Topicality lecture notes for students

advertisement
Conceptualizing, preparing for, and
executing topicality arguments
I
Interpretation: “Exploration” and “development” limit the aff to
resource extraction
US Code ‘14 (43 USC 1331: Definitions, current as of 2014, From Title 43-PUBLIC
LANDS CHAPTER 29-SUBMERGED LANDS SUBCHAPTER III-OUTER
CONTINENTAL SHELF LANDS,
http://uscode.house.gov/view.xhtml?req=(title:43%20section:1331%20edition:prelim))
The term “exploration” means the process of searching for minerals,
including (1) geophysical surveys where magnetic, gravity, seismic, or other systems are used to
detect or imply the presence of such minerals, and (2) any drilling, whether on or off known geological
structures, including the drilling of a well in which a discovery of oil or natural gas in paying quantities is
(k)
made and the drilling of any additional delineation well after such discovery which is needed to delineate any reservoir
and to enable the lessee to determine whether to proceed with development and production; (l) The term
“development” means those activities which take place following discovery
of minerals in paying quantities, including geophysical activity, drilling, platform
construction, and operation of all onshore support facilities, and which are
for the purpose of ultimately producing the minerals discovered; (m) The term
“production” means those activities which take place after the successful completion of any means for the removal of
minerals, including such removal, field operations, transfer of minerals to shore, operation monitoring, maintenance, and
work-over drilling;
Violation: []
They unlimit – opens up development mechanisms of the week.
Adding small science affs precludes effective preparation.
Energy encloses a finite, predictable body of literature with
stable plan mechanisms that guarantee competitive CP and DA
ground – key to clash.
2
Interpretation: “Exploration” and “development” limit the aff to
resource extraction
US Code ‘14 (43 USC 1331: Definitions, current as of 2014, From Title 43-PUBLIC
LANDS CHAPTER 29-SUBMERGED LANDS SUBCHAPTER III-OUTER
CONTINENTAL SHELF LANDS,
http://uscode.house.gov/view.xhtml?req=(title:43%20section:1331%20edition:prelim))
The term “exploration” means the process of searching for minerals,
including (1) geophysical surveys where magnetic, gravity, seismic, or other systems are used to
detect or imply the presence of such minerals, and (2) any drilling, whether on or off known geological
structures, including the drilling of a well in which a discovery of oil or natural gas in paying quantities is
(k)
made and the drilling of any additional delineation well after such discovery which is needed to delineate any reservoir
and to enable the lessee to determine whether to proceed with development and production; (l) The term
“development” means those activities which take place following discovery
of minerals in paying quantities, including geophysical activity, drilling, platform
construction, and operation of all onshore support facilities, and which are for the
purpose of ultimately producing the minerals discovered; (m) The term “production” means those activities which take
place after the successful completion of any means for the removal of minerals, including such removal, field operations,
transfer of minerals to shore, operation monitoring, maintenance, and work-over drilling;
Topical affirmatives can only develop by issuing leases or
permits or directly building infrastructure – their management
strategy isn’t topical
Coast Guard 2K (Commandant Instruction Manual ID 16475, United States Coast
Guard, November 29, 2000, “COMMANDANT INSTRUCTION M16475.1D,”
http://www.uscg.mil/directives/cim/16000-16999/CIM_16475_1D.pdf, alp)
3. Distribution of Environmental Documents. a. Provide a written notification to state,
area-wide, regional, and local officials through the state process or otherwise, of any plan
or project proposed in the state or locality. Direct Federal development includes
the planning and construction of public works, physical facilities, and
installations or land and real property development (including the
acquisition, use and disposal of real property and the issuance of permits
and licenses) undertaken by and for the use of the Federal government.
Note that notification is not required for permits issued for the construction of bridges
over navigable waters on Federal-aid or direct Federal highway projects, providing the
project has complied with the provision of 49 CFR Part 17. Notification shall take place at
the earliest practicable time in project planning. The notification shall contain: (1) Name
of the organization proposing the project; (2) Geographic location of the project; (3)
Brief description of the project that will ensure appropriate distribution; (4) Program to
be supported by the project; and (5) Date on which the actual development,
construction, or other activities involved in the physical implementation of the project
are scheduled to begin.
Violation: the aff regulates existing ocean development but
doesn’t directly increase federal development; that violates the
core meaning of “its development.”
This card explains all the non-topical things they do—at
minimum the plan is massively extra topical
SHAPIRO 13 their 1ac solvency advocate.
(May 2013. Stuart Shapiro is a Ph.D. and Associate Professor and Director for the Public
Policy Program at Rutgers University. “Analysis of the Federal Oil and Gas Regulatory
Landscape: A Report Prepared for the Occupational Safety And Health Administration”
http://policy.rutgers.edu/academics/projects/practicums/OSHA-Final-2013.pdf, twm)
We feel that each agency we examined could do more to move towards performance or risk-based safety regulations.
Doing so would reflect internationally accepted best practices, allow more cost-effective measures to be utilized, and allow
innovative use of new technologies. However we also recognize that moving in this direction, in many cases requires a
If agencies were to move in a more performance
based direction, here is where we suggest they begin.
significant effort and large upfront costs.
BSEE:
BSEE’s recent adoption of SEMS II is a move towards a more performance-based approach to compliance and inspection.
While it may reflect more of a management based approach than a performance based one, it is certainly closer to
performance based than the previous regulatory regime. Oil and gas drilling is a dynamic practice and new information is
needed every step of the well, particularly with innovation and the development of new technology, such as different
systems with blowout preventers. According to agency staff, regulatory programs are still geared towards process safety
rather than production and BSEE has yet to become more focused on goal setting despite recent enhancements to SEMS.
To conduct the
frequency of necessary investigations related to a performance-based
system with SEMS as the centerpiece, more specialized inspectors are needed. This will
ensure the health and safety requirements are met and up-to-date with rapidly changing technology. BSEE should
focus on retraining their inspectors for enforcement of the new regulations
and changing the culture of the agency from prescription to performance.
Existing regulators are still trained to ensure compliance with prescriptive-based approaches.
PHMSA:
PHMSA’s Integrity Management Program is an effective and efficient risk-based process. The IMP institutes a risk
assessment framework and guides priorities to ensure high-consequence pipeline segments are inspected more frequency.
This model program implements a robust and systemic approach to assessing the risks of transporting oil, gas, and
hazardous materials across the United States. While the IMP program is a model for risk-based assessment of the oil and
gas industry, a 2010 audit by the Office of the Inspector General revealed a number of areas of issues with the program.
These problems include: accumulated backlog of IM inspections,
insufficient onsite visits to facilities, less stringent IM requirements for
non-line pipe facilities, data management and quality deficiencies, lack of
systemic data analysis to identify pipeline safety and accident trends, lack
of capability to identify high-risk pipelines by linking data to geographic
location, and lack of performance based metrics to monitor the IM
program’s effectiveness. We suggest creating solutions to the Inspector General audit
fulfill the essential components of a performance-based regulation
program.
in order to
OSHA:
OSHA’s PSM standard sets an example of using performance and management-based approaches in regulating oil and gas
production process safety. It has been widely adopted and acknowledged by the industry and allows for cost effective ways
to achieve the policy goal. OSHA does not need to further shift towards a performance-based approach for its PSM
standard, but there are two areas where OSHA could move more toward a performance or risk based regime. OSHA
already uses a risk-based approach toward inspections. The agency bases this approach on injury rates at facilities (OSHA
to use
violations of regulations by other agencies to target its inspections. A sector
that is subject to so many different agency requirements, such as the oil
and gas industry, would be an ideal one on which to test this approach. Other
must also inspect whenever there is a fatality or a worker complains). There have been proposals for OSHA
OSHA standards that pertain to industry in general also impact the oil and gas industry are more prescriptive based,
Examples include Hazard
Communication (29 CFR 1910.1200) and Hazardous Waste Operations (29 CFR 1910.120).
mainly in the form of requiring the use of certain protective measures.
While there are certainly circumstances where prescriptive regulations are appropriate, OSHA has considered moving
toward a "safety and health program" model, which could reduce the prescriptive nature of these regulations.
EPA:
The EPA has implemented its oil pollution prevention program with a performance-based approach where appropriate to reduce the
regulatory burden without increasing risk to public safety or the environment. Although EPA has successfully incorporated performancebased principles in its implementation of the SPCC rule, there are areas where EPA could further reduce its regulatory burden without
jeopardizing its mandate to protect the environment. Facilities that are covered under EPA’s SPCC and FRP regulations are also covered by
should work with
these other agencies to identify areas that may be streamlined to eliminate
regulatory overlaps. Increasing the frequency of joint inspections in such areas is also an effective and feasible way to
other similar regulations by agencies such as PHMSA (including the overlap described above). The EPA
reduce the regulatory burden without substantial changes to agency jurisdictions. According to its website, in 1995 EPA conducted a survey
of oil storage facilities that were covered by the SPCC regulation.79 The survey results provide valuable insight into the types of facilities
covered, the effectiveness of SPCC regulation, and identifies high-risk facilities. Subsequently, a review of EPA publications in the Federal
Register indicates that there have been several amendments and revisions to the SPCC regulations over the past few years.80 Given these
EPA should conduct another survey to get an updated perspective
of the SPCC regulations in the oil and gas industry. The survey would help
identify areas where performance-based approach would help facilitate
compliance and improve overall effectiveness of the SPCC regulations.
recent changes,
Although EPA has successfully incorporated performance-based principles in its implementation of the SPCC rule, there are areas where
EPA could further reduce its regulatory burden without jeopardizing its mandate to protect the environment. In particular, there are several
prescriptive elements to the SPCC requirements in 40 CFR 112.8-11 pertaining to the oil and gas industry that may be improved by adopting
a more performance-based approach. Currently, there are prescriptive requirements for facility drainage, bulk storage containers, and
The EPA could adopt a performance-based approach in these
areas by requiring facilities to conduct a risk assessment based on a
common set of criteria. The risk assessment could be used to formulate and implement spill prevention measures that
facility processes.
are specifically tailored to the facility. The EPA could also introduce a performance-based approach to the RMP regulations. Currently, the
RMP rule applies to facilities that meet specifications outlined in 40 CFR 68.10. As such, the RMP applicability is based on whether facilities
contain more than a threshold quantity of regulated substance and the facility’s accident history. These criteria are intended to identify
facilities that are prone to accidental release of hazardous substances that would be particularly harmful to the environment. Although
recent studies have shown that the RMP effectively reduces accident releases, they also demonstrate characteristics beyond the current
criteria that may indicate environmental risk.81 Research suggests that as facilities grow in the number of employees the risk of an
accidental release increases substantially. Using the total number of employees to determine RMP applicability may help to focus the
regulation on facilities with a greater risk of chemical accidents. Likewise, such criteria may also reduce the regulatory burden and
compliance cost for smaller facilities that are less accident prone.
USCG:
may have the greatest
challenge implementing performance-based regulations. Due to the nature of the
The United States Coast Guard’s response, rescue, and security-oriented mission
agency and its regulations, we understand why the USCG’s regulations are primarily prescriptive. However, to the extent
hould, after solving the issues with OSHA and BSEE, described earlier in
the report, audit its regulations to search for opportunities to move to a more
performance based regime.
feasible, USCG s
Topicality is a voting issue:
a) Limits and ground – there are hundreds of ways to make
minor modifications to existing regulatory frameworks or to
overhaul status quo regulations. The aff gets new ground in the
form of courts affs and tons of internal agencies which all crush
the link to core generics like politics and spending.
Wayzata’s nuclear shipping insurance aff, Westminster’s
binding aquaculture standards aff, Blake’s LOST aff etc. prove
allowing regulations explodes the topic. More limited topics are
good – they’re key to clash because they encourage case-specific
research, which results in in-depth competitive debates that
foster advocacy and research skills. Regulatory changes should
be negative ground as a PIC out of “development” or “increase.”
b) Extra and effects T – there are infinite ways the aff could
result in or contain a topical action. They get more ground to
weigh as offense against counterplans or to link turn DAs like
politics, at the expense of negative preparation, because it’s
impossible to research every single non-topical trick the aff
could deploy. That crushes competitive equity which comes first
because debate is a game. 75% of what their plan does is a
regulatory change which may or may not result in more drilling
– they could defend drilling in this debate and defend restricting
it in other debates. It’s entirely likely that the first effect of the
plan is to create a moratorium on drilling so that the USFG can
begin a new regulatory regime which is anti-topical.
Topical version of the aff – they can substantially issue leases
and permits for offshore drilling which solves 90% of their core
offense without sacrificing neg ground. Their core ground is the
Japan advantage and prices but they shouldn’t get to read the
environment advantage with a drilling aff. We can read
regulations CPs against their aff which solves their education
claims which means the only impact that matters is topic size –
that’s a reason competing interpretations come first.
3
Our interpretation is that topical affirmatives can only search for and
extract seabed resources.
They violate by [].
That allows anything in the oceans – search for downed planes, fund the
Aquarius base, space elevators, Makah whaling, nuclear shipping insurance
and SMRs, iron fertilization regulations, sub-seabed disposal, overturn the
Odyssey shipping lawsuit etc.
These were all affs cut at UMich and SDI which proves the tangible link to
our limits arguments AND disproves all their “functional limits” defense.
The impact is predictable limits –
Our interpretation ties the aff to materially interacting with the oceans and
outlines clearly delineated categories of affirmatives with diverse,
contentious, and balanced ground.
Overly broad topics unfairly burden the neg which causes a shift to generics
and undermines research skills by disincentivizing case research – harms
topic education and critical thinking.
A decrease in specificity also cost-benefit analysis which turns their impacts.
Clash fosters advocacy defense skills which are uniquely portable –
outweighs their offense.
We allow reasonable aff ground – methane hydrates, rare earth mining,
OCS, bathymetry, seismic scans for oil and gas, desalination. Solves
overlimiting.
4
Independently, the aff is effects and extra-topical –
The non-topical components of the plan might result in “development” in
the future, but that ground is fluid and unpredictable which crushes the
negative’s ability to prepare. This is an independent internal link to our
limits offense. 1NC Shapiro indicates the direct mandate of the plan calls for
OSHA to increase site inspections and retrain its employees in addition to a
ton of other non-development initiatives which proves they’re extra-topical.
They could defend an increase in drilling in this debate and a decrease in
another debate – this is especially abusive given that the first step in the
plan would be to decrease drilling to ensure that existing sites comply with
new regulations.
They mix burdens by making topicality a question of the efficacy of their
regulations which makes the aff undebatable since in order to get back to
square one, we have to have researched their affirmative to prove it reduces
development. That’s also a reason you should find a clear brightline which
means competing interpretations is better than reasonability in this context.
5
Prefer competing interpretations:
Prevents a race to the fringes – you can always be reasonably topical – no
brightline ensures topic explosion. They need to win impact framing which
means they need to isolate offense and explain why it outweighs ours before
reasonability makes sense – <lack of 2AC link defense to limits makes that
impossible>.
Overview proves they’re not reasonable.
IV. Topicality activity
Speech times:
2AC: 1 minute.
2NC: 3 minutes.
1AR: 1:30.
2NR: 5 minutes.
2AR: 5 minutes.
The neg should construct their own 1NC shell using the interpretation evidence below,
and the aff should construct a 2AC and select appropriate pieces of evidence (if any) for
the 1AR.
1AC
Plan: In the absence of an individually-tailored warrant obtained via use of a specific
selector term, federal intelligence agencies should cease collection of domestic phone,
internet, email, and-or associated electronic records.
Neg
A narrow definition of surveillance requires coercive intent –
they curtail “information gathering” or they unlimit the topic
Fuchs 11 – Christian Fuchs, Professor of Social Media at the University of
Westminster's Centre for Social Media Research, “New Media, Web 2.0 and
Surveillance”, Sociology Compass, 5(2), p. 135-137
Theoretical foundations of surveillance studies
‘Living in ‘‘surveillance societies’’ may throw up challenges of a fundamental –
ontological – kind’ (Lyon 1994, 19). Social theory is a way of clarifying such ontological
questions that concern the basic nature and reality of surveillance. An important
ontological question is how to define surveillance. One can distinguish
neutral concepts and
negative concepts.
For Max Horkheimer, neutral theories ‘define universal concepts under which all facts in
the field in question are to be subsumed’ (Horkheimer 1937 ⁄ 2002, 224). Neutral
surveillance approaches define surveillance as the systematic collection of data about humans or
non-humans. They argue that surveillance is a characteristic of all societies. An example
for a well-known neutral concept of surveillance is the one of Anthony Giddens. For
Giddens, surveillance is ‘the coding of information relevant to the administration of
subject populations, plus their direct supervision by officials and administrators of all
sorts’ (Giddens 1984, 183f). Surveillance means ‘the collation and integration of
information put to administrative purposes’ (Giddens 1985, 46). For Giddens, all forms
of organization are in need of surveillance in order to work. ‘Who says surveillance says
organisation’ (Giddens 1981, xvii). As a consequence of his general surveillance concept,
Giddens says that all modern societies are information societies (Giddens 1987, 27; see
also: Lyon 1994, 27).
Basic assumptions of neutral surveillance concepts are:
• There are positive aspects of surveillance.
• Surveillance has two faces, it is enabling and constrainig.
• Surveillance is a fundamental aspect of all societies.
• Surveillance is necessary for organization.
• Any kind of systematic information gathering is surveillance.
Based on a neutral surveillance concept, all forms of online information storage,
processing and usage in organizations are types of Internet surveillance. Examples
include: the storage of company information on a company website, e-mail communication
between employees in a governmental department, the storage of entries on Wikipedia, the online
submission and storage of appointments in an e-health system run by a hospital or a general
practitioner’s office. The example shows that based on a neutral concept of surveillance, the
notion of Internet surveillance is
fairly broad .
Negative approaches see surveillance as a form of systematic information gathering that is
connected to domination, coercion , the threat of using violence or the actual use
of violence in order to attain certain goals and accumulate power, in many cases against
the will of those who are under surveillance. Max Horkheimer (1947 ⁄ 1974) says that the
‘method of negation’ means ‘the denunciation of everything that mutilates mankind and
impedes its free development’ (Horkheimer 1947 ⁄ 1974, 126). For Herbert Marcuse,
negative concepts ‘are an indictment of the totality of the existing order’ (Marcuse 1941,
258).
The best-known negative concept of surveillance is the one of Michel Foucault. For
Foucault, surveillance is a form of disciplinary power. Disciplines are ‘general formulas
of domination’ (Foucault 1977, 137). They enclose, normalize, punish, hierarchize,
homogenize, differentiate and exclude (Foucault 1977, 183f). The ‘means of coercion
make those on whom they are applied clearly visible’ (Foucault 1977, 171). A person that
is under surveillance ‘is seen, but he does not see; he is the object of information, never a
subject in communication’ (Foucault 1977, 200). The surveillant panopticon is a
‘machine of power’ (Foucault 2007, 93f).
In my opinion, there are important arguments speaking against defining
surveillance in a neutral way:
1. Etymology: The French word surveiller means to oversee, to watch over. It implies a
hierarchy and is therefore connected to notions, such as watcher, watchmen, overseer and
officer. Surveillance should therefore be conceived as technique of coercion (Foucault 1977,
222), as ‘power exercised over him [an individual] through supervision’ (Foucault 1994,
84).
2. Theoretical conflationism: Neutral concepts of surveillance put certain phenomena, such as
taking care of a baby or the electrocardiogram of a myocardial infarction patient, on one
analytical level with very different phenomena, such as preemptive state-surveillance of personal
data of citizens for fighting terrorism or the economic surveillance of private data or
online behaviour by Internet companies (Facebook, Google, etc.) for accumulating
capital with the help of targeted advertising. Neutral concepts might therefore be used for
legitimatizing coercive forms of surveillance by arguing that surveillance is ubiquitous and
therefore unproblematic.
3. Difference between information gathering and surveillance: If surveillance is conceived as
systematic information gathering, then no difference can be drawn between surveillance studies
and information society studies and between a surveillance society and an information society .
Therefore, given these circumstances, there are no grounds for claiming the existence of
surveillance studies as discipline or transdiscipline (as argued, for example, by Lyon 2007)
4. The normalization of surveillance: If everything is surveillance, it becomes difficult to criticize
coercive surveillance politically.
Given these drawbacks of neutral surveillance concepts, I prefer to define surveillance as a
negative concept: surveillance is the collection of data on individuals or groups that are used so
control and discipline of behaviour can be exercised by the threat of being targeted
by violence. A negative concept of surveillance allows drawing a clear distinction of what
that
is and what is not Internet surveillance. Here are, based on a negative surveillance concept,
some examples for Internet surveillance processes (connected to: harm, coercion, violence,
power, control, manipulation, domination, disciplinary power, involuntary observation):
• Teachers watching private activities of pupils via webcams at Harriton High School,
Pennsylvania.
• The scanning of Internet and phone data by secret services with the help of the Echelon system
and the Carnivore software.
• Usage of full body scanners at airports.
• The employment of the DoubleClick advertising system by Internet corporations for
collecting data about users’ online browsing behaviour and providing them with targeted
advertising.
• Assessment of personal images and videos of applicants on Facebook by employers
prior to a job interview.
• Watching the watchers: corporate watch systems, filming of the police beating of
Rodney King (LA 1992), YouTube video of the police killing of Neda Soltan (Iran 2009).
There are other examples of information gathering that are oriented on care, benefits,
solidarity, aid and co-operation. I term such processes monitoring. Some examples are:
• Consensual online video sex chat of adults.
• Parents observing their sleeping ill baby with a webcam that is connected to their PC in
order to be alarmed when the baby needs their help.
• The voluntary sharing of personal videos and pictures from a trip undertaken with real life
friends who participated in the trip by a user.
• A Skype video chat of two friends, who live in different countries and make use of this
communication technology for staying in touch.
“Surveillance” is monitoring with preventive intent
Lemos 10 – André Lemos, Associate Professor at Faculty of Communication at
Federal University of Bahia, Brazil, “Locative Media and Surveillance at the Boundaries
of Informational Territories”, ICTs for Mobile and Ubiquitous Urban Infrastructures:
Surveillance, Locative Media and Global Networks, Ed. Firmino, p. 130-132
important to distinguish between
informational control , monitoring and surveillance so that the problem
can be better understood . We consider control to be the supervision of activities, or
Although they often appear to be synonymous, it is
actions normally associated with government and authority over people, actions and processes.
Monitoring can be considered a form of observation to gather information with a view to making
projections or constructing scenarios and historical records, i.e., the action of following up and
intended to avoid
something , as an observation whose purposes are preventive or as behavior that
evaluating data. Surveillance, however, can be defined as an act
is attentive, cautious or careful. It is interesting to note that in English and French the two
words “vigilant” and “surveillance”, each of which is spelt the same way and has the same
meaning in both languages, are applied to someone who is particularly watchful and to
acts associated with legal action or action by the police intended to provide protection
against crime, respectively. We shall define surveillance as actions that imply control and
monitoring in accordance with Gow, for whom surveillance "implies something quite
specific as the intentional observation of someone's actions or the intentional gathering
of personal information in order to observe actions taken in the past or future" (Gow, 2005, p.
8).
According to this definition, surveillance actions presuppose monitoring and control, but not
all forms of control and/or monitoring can be called
surveillance . It could be said that all forms of surveillance require two elements:
intent with a view to avoiding causing something and identification of individuals or
groups by name. It seems to me to be difficult to say that there is
surveillance if there is no identification of the person under observation
(anonymous) and no preventive intent (avoiding something) . To my
mind it is an exaggeration to say, for example, that the system run by my cell phone
operator that controls and monitors my calls is keeping me under surveillance. Here there is
identification but no intent . However, it can certainly be used for that purpose. The Federal
Police can request wiretaps and disclosure of telephone records to monitor my telephone calls.
The same can be said about the control and monitoring of users by public transport operators.
part of the administrative routine of the companies involved. Once
again, however, the system can be used for surveillance activities (a suspect can be kept
under surveillance by the companies’ and/or police’s safety systems). Note the example
further below of the recently implemented "Navigo" card in France. It seems to me that
the social networks, collaborative maps, mobile devices, wireless networks and countless
different databases that make up the information society do indeed control and monitor
and offer a real possibility of surveillance.
This is
“Surveillance” requires an intentional purpose to shape future
action---“monitoring” without objective isn’t T
Santaella 10 – Lucia Santaella, Full Professor at São Paulo Catholic University,
Director of the Center of Research in Digital Media, One of the Honorary Presidents of
the Latin-American Federation of Semiotics, and Member of the Argentinian Academy of
Arts, ICTs for Mobile and Ubiquitous Urban Infrastructures: Surveillance, Locative
Media and Global Networks, Ed. Firmino, p. 297
THREE REGIMES OF SURVEILLANCE: PANOPTIC, SCOPIC AND TRACKING
The word surveillance and its concept are widely used. Even one seems to intuitively know
what surveillance means. In a research context, however, we must follow an ethics of
terminology , by defining our sources and the meaning implied in the terms being used. A
simple definition is given by Bennet & Regan (2004: 452): "surveillance is a way of
determining who is where and what s/he is doing in the physical or virtual world, on a
given moment in time." Bruno (2008b) mentions a functional definition of surveillance
given by Wood et al. (2006:9): "Wherever we may find purposeful, routine oriented, systematic
and focused attention given to personal details, with the
objective of control, authorization,
management, influence or protection, we are facing surveillance." For Lyon (2004: 129).
serious and systemic attention to personal details for purposes of influence,
administration and control is defined as surveillance. More recently Lyon (2010:6)
added to the definition that "in part due to its reliance on electronic technologies,
surveillance is generalized across populations, for numerous, overlapping purposes and
in virtual and fluid spaces."
Lemos (2010:8) cites Gow (2005a), according to whom surveillance "implies something
very specific such as the observation of someone's actions or the gathering of personal
information in order to monitor actions taken in the past or in the future." Lemos
questions this definition by pointing out that "not every form of control and
or monitoring might be called surveillance" , since surveillance
requires the presence of two elements : " intentionality , aimed at
avoiding or causing something , and a nominal identification of individuals and
groups". Lemos finds anonymous surveillance a difficult concept to grasp without
preventive intention, which aims to avoid something, and the identification of the one
being surveilled.
Data collection that could have coercive potential isn’t
“surveillance” until it has actually been analyzed by human
agents who monitor to make decisions about individuals---they
collapse routine collection into the category, which trivializes
the concept and makes specific analysis impossible
Bennett 13 – Colin J. Bennett, Associate Professor of Political Science at the
University' of Victoria, British Columbia, Global Surveillance and Policing, Ed. Zureik
and Salter, p. 132-133
Have I been the subject of surveillance or, more precisely, 'dataveillance' [Clarke 1989].
Again, the literature would suggest that any capture of personal information (however benign)
constitutes a surveillance process. Surveillance, Lyon contends, is 'any collection and
processing of personal data, whether identifiable or not, for the purposes of influencing
or managing those whose data have been garnered.' It is simply the outcome of the
'complex ways in which we structure our political and economic relationships' (2001: 2).
Marx (1938) It has also argued that there is a 'new surveillance' - routine, everyday,
invisible and pre-emptive. Linked to this broad definition is the power of classification
and sorting. It is a powerful means of creating and reinforcing social identities and
divisions [[Candy 1993H I.yon 20031.
Without dissenting from these judgements, two insights suggest themselves as a result of
the case studies above. First, my personal data (so far as I know) has not been processed for
any purpose beyond that of ensuring that I am a valid passenger on the days and flights
reserved. It has not been analysed , subjected to any investigation ,
manipulated or used to make any judgement about me . No doubt, a
certain amount of data mining of de-identified information occurs within the industry to
analyse general travel patterns and demands. No doubt, had I not opted out under the
Aero-plan privacy policy, my data might have ended up with a variety of Aeroplan's
partners, and I might have received related, and unrelated, promotional materials.
It seems, however, that there is a fundamental difference between the routine
capture, collection and storage of this kind of personal information, and any
subsequent
analysis of that information from which decisions (benign or otherwise) might be made
about me. The new process for API/PNR analysis serves to highlight the distinction. As a
passenger, when I return to Canada, that information is automatically transferred ahead
of my arrival to the CCRA's Passenger Assessment Unit at the Canadian airport, and it is
systematically analysed. Anybody within a 'high-risk' category is then subject to further
investigation. The crucial process , therefore, is not the capture and transmission of the
information, but the prior procedures , and the assumptions that underpin them,
about who is or is not a high-risk traveler. Surveillance might be 'any collection and processing of
personal data, whether identifiable or not.' If we are to use such a broad definition, however, we
active intervention of human
agents who then monitor that data to make decisions about individuals.
'Surveillance' conflates a number of distinct processes. To describe what has happened to me
as surveillance perhaps serves to trivialize the real surveillance to which some
need to find another concept to describe the
individuals, perhaps with 'risky' surnames and meal preferences, can be subjected during
air travel.
Surveillance is, therefore, highly contingent. If social scientists are to get beyond
totalizing
metaphors and broad abstractions , it is absolutely necessary to understand these
contingencies. Social and individual risk is governed by a complicated set of
organizational, cultural, technological, political and legal factors. The crucial questions
are therefore distributional ones: Why do some people get more 'surveillance' than
others |[ Bennett nd Raab 1997 2003)? But to address those questions, it is crucial to
conduct the kind of finely tuned empirical studies such as the one attempted above.
They curtail detection, not “surveillance”, because the primary
purpose of the data is not to enable intervention to suppress
behavior
Langlois 13 – Stephane Leman-Langlois, Professor of Criminology at the School of
Social Work, Laval University, The Surveillance-Industrial Complex: A Political
Economy of Surveillance, Ed. Ball and Snider, Google Books
Though they are not synonyms, security and surveillance cover vastly overlapping fields of
activity and can easily be amalgamated. It does not help that many of those fields are
identified as 'security' instead of surveillance' for political and/or marketing reasons
because it is safer to speak of security, a universal good, than surveillance, which may
raise suspicion. The positive and non-political appearance of 'security' is one of its most
important characteristics to those in the field of science and engineering, who sec their
work as isolated from politics. At any rate, it is not within the goals of this chapter to
clarify the boundaries and functions of this vocabulary. Consequently, I shall concentrate on
security technologies whose main function is clearly to enable surveillance, rather than those that
peripheral surveillance role, avoiding the fuzzy edges of the concepts. To
that end, I define surveillance as any form of information-gathering that is meant to
enable intervention . In the context of security, this intervention usually involves the
prevention or repression of behaviours identified as unwanted conduct
(Leman-Langlois 2007; Lcman-Langlois and Dupuis 2007). This excludes surveillance
devices meant to detect natural disasters , accidents , fires , electrical
power supply problems or other system malfunction, command-andcontrol appliances (such as Supervisory Control and Data Acquisition [SCADA]
play a
computers) as well as those forms of surveillance that bear on social relationships, consumer
behaviour or markets. It also excludes all security technologies that do not primarily serve
surveillance objectives (though they may peripherally), such as physical locks, weapons,
armour and protection technologies, etc.
They blow the lid off the topic---without preventive intent,
dozens of Affs and entirely new categories of policy become
topical because any information gathering, including benign
forms like weather monitoring and disaster warning, would
meet
Fuchs 11 – Christian Fuchs, Chair in Media and Communication Studies Uppsala
University, Department of Informatics and Media Studies. Sweden, “How Can
Surveillance Be Defined?”, Matrizes, July/December,
http://www.matrizes.usp.br/index.php/matrizes/article/viewFile/203/347
Normalization of surveillance
If everything is surveillance, it becomes difficult to criticize repressive forms of surveillance
politically because surveillance is then a term that is used in everyday language for
all sorts
of harmless information processes that do not inflict damage on humans. The
post 9/11 world has seen an intensification and extension of repressive surveillance. Therefore I consider it important to
have categories available that allow scholars, activists, and citizens to criticize these developments. If surveillance is a
normalized concept of everyday language use that characterizes all forms of information
gathering, storage, and processing and not only a critical concept, then this normative task
becomes more difficult. If everything is surveillance, then there is no outside of surveillance left,
no transcendental humanistic sphere, idea, or subject that allows to express discontent coercive information gathering and
the connected human rights violations. Repressive surveillance has slowly, but steadily, crept into our lives and it
therefore becomes easier that policy makers and other powerful actors present its implementation as necessary and
inevitable. The normalization of the concept of surveillance may ideologically support such developments. It is therefore in
my opinion a better strategy to make surveillance a strange concept that is connected to feelings of alienation and
domination. For doing so, it is necessary to alienate the notion of surveillance from its normalized neutral usage.
CONCLUSION
The task of this paper was to argue that it
is important to deal with the theoretical question of how
surveillance can be defined. My view is that it will be impossible to find one universal, generally accepted definition
of surveillance and that it is rather importance to stress different approaches of how surveillance can
be defined, to work out the commonalities and differences of these concepts, and to foster constructive dialogue about
these questions. A homogenous state of the art of defining surveillance is nowhere in sight and maybe is not even
desirable. Constructive controversy about theoretical foundations is in my opinion not a characteristic of the weakness or
of a field, but an indication that it is developing and in a good state. It is not my goal to establish one specific definition of
surveillance, although I of course have my own view of what is surveillance and what is not surveillance, which I try to
ground by finding and communicating arguments. Theorizing surveillance has to take into account the
boundary between surveillance and information and it has to reflect the desirability or undesirability of
normative and critical meanings of the term. No matter how one defines surveillance, each surveillance concept positions
itself towards theoretical questions such as the relation of abstractness and concreteness, generality and specificity,
normative philosophy and analytical theorizing, etc.
My personal view is that information is a
more general concept than surveillance and that
surveillance is a specific kind of information gathering, storage, processing, assessment,
and use that involves potential or actual harm, coercion, violence, asymmetric power relations, control,
manipulation, domination, disciplinary power. It is instrumental and a means for trying to derive and accumulate benefits
for certain groups or individuals at the expense of other groups or individuals. Surveillance is based on a logic of
competition. It tries to bring about or prevent certain behaviours of groups or individuals by gathering, storing,
processing, diffusing, assessing, and using data about humans so that potential or actual physical, ideological, or
structural violence can be directed against humans in order to influence their behaviour. This influence is brought about
by coercive means and brings benefits to certain groups at the expense of others. Surveillance is in my view therefore
never co-operative and solidary – it never benefits all. Nonetheless, there are certainly information processes
that aim at benefiting all humans. I term such information processes monitoring , it
involves information processing that aims at care, benefits, solidarity, aid, and co-operation,
benefits all, and is
opposed to surveillance .
Here are some examples of what I consider to be forms of surveillance:
* teachers watching private activities of pupils via webcams at Harriton High School, Pennsylvania;
* the scanning of the fingerprints of visitors entering the United States;
* the use of speed cameras for identifying speeders (involves state power);
* electronic monitoring bracelets for prisoners in an open prison system;
* the scanning of Internet and phone data by secret services with the help of the Echelon system and the Carnivore
software;
* the usage of full body scanners at airports;
* biometrical passports containing digital fingerprints;
* the use of the DoubleClick advertising system by Internet corporations for collecting data about users’ online browsing
behaviour and providing them with targeted advertising;
* CCTV cameras in public means of transportation for the prevention of terrorism;
* the assessment of customer shopping behaviour with the help of loyalty cards;
* the data collection in marketing research;
* the publication of sexual paparazzi photos of celebrities in a tabloid;
* the assessment of personal images and videos of applicants on Facebook by employers prior to a job interview;
* the collection of data about potential or actual terrorists in the TIDE database (Terrorist Identities Datamart
Environment) by the US National Counterterrorism Center;
* Passenger Name Record (PNR) data transfer from Europe to the United States in aviation;
* Telekomgate: spying on employees, trade unionists, journalists, and members of the board of directors by the German
Telekom;
* the video filming of employees in Lidl supermarkets and assessment of the data by managers in Germany;
* watching the watchers: corporate watch systems, filming of the police beating of Rodney King (LA 1992), YouTube video
of the police killing of Neda Soltan (Iran, 2009).
The point about these examples is that they all involve asymmetrical power relations, some form of violence, and that
systematic information processing inflicts some form of harm.
We live in heteronomous societies, therefore surveillance processes can be encountered very frequently. Nonetheless, it
would be a mistake to argue that domination is a universal characteristic of all societies and all social systems. Just think
of the situations in our lives that involve altruism, love, friendship, and mutual care. These are examples that show that
nondominative spheres are possible and actual. My argument is that it is possible to think about alternative modes of
society, where co-operation, solidarity, and care are the guiding principles (Fuchs, 2008). If information processes are
central in such a society, then I would not want to term it surveillance society, but solidary information society or
participatory, co-operative, sustainable information society (Fuchs, 2008, 2010).
examples of monitoring that are not forms of
surveillance :
Here are some
* consensual
online video sex chat of adults;
* parents observing their
sleeping sick baby with a camera or babyphone in order to see if it needs their
help;
* the permanent
electrocardiogram of a cardiac infarction patient;
* the seismographic
* the employment
early detection of earthquakes;
of the DART system (Deep-ocean Assessment and Reporting of Tsunamis) in the Pacific
Ocean, the Atlantic Ocean, and the Caribbean Sea for detecting tsunamis;
* the usage of a
GPS-based car navigation system for driving to an unknown destination ;
* the usage of a
fire detector and alarm system and a fire sprinkling system in a public school ;
* drinking
water quality measurement systems;
* the usage of smog and
air pollution warning systems;
* the activities of radioactivity measuring stations for detecting nuclear
* systems for detecting and
power plant disasters ;
measuring temperature, humidity, and smoke in forest areas that are
prone to wildfires;
* measurement
of meteorological data for weather forecasts.
The point about these examples is that there are systematic
information processes in our societies that do not
involve systematic violence, competition, and domination, but aim at benefits for all. One can certainly discuss
if these are particularly good examples and if the boundaries between the first and the second list can be clearly drawn, but
the central point I want to make is that there are political choices between advancing and regulating systematic
information processing that has repressive or solidary effects and that this difference counts normatively. Certainly, forms
of monitoring can easily turn into forms of surveillance, and surveillance technologies might be refined in ways that serve
solidary purposes. The more crucial point that I want to make is that normative theories, critical thinking, and critical
political practices matter in our society and that they need a clear understanding of concepts. I question postmodern and
constructivist approaches that want to tell us that it has become completely impossible to distinguish what is desirable and
undesirable or that all normative ideas and political projects are inherently prone to producing new forms of violence and
domination. I am convinced that a non-violent, dominationless society is possible and that it is especially in times of
global crisis important to have clearly defined concepts at hand that help criticizing violence and domination and points
towards a different world. I therefore see a need for a realist, critical concept of surveillance.
Aff
“Surveillance” is gathering data---it doesn’t require preventive
intent
Rule 12 – James B. Rule, Distinguished Affiliated Scholar at the Center for the Study
of Law and Society at the University of California, Berkeley, Routledge Handbook of
Surveillance Studies, Ed. Lyon, Ball, and Iaggerty, p. 64-65
For many people, the term “surveillance” conjures up images of the
systematic tracking of individuals’ lives by distant and powerful agencies.
These pop-up cartoon images are not entirely misleading. To be sure, surveillance takes
many different forms. But since the middle of the twentieth century, the
monitoring of ordinary people’s affairs by large institutions has grown
precipitously. Such direct intakes of detailed information on literally
millions of people at a time—and their use by organizations to shape their dealings
with the people concerned—represent one of the most far-reaching social
changes of the last 50 years. These strictly bureaucratic forms of
surveillance, and their tensions with values of privacy, are the subject of this
chapter.
Surveillance
Surveillance is a ubiquitous ingredient of social life. In virtually every
enduring social relationship, parties note the actions of others and seek to influence
future actions in light of information thus collected. This holds as much for intimate
dyads—mutually preoccupied lovers, for example, or mothers and infants—as for
relations among sovereign states. Surveillance and concomitant processes of social
control are as basic to the life of neighborhoods, churches, industries and professions as
they are to relations between government or corporate organizations and individuals.
But whereas the ability of communities, families, and local associations to track the
affairs of individuals has widely declined in the world's "advanced" societies,
institutional surveillance has lately made vast strides. Throughout the
world's prosperous liberal societies, people have come to expect their dealings
with all sorts of large organizations to be mediated by their "records." These
records are ongoing products of past interactions between institutions and individuals—
and of active and resourceful efforts by the institutions to gather data on
individuals. The result is that all sorts of corporate and state performances that
individuals expect—from allocation of consumer credit and social security benefits to the
control of crime and terrorism—turn on one or another form of institutional surveillance.
Perhaps needless to say. the outcomes of such surveillance make vast differences in what
Max Weber would have called the "life chances" of the people involved.
No twenty-first-century society, save perhaps the very poorest, is altogether without such
large-scale collection, processing and use of data on individuals' lives. Indeed, we might
arguably regard the extent of penetration of large-scale institutions into the details of
people's lives as one measure of modernity (if not post-modernity). The feet that these
activities are so consequential—for the institutions, and for the individuals concerned—
makes anxiety and opposition over their repercussions on privacy values inevitable.
Despite the slightly foreboding associations of the term, surveillance
need not be unfriendly in its effects on the individuals subjected to it.
In the intensive care ward at the hospital, most patients probably do not
resent the intrusive and constant surveillance directed at them. Seekers of
social security benefits or credit accounts will normally be quick to call
attention to their recorded eligibility for these things—in effect demanding
performances based on surveillance. Indeed, it is a measure of the pervasiveness
of surveillance in our world that we reflexively appeal to our "records" in seeking action
from large institutions.
But even relatively benevolent forms of surveillance require some
tough-minded measures of institutional enforcement vis-a-m individuals
who seek services. Allocating social security payments to those who deserve them—as
judged by the letter of the law—inevitably means hoi allocating such benefits to other
would-be claimants. Providing medical benefits, either through government or private
insurance, means distinguishing between those entitled to the benefits and others. When
the good things of life are passed around, unless everyone is held to be equally entitled,
the logic of surveillance demands distinctions between the deserving, and others. Ami
this in turn sets m motion requirements for positive identification, close record-keeping,
precise recording of each individual case history, and so on (see also Webster, this
volume).
“Surveillance” includes routine data collection---they exclude
the majority of contemporary activity and over-focus on
dramatic manifestations
Ball 3 – Kirstie Ball, Professor of Organization at The Open University, and Frank
Webster, Professor of Sociology at City University, London, The Intensification of
Surveillance: Crime, Terrorism and Warfare in the Information Age, p. 1-2
Surveillance involves the observation, recording and categorization of
information about people, processes and institutions. It calls for the collection
of information, its storage, examination and - as a rule - its transmission. It is a
distinguishing feature of modernity, though until the 1980s the centrality of
surveillance to the making of our world had been underestimated in social analysis.
Over the years surveillance has become increasingly systematic and
embedded in everyday life, particularly as state (and, latterly, supra-state)
agencies and corporations have strengthened and consolidated their
positions. More and more we are surveilled in quite routine activities, as
we make telephone calls, pay by debit card, walk into a store and into the path of security
cameras, or enter a library through electronic turnstiles. It is important that this
routine character of much surveillance is registered, since
commentators so often focus exclusively on the dramatic
manifestations of surveillance such as communications interceptions
and spy satellites in pursuit of putative and deadly enemies.
In recent decades, aided by innovations in information and communications
technologies (ICTs), surveillance has expanded and deepened its reach
enormously. Indeed, it is now conducted at unprecedented intensive and extensive
levels while it is vastly more organized and technology-based than hitherto.
Surveillance is a matter of such routine that generally it escapes our notice who, for instance, reflects much on the traces they leave on the supermarkets' checkout,
and who worries about the tracking their credit card transactions allow? Most of the time
we do not even bother to notice the surveillance made possible by the generation of what
has been called transactional information (Burnham, 1983) - the records we create
incidentally in everyday activities such as using the telephone, logging on to the Internet,
or signing a debit card bill. Furthermore, different sorts of surveillance are
increasingly melded such that records collected for one purpose may be
accessed and analysed for quite another: the golf club's membership list may be
an attractive database for the insurance agent, address lists of subscribers to particular
magazines may be especially revealing when combined with other information on
consumer preferences. Such personal data are now routinely abstracted from individuals
through economic transactions, and our interaction with communications networks, and
the data are circulated, as data flows, between various databases via 'information
superhighways'. Categorizations of these data according to lifestyle, shopping habits,
viewing habits and travel preferences are made in what has been termed the 'phenetic
fix' (Phillips & Curry, 2002; Lyon, 2002b), which then informs how the economic risk
associated with these categories of people is managed. More generally, the globe is
increasingly engulfed in media which report, expose and inflect issues from around the
world, these surveillance activities having important yet paradoxical consequences on
actions and our states of mind. Visibility has become a social, economic and political
issue, and an indelible feature of advanced societies (Lyon, 2002b; Haggerty & Ericson,
2000).
Broad interpretations of “surveillance” are key to advance
discussion of the topic beyond a limited fixation on overt
monitoring---that’s critical to capture the essence of modern,
bureaucratic information gathering
Ericson 6 – Richard V. Ericson, Principal of Green College, University of British
Columbia, and Kevin D. Haggerty, Doctoral Candidate in sociology at the University of
British Columbia, The New Politics of Surveillance and Visibility
p. 3-4
Surveillance involves the collection and analysis of information about
populations in order to govern their activities. This broad definition
advances discussion about surveillance beyond the usual fixation
on cameras and undercover operatives. While spies and cameras are
important, they are only two manifestations of a much larger
phenomenon.
The terrorist attacks of September 11, 2001 (hereafter 9/11) now inevitably shape any
discussion of surveillance (Lyon 2003). While those events intensified anti-terrorist
monitoring regimes, surveillance against terrorism is only one use of
monitoring systems. Surveillance is now a general tool used to
accomplish any number of institutional goals. The proliferation of
surveillance in myriad contexts of everyday life suggests the need to
examine the political consequences of such developments.
Rather than seek a single factor that is driving the expansion of surveillance, or detail
one overriding political implication of such developments, the volume is concerned
with demonstrating both the multiplicity of influences on surveillance
and the complexity of the political implications of these developments.
Contributors to this volume are concerned with the broad social remit of
surveillance - as a tool of governance in military conflict, health, commerce, security
and entertainment - and the new political responses it engenders.
Download