an inventory and evaluation of cctv internet crowd - pact project

25
An Inventory and Evaluation of CCTV Internet Crowd-sourcing The Privacy & Security Research Paper Series issue #4

Upload: others

Post on 19-Feb-2022

1 views

Category:

Documents


0 download

TRANSCRIPT

An Inventory andEvaluation of CCTVInternetCrowd-sourcing

The Privacy & SecurityResearch Paper Series

issue #4

The Privacy & Security - Research Paper Series

Edited by Centre for Science, Society & Citizenship Co-edited by Uppsala University - Department of Informatics and Media ISSN 2279-7467

An Inventory and Evaluation of CCTV Internet Crowd-sourcing Author: Daniel Trottier Research Paper Number # 4 Date of Publication: 15 December, 2012 Acknowledgement: The research presented in this paper was conducted in the project “PACT – Public Perception of Security and Privacy: Assessing Knowledge, Collecting Evidence, Translating Research into Action”, funded by EU FP7 SECURITY, grant agreement no. 285635

This paper is an output of PACT’s Work Package 1 “Root and Branch Review” All rights reserved. No part of this publication may be reproduced, distributed or utilized in any form or by any means, electronic, mechanical, or otherwise, without the prior permission in writing from the Centre for Science, Society and Citizenship. Download and print of the electronic edition for non commercial teaching or research use is permitted on fair use grounds. Each copy should include the notice of copyright. Source should be acknowledged. © 2013 PACT

http://www. projectpact.eu

The Privacy & Security Research Paper Series, Issue # 4 1

An Inventory and Evaluation of CCTV Internet Crowd-sourcing

Daniel Trottier

Abstract:Thispaperintroducesthephenomenonofcrowd‐sourcedsurveillanceofCCTVfootagethroughonlineplatforms.Whilecamera‐basedsurveillanceinpublicandprivatespacesisalongstandingconcernforacademics,policymakersandthepublic,themigrationofCCTV footageonlineraises furtherethicalandsociologicalconcerns, inaddition toamplifyingexistingconcerns.Afterconsidering theconceptualoriginsof the termcrowd‐sourcing, thispaperexplores fourexamplesofcrowd‐sourcingCCTV footagethroughonlineplatforms.Followingthis,thispaperevaluatesthesecurity,privacy,andpoliticaleconomicimpactoftheseschemes,drawingfromexistingliteratureonCCTVsurveillance.

Keywords:Surveillance,CCTV,Internet,Privacy,Crowd‐sourcing,DigitalMedia

Shortbiographyoftheauthor:DanielTrottier isapostdoctoral fellow intheDepartmentof Infor‐maticsandMediaatUppsalaUniversity,Sweden,whereheisinvolvedintwoEuropeanUnionprojectsonsecurityandsocialmedia.HepreviouslyheldapostdoctoralfellowshipintheDepartmentofSoci‐ologyattheUniversityofAlberta,andobtainedhisPhDinSociologyatQueen'sUniversity,Canada.Heis theauthorof thebook “SocialMediaas Surveillance,”publishedbyAshgate, aswellasnumerousarticlesonthesociologyofdigitalandsocialmedia.

The Privacy & Security Research Paper Series, Issue # 4 2

1. Introduction

ThispaperintroducesCCTVInternetcrowd‐sourcing,explainingtherelevanceandimportanceof thistopic inthebroadercontextofprivacyandInternetsurveillance.Surveillance is typically a top down process: someone with a special designationoversees a broader and comparatively powerless population. The guard tower orBenthamianpanopticonisanoft‐usedimageryforinstitutionalsurveillanceandcon‐trol(Foucault1977),yettheCCTVcameraisamorepervasiveinstrumentforwatch‐ing.ResearchonCCTVinparticularsuggeststhatthiskindofsurveillancehasdamag‐ingeffectsforbothindividualsandcivicsociety(NorrisandArmstrong1999).Othertypesofsurveillancesuggestapotentiallevelling,orbalancingofpower.The

concept of participatory surveillance refers to the way mobile and domesticatedtechnologies enable greater control over visibility and exposure (Albrechtslund2008).Sousveillancesuggeststhatcitizenscanevenreversethegazebackonthoseinpower (Mann et al. 2003). Both models argue that there is a democratization ofwatching,inthattoolsforwatchingaremorefreelyavailable.Theclaimisthatmak‐ingsurveillancetechnologyavailabletothepublichasthepotentialof levellingvisi‐bilityandpromotinggoodcitizenship.Astechnologybecomesfreelyavailable,itcanbeusedtoshedlightonstateandinstitutionalinjustice.Likeconventional,top‐downsurveillance,itcanalsobesubjecttoabuse.Butathemethatunderliesconceptsandapproaches that stress the domestication of surveillance technologies is that thiscouldpresentacounter‐forcetostate‐sanctionederosionsofprivacy.Yet theseeffortsdonotdisplaceabusiveaspectsofstateandothertotalizingsur‐

veillance.Thelatterareremarkablyeffectiveatcapitalizingontheformer(GallowayandThacker2007).Thisfollowsabroadertrendof“crowd‐sourcing”,whereasinglecompany can harness the effort of collective, scattered individuals. In surveillance,thiscanmostclearlybeseenwiththeriseofcompaniesthattakeadvantageofcrowd‐sourcingfortheanalysisofCCTVfootageovertheInternet.ByreleasingCCTVfeedstoalargecrowdofusers,companiesthatmanagethesesystemscanmanageagreatersurveillanceofsociallife,ataminimalcost.Further,crowd‐sourcingposesanumberofprivacyandsecurityissues,inthatvideoinformationaboutindividualsisleakedonanever‐expandingnetworkofservers,homecomputers,andmobiledevices.

2. Crowd-sourcing

This section draws on industry literature to explain crowd‐sourcing. It also pro‐videsconcreteexamplesof crowd‐sourcingbeyond therealmofCCTV Internetsur‐veillance.Indoingso,ithighlightskeyfeaturesofthissystem,andpointstotheriseofcrime‐basedandfor‐profitbasedcrowd‐sourcingontheInternet.Crowd‐sourcing is a processwhere non‐professionals (hobbyists, or those other‐

wisemotivatedbyintrinsicmeasures)engageinacollaborativeprojectforlittletonofinancial compensation. Large crowds of non‐specialized individuals now performactivitiesthatwouldotherwisebereservedtoaskilledfewwithprofessionaldesigna‐tion.Havingsomuchproductivityfromsomanypeopleatanaffordablecostmakes

The Privacy & Security Research Paper Series, Issue # 4 3

the loss inexpertise aminor setback.Thisdefinition involves three factors, orpre‐conditions:

First,apoolofmotivatedandquasi‐skilledlabourers. Second,technologiesthatallowcollaboration.ThisoftenincludestheInternet,asitoffersan inexpensiveway for largeamountsofpeople toaccessandshare infor‐mation.

Third,akindofrewardsystemthatdrivesthelabourpool.Thismaysimplybein‐trinsic, as people choose to collaborate in crowd‐sourced projects that interestthem.Butextrinsicmonetaryrewardsmayalsobeinvolved,evenifthesearemi‐nortothepointofbeingtokenistic.Crowd‐sourcingasatermemergedinaculturalcontextthatcelebratedthesocial

virtuesof freelyavailable technologies. It is associatedwith the riseofWeb2.0, anInternet based movement that celebrates user‐generated content. Crowd‐sourcingprojects have beenwell received in themainstreammedia and industry literature.This is for two reasons. First, it allows non‐professionals to engage in the kind ofwork they purportedly enjoy, as well as gain some degree of recognition for thiswork.Amateurhobbyistsare leaving theirbasements, and loggingon to their com‐puterstocollaboratewithlike‐mindedpeers.Second,crowd‐sourcingallowscompa‐nies to receive a free – or very cheap – pool of labour. Business literature (Howe2008,Surowiecki2004)hasextolledthevirtuesoftheseschemes,makingitclearthatit is ‘the next big thing’ for companies. In his book TheWisdom of Crowds, JamesSurowieckiclaims,“undertherightcircumstances,groupsareremarkablyintelligent,and are often smarter than the smartest people in them” (2004, xiii). Likewise JeffHowe,acontributingeditoratWiredmagazine,describescrowd‐sourcingasasocialphenomenoninhisbookCrowd‐sourcing:“Overthepastseveralyearspeoplefromaroundtheworldhavebegunexhibitinganalmost totallyunprecedented socialbehavior: theyare coming together toperformtasks,usually for littleornomoney, thatwereonce thesoleprovinceofemployees”(2008,8).

Basedontheseaccounts,crowd‐sourcingwillpotentially impacteveryindustryandsocialsector.Crowd‐sourcingoriginatesintheopensourceandfreesoftwaremovement(ibid.).

TheoperatingsystemLinuxandtheOpenOfficesoftwaresuite(that framesitselfasanalternativetoMicrosoft’sOfficesoftware)areboththeproductofalargegroupofworkers.Theyarebothfreelyavailableforthisreason,andthisfactcontributestothecelebrationofcrowd‐sourcing,evenamongfor‐profitbusinesses.Wikipediaisanoth‐erprominentexampleofcrowd‐sourcedfreeworktoproduceafreeservice, inthiscase, a universal encyclopaedia. The transition to for‐profit crowd‐sourcing camewithschemeslikeAmazon’sMechanicalTurk.Itdescribesitselfasa“marketplaceforwork” (AmazonMechanical Turk. https://www.mturk.com/mturk/welcome). It al‐lows“workers”tobecompensatedforperformingsimpletasksattheircomputerthat

The Privacy & Security Research Paper Series, Issue # 4 4

cannotbeautomated.The labour conditionsare framedasa flexible, and thereforedesirable for workers. Yet on the same page it markets its services (in this case,crowd‐sourced human cognition) to businesses, claiming “access to a global, on‐demand,24x7workforce”(ibid.).Inalabourcontext,thisissituatedasaresponsetooutsourcing.Ratherthansendjobstoanothercountry,thesetasksare“virtualized”.Insteadofonepaidworker, the labour isdividedamongan innumerableamountoffreeornear‐freeworkers.ThedifferencebetweenAmazonMechanicalTurkandWik‐ipedia,OpenOfficeandLinuxisthattheformerisafor‐profitcrowd‐sourcing.Crowd‐sourcing tookona criminal justicenaturewith the riseofBlueservo.This

projectwasfirstproposedin2006withtheintentionofcrowd‐sourcingthepolicingoftheTexasregionoftheUS‐Mexicoborder.Itisdescribedas“designedtoempowerthe public to proactively participate in fighting border crime” (BlueServo.http://www.blueservo.net/).Theyalsoemphasize the fact that this isa freeserviceforusers.Thisspecificcrowd‐sourcingeffort ispresentedasnotonlyaresponsetothedemandsofthebroaderpublic,butonethatisadditionallyattractivetothemastheydonothave topay towatchoverCCTV feeds.Here, crowd‐sourcing intersectswiththemediacultureofcrime‐basedrealityshowslikeCrimewatchandAmerica’sMostWanted,whichmadeappealstotheiraudiencesforpersonalinformationaboutsuspects.

3. CCTV Crowd-sourcing

CCTVCrowd‐sourcingreferstoascheme,whereusers,whoaregeographicallydis‐persed,monitorCCTVfootagefromtheirrespectivecomputers.Theseschemesusual‐lyhaveakindofrewardsystemasincentive.ThissectionconsidersfourexamplesofCCTVcrowd‐sourcinginEurope.Theseex‐

amplesarelargelybasedintheUK.GiventhatCCTVhasacomparativelylengthyhis‐toryandisextensivelyusedintheUK(NorrisandArmstrong1999),thisfocusisrea‐sonable.TheriseofInternetcrowd‐sourcingasawaytomanageCCTVfootagegivesindicationoftrendsarisingintherestofEurope.Eachofthefourexamplesissituatedinadistinctcontext.

CrimeStoppersUKfollowsfromatraditionofpoliceandrelatedorganizationsmak‐ingappealstothepublicforinformation,forinstance,oncrime‐basedrealitytele‐vision(FishmanandCanvender1998).

Facewatchalsosolicitsinformationaboutcriminalevents,butisframedmoreasaserviceforbusinesses,andalsofosteringapartnershipbetweenkeystakeholders.

Internet Eyes also emphasizes a partnership between crowd‐sourced users andbusinesses.Italsoextendssurveillancefurtherbybroadcastingfeeds,andrelyingonuserstoidentifycriminalevents.

Finally,ShoreditchDigitalBridgetreatsCCTVlikea“fifthutility”(Graham2002)bycrowd‐sourcingneighbourhoodCCTVtoresident’sbroadbandTV.

The Privacy & Security Research Paper Series, Issue # 4 5

3.1. CrimeStoppers UK

Figure1:CrimeStopperswantedpage(DataSource:http://wanted.crimestoppers‐

uk.org/detail.aspx?ID=44717)

The first example of crowd‐sourced CCTV surveillance on the Internet is

CrimeStoppers UK (http://www.crimestoppers‐uk.org). This site first emerged in2005.Thisisnotasitethatisexclusivelydedicatedtocrowd‐sourcedCCTVsurveil‐lance.However,itmakespublicappealsthatincludeCCTVfootage.Thisisawebsitewhere individuals can provide information about known suspects. CrimeStoppersprovides informationaboutsuspectsontheirwebsite,andthis includesstill imagesfromCCTV. Footage is therefore transformed into images,which highlight relevantmomentsandareeasiertodistribute.Theconversionfromvideofootagetostillim‐ageswould appear necessary in themid‐2000s, as high‐speed andmobile Internetwerenotasprevalent.Uponviewingthiscontent,individualscanlogintoanonlineforumwheretheycansubmitinformation.Aswiththeexamplesbelow,theInternetisnotonlyalocationwherefootageislocated,butthewebsiteisalsothelocationthatdrawsattentionbyintroducinguserstotheservice.TheInternetisboththelocationwhere CrimeStoppers make appeals to citizens over CCTV footage, and where thecrowdprovidesvaluableinformationaboutsuspectedcriminals.CrimeStoppersUKisanindependentcharity.Itacceptsanonymoustips,andoffers

rewardsofupto£1,000ifasuspectisarrestedandcharged.Atthispoint,theanony‐mous user has to provide personal information, including their name and bankinginformation.CrimeStoppersalsosolicitsdonationsfromcorporationsandindividuals,ostensibly to their operation costs. CrimeStoppers UK justifies the crowd‐sourced

The Privacy & Security Research Paper Series, Issue # 4 6

surveillanceofCCTVfootagethroughtheclaimthatthiskindofsurveillancereducescrime:“Webelievethatpeopleandtheircommunitieshavetherighttolivewithoutcrimeandwithoutthefearofcrime.Whencrimedoestakeplace,webelievethatanybodywhoknowsthoseresponsibleshouldgotothepolice.However,manypeoplewhowanttotakeactionareclosetothecriminalandfearretribution.CrimeStoppersof‐fersthesecuremeansforthemtogetthatinformationtothepolice,makingtheirfamiliesandcommunitiessafer.”(CrimeStoppers,HowWeHelp.http://www.crimestoppers‐uk.org/how‐we‐help)

CrimeStopperspromotestheefficacyofthiskindofsurveillancewithanarrayoffig‐uresontheirwebsite,includingthefactthattwenty‐threepeoplearearrestedeveryday as a result of their service (CrimeStoppers, Facts and Figures,http://www.crimestoppers‐uk.org/how‐we‐help/our‐achievements/facts‐and‐figures).ThepressisgenerallysupportiveofCrimeStoppers,especiallybecauseofitsfocusonhighprofileincidents.Ithasrecentlybeenusedinconjunctionwiththemur‐der of a 77‐year oldwoman inBewdley (BirminghamMail.net, Crimestoppers offer£10,000 reward in hunt for killer of Betty Yates. January 24, 2012.http://www.birminghammail.net/news/top‐stories/2012/01/24/crimestoppers‐offer‐10‐000‐reward‐in‐hunt‐for‐killer‐of‐betty‐yates‐97319‐30184915/), aswell asthemurderofapoliceofficer’sparentsinBirmingham(TheExpress,£10,000tocatchkiller of policeman’s parents. January 14, 2012.http://www.express.co.uk/posts/view/295567). CrimeStoppers is presented in thepressasanadditionalresourcetobeusedwhenpolicearepresentedwithadifficultcase.Withclosedcases,itispresentedasaservicethatwashelpfulintheinvestiga‐tion.

The Privacy & Security Research Paper Series, Issue # 4 7

Figure2.SubmissionformonCrimeStopperswebsite(Datasource:https://secure.crimestoppers‐

uk.org/ams.form.anonymous.asp)

The Privacy & Security Research Paper Series, Issue # 4 8

3.2. Facewatch

Figure3:Facewatchdiagram(Datasource:http://facewatch.co.uk/cms/how‐does‐it‐work/) Thetrendtoidentifycriminalsinanetworkedonlineenvironmentcontinueswith

Facewatch(http://facewatch.co.uk).Foundedin2010,FacewatchispresentedasafreeservicebasedintheUKdesignedforbusinessestocombatlow‐levelcrime.ItwaslaunchedbySimonGordon,whowantedtouseCCTVtolowertheamountoftheftsinhisLondonwinebar.Whilethisisapublicservicethatsolicitsmemberships,itspecif‐icallytargetsbusinesses,groupsandthepolice.Itseekstoformanetworkamongthesesocialactorsinordertoquicklyshareinformationaboutcriminalsamongthem.Assuch,Facewatchhasmoreofaninstitutionalfocus,ratherthanenrollingpublicindividualsascrowd‐sourcedagents.Yetindividualsmayberegisteredasemployedbyabusinessorasamemberofagroup.Facewatchisbuiltonthepremiseofsharinginformationwithabroader,dispersedpublicinordertoidentifysuspects.Thereisnorewardforlabour.Facewatchismarketedasafreeserviceforbusi‐

nesses,crimewatchgroupsandpolice.Yettheyalsosellmembershipsonafixedpric‐ingplan(Facewatch,JoinToday.http://facewatch.co.uk/cms/join‐today/),andsolicitsponsorshipstocoveroperatingcosts.Onceabusinessisregisteredonasite,theyareabletosubmitcontent.Followingacriminalevent,memberssubmitinformation,in‐cludingCCTVvideofootageandstills,tothesite’sservers.Atthispoint,thiscontentissharedwithbusinesses,groupsandpolice.

The Privacy & Security Research Paper Series, Issue # 4 9

Facewatchpresentsitselfasreducingcrimeandalsoenablingbusinessestomakeapublicstatementthattheywillnottoleratecrime.Italsoclaimstobenefitthepolicebyprovidinginformationaswellascloserrelationswithbusinessesandthepublic:

“Ourvisionistocreatesafercommunitieswherecrimeisnottolerated.Wewillachievethisbyunitingbusiness,thepublicandthepoliceinpartnershipsusingtech‐nologyandwewilltacklethecausesofcrimebyworkingandinvestinginpeopleandprojectsdesignedtoeducate,trainandmentorthosewhohavelimitedopportunities”(Facewatch,OurVision.http://facewatch.co.uk/cms/our‐vision/).

Here, the idea of crowd‐sourcing/networking is a “uniting” move, which suggestsgreaterandmoretargetedexchangeof informationbyconvergingformerlydiscretesocialactors.AswithCrimeStoppers,Facewatch’scrowd‐sourcingofCCTVcontentontheInter‐

net is exclusively framedas fighting crime.This representation is also found in themedia.MostmediacoveragefocusesonGordon’sentrepreneurialinitiative,aswellasthefactthatFacewatchhasadirectimpactonhandbagtheftsinbars:“MoreaccustomedtosourcingagoodcaseofMerlotthanfightingcrime,theownerofthe establishment that claims to be London's oldestwine bar startedworking onFacewatchtwoyearsagoafterbecoming frustratedat findingthesamebagthievesappearing repeatedly on his CCTV cameras” (The Times, Bar owner leads digitaldrivetofoilbagsnatchers.June25,2011).Facewatch has received favourable press coverage, claiming it is expanding be‐

causeofsuccess.Gordonisquotedasclaimingthat“[t]he systemmeans a huge reduction in police time.At present police have to goroundtobusinessesandpickuptheCCTVandthenspendhourstrawlingthroughittogettherelevantclip.ThisbridgesthegapbetweenCCTVoperatedbybusinessesandthepolice. It isahugesaving in time for thepoliceandus”(TheEveningStandard,Online CCTV system goes nationwide after slashing thefts in city. September 23,2011. http://www.thisislondon.co.uk/standard/article‐23990346‐online‐cctv‐system‐goes‐nationwide‐after‐slashing‐thefts‐in‐city.do).

Thus,GordonclaimsthatthemonotonoustaskofsortingthroughhoursofCCTVfoot‐ageiscrowd‐sourced,leavingthepolicetoconcentrateonotherefforts.ThepresspresentFacewatchasanefficientwaytotargetlow‐levelcrimeincom‐

mercialcentres.Thereis littleconcernoverprivacyassociatedwithit.Interestingly,even privacy advocacy groups endorse Gordon’s initiative. UK‐based Big BrotherWatchoffersthefollowing:

“FromBigBrotherWatch'spointofview,oneofthemostattractiveelementsofthesystemwasthatitremovestheneedforCCTVoperatorstohandovereithervastreelsofvideotapeorCDstothePolicewhichareultimately lostduetoofficererror. In‐deed,theproblemofaccidentaldatalossbypoliceforcehasbeenhighlightedonthisblogtwiceinthelastweek.Similarly,wewerecomfortedbythepledgesmadebythedevelopertoworkcloselywiththeInformationCommissionerinordertoensuredata

The Privacy & Security Research Paper Series, Issue # 4 10

protectionconcernsaretakenintoconsiderationasitisrolledoutacrossthecountry.AtBigBrotherWatch,wealwayscautiousabouttheways inwhichCCTV footage isused,yetitcertainlyseemsthatFacewatchistakingastepintherightdirectionwhenitcomes tousing technology to secureconvictionswhileat the same timeensuringthattheprivacyofinnocentmembersofthepublicisprotected”(BigBrotherWatch,Facewatch.http://www.bigbrotherwatch.org.uk/home/2011/02/facewatch.html).

WhileCCTVfootageandstillimagesareonlysharedbetweenagreedbusinessgroupsandpolice,itisstill inasemi‐publicnetwork,whichheightenstheriskofthisinfor‐mationleakingbeyondintendedrecipients.

Bymaking a pledge to secure data, Big BrotherWatch presents Facewatch as amoresecurealternativetotherelianceonCCTVoperators.MuchlikeCrimewatchUK,thefocusoncrimefacilitatestheexpansionofcrowd‐sourcedCCTVsurveillanceovertheInternet.

3.3. Internet Eyes

Figure4:InternetEyeshomepage(Datasource:http://Interneteyes.co.uk/)

Other surveillance schemes extend from anti‐crime rhetoric, but incorporate a

points system as incentive for watchers. Internet Eyes (http://interneteyes.co.uk/)actsasanintermediarybetweenbusinessesthatneedpersonneltosortthroughtheirCCTVfootage,andindividualswhowanttoworkinthisarea.Quotingthesite:“Inter‐netEyes isanonlinemonitoringsolution,allowingourregisteredmemberstoviewliveCCTVcamerafeedsfromourBusinessCustomers,andnotifythemtheinstantacrimeisobserved”(InternetEyes.http://interneteyes.co.uk/).Thisserviceismoreexplicitaboutbeingabusiness.Customersarebusinesseslike

shop‐ownerswhosignup tohavea crowdof individualswatchover their shopvia

The Privacy & Security Research Paper Series, Issue # 4 11

CCTV footage that is live‐streamedover the Internet.This costsbusinesses£75permonth.IndividualsincludeanycitizenfromEU/EEAcountries,aswellanycountrieswithadatasharingagreementwiththeEU. Individualsarerequiredtopayamem‐bership fee for legal reasons.Membership feesstartsat£1.99permonth,but therearediscountsforquarterlyandannualsubscriptions.Viewersarefinanciallycompen‐satedforviewing,especiallyiftheydetectcrime.Thereisapointsystem,whereusersreceivepointsdirectlyfrombusinesses.Individualsreceive10pointsiftheyalertthebusiness toa crime,1point if theyactongood faith,butnocrime isdetected, andthey lose2points if thebusinessbelieves that individualsprovideda falseormali‐ciousalert.Whilethepointsystemisawayofmanagingrelationsbetweenbusinessesand individuals, InternetEyesoffersa£1000 rewardeverymonth to theuserwiththehighestamountofpoints.Italsooffersmonthlypaymentsbasedontheamountofhours a viewer is engaged. For every thirty hours of viewing, the user gets £0.50(http://interneteyes.co.uk//community/), which amounts to an hourly ‘wage’ of£0.017. This amount goes up to £1.00 for 45 hours, and £1.50 for 60 hours. CCTVfeedsaretransferredfromthestore’scamerastothesite’sservers,atwhichpointitisencryptedand thenaccessedby theuser.Feeds fromall clientsare combined, ran‐domizedandanonymised.Usershave four feeds at once,which they can refreshatanypointtoobtainnewfeeds.Otherwise,newfeedswillbeselectedafteraperiodoftime.InternetEyesisdirectedagainstshoplifting.Basedonhowitpresentsitself,aswell

ashowitsusersdescribeit,InternetEyesislessaboutfightingcrimeasasocialprob‐lem,andmoreaboutlosspreventionasanuisance.Thisshiftinfocusmarksabanali‐zationofCCTV footage, as it is associatedwith lessviolent crimes.Moreover,usersarenotlookingatexceptionalstillsorfootage,butrathercontinuouslylookingovermundane footage in real‐time, with the hope of identifying something of concern.Thus, the task of identifying keymoments from the vastmajority of uninterestingcontentiscrowd‐sourcedtousers.

The Privacy & Security Research Paper Series, Issue # 4 12

Figure5:InternetEyesdiagram(DataSource:http://interneteyes.co.uk/business/)

InternetEyesalsomaintainsaFacebookgroup,wherethecompanypromotesnew

features and publicity, and users discuss the company and occasionally raise com‐plaints (Facebook, Internet Eyes. https://www.facebook.com/pages/Internet‐Eyes/108455634071). User complaints include technical issues like cameras notloading,aswellasproblemswithnegativefeedbackfromshopkeepers.Oneuserre‐ports:“Abitdissapointedgotmyfirstnegativefeedback:(Isawanincedentwithagentelmanoncrutchesatthedooroftheshop;heseemedtohaveproblemesandno‐bodywas takinganynotice so I alerted . Later I saw therewasanambulancemantherewithhim,sosomethinghadhappend.Wellthealertturnedoutnegative.Sniff”(Facebook,InternetEyes,messagepostedFebruary7,2012).Thisforumalsocontainscommentsaboutshoppers’behaviourandappearance.Oneusercommentsonpoorshopperetiquette:“wouldn'tyouthinkthatifyouknocksomethingoffashelfwhendoingyourshopping,youmightpickitup?Grrrr”(InternetEyesFacebook,messageposted on February 6, 2012). This same user polices how shoppers are dressed:“Brrrr.......someoneshoppingwearingshorts!Everyoneelseinbootsandcoats!”(Fa‐cebook, Internet Eyes, message posted on February 6, 2012). The combination ofcrowd‐sourcedCCTVand socialmedia givesusers a venue to observepeople (whoareunawarethattheyareunderwatch),andreporttheirbehaviourtoalargecrowd.Even if theydonot identify thesepeoplebyname, their personaldetails leak frombeingcapturedoncamera,tohavingthatfootagesenttoanInternetEyesuser,whothentalksabouttheirbehaviourorappearanceonapublicforum.

The Privacy & Security Research Paper Series, Issue # 4 13

InternetEyespresentsitselfasaninvaluableservicetoshopkeepers,anditsweb‐site contains testimonials fromshopkeepers.Citing the fact thathe is alreadyover‐whelmedbymaintaininghisshop,KamleshPatel isreassuredbytheservice,claim‐ing: “we know that somebody out there is looking after our shop” (Internet Eyes,Business.http://interneteyes.co.uk/business/#IET).AsofFebruary6,2012,InternetEyes had over 7000 subscribers for roughly seventy businesses (DW.de. InternetEyes: Community Surveillance – Shift, February 6, 2012.http://www.dw.de/dw/episode/9798/0,,15676531,00.html).AlthoughInternetEyeshasmanysupportersamongitsuserbaseandinthemedia,ithasalsoelicitedcontro‐versyandsanctions.TheUKInformationCommissioner’sOfficeorderedthecompanyto take better measures when footage from their site was leaked onto YouTube.“CCTVfootageshouldnotenduponYouTubewhenitshowssomeonesimplyoutdo‐ing their shopping. A person’s CCTV image is their personal data,” reports deputycommissionerDavidSmith (ITPro, CCTVService InternetEyesForced IntoPrivacyChanges. June14,2011.http://www.itpro.co.uk/634201/cctv‐service‐internet‐eyes‐forced‐into‐privacy‐changes).Notonlydoesthiscomplaintidentifyaperson’simageaspersonaldata,itmakesreferencetotheeasewithwhichinformationthatismeanttobehandledinaprofessionalmannercanleaktoothercontexts.Thesurveillanceofnon‐shoplifting individuals is also highlighted as a privacy risk. JamesWelch, legaldirectorofthecivillibertiesorganizationLibertyquestionsprofessionalismofcrowd‐sourced operators as a condition. Thoseunderwatch shouldbe assured of this: "Ifwe'regoingtohavesomanyCCTVcamerasinthiscountry,thenweneedtobereas‐suredthatthey'rebeingoperatedprofessionally”(BBCNews,WhoiswatchingyouonCCTV? November 27, 2010.http://news.bbc.co.uk/2/hi/programmes/click_online/9232158.stm).

InternetEyeshasalsoreceivedtheattentionofthecivillibertiesgroupBigBrotherWatch.Thisgroupalsoexpressesconcernsoverprivacy,describingInternetEyesas“a rather, well, creepy projectwhich allows voyeurs sitting in their living room towatch CCTV networks and report people suspected of committing crimes for cashrewards” (Big Brother Watch, New privacy concerns about Internet Eyes.http://www.bigbrotherwatch.org.uk/home/2011/03/new‐privacy‐concerns‐about‐internet‐eyes.html).Theyalsoraiseconcerns thatusers,whoareoutsideof theUK,arenotboundbynationaldataprotectionlaws.Ineffect,thesewatchersare“outsideofthelaw”(ibid.)Thecomparativelynegativepublicpresshascompelledsomebusi‐nessestocanceltheirsubscription.JinxHundal,whoownsseveralBudgensfoodre‐tailers,stoppedusingitinthreestoresinNorwich,stating“Ihavespokentocustom‐ers […] there have been concerns raised,with customers saying theywere uneasyabout being viewed bymembers of the public” (EasternDailyPress, Norfolk shop‐keeper backs out of using Internet Eyes system. March 15, 2011.http://www.edp24.co.uk/news/norfolk_shopkeeper_backs_out_of_using_internet_ey

The Privacy & Security Research Paper Series, Issue # 4 14

es_system_1_829654).WhileInternetEyesismeanttodetershoplifting,italsohadachillingeffectoncustomers’senseofprivacy.

3.4. Shoreditch Digital Bridge

Thefinalcasestudymarksafurthershiftawayfromcrimeandtowardablendofcivic engagement and entertainment. The Shoreditch Digital Bridge project(http://www.hildebrand.co.uk/ourwork/digitalbridge.html) was launched in 2006,and ended in 2007. It wasmanaged by Hildebrand, a technology‐based consultingfirm.ShoreditchDigitalBridgeispartofamunicipalinitiativeinEastLondon.Com‐paredtothethreeexamplesabove,itisamuchmorelocalizedinitiative.The“sourc‐ing”incrowd‐sourcingfollowsadifferenttrajectory:whileotherschemesoverseetheoutflowofpersonaldata,DigitalBridge intends to retain thisdatawithina specificcommunity.ShoreditchDigitalBridgereceivedEUStructuralFundingaswellas funding from

theOfficeoftheUK’sDeputyPrimeMinister.AnetworkofelevenCCTVcamerafeedsweretobetransmittedinreal‐timetoresidents’homes,bywayofbroadbandtelevi‐sion.Thisisonechannelamongmanyonabroadbandnetworkfor22,000residents.Thisservicewasintegratedintocitizens’utilitycosts.Theywouldstillhavetopayforthebroadbandutility,butthiswasframedaspotentiallysavingmoneyforresidentsbecause theywouldcollectivelynegotiate for thebestprice fromserviceproviders.Theservicecostsresidents£3.50aweek.ItisnoteworthythatthiswasconsideredtobeoneofthemosteconomicallydeprivedneighbourhoodsinLondon.Residentswerenot paid or rewarded for identifying criminal or otherwise relevant events on theCCTVfeeds.ShoreditchDigitalBridgewaspresentedasbenefittingresidentsbygivingthemac‐

cess toCCTV feeds,andbyenabling themtocollectivelyactonbehalfofpoliceandotheremergencyservices.Ontheonehand,thisappearstobeademocratizedformofcrowd‐sourced surveillance. Spatial barriers between those underwatch and thosedoing thewatchingare lifted, ifall individuals involvedareresidentsofShoreditch.Yet this initiative took place during the gentrification of this neighbourhood. Pressmedia looking at this initiative noted the bifurcation of twopopulations: new resi‐dents andold residents,manyofwhomwere labelled asASBOs, a reference to theAnti‐SocialBehaviouralOrderusedintheUnitedKingdom.

The Privacy & Security Research Paper Series, Issue # 4 15

Figure6:Shoreditchprojectpage(Datasource:

http://www.hildebrand.co.uk/ourwork/digitalbridge.html)

CriticsofDigitalBridgeframedthisinitiativeascreatingadividebetweenoldand

newresidents.Notonlyisthispresentedasaninvasionofprivacy,butalsotriggeringa rise in vigilantism (BBC News, “Is ‘Reality CCTV’ a Step Too Far?”, May 8, 2006.http://news.bbc.co.uk/2/hi/uk_news/4752167.stm).Viewersareabletowatchtheirpublicspaces,andcontributetodesignationofASBOs.Becausetheypromotecloserrelationswithemergencyservices,usersareable toalertpeople tocriminalbehav‐iour.Thisbringsanoutsourcingofprofiling,asviewersmayuseheuristicmeasuresto determine anti‐social behaviour. Media coverage expressed concerns that thismakeswatchingCCTV intoa formof entertainment (“Spot theASBO”), andas suchmarksanextensionofcrime‐basedrealityTV(TheRegister, “LondonEstateBroad‐band Offers 'Spot the ASBO Suspect' TV Channel”, December 30, 2005.http://www.theregister.co.uk/2005/12/30/shoreditch_digital_bridge/).

4. Assessment of CCTV Internet Crowd-sourcing

Afterconsideringtheaboveexamplesofcrowd‐sourcedCCTVsurveillanceovertheInternet,thissectionpointstoconcernsandgeneralthemesthatemerge.Thecrowd‐sourcingofCCTVsurveillancebywayoftheInternetisauniquedevelopmentinthatit takes advantage of both ubiquitously available media technology and a quasi‐voluntaryworkforce.YetitisalsoanextensionoftheproliferationofCCTVinurban

The Privacy & Security Research Paper Series, Issue # 4 16

spaces, and some connections stand out between these two developments. In bothcases,crimepreventionistheentrypointusedtojustifythesesystems.Thesectionsbelowconsidertheprivacyaswellaspoliticaleconomicrisksassociatedwithcrowd‐sourcedCCTVsurveillance.

4.1. Privacy and Security

Research on CCTV systems raise a number of surveillance and privacy concernsabout the efficacy of these systems, aswell as unanticipated consequences. Ratherthanremedy theseproblems,crowd‐sourcing thesesystemsover the Internetexac‐erbates them.Support for implementingCCTVhashistorically come froma techno‐logically deterministic view that claims it lowers crime rates. However, numerousreportscounterthisapproach,suggestingthatCCTVisineffectiveatcombatingcrime(NoCCTV,Reports.http://www.no‐cctv.org.uk/caseagainst/reports.asp).Atthetimeofwritingthereisnoevidencethatcrowd‐sourcingsurveillanceofCCTVovertheIn‐ternet will do anything to remedy these issues. This shift advances the belief thattechnology (technological determinism) and policing (law and order politics) solvecrimes,whichobviatesdiscussionsofthesocialandsocietalcausesofcrime,especial‐lylow‐leveltheft.OneprominentcriticismofCCTVisthatitfurtherseparatespolicefromthepublic.

CCTV systems mediate a link between public spaces and official scrutiny (Norris2003). The distance is spatial, leading to delays in intervention. But there is also acontextualdistance,whichmeansthatpoliceandother investigatorsare inadisad‐vantageouspositiontointerpretwhattheyarewatchingonthescreen.Afriendlyex‐changebetween individualsmaybemisinterpretedastheprecursortoaviolentat‐tack,orviceversa.Thisleadstoafailureofinterpretation.ScholarsalsopointoutthatCCTVsystemsoftenactasbarriersbetweenpoliceandthepublic (NorrisandArm‐strong1999).Whiletheypromisetogivepolicegreateraccesstopublicspace,inef‐fecttheyaddtemporaldelaysforintervention.CCTVmonitoringsystemsareoftenfarawayfromthelocationtheyaremonitoring.Thistrendisonlyfurtheredwhenfoot‐ageisplacedontheInternetanddistributedglobally.BigBrotherWatchnotesthat“itwasconcerning tonote that ‘anyone fromtheUK,EuropeanUnion,CanadaandAr‐gentinacanregistertousethesite’andviewtheimagesofinnocentmembersofthepublicdoingtheirshopping”(BigBrotherWatch,NewPrivacyConcernsAboutInter‐net Eyes. http://www.bigbrotherwatch.org.uk/home/2011/03/new‐privacy‐concerns‐about‐internet‐eyes.html).Criminalinterventiongiveswaytoremotemedi‐ation.Thisalsofurthersgapsbetweenmembersofthepublic.Thesefourcasestudiesmarkashiftawayfrompeoplebeingphysicallypresent,tosituationswherepeer‐to‐peer,orcivic,relationsaremediatedasymmetricallyintermsofvisibility.Wecanalsospeculateaboutthekindofcitizenshipandcivicengagementthatisbeingproduced.Whilethebusinessesthatdesignthesesystems–andtheindividualsthatparticipateinthem–claimtobeworkingtowardsasafercommunity,theyalsocontributetothepersecution of individuals suspected of criminal acts. Crowd‐sourcing these efforts

The Privacy & Security Research Paper Series, Issue # 4 17

alsomeansthatthosebeingscrutinizedcannoteasilyaccessthisinformationtospeakontheirownbehalf.ThereisalsoanissuerelatingtothesubjectivityofthepersonwatchingtheCCTV

feeds.ThemediatednatureofCCTVscrutinymeansthattheindividualwatchingmayemploypersonalbiasestoformharmfuljudgements,andtakewrongactions.AsNor‐ris and Armstrong remark: “In the absence of any concrete information as towhotheyshouldmonitor,CCTVoperatorsselectively target thosesocialgroups theybe‐lievemostlikelytobedeviant”(NorrisandArmstrong1999,196).Thismayworktothedetrimentof apersonwho iswrongly targeted, butalso storeownerswhomayreceivelessvigilantscrutinyasaresultofpersonaldifferences.Crowd‐sourcedpolicingbearstheriskthatusersmakefalsecrimereportsforper‐

sonalreasonslikevengeance,andthatthisresults infalsesuspicions.ScholarshaveaddressedthefactthatprofessionalcameraoperatorsemploygamesandotherformsofresistanceinresponsetothemonotonyofwatchingCCTVfeeds(Smith,2004).Wehavenoreasontobelievethatcrowd‐sourcedwatcherswouldhaveahigherlevelofprofessionalism.Onepossibleoutcome is that crowd‐sourced systemsenable racialbiasesthatwouldotherwisebeillegal.Inaclimateofwidespreadnationwideorlocalxenophobia, crowd‐sourced CCTV Internet surveillance can support false crime re‐portingaboutprimarilyimmigrantsoutofpoliticalandracistreasons.Thesesystemsmaynot explicitly instruct viewers to target visibleminorities or other groups, buttheinstructionto“reportsuspiciousactivity”canbeinterpretedthuslyifvisiblemi‐noritiesare inherentlytreatedassuspect. Ineffect,crowd‐sourcingsurveillancecanalsobeavoluntaryorinvoluntaryoutsourcingofsystemicprejudices.Astheaboveindicates,privacyisanissueforCCTVdeployment.Whilepeopleun‐

derwatchareinsemi‐publicspaces,theyaresubjecttoakindofvisibilitythattheydonotanticipate.Further,thecriminologicalframingofthoseunderwatch(eitherassuspects or potential suspects)means that their privacy rights are not considered.Companiesforegroundtheneedforheightenedsecurityorshopsandurbanspaces,whichoftenpre‐emptsprivacyconcerns.Intermsofsecurity,wemayalsoconsiderthe security of Internet footage. As it is distributed on several servers, the risk forhackinganddata loss is onlyheightened (Microtask, Net Cops: Cybercrime and theCrowd,February3,2011.http://blog.microtask.com/2011/02/net‐cops‐cybercrime‐and‐the‐crowd/).Anotherriskistheemergenceofconstantandubiquitoussurveillanceofallpublic

andsemi‐publicandprivateactivitiesinpublicspaces,whichcancreateacultureofmistrust and categorical suspicion. Categorical suspicion “denotes attentionpaid toindividualsbyvirtueoftheirinclusioninasocialorbehaviouralcategory,ratherthanbecauseoftheiractualactionsorwords”(Lyon2007,198).Intheabsenceofformaltraining,crowd‐sourcedusersarelikelytoreplyonsuchcategorization(furtheringaof creating suspect communities). Further development of these systems will con‐tribute to social discomfortwhen exposed to CCTV.Many citizenswill feel uncom‐fortablebeingfilmedandwatchedbyotherswhene.g.sittinginarestaurant,buyingunderwear,flirting,enteringorexitingasexshop,jaywalking,etc.

The Privacy & Security Research Paper Series, Issue # 4 18

Another privacy concern is the lack of transparencyof companypractices.Whilethese initiatives place citizens and public life under heightened scrutiny, their ownendeavoursaretypicallynottransparent.Thiscontributestoa lackofawarenessofhowcitizens’personaldata isbeingused.Moreover, thefactthat individualsareanextensionofthissurveillancesystemmeansthatthepeoplewhoareconductingthewatchingarenotatallknowntothosewhoarebeingwatched.Thisspecificsurveil‐lancediagramishighlyasymmetricalintermsofvisibility.1ThepersonunderwatchbytheCCTVcameralikelydoesnotknowthatInternetEyes,oranyothercompany,isdistributingthisfeed.Andevenifthosewhoareunderwatchknowthis,theywillcer‐tainlynot knowwho is actuallywatching them. It isworthnoting thatBigBrotherWatchcommendsFacewatchfortherelativeefficiencywithwhichtheyhandleCCTVfootage,notingthattheyensurethat“dataprotectionconcernsaretakenintoconsid‐eration” (Big Brother Watch, Facewatch.http://www.bigbrotherwatch.org.uk/home/2011/02/facewatch.html#.T9yH7OItgzE). Another risk is that crowd‐sourced CCTV systems on the Internet may “creep”(Lyon2007,198)whentheyareadoptedfornewfunctionsinnewcontexts.For in‐stance,anInternetEyesusercouldpossiblystartaweblogwithembarrassingCCTVstills of shoppers in compromised situations and unflattering angles. Alternatively,thedatathatiscollectedcouldbecombinedwithfacialrecognitionsoftwaretopro‐ducealistofidentifiedknownsuspects.

4.2. Political Economy

Crowd‐sourcedwatchersareanextensionofsurveillancesystems.Buttheyareinaunique position. While the work conditions and general exploitation of low‐levelcamera operators is a longstanding concern (Smith 2004), yet the move towardscrowd‐sourcingnotonlymarksafurtherexploitationoftheirlabour,butthisexploi‐tationcanbeobfuscatedbyrhetoricthatcelebratesandextolsthevirtuesofthiscon‐figuration.Businessguruspresent crowd‐sourcingas thebestofbothworlds: com‐panieshavevalueaddedtotheirproductasaresultofindividualswhowanttosharetheirinputandeffort.Butitremainsthatusereffortispartoftheiroverallbusinessplan.Inmanycases,usershavetopayaserviceoraccessfeeinordertoaccessthisser‐

vice.Of course, theyalsohave topay for their electronicdevicesandworkspace inwhichtheyoperate.Butthesecostsareneveraddressed,astheirworkisnot‘profes‐sional’. This speaks tohowplay and labour are increasinglymixed. Crowd‐sourcedsurveillance is amix of entertainment and a service. Companies are able to chargeusers for the entertainment aspect, and also charge businesses for the service thatentertainedusers renderunto them. Somecrowd‐sourcingbusinesseshave rewardsystems,butthesearenominal.Evenanindividual‘working’fortyhoursperweekon

1Cf.asimilarargumentregardingbiometricsinMordini,EmilioandAndrewP.Rebera.2012.“NoIden‐tificationWithoutRepresentation:ConstraintsontheUseofBiometricIdentificationSystems,ReviewofPolicyResearch,Vol.29,No.1,pp.5‐20.

The Privacy & Security Research Paper Series, Issue # 4 19

InternetEyeswillnotmakealivingwage.Theirwagewillalmostcertainlybeafrac‐tionofwhat aprofessionalCCTVoperatorwouldearn.Amemberof InternetEyes’Facebookgroupremarks: “Youspentnearly tenhours in frontofyourcomputer toearn 5.90€?? At that rate, you’re better off working at McDonald’s.2 Of course, itwouldappearthatmostusersandownersofthesesystemsdonottreatthemlikefulltimework.Butthefactthatthisisthecasespeakstounderlyingconcernsofexploit‐ingtheirefforts.Arelatedissue isthe“gamification”ofsurveillance‐based labour.Gamificationre‐

ferstotheintroductionofpoints‐basedincentivesintoeverydaylife(Deterdingetal.2011).Thisispresentedasawaytomotivatepeopletoperformandbehaveinmoreoptimalways.Notonlyisthisasoftformofcoercion,buttherelationbetweenthesealsopointsandmonetarycompensationneedstobescrutinized.InthecaseofInter‐netEyes,oneuserwillreceive£1000everymonth.Allotheruserswillsimplyaccu‐mulatepoints.Whilethevastmajoritywillenjoyextrinsicrewardsfromthesepoints,itwillalsoserveasawaytoenhancetheirperformance.

5. Assessment of CCTV Internet Crowd-sourcing

CCTVInternetcrowd‐sourcingraisesnumeroussocietalconcerns.

Vigilantism:Itcanfosterasenseofvigilantismamongitsusers,andmayattractmemberswhohavesuchtendencies.

Falsereportsforpersonalretaliation:Usersmaytakeadvantageofthesesys‐temstofilefalsereportsasaformofpersonalretaliationagainstothers.

Falsereportsduetoracialbiasorotherprejudices:Usersmayalsoissuefalsereportsbasedonracialbiasesorotherprejudices.

Categoricalsuspicion:Itcancontributetoacultureofsuspicionandubiquitoussurveillancebyencouragingcitizenstowatchovereachother.

Itcontributestoalossofprivacy,notablyinpublicandsemi‐publicspaces. Socialsorting:Itcanfacilitatesocialsorting. Deterministicviewofcrimeandsurveillancetechnologies:Itcanreinforceatechnologicallydeterministicviewofcrimeandsurveillancewhichcouldbedis‐puted.Astrongfocusonfightingcrimebytheuseofsurveillancetechnologycandistractfromaddressingsocietalcausesofcrimeandothersocialproblems.

Law‐and‐orderpolitics:Itcanpromotealaw‐and‐orderapproachtopolitics,totheexclusionofothervalidapproaches.

Distanciation:Itcanfurtherdistancethepoliceandthepublicbyplacinganin‐termediarybetweenthem.Membersofthepublicwatchthepubliconamediatedplatform.Thesewatchersthencommunicatetoacompany,onamediatedplat‐form,andthiscompanymayrelaytheirinformationtothepolice,againonamedi‐atedplatform.

2Tuaspasséprèsde10hdevanttonpcpourgagner5.90€??AcetariflàilvautmieuxbosserchezMcdo‐nald...”.(Facebook,InternetEyes,messagepostedonJanuary18,2012).

The Privacy & Security Research Paper Series, Issue # 4 20

Lackoftransparency:Crowd‐sourcingislinkedtoalackoftransparency,asthefactthatcrowd‐sourcedsurveillancetakesplaceusuallyistypicallynotknowntothosebeingwatched.Eveniftheyareawarethattheyarewatched,theydonotknowwhoisdoingthiswatching,andknowverylittleaboutthecompaniesthatoverseetheseprocesses.

Surveillancecreep:Itraisesthepossibilityofsurveillancecreep,asthesesystemscanbeadoptedfornewpurposesinnewcontexts.

Digitallabour:Itisbasedondigitallabour,asusersperformvitaldutiesforlittletonocompensation.

CCTVInternetcrowd‐sourcingsignifiesadiffusionofthemonitoringaspectofsur‐

veillance intosociety. Itbroadensthenumberofpeople involved inthemonitoring,whichalsomeansthatitbroadensthenumberof individualshavingaccesstoCCTVfootage.Theidentifiedriskscanhavequiteseriouseffects.Thepolicyquestionthatisthereforeraisediswhatlegalmeasuresareneededforlimitingandavoidingthepo‐tentialnegativeconsequences.CitizensarestillcopingwiththepresenceofCCTVInternetcrowd‐sourcing,bothas

potentialtargetsandusersofthesetechnologies.Itispossiblethatitcanbeappliedinawaythatminimizesprivacyrisksandensurespublicacceptance.Yetanethicalim‐pactassessmentisfirstrequiredinordertounderstandwhatrisksarethemostsali‐ent, and thereforemost in need of intervention.However, a potential for improve‐mentisthewaycrowd‐sourcedusersaretrained.Inmostcases,usersreceivelittletono formal training,most notablywith regards to how they are expected to handlesensitivepersonalinformation.IfsuchtrainingwasmandatoryforusersofCCTVIn‐ternetcrowd‐sourcingsites,thiscouldensureaminimallevelofprofessionalism,andpossiblyimpactthepublicacceptanceofthistechnology.

The Privacy & Security Research Paper Series, Issue # 4 21

References

Albrechtslund,Anders.2008.Onlinesocialnetworkingasparticipatorysurveillance.FirstMonday13(3).http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/2142/1949/

Deterding,Sebastian,MiguelSicart,LennartNacke,KentonO’HaraandDanDixon.2011.Gamification.Usinggame‐designelementsinnon‐gamingcontexts.Proceed‐ingsofthe2011annualconferenceextendedabstractsonHumanfactorsincompu‐tingsystems.May7‐12.

Fishman,MarkandGrayCavender,ed.1998.Entertainingcrime:Televisionrealityprograms.Hawthorne,NY:AldinedeGruyter.

Foucault,Michel.1977.Disciplineandpunish:Thebirthoftheprison.NewYork:Vin‐tageBooks.

Galloway,AlexanderandEugeneThacker.2007.TheExploit:ATheoryofNetworks.Minneapolis:UniversityofMinnesotaPress.

Graham,Stephen.2002.CCTV:Thestealthyemergenceofafifthutility?PlanningThe‐ory&Practice3(2):237‐241.

Howe,Jeff.2008.Crowd‐sourcing:Whythepowerofthecrowisdrivingthefutureofbusiness.NewYork:ThreeRiversPress.

Lyon,David.2007.SurveillanceStudies:Anoverview.Cambridge:PolityPress.

Mann,Steve,JasonNolanandBarryWellman.2003.Sousveillance:InventingandUs‐ingWearableComputingDevicesforDataCollectioninSurveillanceEnvironments.Surveillance&Society,1(3):331‐355.

Mordini,EmilioandAndrewP.Rebera.2012.NoIdentificationWithoutRepresenta‐tion:ConstraintsontheUseofBiometricIdentificationSystems.ReviewofPolicyResearch29(1):5‐20.

Norris,Clive.2003.Frompersonaltodigital:CCTV,thepanopticon,andthetechno‐logicalmediationofsuspicionandsocialcontrol.InSurveillanceassocialsorting:privacy,risk,anddigitaldiscrimination,ed.DavidLyon,249‐281.London:Routledge.

Norris,CliveandGaryArmstrong.1999.Themaximumsurveillancesociety:TheRiseofCCTV.NewYork:BergPublishers.

Smith,Gavin.2004.Behindthescreens:Examiningconstructionsofdevianceandin‐formalpracticesamongCCTVcontrolroomoperatorsintheUK.Surveillance&So‐ciety2(2/3):376‐395.http://www.surveillance‐and‐society.org/articles2(2)/screens.pdf

Surowiecki,James.2004.Thewisdomofcrowds.NewYork:AnchorBooks.

Reports,Interviews,NewsArticlesandotherDocuments

The Privacy & Security Research Paper Series, Issue # 4 22

AmazonMechanicalTurk.https://www.mturk.com/mturk/welcome

BBCNews,WhoiswatchingyouonCCTV?November27,2010.http://news.bbc.co.uk/2/hi/programmes/click_online/9232158.stm

BBCNews,Is‘realityCCTV’asteptoofar?May8,2006.http://news.bbc.co.uk/2/hi/uk_news/4752167.stm

BlueServo.http://www.blueservo.net/

BigBrotherWatch,Facewatch.http://www.bigbrotherwatch.org.uk/home/2011/02/facewatch.html

BigBrotherWatch,NewprivacyconcernsaboutInternetEyes.http://www.bigbrotherwatch.org.uk/home/2011/03/new‐privacy‐concerns‐about‐internet‐eyes.html

BirminghamMail.net,Crimestoppersoffer£10,000rewardinhuntforkillerofBettyYates.January24,2012.http://www.birminghammail.net/news/top‐stories/2012/01/24/crimestoppers‐offer‐10‐000‐reward‐in‐hunt‐for‐killer‐of‐betty‐yates‐97319‐30184915/

CrimeStoppers,FactsandFigures.http://www.crimestoppers‐uk.org/how‐we‐help/our‐achievements/facts‐and‐figures

CrimeStoppers,HowWeHelp.http://www.crimestoppers‐uk.org/how‐we‐help

DW.de.InternetEyes:CommunitySurveillance–Shift,February6,2012.http://www.dw.de/dw/episode/9798/0,,15676531,00.html

EasternDailyPress,NorfolkshopkeeperbacksoutofusingInternetEyessystem.March15,2011.http://www.edp24.co.uk/news/norfolk_shopkeeper_backs_out_of_using_internet_eyes_system_1_829654

EveningTimesOnline,Copshuntkillerafterstabbing.February22,2012.http://www.eveningtimes.co.uk/news/cops‐hunt‐killer‐after‐stabbing‐1.1149130

Facebook,InternetEyes.https://www.facebook.com/pages/Internet‐Eyes/108455634071

Facewatch,JoinToday.http://facewatch.co.uk/cms/join‐today/

Facewatch,OurVision.http://facewatch.co.uk/cms/our‐vision/

HildebrandInteractive,Aboutus.http://www.hildebrandinteractive.com/aboutus.html

HidebrandInitiative,Eliminatingdigitalexclusion.http://www.hildebrand.co.uk/ourwork/digitalbridge.html

InternetEyes,http://interneteyes.co.uk/

InternetEyes,Business.http://interneteyes.co.uk/business/#IET

The Privacy & Security Research Paper Series, Issue # 4 23

ITPro,CCTVserviceInternetEyesforcedintoprivacychanges.June14,2011.http://www.itpro.co.uk/634201/cctv‐service‐internet‐eyes‐forced‐into‐privacy‐changes

Microtask.Netcops:cybercrimeandthecrowd.February3,2011.http://blog.microtask.com/2011/02/net‐cops‐cybercrime‐and‐the‐crowd/

NoCCTV,Reports.http://www.no‐cctv.org.uk/caseagainst/reports.asp

TheExpress,£10,000tocatchkillerofpoliceman’sparents.January14,2012.http://www.express.co.uk/posts/view/295567

TheTimes,Barownerleadsdigitaldrivetofoilbagsnatchers.June25,2011.

TheEveningStandard,OnlineCCTVsystemgoesnationwideafterslashingtheftsincity.September23,2011.http://www.thisislondon.co.uk/standard/article‐23990346‐online‐cctv‐system‐goes‐nationwide‐after‐slashing‐thefts‐in‐city.do

TheRegister,Londonestatebroadbandoffers'spottheASBOsuspect'TVchannel.December30,2005.http://www.theregister.co.uk/2005/12/30/shoreditch_digital_bridge/