The University of Southampton
University of Southampton Institutional Repository

Surveillance and the olympic spectacle

Surveillance and the olympic spectacle
Surveillance and the olympic spectacle
Since Munich, one of the key features of Olympic security has been the use of technological surveillance, a strategy that has become increasingly central to securing large sporting events in the post-9/11 era and one that fits neatly with the IOC’s demands to prioritise the sporting event over the policing spectacle. With the London Games likely to become the first biometric and wireless Olympics, the capital is likely to reinforce its reputation as a pioneer of such technologies via the deployment of ever-more intensified, networked and advanced forms of technological observation. This chapter examines the way technological surveillance has been applied to secure mega sporting events (with particular reference to the post-Munich Olympiads) and considers the implications of these processes and practices for 2012. In doing so, key processes shaping the form and scale of surveillance strategies and the types of technological surveillance provision (from first generation CCTV systems to second generation video analytics) are identified and analysed before their application, impact, efficacy and legacy are critically assessed. As this chapter argues, a broad view of Olympic security operations reveals the convergence of at least three different processes. First, a number of security themes have been transferred across events and locations. Second, their direction and intensity have also been shaped by responses to key events, most notably, Munich, the 1996 Atlanta bombing and 9/11. At the same time, threats to Olympics have constantly shifted in relation to their own contextual environments and logic, thus raising operational questions over the relationship between future planning and retrospective events. In exploring the role and impact of surveillance strategies in securing the Olympics from crime and terrorism, this chapter engages in three main areas of discussion. First, a number of key contextual issues are addressed. This involves a definition of what is meant by ‘surveillance’ and an exploration of surveillance strategies in the areas hosting the 2012 Games (both nationally and locally). Second, the chapter will focus on the ways sporting events, particularly the Olympic Games, have been secured using surveillance technologies. Finally, the chapter will draw on some of the key analytical issues emerging from these discussions to consider the efficacy, operational context and ethical considerations of surveillance strategies at Olympic sized events.
Routledge
Fussey, P.
1553072f-da89-4ff8-963c-deb7bfd65c4f
Fussey, P.
1553072f-da89-4ff8-963c-deb7bfd65c4f

Fussey, P. (2010) Surveillance and the olympic spectacle. In, Terrorism and the Olympics: Major Event Security and Lessons for the Future. London. Routledge. (doi:10.4324/9780203835227).

Record type: Book Section

Abstract

Since Munich, one of the key features of Olympic security has been the use of technological surveillance, a strategy that has become increasingly central to securing large sporting events in the post-9/11 era and one that fits neatly with the IOC’s demands to prioritise the sporting event over the policing spectacle. With the London Games likely to become the first biometric and wireless Olympics, the capital is likely to reinforce its reputation as a pioneer of such technologies via the deployment of ever-more intensified, networked and advanced forms of technological observation. This chapter examines the way technological surveillance has been applied to secure mega sporting events (with particular reference to the post-Munich Olympiads) and considers the implications of these processes and practices for 2012. In doing so, key processes shaping the form and scale of surveillance strategies and the types of technological surveillance provision (from first generation CCTV systems to second generation video analytics) are identified and analysed before their application, impact, efficacy and legacy are critically assessed. As this chapter argues, a broad view of Olympic security operations reveals the convergence of at least three different processes. First, a number of security themes have been transferred across events and locations. Second, their direction and intensity have also been shaped by responses to key events, most notably, Munich, the 1996 Atlanta bombing and 9/11. At the same time, threats to Olympics have constantly shifted in relation to their own contextual environments and logic, thus raising operational questions over the relationship between future planning and retrospective events. In exploring the role and impact of surveillance strategies in securing the Olympics from crime and terrorism, this chapter engages in three main areas of discussion. First, a number of key contextual issues are addressed. This involves a definition of what is meant by ‘surveillance’ and an exploration of surveillance strategies in the areas hosting the 2012 Games (both nationally and locally). Second, the chapter will focus on the ways sporting events, particularly the Olympic Games, have been secured using surveillance technologies. Finally, the chapter will draw on some of the key analytical issues emerging from these discussions to consider the efficacy, operational context and ethical considerations of surveillance strategies at Olympic sized events.

This record has no associated files available for download.

More information

Published date: 23 November 2010

Identifiers

Local EPrints ID: 495248
URI: http://eprints.soton.ac.uk/id/eprint/495248
PURE UUID: 04ea1690-09ea-4343-87de-53f8258a20ba
ORCID for P. Fussey: ORCID iD orcid.org/0000-0002-1374-7133

Catalogue record

Date deposited: 04 Nov 2024 17:33
Last modified: 09 Nov 2024 03:14

Export record

Altmetrics

Contributors

Author: P. Fussey ORCID iD

Download statistics

Downloads from ePrints over the past year. Other digital versions may also be available to download e.g. from the publisher's website.

View more statistics

Atom RSS 1.0 RSS 2.0

Contact ePrints Soton: eprints@soton.ac.uk

ePrints Soton supports OAI 2.0 with a base URL of http://eprints.soton.ac.uk/cgi/oai2

This repository has been built using EPrints software, developed at the University of Southampton, but available to everyone to use.

We use cookies to ensure that we give you the best experience on our website. If you continue without changing your settings, we will assume that you are happy to receive cookies on the University of Southampton website.

×