describe the accumulation of knowledge as the Information Age. In a democratic sense, this term connotes the dissemination of power to

the masses, but the new technologies of spyware allow for the inverse centralization of power through vast repositories of knowledge in the service of commercial growth and state control.