Review of David Lyon's "Surveillance society: Monitoring everyday life" (2001) Open University Press, Buckingham

Authors Avatar

By Magnus Aabech                Information Society

Journalism w/ Sociology, 3rd year                17/12/04

Review of David Lyon’s

“Surveillance society: Monitoring everyday life” (2001)

Open University Press, Buckingham

As the fear of a terrorism attack on London has been growing ever since the Twin Towers of the World Trade Center fell on 11 September 2001, the UK government has been working on a scheme to prevent an attack on the capital which Met Police Commissioner Sir John Stevens believes is “inevitable”.  Thus the Home Office is trying to pass through a bill on a new national identity card, which all citizens must hold. Information on this ID card will carry “biometric” details, such as fingerprints or an electronic scan of the iris of the eye, together with a photograph, signature, address, nationality and date of birth. This will all be stored in a national register. While Prime Minister Tony Blair argues identity cards will “protect, rather than erode, civil liberties”, others, such as human rights group Liberty, fear that Britons will lose their right of privacy and freedom, and they also have doubts about the security of a national database.

David Lyon is regarded as one of the top experts on surveillance in today’s society. His first book on the topic, Electronic Eye: the Rise of Surveillance Society, looked more on the history of surveillance and how it has developed, but Surveillance Society: Monitoring Everyday Life goes beyond that and looks at the implications of surveillance, and how it works, in society. Divided into three sections – Surveillance societies; The spread of surveillance; and Surveillance scenarios – Lyon gives a thorough explanation of a topic which has become increasingly important as we have started living in an information society, and especially since the al-Qaeda attack on the United States. In this review I will examine one chapter in each of the three sections in Lyon’s Surveillance Society and also compare it with other social thinkers’ views on the issue of surveillance. As an introduction to each topic I will also use a scenario to help grasp the discussion from the beginning.

If you walk into your local Sainsbury’s to buy this week’s groceries, you are being caught on tape by several Close Circuit Television Cameras (CCTV). Watching your every move, they were originally installed to prevent shoplifting, but in the new information society, it is also used to examine the worker’s performance and how they treat customers, in addition to keeping an eye on internal theft.

This is an example of how, Lyon argues, a “surveillance container” is leaky – it is being used for other purposes than it originally was. In modernity personal data was much more specialised, but now this data flows freely between, and have implications for, different sectors or containers. This is some of what Lyon is discussing in the chapter “Leaky containers”, where he is concerned about the growth of surveillance and its use. Simple surveillance methods are now cheap and easily available, such as email control systems, logging of employees’ telephone use etc., and thus more common. Anthony Giddens argues that “surveillance in the capitalist enterprise is the key to management”. Consumers are also being constantly monitored, through loyalty clubs where their transactions leave behind records of what they bought. Internet cookies, which stores data on the computer hard drive of which sites have been visited, can be extracted so that companies can target their advertising.

Lyon believes that the expansion of the nation state and capitalist enterprise are the two major sources for this. Giddens states that war and violence have been important factors of the increase of surveillance in the nation state. Nation states have been established because of wars which also heightens surveillance.

In this chapter, Lyon looks especially at surveillance used by police authorities, employers monitoring workers and customers (as mentioned), in addition to the role of deregulation and risk. Another example of leaky containers is the Police National Computer in Britain which started off as a record of vehicles on the roads. The PNC’s database is now developed to work alongside records of fingerprints, number plate records, and the Driver and Vehicle Licensing Authority’s records of road tax and vehicle safety checks. Lyon argues this shows how “an information infrastructure has enabled not only a more efficient service, but also opened the door to unanticipated uses and to a reorientation of policing itself”.

Join now!

Economic deregulation also adds to the blurring of boundaries and more “leaky containers”. The public sector, in order to save time and money, hands out contracts to private companies. This means that personal information flows between the two sectors, and can easily be misused for marketing purposes. Reg Whitaker is concerned on the effect of private companies getting access to public records because they “stand outside whatever regulation and democratic accountability [that] may constrain state agencies”.

 In addition, there is an increase in trying to prevent risk, and some of this is deregulated to private companies, such as in ...

This is a preview of the whole essay