Read Constant Touch Online

Authors: Jon Agar

Tags: #science, #engineering and technology, #telecommunications, #electronics and communications, #telephone and wireless technology, #internet, #mobile telephones

Constant Touch (10 page)

BOOK: Constant Touch
7.74Mb size Format: txt, pdf, ePub
ads
Chapter 19
Cars, phones and crime

New
technologies of mobility create new crimes, new criminal
modus operandi
and new ways to catch criminals. Take, for example, the automobile. From the first decade of the 20th century, cars provoked a crime wave. In Britain, a speed limit of 20 miles per hour was in force between 1903 and 1930, when it was briefly revoked; and a 30 miles per hour limit in built-up areas was hurriedly reintroduced by the 1934 Road Traffic Act, after a spate of accidents, and has been in place ever since. Mobility increased through the century: by 1950 an average day's travel was five miles, but by 2000 it was 28 miles. Much of this travel was by car. A dramatic effect of the new mobility, with its legal limits, was to create new crimes of speeding. Criminal statistics became dominated by car-related crime. Furthermore, as well as driving infringements becoming criminal offences in their own right, speedy automobiles led to more accidents, including ‘hit-and-run' incidents. Patterns of criminal behaviour also changed. More cars meant more stolen cars. Burglars, previously confined to large towns and cities, suddenly found rich pickings in the surrounding countryside, which was now only minutes away. Statistics for break-ins correlate strongly with increased car ownership.

The history of two technologies of mobility and individual freedom, the car and the mobile phone, has long been intimate. (BT Archives)

But,
in turn, techniques of policing and crime detection also changed in response to the mobility of criminals. On a mundane level, many hours of police time were now spent in work such as enforcing traffic codes or tracing missing vehicles. This new emphasis would have been unwelcome were it not for the new information
tools that registration provided. Within a few decades of the birth of mass motoring, every driver and every vehicle had been tagged with a unique identifying number, and immense filing systems recorded changes and movements. The registers relating to motoring soon became central tools in police work. Of course, different countries responded to the mobility provided by the automobile in different ways. Norway, for example, introduced strict speed limits relatively early – a pattern shared by other countries which strongly valued social cohesion and were not swayed by lobbying from car manufacturers. The United States or China would be different cases again. But the car became so central to many societies in the 20th century that the phenomenon of increasing interdependence of policing and criminality was a common one. It should be seen as one more example of how the increased spread of technologies of mobility created possibilities of freedom from centralised authority – whether it was from the family, society or other enforcers of ‘correct' behaviour – which in turn were countered, even domesticated, by strengthening bureaucratic or policing powers.

A technology that demonstrated the links between mobile radio and the automobile, between cultures of mobility and freedom, was Citizens' Band (CB) Radio. CB was not a cellular radio service: all transmissions were made on a segment of the radio spectrum, around
27 MHz, that had been given over to amateur use. Everyone could hear everyone else. From the late 1950s, a movement of enthusiasts was fostered by the marketing of CB radio kits. But CB radio really took off in the late 1960s and early 1970s, when its adoption was spearheaded by US truckers, providing communication and social ties across the freeways. The CB ‘fad' marked the moment when the values – and technology – of the truckers struck a deeper chord. For a few years in the mid-1970s, the specialised CB language of American truck-drivers – ‘10-4, good buddy', ‘Breaker 1-9, this is the rubber duck' and so on – could be heard echoed as far from Route 66 as Britain and the Netherlands. The 1977 film
Smokey and the Bandit
was a smash, as was
Convoy
(starring ‘Rubber Duck') the following year. What resonated was the mythology of a network of individuals living outside traditional society, indeed outside the law, best encapsulated in the supposed truckers' trick of using CB radio to warn each other of police speed traps. The network opposed centralised power. While the popularity of CB prefigured the later demand for cellular telephony, the continuity of social values associated with both also tells us something important.

The cellular phone is also a technology of mobile communication, and a similar story can be told. As with the spread of the automobile, this new technology of mobility created new crimes. In early-21st-century Britain,
for example, the theft of mobile phones contributed to the largest recorded increase in reported crimes affecting young people. By 2007, 800,000 phones were being stolen in Britain each year. Rates were similar elsewhere: hundreds of thousands in Australia and millions in the United States. As we have already seen, the mobile phone is by far the most expensive object ever to become routinely carried on the person. (And by 2001 70 per cent of adults and 81 per cent of fifteen- to 24-year-olds in the UK possessed one.) Also, despite the phone's slide down the social scale, its role as an indicator of status and personal identity – important, as ever, in the playground – has not been diminished. But by 2001 over a quarter of all robberies involved a mobile phone, and nearly half the victims were under eighteen. The perpetrators too were likely to be young.

A portion of this wave of thefts by and from children stemmed from bullying rather than anything more organised. But when Home Office researchers Victoria Harrington and Pat Mayhew interviewed the inmates of Feltham Young Offenders' Institution, a more complex picture emerged. Some phones were stolen as part of the general ‘pickings' of others' possessions, but expensive models might be particularly targeted. Phones would be used until the service was blocked, or the pay-as-you-go card ran out. Or they would be immediately passed onto a ready local – and probably international – market. Thefts were prompted by opportunity and, intriguingly,
the social tensions brought to the surface by conspicuous display of technology:

The plethora of phones around – left for instance casually on counter tops in bars, or on the shelf near the front door at home – also makes them relatively accessible to thieves. In the case of street crime, too, potential thieves can easily spot someone with a phone. It is difficult to say how much truth there is in the contention of offenders in Feltham … that owners' ostentatious use of phones causes a degree of irritation that provokes theft – but it might give users pause for thought.

The Feltham boys expressed the same ‘irritation' as the annoyed passenger on the train surrounded by mobile users, although they took rather more drastic action in response. Many police officers (although not the Home Office researchers) believed that mobile theft was often implicated in the maintenance of social status by the technique of ‘taxing': here ‘the phone theft per se is less important than groups of offenders exerting control, establishing territorial rights, and showing “who's who” by penalising street users (in particular young ones) through phone theft'. Possession of technology made a social statement, and, conversely, to
not
have a phone meant social deprivation: for the boys, phones were ‘an indispensable crutch. Their loss of phones in custody was
said to be one of the worst elements of the deprivation of their liberty.' Loss of a technology of mobility was equated directly with loss of freedom.

By the 2000s it was clear that stealing mobile phones had become international and more organised, partly because increased security meant that phones were hotter property. The National Mobile Phone Crime Unit in the UK, for example, in 2007, noted that phones were being stolen to order and then shipped abroad in increasing numbers.

Reliable research on criminals' uses of mobile phones is much harder to come by, although evidence suggests that the opportunities provided by mobile phones to make planning and carrying out crimes more ‘efficient' have not been ignored. Smuggling drugs across the Mexican–United States border (as well as the more benign movement of immigrants) is coordinated by text messages containing information about routes and the presence of border patrols. The messages are sent by spotters who, according to Marc Lacey in the
New York Times
, ‘monitor the southern Arizona desert from lookout points and help steer the migrants, as well as drug shipments, away from authorities'. The patchy reception in the thinly populated border regions is a problem both for the patrols and for those they are trying to catch.

A major influence on criminal uses has been the availability of pay-as-you-go mobile phones, which can
be easily bought under an assumed name. Any calls made might be traceable, but ownership of the phone cannot be ascertained. The 7 July 2005 tube and bus bombers in London exploited this anonymity. The same advantage, of course, applies to stolen phones. Before the mobile phone, the crime of cellular fraud could not have existed – another reminder that new technologies of mobility
create
new crimes. The subscription fraud form of mobile crime, in which phones are bought under false names with no intention of paying for calls, is the most frequent. But the cloning of phones, in which the identity of another user is stolen, amounted to 85,000 cases in the United Kingdom by 1996, and is widespread across the cellular world: 80 per cent of drug dealers apprehended in the United States in the late 1990s, for example, were found to be using cloned mobile phones; while in the occupied territories of Israel, Palestinians made 57,000 international calls, subverting official security restrictions – and charged subscribers in Arizona.

In 2001 a complex European taxation swindle that proved lucrative came to light. It was based, rather bizarrely, in Stoke-on-Trent, a conurbation in the northern Midlands of England which had not seen the good days since Josiah Wedgwood produced pots there. Fraudsters exploited the fact that no tax was charged on the traffic of goods within the European single market. They imported mobile phones, chosen because they
were easily portable and in high demand, and sold them on to other, legitimate traders – adding 17.5 per cent tax, which was pocketed. At least £2.6 billion was creamed off in this way in 2000–01, with possibly 10 billion pounds lost to the taxman overall.

Just as the mobility of the car was domesticated by keeping databases of information, the criminal potentialities of the cellphone have been contained by technologies of registration. Indeed, whereas there was no essential reason why cars and drivers had to be registered – if you don't care about the law, you can get in a car and drive off; if it has petrol it will work – the cellular phone is unimaginable without databases of information. Every time a cellular phone passes from cell to cell, a reference has to be made to some central computerised list of network users. Every time an owner is billed, the information on phone use has to be totted up and processed. Unlike the automobile, databases are integral to mobile phone technology. (Although the user might never suspect this, sometimes with unintended consequences: when itemised billing was introduced in France male customers complained in their thousands because their extramarital affairs were uncovered overnight. The networks were forced to bow to public pressure and replace the last four digits of phone numbers with asterisks.)

Most of this information is stored centrally, as part of the operation of the mobile switching centre, but
increasingly personal data is held in the handset. In Europe, this shift coincided with the introduction of digital cellphones. First developed for the German analogue Netz-C system, which in many other ways was a commercial disappointment, the Subscriber Identity Module, or SIM card, was adopted as part of the pan-European GSM concept. While the SIM card contained information identifying the subscriber, it also could hold much more: preferred phone settings, recently dialled numbers or the equivalent of an address book. (One incidental consequence has been the reduced need to remember phone numbers. I can no longer recall friends' numbers, since my phone identifies incoming and outgoing calls by name.) The introduction of the SIM card was prompted by anxieties over crime. The SIM card also reflected wishes – hopes rather than expectations – that the card, which could identify the purchaser, would spark a boom in mobile commerce. GSM, remember, was imagined as a key infrastructural component of a future European market.

The GSM standard also provided the option of identifying equipment through an Equipment Identification Number (EIN) – so the SIM would say who was on the phone and the EIN would say exactly which phone was being used. In the UK, the mobile phone companies chose
not
to activate the EIN capability. In April 2002 the British prime minister, Tony Blair, made an announcement
that many commentators considered a hostage to fortune: that the recent rise in crime would be under control by the following September. What seemed like a bold political gamble was in fact partly a measured guess that if the mobile companies were persuaded to activate the EIN, then stolen phones could be cut off as soon as they were reported. Crime and mobile phones had become matters of political spin.

BOOK: Constant Touch
7.74Mb size Format: txt, pdf, ePub
ads

Other books

Dragon Down by Casey Knight
Shine Your Light on Me by Lee Thompson
PostApoc by Liz Worth
Dark Secrets by Jessica Burnett
Maylin's Gate (Book 3) by Matthew Ballard
The Minions of Time by Jerry B. Jenkins, Chris Fabry
The Noise Revealed by Ian Whates