Publications by authors named "Sarah Brayne"

This review focuses on government use of technology to observe, collect, or record potential criminal activity in real-time, as contrasted with "transaction surveillance" that involves government efforts to access already-existing reviews (Brayne 2018, Ridgeway 2018). Even so limited, surveillance technologies come in many guises, including closed-circuit television, automated license plate and facial readers, aerial cameras, and GPS tracking. Also classifiable as surveillance technology are devices such as thermal and electromagnetic imagers that can "see" through walls and clothing.

View Article and Find Full Text PDF

The number of predictive technologies used in the U.S. criminal justice system is on the rise.

View Article and Find Full Text PDF

Visual data are transforming the documentation of activities across many legal domains. Visual data can incriminate or exonerate; they can shape and reshape public opinion. Visual evidence can legitimize certain accounts of events while calling others into question.

View Article and Find Full Text PDF

Law enforcement agencies increasingly use big data analytics in their daily operations. This review outlines how police departments leverage big data and new surveillant technologies in patrol and investigations. It distinguishes between directed surveillance-which involves the surveillance of individuals and places under suspicion-and dragnet surveillance-which involves suspicionless, unparticularized data collection.

View Article and Find Full Text PDF

This article examines the intersection of two structural developments: the growth of surveillance and the rise of "big data." Drawing on observations and interviews conducted within the Los Angeles Police Department, I offer an empirical account of how the adoption of big data analytics does-and does not-transform police surveillance practices. I argue that the adoption of big data analytics facilitates amplifications of prior surveillance practices and fundamental transformations in surveillance activities.

View Article and Find Full Text PDF