Syllabus

1. Introduction (9/1)

A Report on the. Surveillance Society. For the Information Commissioner by the Surveillance Studies Network. September 2006. P. 1-10 link

Lyon, Surveillance Studies, pp 13-18 link

2. Theory (9/8)

Lyon, Surveillance Studies, pp. 46-70

Michel Foucault, "The Eye of Power," CTRL [SPACE] pp. 94-102

Jeremy Bentham, "The Penitentiary Panopticon," CTRL [SPACE] pp. 114-119

Haggerty and Ericson, "The Surveillant Assemblage," British Journal of Sociology, 51 (4):605-622 link

Wood and Graham, "Permeable Boundaries in the Software-sorted Society: Surveillance and the Differentiation of Mobility," A Paper for 'Alternative Mobility Futures', January 2004 link

ASSIGNMENT: Be prepared to discuss areas of interest.

3. Surveillance and the state (9/15)

Sklansky, "Police and Democracy," Michigan Law Review, Vol. 103, p. 1699, June 2005, pp 1699-1708,1769-1770, 1778-1792, 1803-1810, 1815-1818, 1828-1829. link

Simmons, "Why 2007 is Not Like 1984: A Broader Perspective on Technology's Effect on Privacy and Fourth Amendment Jurisprudence," 97 J. Crim. L. & Criminology 531 (2006-2007) download here, log in with ischool username and password; online version at http://findarticles.com/p/articles/mi_hb6700/is_2_97/ai_n29360740/; also accessible on LexisNexis Academic (select "LexisNexis Academic," go to "Legal" tab, select "Law Reviews," search for article name.)

Stalder, "Privacy is not the Antidote to Surveillance," Surveillance and Society link

4. CCTV (9/22)

CITRIS Report: Community Safety Camera Program, 2008 http://www.ischool.berkeley.edu/files/CITRIS_SF_CSC_Study_Final_Dec_2008.pdf (read the summary)

5. ICT (9/29)

Strandburg, Katherine J., "Freedom of Association in a Networked World: First Amendment Regulation of Relational Surveillance," Boston College Law Review, Vol. 49, No. 741, 2008 link

Cohen, Julie E., "Privacy, Visibility, Transparency, and Exposure," University of Chicago Law Review, Vol. 75, No. 1, 2008 link

Parsons, "Deep Packet Inspection in Perspective: Tracing its lineage and surveillance Potentials," Jan. 2009 link

6. Crime and Safety (10/6)

E Erez, PR Ibarra, NA Lurie, "Electronic Monitoring of Domestic Violence Cases-A Study of Two Bilateral Programs," Federal Probation, 2004 68: 15 http://www.uscourts.gov/fedprob/June_2004/monitoring.html

Koskela, "Video Surveillance, Gender, and the Safety of Public Urban Space:" Peeping Tom" Goes High Tech?," Urban Geography, 2002 - Bellwether Publishing http://bellwether.metapress.com/content/e8m77u9747708245/

Goold, "Open to All - Regulating Open Street CCTV and the Case for Symmetrical Surveillance," 25 Crim. Just. Ethics 3 (2006) (online copy available at UC-eLink http://berkeley.worldcat.org/oclc/109841199&referer=brief_results, or download here, log in with ischool username and password)

(optional) H Koskela, "'The gaze without eyes': video-surveillance and the changing nature of urban space,' Progress in Human Geography, 2000 http://www.geog.psu.edu/courses/geog497b/Readings/Koskela.pdf

(optional) http://www.texasborderwatch.com/

ASSIGNMENT: Think about: Is symmetrical surveillance responsive to the concerns raised by Koskela? What might be?

7. Sorting, Surveillance and the private sector (10/13)

Danna and Gandy, "All that glitters is not gold: Digging beneath the surface of data mining," Journal of Business Ethics, 40(2002):373-386 link

Strahilevitz, "Privacy versus Antidiscrimination," University of Chicago Law Review, Vol. 75 link

Dempsey and Flint, "Commercial Data and National Security," The George Washington Law Review, Vol 72, Number 6 (August 2004) link

8. Access to information, intellectual inquiry and surveillance (10/20)

Conti, Gregory, "Considering Google harmful." Conference paper. New Security Paradigms Workshop, Schloss Dagstuhl, Germany. September 2006. link

The Center for Democracy and Technology's Report on Google Book Service, July 27, 2009. link

Cohen, "Normal Discipline in the Age of Crisis," Georgetown University Law Center, Public Law and Legal Theory Research Paper No. 572486 (August 4, 2004). link

Good et al., "Radio Frequency Identification and Privacy with Information Goods," Draft Submission for WPES 2004 link

9. Sousveillance (10/27)

Mann, "Sousveillance": inverse surveillance in multimedia imaging," In Proceedings of the 12th Annual ACM international Conference on Multimedia (New York, NY, USA, October 10 - 16, 2004). link

Kohn, "From Citizen to Subject: The Perils of Privacy," Unblinking Symposium UCB link

Vargas, "YouTube Clips Unveil Oakland Shooting," Washington Post, January 8, 2009 link

10. Coveillance (11/3)

Shaw, "Recognition Markets and Visual Privacy," link

Allen, "Dredging Up the Past: Lifelogging, Memory and Surveillance," University of Chicago Law Review, Vol. 75, p. 47, 2008 link

Blanchette and Johnson, "Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness," The Information Society, 18:33-45, 2002 link

ASSIGNMENT: In your opinion what is the most contentious issue that will arise if lifelogging becomes the norm? Be prepared to discuss, hopefully with an example.

11. Resistance and Support (11/10)

Marx, "A Tack in the Shoe and Taking off the Shoe Neutralization and Counter-neutralization Dynamics," Surveillance and Society Vol 6 No 3 (2009) link

Sanchez, "Facebook Feeding Frenzy: Resistance-through-Distance and Resistance-through-Persistence in the Societied Network," Surveillance and Society Vol 6 No 3 (2009) link

ASSIGNMENT: please come with an example of resistance or support of interest to you and be prepared to discuss it in relation to the readings with your classmates.

12. TBA (11/17)

Student Presentation

13. TBA (11/24)

Student Presentation

14. TBA (12/1)

Student Presentation

15. Closing Class (12/8)

A Report on the. Surveillance Society. For the Information Commissioner by the Surveillance Studies Network. September 2006. P. 64-75 link