surveillance

This is the complete version of a three-part essay that I posted in May, June, and July of this year:
Part I: Distributed Agency and the Myth of Autonomy
Part II: Disclosure (Damned If You Do, Damned If You Don’t)
Part III: Documentary Consciousness

Privacy is not dead, but it does need to change.

Part I: Distributed Agency and the Myth of Autonomy

Last spring at TtW2012, a panel titled “Logging off and Disconnection” considered how and why some people choose to restrict (or even terminate) their participation in digital social life—and in doing so raised the question, is it truly possible to log off? Taken together, the four talks by Jenny Davis (@Jup83), Jessica Roberts (@jessyrob), Laura Portwood-Stacer (@lportwoodstacer), and Jessica Vitak (@jvitak) suggested that, while most people express some degree of ambivalence about social media and other digital social technologies, the majority of digital social technology users find the burdens and anxieties of participating in digital social life to be vastly preferable to the burdens and anxieties that accompany not participating. The implied answer is therefore NO: though whether to use social media and digital social technologies remains a choice (in theory), the choice not to use these technologies is no longer a practicable option for number of people.

In this essay, I first extend the “logging off” argument by considering that it may be technically impossible for anyone, even social media rejecters and abstainers, to disconnect completely from social media and other digital social technologies (to which I will refer throughout simply as ‘digital social technologies’). Consequently, decisions about our presence and participation in digital social life are made not only by us, but also by an expanding network of others. I then examine two prevailing privacy discourses—one championed by journalists and bloggers, the other championed by digital technology companies—to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control. Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequality and larger issues of power. Finally, I argue that the reality of inescapable connection and the impossible demands of prevailing privacy discourses have together resulted in what I term documentary consciousness, or the abstracted and internalized reproduction of others’ documentary vision. Documentary consciousness demands impossible disciplinary projects, and as such brings with it a gnawing disquietude; it is not uniformly distributed, but rests most heavily on those for whom (in the words of Foucault) “visibility is a trap.” I close by calling for new ways of thinking about both privacy and autonomy that more accurately reflect the ways power and identity intersect in augmented societies. more...

 

Last week, cell phone footage emerged on Youtube that purports to be taken by a Saudi Arabian woman in a mall, of her clash with the Saudi religious police. The woman is righteously indignant, insisting that they have no right to harass her, that it’s “none of [their] business if [she] wears nail polish”. She also tells them to “smile for the camera”, as she’s filming the entire thing and is sharing the footage.

The pattern of this particular encounter isn’t necessarily novel, and by Western standards a claim on the right to wear nail polish in public seems fairly mundane, but there is something worth noting about the specific dynamics inherent in sharing this kind of footage. Most obviously there’s the fact that in countries with repressive laws based on gender, wearing nail polish in public may indeed be an extremely subversive act, but that leaves aside the question of the cell phone footage itself, and what uploading it to Youtube does.

more...

We're always connected, whether we're connecting or not.

Last month at TtW2012, a panel titled “Logging off and Disconnection” considered how and why some people choose to restrict (or even terminate) their participation in digital social life—and in doing so raised the question, is it truly possible to log off? Taken together, the four talks by Jenny Davis (@Jup83), Jessica Roberts, Laura Portwood-Stacer (@lportwoodstacer), and Jessica Vitak (@jvitak) suggested that, while most people express some degree of ambivalence about social media and other digital social technologies, the majority of digital social technology users find the burdens and anxieties of participating in digital social life to be vastly preferable to the burdens and anxieties that accompany not participating. The implied answer is therefore NO: though whether to use social media and digital social technologies remains a choice (in theory), the choice not to use these technologies is no longer a practicable option for number of people.

In the three-part essay to follow, I first extend this argument by considering that it may be technically impossible for anyone, even social media rejecters and abstainers, to disconnect completely from social media and other digital social technologies (to which I will refer throughout simply as ‘digital social technologies’). Even if we choose not to connect directly to digital social technologies, we remain connected to them through our ‘conventional’ or ‘analogue’ social networks. Consequently, decisions about our presence and participation in digital social life are made not only by us, but also by an expanding network of others. In the second section, I examine two prevailing discourses of privacy, and explore the ways in which each fails to account for the contingencies of life in augmented realities. Though these discourses are in some ways diametrically opposed, each serves to reinforce not only radical individualist framings of privacy, but also existing inequalities and norms of visibility. In the final section, I argue that current notions of both “privacy” and “choice” need to be reconceptualized in ways that adequately take into account the increasing digital augmentation of everyday life. We need to see privacy both as a collective condition and as a collective responsibility, something that must be honored and respected as much as guarded and protected. more...

Michael Rogers, Republican Congressional Representative of Michigan's 8th district and sponsor of CISPA

House representative Mike Rogers (R-MI) introduced a bill back in November called the Cyber Intelligence Sharing and Protection Act (H.R. 3523) or CISPA. It has since been referred to and reported by the appropriate committees. Since then, according to Representative Rogers’ own web site, over 100 members of congress have already announced their support for the bill:

The 105 co-sponsors of the bill include 10 committee chairmen.  Additionally, a wide range of major industry and cyber associations, such as Facebook, Microsoft, the US Chamber Commerce, the Business Roundtable, the Internet Security Alliance, TechAmerica, and many others have sent letters of support for the bill.  A list of major industry and association supporters can be found at http://intelligence.house.gov/bill/cyber-intelligence-sharing-and-protection-act-2011

Unlike SOPA and PIPA, CISPA is all about collecting and sharing “cyber threat intelligence” and has less to do with copyright infringement concerns. This bill does not directly threaten the business interests of web companies, which means we should not expect their help in fighting the bill. In fact Facebook, IBM, Intel, Oracle, and Microsoft (among others) have already sent letters in support. more...

In my research on the Dutch banking system, it became clear that the banks are seriously worried about social engineering. These techniques, such as phishing and identity theft, have become increasingly common. No reason for concern, right? Surely, a system upgrade, some stronger passwords, or new forms of encryption and all will be well again. Wrong! When it comes to social engineering, trust in technology is deadly. The solution, in fact, cannot be technological; it must to be social.

The term social engineering has been around for decades, but in the last couple of years, it has been popularized by famous social engineer Kevin Mitnick.  In the book Social Engineering: The Art of Human Hacking by another famous social engineer, Christopher Hadnagy, social engineering is defined as “the act of manipulating a person to take an action that may or may not be in the ‘target’s’ best interest.” This may include obtaining information, gaining computer system access, or getting the target to take certain action. Kevin Mitnick pointed out that instead of hacking into a computer system it is easier to “hack the human.” While cracking the code is nearly impossible, tricking someone into giving it to you is often relatively easy. more...

Not long after the release of Google’s widely discussed and hotly contested privacy policy, which shares user data across its websites, the company is now offering to compensate customers for the data that they provide. Closely resembling the television tracking techniques used by  Nielsen, Google offers users who participate in the screenwise program up to $25 in Amazon gift cards for allowing Google to monitor their online activities. Users can even opt to be more extensively surveilled and earn up to $100.  While some (in particular, those in the comments section of the article linked above) view this as a cheap payoff for strong privacy violations, others are happy to receive monetary compensation for engaging in everyday leisure activities. This latter group is evidenced by a temporary hold on signups for the new program due to overwhelming interest.

Debates will likely ensue over the cost of privacy, the blurry line between labor and leisure, and the degree to which surveillance can—or should—be resisted.

[Editor’s comment: while this is only a small test, might we envision a model where users are paid for their data? Would it work? What are the implications? ~nathan]

Kurt Anderson, writer, critic, and public intellectual

Kurt Anderson’s recent article in Vanity Fair titled “You Say You Want a Devolution.” contends that the past 20 years have seen a total stagnation in the production of new cultural aesthetics. In other words, the end of the 50s looked nothing like the end of the 70s, but 1989 looks remarkably similar to 2009. Anderson concludes:

We seem to have trapped ourselves in a vicious cycle-economic progress and innovation stagnated, except in information technology; which leads us to embrace the past and turn the present into a pleasantly eclectic for-profit museum; which deprives the cultures of innovation of the fuel they need to conjure genuinely new ideas and forms; which deters radical change, reinforcing the economic (and political) stagnation.

This is concerning, since that means the entirety of our blog is nothing more than the fungal growth sitting upon the neutral technological substrate that we impregnate with decaying cultures of past decades. Tattoos, Facebook, Burning Man, the iPhone, Twitter, sex dolls, wifi, internet memes, reality TV, geek culture, hipsters, video gamesfaux-vintage photographs, and dubstep are all popular topics on our blog, and (along with blogging itself) are products of the last 20 years. Anderson assumes that cultural objects are made possible through technology, but refuses to admit that technologies can also be cultural objects in and of themselves. more...

Marc Smith of the Social Media Research Foundation analyzed twitter associations of Occupy Wall Street tweets and found a viral, highly decentralized network of individuals. They compared this to the Tea Party, which had a much more centralized group dynamic.

Americans have gotten so good at being consumers that it almost seems hackneyed to acknowledge such a thing. I say “almost” because there are still wonderfully interesting things being said in some literary and academic circles that continually find deeper levels of meaning in the seemingly shallow end of the societal pool. Our near-perfect systems of consumption not only make it technically possible to exchange beautifully designed plastic gift cards,but  it makes it socially acceptable as well. A gift-giver can reliably assume that the recipient a thousand miles away has access to the same stores, with almost the exact same products. The gift-giver can also assume a certain level of homogeneity about gift-giving practices. Most of us share a set of common beliefs about what constitutes a good gift: It should, relate to our interests, be useful, carry sentimental value, reflect the nature of a relationship, provide entertainment, and/or fill a need. When you give a gift card, you are acknowledging the need or want, but allowing the receiver to specify its final material (or digital) form. This system relies on stability and uniformity to function smoothly. There must be a common culture, as well as a reliable stream of goods and services. But such stability is becoming less, and less likely. Whether it is peak energy, financial collapse, or a little bit of both- our world is becoming less predictable and the systems that rely on steady streams of capital and petroleum are breaking down. In their place, we might begin to find self-organizing systems that are not only more efficient, but also much more just forms of resource distribution. more...

Iran claims to have captured one of the CIA’s stealth drones which, they say, intruded on their airspace. Usually, I would talk about nations’ continuing development of their capacity for “augmented warfare” and maybe throw in some commentary on how this relates to theories on surveillance and the state. But, to be totally honest, I am incapable of doing that right now. Not because I have deadlines for papers coming up, or because I actually promised that my next post was going to be about Actor Network Theory. Its because… Well…

more...

A modern day panopticon. Photo by Nathan Jurgenson.

The first post I wrote for Cyborgology concluded that many of the dominant socio-technical systems in our world look and behave in a similar fashion. The entertainment industry, advanced military surveillance, search algorithms, and academic reference tools are swapping hardware and best practice in such a way that the carrying out of a military invasion, or the Super Bowl begins to look disturbingly similar. Around the time that I wrote that post, USAToday ran a disturbingly cheerful story about police departments’ desire to acquire similar technology. Miami’s police department acquired the  Honeywell’s T-Hawk Micro Air Vehicle (MAV) a few moths later. The only regulations that prevented the MPD (or any police force) from acquiring such technology were FAA regulations about where and how it could be flown. Such acquisitions have gone largely unquestioned by the media as well. In fact, local coverage of the purchase was supportive. A local CBS affiliate led with the headline, “Dade Cops Waiting To Get Crime Fighting Drone Airborne.” This all seems very bleak, but just as powerful actors have increased their abilities to engage in surveillance, the individual has more tools than ever to watch the watchers. more...