Professional Documents
Culture Documents
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at http://www.jstor.org/page/
info/about/policies/terms.jsp
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content
in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship.
For more information about JSTOR, please contact support@jstor.org.
Social Justice/Global Options is collaborating with JSTOR to digitize, preserve and extend access to Social Justice.
http://www.jstor.org
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
THE
Casella
BEGAN
TRADEMAGAZINE,
SECURITYINDUSTRY
AMERICAN
SCHOOLANDUNIVERSITY,
an article about school safetywith the following real-life scenario (Kennedy,
2001):
As
When
Ronnie
Publishing, 2001).
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
83
lance, detection, access control, and biometric equipment. Many of these items
depend on technologies (such as digitalized networks and lasers) that were
developed by military and security industry scientists beginning in the 1940s
primarily forpolice and national security purposes during theCold War. Today,
theprevalence in high schools ofwhat De vine (1996) called "techno-security" is
an example of how these developments in technology have altered our public
spaces, institutions,and homes. In the case of schools, the use of techno-security
epitomizes fear of violence as well as fear of legal liability thatconvinces school
district administrators that security technology isworth the expenditures. How?
ever, italso epitomizes the inroads thatsecuritybusinesses have made in thepublic
school market. Peter Blouvelt, the executive director of theNational Alliance for
Safe Schools, remarked about security vendors: "Schools have become a major
market for these guys. The proliferation of security equipment for schools has
taken off (cited inLight, 2002: 3).
Schools are just one example of people's increased use and acceptance of
security technologies in theUnited States. Government buildings, stores, offices,
workplaces, recreation areas, streets, and homes have also been outfittedwith
CCTVs, biometric equipment, scanners, detectors, not tomention alarms, locks,
and intercoms.At a security industryconference I attended as part of the research
for this article, a spokesperson for a security corporation told conference partici?
pants that,according to research, inNew York City an individual was likely tobe
caught on a security camera about seven times each day without knowing it; in
London, thenumberwas double that.Although theuse of security technologies is
often explained as a need during times ofwanton violence and crime, the allure of
technology and humans' fascination with gadgets and equipment partly explain
why security technology is rapidly becoming a fixture in even themost idyllic
areas. In thecase of schools, thoughproponents of technologies warn against their
misuse, theystillbelieve thatCCTVs, scanners, and other advanced technologies
are essential for any overall school safety plan (Townley and Martinez, 1995;
Kosar and Ahmed, 2000; Trump, 1999; Fickes, 2000). Moreover, corporate
incentives and federal support have made itpossible for low-budget institutions
and individuals to invest in security.
The mass installation of security technologies is one aspect of what Lyon
(1994) referred to as a "surveillance society," whereby security items are at once
ubiquitous and invisible. People accept them inpublic and private places and often
acquiesce to thegreater restrictionson theircivil rightsand privacy thatensue due
to theiruses (see also Beger, 2002; Casella, 2003). Postman (1992) stated that in
such a society, which he described as a technopoly, individuals find it almost
impossible to thinkoutside paradigms devoted to scientism, objectivity, and order.
Critics of technology do not dismiss some key aspects (e.g., extending the lifespan
of individuals and providing comfort), but theyare skeptical of thepromises made
in the name of technology and itsunrestrained use in society.
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
84
Casella
Investing inTechnology
In using public schools as a case study tobetter understand theuse of security
technologies inU.S. society, one of the firstaspects one should consider is their
cost. These costs include the installation, maintenance, and upgrading of the
security technology, and thehiring of personnel to oversee it.Costs are difficult
to calculate partly because school district accountants often combine figures
pertaining to technologywith other safetyexpenditures. For example, theChicago
public school system spent about $35 million during the 2000-2001 school year
on security,but this includedmoney earmarked for technology and tech-support,
as well as police officers, security guards, and violence prevention and character
importantbenefit for corporations from these donations and pro bono work is the
profit theyreceive from themonthly payments forupgrading andmaintaining the
equipment. Corporations also benefit from contractual clauses thatallow them to
feature the recipient of the equipment in theirpromotional materials and ads in
trademagazines. WebEyeAlert includes in its ads news articles from theBoston
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
85
Business Journal and theDerry News ofNew Hampshire on the schools thathave
received itsweb-CCTV monitoring system.This technology allows police offic?
ers to monitor students through CCTVs, modems, computers, and Internet
networks.
company also markets tomunicipal buildings, banks, malls, prisons, stores, and
airports.At the center of thepamphlet is thepicture of a school and a school bus.
Another picture depicts a young couple proudly standing outside their home;
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
86
Casella
Code
can*cmed
Exhibit
Miat
4.4.ItltMUaUd
are
Mvend
of
Momvcric
her*
fatontlOm
lypa*
for
a hi&coaOdencc
control
urllb
of?ccorscy.
entry
Figure 1: From Mary Green (1999: 111; Exhibit 4.4 visual). Demonstrating the uses of iris scanning,
a palm reader, and a fingerprint reader. Individuals enter a PIN and gain access to the school if the
biometric reading matches stored information in a security database.
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
87
The young man inFigure 2 has long hair and wears jeans and sneakers (and
boots in thebottom rightcorner image). His hair lengthand clothing contrastwith
theguard's shorthair and uniform.The guard is theoverseer and theyouth is the
suspect. The overseers, however, are also the suspects fora higher level of security
professional (Lyon, 1994). Those who use security equipment on others also have
it trained on themselves. An interesting characteristic of the ads is that the
individuals being searched or having theirbody parts scanned are depicted as
content and sometimes happy (thewoman inFigure 1 is smiling). A 2002 Garrett
Metal Detectors ad shows a young, white, handsome man smiling broadly while
a securityprofessional searches him using thetop-of-the-lineGarrett SuperScanner.
In a 2001 Garrett ad, another person in tatteredjeans and sneakers ispictured being
searched by someone holding a metal detector. A sturdyarm entering the frame
isholding theSuperWand and is examining thefringedcuffsof theperson's jeans,
shown only from theknees down. The advertisement claims thatthe "SuperWand
is very easy and fun to use."
zone
Exhibit3.10.Thiato anunmpteofprocedure*
forusing? handheldmetaldetectorthathas at leasta 10-ineh
Figure 2: From Mary Green (1999: 88; Exhibit 3.10 visual). The
guards on how to use a handheld metal detector to search students.
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
88
Casella
Security Technologies
intoOne's
Life
Beyond the federal support and corporate benefits and incentives stands the
allure of technology and an almost myth-making quality to induce individuals to
embrace the surveillance society inwhich they live. Corporate advertisers play on
people's fears topromote technology as theway of thefutureand its increasing use
as inevitable: "Take a closer look at theLG IrisAccess 3000 ?
it's the look of
a
Electronics
to
2002
LG
advertisement
claimed
Inc., for
U.S.A.,
by
things come,"
an iris identification system.The president of Evolution Software, Inc., explained
at a 2001 conference that "wearable security computer systems" would have
technology "integrated in everyday life." She demonstrated a wearable computer
equipped with voice recognition technology: a monocle strapped toher head (the
computer screen), a littlepouch on her hip (the computer), and a micro-keyboard
attached toone hand; a hidden camera on her shoulder recorded her surroundings
and could be projected on themonocle computer screen. Then she explained that
the armed forces were interested in the "adoption of the technology formotion
tracking systems and 3D augmented systems." Though the equipment makes one
look part robot, the integration of technology with everyday life is a popular
security industry item, a staple of security advertisements, and is commonly
alluded toby school securitydealers when theyexplain the "integration," "natural
fit," or "harmony" between security technology and humans.
These areworrisome claims considering thattechnology has demonstrated the
success of science, but not necessarily the success of society. Although the
sophistication of technology has increased, society has not always benefited
(Collingridge, 1980;Weisberg, 2000). In thephilosophy and sociology of technol?
ogy, there ismuch agreement about what is sometimes referred to as theparadox
of technology (Durbin, 1989; Scarbrough and Corbett, 1992) or what Tenner
called the "revenge of unintended consequences"
(1996). Examples of this
on
the environment, work,
to
references
include
technology's impact
paradox
to
nature:
the
closeness
and
of
life,
way
technology makes lifemore
quality
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
89
leisurely and busier at the same time; theway technology helps to save lives but
also causes deaths and introduces new ways of dying. Technology has enabled
individuals toproduce enough food to feed theworld, yet hunger persists; theatom
was split, yetwar became more dangerous.
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
2002
90
Casella
Figure 4: TR Interflex, subsidiary of IR Ingersoll Rand, advertisement booklet, 2002, p. 16. The hand
in the bottom leftcorner enters the technological age, as does the hand on the palm reader. Classical
science (represented by the image at top) enters the "future of biometrics,*' which includes signature,
keystroke, iris,DNA,
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
91
of a codified authority (the presence of rules, policies, and laws), through actual
punishment of transgressors, and by persuading individuals thatwhat is being
asked of them is a natural part of life. In past generations, imagine the shock
expressed by individuals who, for the firsttime,had to punch in atwork using a
time clock. Yet, ithas become a natural part of workplaces and the recording of
one's "time in" and "time out" isexpected. For workplace managers using security
technologies, its use is usually for financial gain and expediency, while for the
federal government, the aim is information gathering; for the individual who
submits to it, it is toprove ones innocence without having done anythingwrong.
Police forces in theU.S. aremaking greater use of security technologies. For
example, theNew York City Police Department is considering putting facial
recognition technology in the 3,000 CCTVs already mounted in public housing
units. This will allow police officials to record the facial features of public
housing occupants and to run their features through various crime analysis
databases. The cameras and facial recognition technology will thus be used on
poor andmostly nonwhite people. New Jerseypolice cruisers have been outfitted
with cameras todocument trafficstops along theNew JerseyTurnpike. Cameras
were installed in response to accusations of police brutality, but they also
document who is riding thehighways, atwhat time, and on what day. Are people
aware they are being captured on film several times each day, that information
about them is increasingly run throughdatabases and kept on record, or that this
information is sharedwith individuals theydo not know and over whom theyhave
no control? As individuals accept greater surveillance, close themselves within
gated communities, and support institutionsthatcommission security companies
towatch over employees, they end up doing exactly what the government and
security companies want them to do.
PuttingUp (with)Technology
Is the extensive use of security technology a sensible response to safety
problems in society, or is itbased on totalitarianism and irrational fear?Many
would claim that it is a logical reaction tounprecedented violence inU.S. society,
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
92
Casella
Regardless of how one answers these questions, everyone should explore the
purposes behind this security buildup and refuse to accept simple answers about
safetyand protectionwhen there is littleevidence thatsecurity technology actually
makes
us
safer.
REFERENCES
Beger, Randall
2002
Casella, Ronnie
2003
2001
and theVanishing
Rights of
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions
1980
Devine,
93
David
John
1996
Maximum
Durbin, Paul
1989
Fickes, Michael
2000
Green, Mary
1999
Kennedy, Mike
2001
Philosophy
of Technology.
Press.
Publishers.
and Management
inU.S. Schools:
The Appropriate and Effective Use of Security Technologies
Guide for Schools and Law Enforcement Agencies. National Institute of
Justice Research Report. Washington, D.C.: U.S. Department of Justice.
C. Wright
1956
Paeey, Arnold
1999
Postman, Neil
Mills,
Society. Minneapolis:
University
in Technology.
Cambridge: MIT
Press.
Tenner, Edward
1996
Jake
Weisberg, Dan
2000
This content downloaded from 128.252.67.66 on Mon, 13 Jul 2015 21:02:53 UTC
All use subject to JSTOR Terms and Conditions