CCTV Identity Management and Implications For Criminal Justice: Some Considerations
CCTV Identity Management and Implications For Criminal Justice: Some Considerations
CCTV Identity Management and Implications For Criminal Justice: Some Considerations
5(1): 33-50
http://www.surveillance-and-society.org
Abstract
The UK Presidency of the European Union called for an expansive, mandatory policy of surveillance
technologies aimed at the reduction of crime and the protection of citizens. Research indicates that the
efficacy for this task of the technology, epitomised by CCTV, cannot be taken for granted. This paper asks
whether the effects of the technological surveillance environment may be more problematic than currently
posited in the literature to the extent that they render more vulnerable and undermine the identities of those
they are pledged to safeguard. Much of the literature in surveillance studies debates whether surveillance
technology, particularly CCTV, has the effects of crime reduction and prevention attributed to it by
proponents. This paper goes one step further and through a process of critical analysis explores the import
for individuals subjected to the process of surveillance technologies epitomized by CCTV. In particular the
paper addresses the question as it is perceived through the postmodernist agenda. Accordingly in the
process of critical analysis the paper considers the effects of transcarceration, the phenetic fix and the
technological imperative.
Background Issues
McCahill and Norris (2002) estimated that in the UK there are over 4.2 million CCTV
cameras, one for every 14 citizens. A UK citizen may be captured on CCTV up to 300
times each day (Murakami Wood et al., 2006: 7). The figures indicate a higher
camera/citizen ratio in the UK than in any other state on earth. It is against this backdrop
that on the 7th September 2005 the UK Presidency of the European Union released a first
formal report on security enhancement entitled Liberty and Security: Striking the Right
Balance2. The main intention of the report was to further promote surveillance
technologies in order to safeguard freedom and security. Some of the policies suggested
in the report are domestic UK policies that had failed in the UK for a variety of reasons
∗ In the context of this paper identity management describes the process whereby the individual’s identity
is recast through the medium of CCTV surveillance technologies.
1 All: Centre for Computing and Social Responsibility, Faculty of Computing Sciences and Engineering,
De Montfort University, UK. mailto:moiracaroll2000@yahoo.co.uk
2 The report may be accessed at
http://www.privacyinternational.org/issues/terrorism/library/ukpresidencypaperonstrikingtherightbalance.p
df. It is also accessible at: http://www.fco.gov.uk/Files/kfile/LibertySecurity.pdf [Last accessed Jan 18th,
2008].
(Riley, 2003:16; FIPR, 2003). What is nevertheless interesting about the report is that it
suggests that surveillance technologies are generally justified in the fight against crime
and terrorism. It is based on strong assumptions about the nature of crime, of law
enforcement and of the role of technology as a facilitating factor for providing security.
But it must be emphasised that there is no agreement as to the effectiveness of CCTV
technology as a panacea to misbehaviour. This will come as no surprise to scholars in the
field of surveillance studies. Research on the effectiveness and efficiency of surveillance
technologies in the UK has shown that their efficacy is dubious. A leading study
conducted for the Home Office concludes that CCTV does not lead to crime reduction
(Gill and Spriggs, 2005: 60). Gerrard et al. (2007:11) are careful to stress the ongoing
debate as to CCTV efficacy in crime reduction and prevention. Any analysis of the value
to society of increased technologically enabled surveillance must, in the face of its
promotion by the authorities as a general panacea, take account of the doubtful status of
CCTV as a crime reduction tool.
This paper aims to counter balance the blanket approval of CCTV surveillance
technologies by policy makers. Overall, the paper asks readers to go beyond the standard
issue of usefulness of CCTV surveillance technology and develop a broader account that
allows an appreciation of unexpected and counter-intuitive effects of the technology.
The paper critically analyses the events surrounding the deaths of Rigoberto Alpizar and
Jean Charles De Menezes in the CCTV rich environments of an airport and underground
rail station respectively. Of airports Adey (2004:1477) has this to say ‘they are symbols of
mobility, emblematic of the postmodern world… well and truly a space under
surveillance’. Since mobility is often viewed as a risk to the social order (Adey, 2004:
1478), it is no surprise that surveillance in the form of CCTV should be concentrated and
implicated there in societal conflict. Their role in surveillance has gone largely unnoticed
by surveillance studies, reflecting the invisibility of these transient ‘non-places’ within the
social sciences (Adey, 2004:1). Cwerner (2006) concurs and explains, ‘the social sciences
and humanities have had relatively little to say about these systems and processes
(comprising airports) partly because such time-systems are gated and off-limits’. (The
position is exacerbated since as Gerrard et al. (2007:28) note there is refusal to reveal ‘the
needs’ of state agencies regarding viewing, analysis and recovery of CCTV footage due to
national security considerations.) The role of surveillance at airports, largely ignored,
reflects that invisibility. Despite invisibility and obfuscation, what happens there [and
surely now at rail stations] is a microcosm of events to come as through surveillance
technologies a range of political agendas and aspirations strive to effect wider society
(Lyon, 2003: 410). We may learn useful lessons from what happens within them for other
places and spaces.
The thrust of the paper is all the more pertinent in light of recent research for the Home
Office and other major stakeholders in CCTV (Camerwatch Launch Report, 2007)
revealing that over 90% of the CCTV cameras from which police evidence is obtained fail
to meet the Information Commissioner’s Code of Practice and are operated illegally
(Ferrie, 2007). Ferrie states too,
Courts are also taxed by questions of image quality. Cunningham (2007) representing the
Home Office and ACPO states ‘The use of CCTV as an evidential tool has grown
significantly but 89% of CCTV images that reach the police is far from ideal.’ The theme
is repeated in the National CCTV Strategy 2007,
Anecdotal evidence suggests that over 8o% of the CCTV footage supplied
to the police is far from ideal, especially if it is being used for primary
identification or identities are unknown and identification is being sought,
for instance by media release.
(National CCTV Strategy, 2007: 2.2.2)
Underscoring these problems are the informing instructions issued by the Fifth Report of
the House of Lords Science and Technology Select Committee3 whereby it is left to the
discretion of the courts whether to admit CCTV evidence. Current practice is to admit
such evidence even where there are weaknesses arising for example from image quality or
authenticity. Such issues go instead to the weight afforded to the CCTV evidence within
the judicial process. The Committee having looked at issues effecting the admissibility of
digital imaging for evidential purposes for example loss of quality attendant upon
compression, image manipulation and authentication concluded, ‘Evidence should not
necessarily be inadmissible because it does not conform with some specific technological
requirement.’4. The laissez faire approach is perhaps understandable if it understood, for
example, that though it is possible to go through CCTV operating code line by line it is
not possible to see it in operation; CCTV software algorithms are operationally obscure
(Introna and Wood, 2004:183). This difficulty is equalled by there being a mere handful
of experts worldwide with the ability to understand and interpret the algorithmic trial left
by smart CCTV (Philips et al., 2003).
Methodology
The paper addresses the issue of CCTV and its implications for identity management
within the criminal justice system through the lens of critical theory, it proceeds upon the
basis that there is inherent structural conflict at the nexus of the technology and the
interests of societal stakeholders. Since the presence of structural conflict provides the
ideal milieu for critical research (Fay, 1987: 27) this was a major factor in the decision to
proceed from that theoretical standpoint. Taking into account the blanket and pervasive
nature of the hegemonic discourse, characterised by the call of the UK Presidency of the
EU to intensify CCTV surveillance technologies, a theoretical approach was required that
would effectively probe the attendant incomplete, ambiguous and contradictory discourse.
Critical analysis finds what lurks behind and what is really being said (Bondarauk and
Hubb, 2003: 2). Overarching all of this is the consideration that of all the main stream
methodologies only critical analysis permits the identification, investigation and
judgement of the effects of phenomenon outside the boundaries of origin. It answers the
question ‘how’ invites prescription and does not preclude dismay (Potter, 1996:3).
Gerrard et al. (2007: 24) opine, ‘there appears little doubt the police service utilizes
CCTV images in the investigative process and has considerable success in doing so. High
profile cases have reinforced the investigative benefits of CCTV, which not only assist
police officers in the identification of offenders but also help establish the nature, location
and time of the crime...’ Their remark is immediately preceded by an acknowledgement
that there is a lack of formal research evidence for the conclusion5.
It is instructive to look at formal research evidence that does exist. There is near
consensus that the presence of CCTV in the working environment of police officers can
produce negative effects on their behaviour (Werrett, 2003: 192). These effects may
manifest in mistakes or in the commission of criminal offences. Goold (2003) found that
though officers positively modify their behaviour in the presence of CCTV that they
exhibit a tendency to manipulate CCTV deployment to their advantage. Goold (2003:
199) cites Norris and Armstrong (1999: 190) who identified police practices such as
signalling operators to pan away from questionable police activities and ignoring or
suppressing CCTV footage in order to create evidential biases. Goold’s findings,
gave reason to believe that police officers at some of the [CCTV] schemes
had attempted to remove tapes that they feared might contain footage of
police misconduct. At police led schemes operators claimed that on a
number of occasions officers had come up to the CCTV control room
following incidents in which they had been required to use force and had
asked to ‘check the tape.’
(Goold, 2003: 199)
According to one CCTV operator interviewed by Goold many officers did not view
themselves bound by the Code of Practice rules on CCTV evidence handling and access.
Goold reports that officers at police led schemes viewed the evidence as existing
primarily for their benefit and displayed signs of regarding themselves as the rightful
owners of all evidence generated by CCTV. At times they were emboldened to remove
tapes without authorisation.
The proprietary stance of the police towards CCTV evidence must be viewed against the
5 Gerrard et al. (2007:26) report that the Police Standards Unit does not publish performance data for
CCTV evidence and that there is therefore no quantifiable data regarding the success of CCTV evidence
an investigative tool. The explanation rendered is the absence of all activities relating to CCTV evidence
from the police National Competency Framework and that therefore the retrieval and compilation of
CCTV evidence is still not a recognised practice or a recognised police officer’s role.
‘broad concern’ regarding the problem of police perjury6 and police involvement in
perverting the course of justice7 in the UK referred to by Edwards (2002: 1).
Of course the manipulation of CCTV evidence is not peculiar to the police. The Rodney
King case is the most compelling extant illustration of CCTV manipulation by both sides
in criminal proceedings. In 1992 Mr Rodney King, an Afro-American, was stopped for
speeding and subsequently assaulted by the four arresting white police officers. The event
was video recorded by a man from a nearby building which recording became subject to
various forms of distortion by the opposing sides in the prosecution of Mr King’s
attackers. Goodwin (1994: 2) states,
Opposing sides in the case used murky pixels of the same television image to display to
the jury incommensurate events: a brutal savage beating of a man lying helpless on the
ground versus careful police response to a dangerous ‘PCP- crazed giant’ who was argued
to be in control of the situation. By deploying an array of discursive practices including
talk, ethnography, category systems articulated by expert witnesses, and various ways of
highlighting images provided by the video tape, lawyers for both sides were able to
structure [the depicted actions ergo the characters of the actors] in ways that suited their
own distinctive agendas…
Following the application of the code to the images what is in fact a brutal assault is
deconstructed into a new set of events as follows:
6 The Perjury Act 1911, section 1 provides for the offence of lying on oath. Lying on oath includes false
declarations per the Criminal Justice Act 1967, s.89 and the Magistrates Court Act 1980, s.106 covering
statements tendered in committal proceedings and representations punishable under any statute in judicial
proceedings. The offence is triable on indictment only and attracts a seven year maximum sentence.
7 Perverting the course of justice is a common law offence; triable on indictment only it may attract a life
sentence though in practice is unlikely to result in a sentence exceeding ten years imprisonment. The
offence includes fabrication or disposal of evidence or inducing others to do so. Edwards (2002) indicates
that police officers found guilty of perverting the course of justice are likely to attract sentences of
between four and seven years for perjury relating to the most serious charges of murder, violence and
drugs. Perjury and perverting the course of justice strike at the basis of the rule of law and have been said
to ‘poison the well of justice’ Crabtree J. in R v. Archer, unreported 2002, Para 63.
Defense: There were ten distinct uses of force rather than one single use of
force. In each of those, uses of force there was an escalation and a de
escalation an assessment period, and then an escalation and a deescalation
again. And another assessment period.
Actions the prosecution describe in the second trial as ‘beating the suspect into
submission’ is then transformed into a display that the ‘period of de escalation has
ceased’:
Goodwin anticipates objections that the expert’s point is tautology; that if one is being
struck repeatedly then by definition the moments in between are de-escalations. Goodwin
responds ‘However much more than tautology is involved. By deploying the escalation-de
escalation framework the expert has provided a coding scheme that transforms the actions
being coded into displays of careful, systematic police craftwork’. At another stage the
defence expert codifies images of Mr King’s buttocks rising slightly in a manner that
unleashes a cascade of perceptual inferences that have the effect of exonerating the
officers and of recasting the identity of the victim as the controller of the action
(Goodwin, 1994: 22).
There are other more insidious forces at work in the CCTV environment. Towards an
explanation of the origins and effects of CCTV identity management exemplified at its
most extreme by the cases of De Menezes and Alpizar, this paper draws attention to
similarities between the characterisation of ‘suspects’ on CCTV and the characterisation
of the mentally ill on televised media through a process of transcarceration. The concept
of transcarceration originally described confinement of the mental patient within and
between environments wherein the individual’s identity and autonomy might be expunged
or modified. The concept has been extended by Arrigo et al. (2005), Lowman et al.
(1987) and Haggerty (2004) to cover those targeted by the criminal justice system.
Haggerty (2004: 218) describes how environments conducive to transcarceration evolve
from the replacement of ‘criminological experts who targeted policy intervention at the
level of the individual or the social by new experts in the situational’ [italics added].
Their focus is upon crime control through transformation of the immediate physical
environment. Situational criminology stresses crime reduction through loss prevention,
target hardening and enhanced visibility; each of these is realised through CCTV as in the
There are two intersecting axes that pass through the speaking subject (Chong et al.,
2006), the plane of meaning and being and the plane of the existential and the symbolic.
The former is identifiable in the linguistic struggle of the psychiatric patient as he seeks to
assert his legitimacy through the limiting, established clinico-legal system of
communication. The latter is identifiable in the articulation of self referential, thematic,
circulated meanings and values of the clinico-legal professions. Clinico-legal speech, the
medium for discussion of mental illness, is ‘steeped in and governed by a grammar that
privileges disciplinary systems’ (Foucault, 1977). In the taken-for-granted clinico-legal
communication setting the mentally ill are over time denied the individuality and validity
they would otherwise posses.
Consider now the societal response to one whose likeness appears on CCTV footage that
has been sequestered or otherwise obtained for the identification of a criminal actor. Not
for him a luxurious world where disempowered voices may nonetheless be heard from
‘the plane of meaning and being’ (Chong et al., 2005). In the silent movie world of CCTV
evidence, in a process of ‘transcarceration’ (Arrigo et al., 2005), suspects are moved
between nowhere and the scene of crime. Worse, they are left hovering, loitering at the
scene, assuming guilt by association. Separated from reality, isolated in virtual reality,
deconstructed within hours, minutes or seconds, according to the temporal constraints of
pressurised police activity, they have no voice. This is, as Chong et al. (2006) would have
it, the ‘manifestation of punishment assuming a discursive linguistic form’. The
superimposition of the suspect’s silence by the voice of authority has consequences that
will be considered.
Personal appearances upon publicly located CCTV screens are unaccompanied by the
voice of the actor. They acquire, in the hands of the police however, a ‘voice over’. The
absence of voice is important in the process of transcarceration. The superimposition of
the voice of authority is critical. From this side, through the lens of critical
postmodernism, it is possible to explain how the superimposition of the voice can lead to
the virtual criminalisation of those depicted on CCTV. It partially explains the horrifying
consequences, for Jean Charles De Menezes, attendant upon the appearance of his look-
alike, a suspected July 7th bomber, on CCTV (IPCC, 2007). For Rigoberto Alpizar it may
explain in part why he was gunned down at Miami airport.
the evidence of the discredited ‘expert’ have failed. Despite defence argument based on
the CPS guidelines judges are determined to give weight to the reliability of lip reading
evidence of CCTV images. In R v Lutterel8 the court opined,
lip reading from a video like facial mapping, is in our view a species of
real evidence…We are entirely satisfied that lip reading evidence as to the
contents of a videoed conversation is capable of passing the ordinary test
of relevance and reliability and therefore being potentially admissible in
evidence.
With respect the wisdom of the finding is questionable. The Association of Teachers of
Lip Reading for Adults has recommended members do not carry out forensic lip reading
for the police since reliability cannot be guaranteed. Professor Quentin Summerfield an
expert in linguistics tested the discredited expert’s deciphering skills with CCTV footage
before her employ by the police. In one test from 297 words she cited 43 that were
unuttered and in another 87 (Johnson, 2005). Johnson quotes Jane Hickman of the
Criminal Appeal Lawyers Association,
No one asks, ‘How far should we go with forensic evidence?’ And its
increasingly becoming the whole story in a trial. The trend as science
advances is for the Crown to adduce evidence that is not sufficiently
developed. Juries are being asked to draw conclusions that the evidence
can’t bear.
Adey (2004: 502) and Lyon (2002b) talk about the ‘phenetic fix’ achieved by surveillance
technologies that capture in a snapshot the [apparent] essence of movements, bodies and
identities9 10. Information obtained from the snapshot is used to determine who might be a
threat and should therefore be subjected to more intense security analysis. Before the
shooting of De Menezes a grainy CCTV image of a suspected London bomber Hussein
Osman was used by the police to determine that De Menezes merited ‘another look’
(IPCC, 2007: 12.9). This loose determination triggered a train of events that culminated in
officers shooting their suspect dead, allegations of police criminality and ultimately to
findings of endangering public safety. Ominously the Stockwell One Report invites the
Crown Prosecution Service to consider charges of murder against two officers (IPCC,
2007).
Due process has long been the quarry of a pressurised police force (Williams, 2000;
Kaufman, 1998; Anderson and Anderson, 1998). In the wake of the September 11th
attacks in America and of the July 7th London bombings due process finds itself closer
than ever to becoming the victim of that force. At the forefront of the ‘war on terror’ it is
apparent that CCTV footage increasingly precedes arrest and interrogation as the first
point of contact between the police and terrorist suspects. It is arguable that an appearance
upon CCTV vies with interrogation, attracting the accolade attributed to the latter by
Williams (2000: 209), ‘a critical forum in which initial information and impressions are
exchanged’. Through the phenomenon of the phenetic fix it may become for the police
much more than prima facie evidence, as to it they attach a presumption of guilt.
from the involvement of CCTV in the debacle1213. Worryingly such an effort would
deflect discussion away from the ethical and legal implications of deploying, in the civil
setting, autonomous decision systems that identify potential human targets. Ethicists and
lawyers pay scant attention to the implications of these devices in the military realm
where they are the cause celebre of western military planners (Carroll-Mayer and Stahl,
2005). As they encroach upon the civil setting that apathy becomes more dangerous than
ever.
In Speed and Politics Virilio (1986: 6) proposes ‘dromomatics’, the influence of speed
upon all aspects of urban life, for example transportation, communication and warfare.
As computers accelerate and set the pace of human transactions, humans in turn are
enthralled to what Virilio terms ‘the technological imperative’. There is evidence to
suggest that the police and others closely involved with CCTV are subject to the
technological imperative; the trite saying ‘because the machine says so’ takes on sinister
meaning as we become what the machine says we are. Manning (1988: 155) posits that
technology enslaves officers, ‘…although the public pays them, they work for the
machines that lurk behind them, glow in front of them, click and buzz in their ears and fill
the air with electronic sounds’.
This type of response exemplified by, for example, a tendency to respond more to
technological ‘chat’ than to human command in the control based situation, that is well
documented (Cummings, 2004: 6). Worryingly it is only very recently, for the first time,
and entirely by accident, that the influence of the technological imperative has been noted
in the targeting situation. The unexpected results arose from tests undertaken by the US
Navy to measure the situational awareness of human controllers of Tomahawk missiles
(Cummings, 2004: 5). The tardiness of this discovery was unmodified by situational
awareness being as Klein (2000) states ‘of utmost importance’ to military planners or by
previous research by (Ruff at al., 2002) indicating reduced situational awareness arising
from poorly designed human/computer interfaces. It is not suggested that the complexity
of the military systems is on par with systems such as might be provided by Marconi at
Miami airport. It is suggested that human responses to the embedded instant messaging
interface in systems such as that provided by Marconi have the propensity to embody the
shortcomings identified in the Tomahawk research. Accordingly the potential for
catastrophic consequences in air and rail termini and in other surveillance intense
environments exists.
12 Discussion of the Marconi system is clouded by obfuscation. Gager (2005) reports Jack Waskowicz
head of the program at Miami airport saying of the system that its details ‘cannot be revealed’. It is
interesting to note also that the system does not appear to have a name though it is however part of the
Marconi Simple Multiservice Architecture for Reliable Transport (SMART) programme. Probably the
most informative document is one released by Marconi in 2003. Described by the company as a White
Paper on Security and Surveillance it was entitled ‘Mission Critical Security Network for Critical
Infrastructure Protection’
13 Editor’s Note: Marconi was largely absorbed by Ericson late in 2005 (Goring, 2005) and most of their
reports and documentation are no longer available online or have been rebadged.
…an unexpected behavioural trend was noted in regards to the use of the
instant message interface…Many subjects fixated on the instant messaging
and ignored primary tasking of retargeting missiles in urgent situations.
This occurred despite the fact that all subjects were repeatedly instructed
that retargeting instructions were their primary priority tasking and that
answering queries through the chat box was the least important of all
tasks…Many subjects would answer all queries before attending to the
more pressing retargeting problems…This could be costly from an
operational perspective…
(Cummings, 2004: 6).
The chatter from the ‘chat box’ overrode other more vital tasking information. Cummings
emphasises that though these findings were unexpected and did not result from
experiments directed at eliciting such information they highlight the need for more
research into the effects of instant messaging upon task performance. Manufacturer’s
literature about digital surveillance systems typically state that the systems analyse,
The alerts disseminated by systems such as those provided by Marconi equate with ‘chat’.
It is not known whether the Marconi system did issue ‘alerts’ at Miami Airport in the
incident in question, but if the Marconi system did issue alerts in response to its
observation of Mr Alpizar these may have been blindly reacted to by the human agents to
the exclusion of other equally valid and important information.
There is evidence tending to suggest that this may have happened. Much has been
reported in the press and in the report of Miami-Dade State Attorney’s office about Mrs
Alpizar having told just about anyone within earshot that her husband’s behaviour was
being driven by illness. Strangely however this vital information did not impinge upon
that collated by Airport security. The unfruitful efforts of Mrs Alpizar are eerily
reminiscent of those of the human agents on the ground in Kosovo just prior to the
bombing of the Chinese Embassy. On that occasion the systems used to guide bombers
mistakenly identified the Chinese Embassy in Belgrade as a legitimate target. Human
agents, on the ground, aware of the mistake frantically attempted to intercept the Secure
Internet Protocol Router Network (SIPERNET). They failed because SIPERNET is a
closed system, incapable of being infiltrated by outside information (Ignatieff, 2000: 64).
In light of the findings cited by Cummings it is debateable, had it not been a closed
system, whether the human voices would in fact have resulted in a countermand to the
strike order.
There is another indication that those in charge of the surveillance systems at Miami are,
probably unconsciously, acquiescing to the technological imperative. This lies in the
unequivocal response of officials when questioned as to how killings like that of Mr
Alpizar could be avoided in the future (Cohen, 2005). The officials advocate,
Now points 1-3 are disquietingly self explanatory. Point 4 however is disturbingly
curious. Every day thousands of travellers for myriad reasons are fidgety, irritable or
downright obstreperous, they may rush and they may struggle. Many of us, for example,
know someone whose fear of flying is physically manifested. The possibilities are
infinite. Security experts are effectively saying that as long as humans have the
propensity for physical behaviour that is not recognised by algorithms as ‘normal’ they
face execution. Further, execution might be considered legitimate if friends and relatives,
having predicted the behaviour in advance or having noticed it, fail to communicate their
knowledge to precisely the right people15.
This approach ignores the cognitive nature of computers. Unlike humans who grow into
the position of being moral agents by socialisation, enculturation and learning (Stahl:
2004: 70) computers have no social history from which to form a sense of meaning.
Algorithms cannot decide which data is relevant to the construction of morally informed
action (Carroll-Mayer and Stahl, 2005: 6).
15 If otherwise suspicious behaviour is to be discounted on the basis of such reports, and they became
common, it is hard to see what would stop potential terrorists similarly phoning to advise that their fear of
flying may mean that they behave erratically before the flight as a way of deflecting suspicion.
16 See Note 14.
It is with dismay one notes the complete absence of references to CCTV in the 41 page
report issued by the Miami Dade State Attorney’s Office exonerating two Air Marshals
from guilt in the Alpizar killing. There are hundreds of smart CCTV cameras at Miami
Airport yet images from none were referred to in the evidential process. Several still
photographs were included in the report but were taken and provided by Miami-Dade
police department after the events. The remark made by Gerrard et al. (2007: 28) as to
state agencies’ refusal to discuss publicly their CCTV ‘needs’ is recalled and takes on
refreshed significance in the light of that report. The last paragraph on the last page states:
In the face of such obfuscation it is unlikely we will ever know the extent of the
involvement of a CCTV system in the death of Rigoberto Alpizar.
As Dick (2004: 52) reminds, policing is socially constructed. Why then, despite the
Menezes and Alpizar killings, evidence suggesting that the police interfere with CCTV
evidence, and authoritative findings that CCTV does not reduce crime or increase
detection, does the public demand more? In part this is explained by a sense of comfort
gained from CCTV, the feeling that an area is safer. Post September 11th and July 7th
Lacan’s voice of ‘desire’ is siren. In the ‘war on terror’ the social capital of the voice ‘on’
the CCTV video tape is maximised; offering security, it delivers danger.
Conclusion
The paper looked at the effects of CCTV surveillance in extremis as they intermingled to
a greater or lesser extent with the other causal factors affecting the deaths of Rigoberto
Alpizar and Jean Charles De Menezes in the CCTV rich environments of airports and
train stations. It considered the nature of these environments, reconstructed through
technologies of surveillance by ‘the new experts in the situational’, as they displace
experts whose remit was the individual and the social. Casting the reconstructed CCTV
rich environments of the airport and the station as prescient microcosms of other/wider
spaces the paper illuminated the societal pitfalls. In sum the paper draws attention to
research findings tending to suggest that inadequately considered reliance upon CCTV
evidence promises the worst of all possible worlds, a world where crime is not in fact
reduced, where the legitimate forces of law may themselves be compromised and the
identity of the individual ultimately lost. It is time to interrogate the strengths and
weaknesses of CCTV technology, its power to mislead and openness to abuse so that its
capabilities can be better harnessed to draw in tandem the interests of the criminal justice
system and of the individuals affected by it.
References
Adey, P. (2004) Secured and Sorted Mobilities: Examples from the Airport, Surveillance and Society 1 (4):
500-519. http://www.surveillance-and-society.org/articles1(4)/sorted.pdf
Anderson, B and D. Anderson (1998) Manufacturing Guilt: Wrongful Convictions in Canada, Halifax,
Fernwood Books.
Arrigo, B.A. (2001b) Transcaration: A Constitutive Ethnography of Mentally Ill Offenders, The Prison
Journal 81(2):162-186.
Arrigo, BA., D. Milovanovic and R.C. Schehr (2005) The French Connection in Criminology:
Rediscovering Crime Law and Social Change. Albany New York: SUNY Press.
Bondarauk,. T. and R. Hubb (2003) Discourse Analysis: Making Complex Methodology Simple. Cambridge:
Polity Press.
Carroll-Mayer, M. and B.C. Stahl (2005) The Wild West: Nanotechnological Weaponry and the Rule of
Law on the Battlefield, British and Irish Law Education and Technology Association, 20th
BILETA Annual Conference. Queens University, Belfast, 6th-7th April, 2005.
Carroll-Mayer, M, Fairweather. B, and Stahl B (2006) Ignotious Per Ignotum: 21st Century Surveillance
Technology and the Presumption of Guilt, British and Irish Law Education and Technology
Association, 21st BILETA Annual Conference. Malta, April 2006.
Datamonitor (2005) Marconi wins £150 million London Underground Contract, 26th Jan 2005
http://www.datamonitor.com/industries/news/article/?pid=F11014B5-69AD-43C4-B860-
A5FDC406DEC8&type=NewsWire (Last accessed 18th Jan 2008)
Chong, P., S. Ho and B. Arrigo (2006) Reality Based Television and Police Citizen Encounters, Punishment
and Society 8(1): 59-85.
Coffey, M. and Hannigan B (2005) Community mental health in the UK: restructuring for the 21st century,
Sociale Psychiatrie 24(75): 25-30
Cohen, M. (2005) ‘Experts stand behind air marshal in Miami incident’, Baltimore Sun Dec 9th.
http://archive.southcoasttoday.com/daily/12-05/12-09-05/a07wn633.htm (last accessed Jan 18th
2008)
Cusick, J. (2006) An Innocent Man Shot Dead on the Tube by Police. Sunday Herald Aug 21st
http://findarticles.com/p/articles/mi_qn4156/is_20050821/ai_n14915960 (Last accessed Jan 18th
2008)
Crang, M. (2002) Between Places Producing Hubs Flows and Networks-Introduction. Environment and
Planning, A 34(4): 569-574.
Cummings, M.L. (2004) The Need for Command and Control Instant Message Adaptive Interfaces:
Lessons Learned from Tactical Tomahawk Human in the Loop Simulations, Cyber Psychology and
Cusick, J. (2005) An Innocent Man Shot Dead on the London Tube by Police, Sunday Herald, 21st August
http://findarticles.com/p/articles/mi_qn4156/is_20050821/ai_n14915960 (Last accessed 18th Jan
2008)
Cwerner, S. (2006) conference web page Air Time-Spaces: New Methods for Researching Mobilities,
Lancaster University, UK, 29TH-30 September 2006
http://www.lancs.ac.uk/fass/sociology/cremore/airspaces/airspaces.htm (Last accessed November
3rd, 2007).
Davenport, J. (2005) London Tubes To Use High Tech Explosives Scanners, Evening Standard, November
15th, 2005.
Dick, P. (2004) The Position of Policewomen: A Discourse Analysis Study. Work Employment and Society,
BSA publications, 18:1, Sage Publications: Thousand Oaks: New Delhi.
Edwards S.M. (2002) Perjury and Perverting the Course of Justice Considered available at
http://74.6.146/search/cache?ei=UTF-
8&p=perverting+course+of+justice+uk+police&rd=r1&u=www.buckingham.ac.uk/publicity/articl
es/edwards-paptcojc.pdf&w=perverting.pdf. Last accessed October 7th, 2007.
Fay, B. (1987) Critical Social Science: Liberation and Its Limits, Polity Press Cambridge.
Foundation for Information Policy Research (FIPR) (2003) Surveillance and Security,
http://www.fipr.org/surveillance.org (Last accessed Nov 11th 2007).
Foucault, M. (1977) Discipline and Punish: The Birth of A Prison. New York: Pantheon.
Freud, S. (1914) The History of the Psychoanalytic Movement, translated by A.A. Brill
http://psychclassics.yorku.ca/Freud/History/index.htm
Gerrard G., G. Parkins, I. Cunningham, W. Hill, S. Jones and S. Douglass (2007) The National CCTV
Strategy, Report for the Home Office, October 2007
http://www.crimereduction.homeoffice.gov.uk/cctv/cctv048.pdf (Last accessed Nov 11th, 2007)
Gill, M. and A. Spriggs (2005) Assessing the Impact of CCTV. Home Office Research Study 292 Feb 2005,
http://www.homeoffice.gov.uk/rds/pdfs05/hors292.pdf (Last accessed Jan 18th 2008).
Goodwin, C. (1994) Professional Vision, American Anthropologist (New Series) 96(3): 606-633.
http://sscnet.ucla.edu/clic/cgoodwin/94prof_vis (Last accessed Nov 2nd 2007)
Goold, B. J. (2003) Public Area Surveillance and Police Work: The Impact of CCTV on Police Behaviour
and Autonomy, Surveillance & Society 1(2):191-203
Goring, N. (2005) Ericsson to buy most of Marconi for $2.1B: Ericsson acquires Marconi's optical
networking equipment, broadband access and softswitch products. IDG News Service, October 25.
http://www.infoworld.com/article/05/10/25/HNericssonmarconi_1.html (Last accessed Jan 18th
2008).
Haggerty K.D. (2004) Displaced Expertise: Three Constraints on the Policy-Relevance of Criminological
Thought, Theoretical Criminology 8(2): 211-231
Hickman, J. (2005) quoted in Downfall of the Silent Witness, interview with Angela Johnson, Mail on
Sunday, July 10th 2005.
Home Office (2007) Talking CCTV brings voice of authority to streets, 4th April 2007
http://www.homeoffice.gov.uk/about-us/news/talking-cctv (Last accessed Nov 2nd, 2007).
House of Lords Science and Technology Select Committee, Fifth Report, Digital Images as Evidence, 3rd
February 1998.
Ignatieff, M. (2000) Virtual War: Kosovo and Beyond, London: Metropolitan Books.
Introna, L. and D. Wood (2004) Picturing Algorithmic Surveillance: The Politics of Facial Recognition
Systems, Surveillance & Society 1(2): 177-198.
Independent Police Complaints Commission (IPCC) (2007) Stockwell One: Investigation into the Shooting
of Jean Charles Menezes at Stockwell Underground Station. London: IPCC.
http://news.bbc.co.uk/1/shared/bsp/hi/pdfs/08_11_07_stockwell1.pdf (Last accessed 18th Jan
2008)
Johnson, A. (2005) Downfall of the Silent Witness, Mail on Sunday, July 10th 2005.
Kaufman, F. (1998) Commission on proceedings involving Guy Paul Morin, Toronto: Queen’s Printer For
Ontario. http://www.attorneygeneral.jus.gov.on.ca/morin/morin.htm (Last accessed Jan 18th 2008)
Klein, G. (2000) Analysis of Situational Awareness from Critical Incidence Reports. In D.J. Garland (ed.),
Situation Awareness Analysis and Measurement, 51-71, Mahwah: New Jersey: Lawrence Erlbaum
Associates.
Lacan, J. (1977) Ecrits: A Selection. Trans A. Sheridan. New York: W.W. Norton.
Lowman J., R. Menzies and . Palys (eds.) (1987) Transcarceration: Essays in the Sociology of Social
Control, Aldershot and Gower.
Lyon, D. (2003) Airports as Data Filters: Converging Surveillance Systems after September
11th.Information, Communication and Ethics in Society, 1(1):13-20.
Manning, P. K. (1988) Symbolic Communication: Signifying Calls and the Police Response. Cambridge
Massachusetts: MIT.
Mathews, J. (2005) Hi tech, High Transport Security? BBC News, 14th November 2005
http://news.bbc.co.uk/1/hi/uk/4435998.stm (Last accessed Jan 18th 2008).
Murakami Wood, D. (ed.), K. Ball, D. Lyon, C. Norris and C. Raab (2006) A Report on the Surveillance
Society, Wilmslow, UK: Office of the Information Commissioner / Surveillance Studies Network.
http://www.ico.gov/upload/documents/library/data_protection/practical_application/surveillance_s
ociety_public_discussion_document-06.pdf (Last accessed November 1st, 2007)
Norris, C. and R. Armstrong (1999) The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg.
Phillips, P.P. et al. (2003) Face Recognition Vendor Text 2002, Overview and Summary
http://biometricinstitute.org/bi/faceRecognitionVendor Test2002.pdf (Last accessed Nov 2nd,
2007)
Potter, J. (1996) Discourse Analysis and Constructionist Approaches: Theoretical Background, in J.T.E
Richardson (ed.) (1996) Handbook of Qualitative Research Methods for Psychology and the Social
Sciences, 125-140, Leicester: BPS Books.
Riley, T.B (2004) Security and Privacy: Striking the Right Balance, Centre for Electronic Governance
http://www.electronicgov.net/pubs.research_papers/slp/Sec&PrivPaper03y03pdf (Last accessed
Nov 11th, 2007)
Ruff, H., S. Narayanan and M. Draper (2002) Human Interaction With Levels of Automation and Decision
Aid Fidelity in the Supervisory Control of Multiple Simulated Unmanned Aerial Vehicles,
Presence II (4):325-351.
Stahl, B. C. (2004) The Ethics of Critical IS Research, Proceedings of the 2nd International Conference on
Critical Research in IS Workshop, 14th July, 2004.
Walby, K. (2003) How Closed-Circuit Television Surveillance Organises the Social: An Institutional
Ethnography, Canadian Journal of Sociology 30: 189-214.
Werrett, S. (2003) Potemkin and the Panopticon: Samuel Bentham and the Architecture of Absolutism in
Eighteenth Century Russia, Journal of Bentham Studies, 2. http://eprints.ucl.ac.uk/648/
Williams, J. W. (2000) Interpreting Justice: A Critical Analysis of Police Interrogation and Its Role in the
Criminal Justice Process. Canadian Journal of Criminology 42: 209-241.
Cases
R v Archer 2002, (unreported) Smith Bernel, Case No. 0104555 S2.