Texas 9-1-1: Emergency telecommunications and the genesis of surveillance infrastructure
Infrastructures of surveillance--everyday, taken-for-granted, institutionalized and technically mediated practices which identify, observe, and analyze individual actions--permeate society. These infrastructures mediate the production of social knowledge and action toward individuals. This article examines the genesis of one such infrastructure, namely the coordinated practices of identifying and locating mobile phone users during emergency (9-1-1) calls. Implementing this infrastructure has entailed creating and coordinating systems to locate wireless phones, to deliver the emergency calls to the appropriate service agency, and to deliver appropriate services to the emergency event. This implementation has occurred within historically specific regulatory, political, cultural, technological, and economic contexts and has specific implications for general surveillance practice. Focusing primarily on the state of Texas, this article examines the development of systems which store and deliver individuals' geographic location. It argues that, despite privacy laws tightly restricting the use of information generated in the 9-1-1 process, and despite the special purpose to which the 9-1-1 system is dedicated, the wireless 9-1-1 initiative has created the infrastructure for a general purpose locational surveillance infrastructure capable both of surveilling broad patterns of activities and of responding to particular individuals. Moreover, the infrastructure is more available to police agencies and to well-established and well-funded corporate entities than to grass roots organizations. This trend is driven by the need to coordinate a national emergency response system within a fractured telecommunication industry, by the desire of marketers to understand and address their customers' habits of mobility, and by an increasing willingness of police agencies to include widespread surveillance under the rubric of "emergency services." Policy responses such as greater ability to opt out of the surveillance system, public oversight of emergency operations, and greater public access to the infrastructure itself might mitigate the most harmful potential social effects of this infrastructure, while distributing its benefits in a more democratic and egalitarian way.
If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
As the access to this document is restricted, you may want to look for a different version under "Related research" (further below) or search for a different version of it.
Volume (Year): 29 (2005)
Issue (Month): 11 (December)
|Contact details of provider:|| Web page: http://www.elsevier.com/wps/find/journaldescription.cws_home/30471/description#description|
|Order Information:|| Postal: http://www.elsevier.com/wps/find/journaldescription.cws_home/30471/bibliographic|
When requesting a correction, please mention this item's handle: RePEc:eee:telpol:v:29:y:2005:i:11:p:843-856. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (Zhang, Lei)
If references are entirely missing, you can add them using this form.