Infrastructures of surveillance--everyday, taken-for-granted, institutionalized and technically mediated practices which identify, observe, and analyze individual actions--permeate society. These infrastructures mediate the production of social knowledge and action toward individuals. This article examines the genesis of one such infrastructure, namely the coordinated practices of identifying and locating mobile phone users during emergency (9-1-1) calls. Implementing this infrastructure has entailed creating and coordinating systems to locate wireless phones, to deliver the emergency calls to the appropriate service agency, and to deliver appropriate services to the emergency event. This implementation has occurred within historically spec...
The past fifty years has witnessed an evolution in technology advancement in police surveillance. To...
Various kinds of media and metadata, such as pictures, videos, and geo-location, can be attached to ...
Activists around the world have developed practices and are taking distinct measures to resist cyber...
Discusses the advantages and impediments to a nationwide police communication system
Newsletter of the Texas Commission on State Emergency Communications discussing news and activities ...
The article examines the history of cell site location information (CSLI) technology and the relevan...
In this paper, we study the evolution of telecommunications technology and its impact on law enforce...
In the post-September 11th world, our judiciary has been forced to confront the truth that “all free...
Various kinds of media and metadata, such as pictures, videos, and geo-location, can be attached to ...
E911 technology allows for the location of a cellular phone to be determined by the wireless service...
Only a small fraction of law enforcement agencies in the United States obtain a warrant before track...
Since the grant of the first Commercial Mobile Radio Service ( CMRS ) license over twenty years ago,...
Courts are divided as to whether law enforcement can collect cell phone location information in real...
Police surveillance ability and information gathering capacity have a dynamic relationship with tech...
Police surveillance ability and information gathering capacity have a dynamic relationship with tech...
The past fifty years has witnessed an evolution in technology advancement in police surveillance. To...
Various kinds of media and metadata, such as pictures, videos, and geo-location, can be attached to ...
Activists around the world have developed practices and are taking distinct measures to resist cyber...
Discusses the advantages and impediments to a nationwide police communication system
Newsletter of the Texas Commission on State Emergency Communications discussing news and activities ...
The article examines the history of cell site location information (CSLI) technology and the relevan...
In this paper, we study the evolution of telecommunications technology and its impact on law enforce...
In the post-September 11th world, our judiciary has been forced to confront the truth that “all free...
Various kinds of media and metadata, such as pictures, videos, and geo-location, can be attached to ...
E911 technology allows for the location of a cellular phone to be determined by the wireless service...
Only a small fraction of law enforcement agencies in the United States obtain a warrant before track...
Since the grant of the first Commercial Mobile Radio Service ( CMRS ) license over twenty years ago,...
Courts are divided as to whether law enforcement can collect cell phone location information in real...
Police surveillance ability and information gathering capacity have a dynamic relationship with tech...
Police surveillance ability and information gathering capacity have a dynamic relationship with tech...
The past fifty years has witnessed an evolution in technology advancement in police surveillance. To...
Various kinds of media and metadata, such as pictures, videos, and geo-location, can be attached to ...
Activists around the world have developed practices and are taking distinct measures to resist cyber...