{"id":11304,"date":"2012-08-06T09:00:56","date_gmt":"2012-08-06T13:00:56","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=11304"},"modified":"2014-06-19T12:07:08","modified_gmt":"2014-06-19T16:07:08","slug":"a-new-privacy-full-essay-parts-i-ii-and-iii-2","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2012\/08\/06\/a-new-privacy-full-essay-parts-i-ii-and-iii-2\/","title":{"rendered":"A New Privacy: Full Essay (Parts I, II, and III)"},"content":{"rendered":"<p><em>This is the complete version of a three-part essay that I posted in May, June, and July of this year:<\/em><br \/>\n<em><a href=\"Disclosure (Damned If You Do, Damned If You Don\u2019t)\">Part I: Distributed Agency and the Myth of Autonomy<\/a><\/em><br \/>\n<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/\"><em>Part II: Disclosure (Damned If You Do, Damned If You Don\u2019t)<\/em><\/a><br \/>\n<em><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/\">Part III: Documentary Consciousness<\/a><\/em><\/p>\n<figure id=\"attachment_11314\" aria-describedby=\"caption-attachment-11314\" style=\"width: 444px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/08\/06\/a-new-privacy-full-essay-parts-i-ii-and-iii-2\/digital-privacy\/\" rel=\"attachment wp-att-11314\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-11314\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/08\/digital-privacy.jpg\" alt=\"\" width=\"444\" height=\"320\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/08\/digital-privacy.jpg 444w, https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/08\/digital-privacy-300x216.jpg 300w\" sizes=\"auto, (max-width: 444px) 100vw, 444px\" \/><\/a><figcaption id=\"caption-attachment-11314\" class=\"wp-caption-text\">Privacy is not dead, but it does need to change.<\/figcaption><\/figure>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/21\/a-new-privacy-pt-i-distributed-agency-the-myth-of-autonomy\/\">Part I: Distributed Agency and the Myth of Autonomy<\/a><\/strong><\/p>\n<p>Last spring at TtW2012, a <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/10\/ttw12-panel-spotlight-logging-off-disconnection\/\">panel<\/a> titled \u201c<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/10\/ttw12-panel-spotlight-logging-off-disconnection\/\">Logging off and Disconnection<\/a>\u201d considered how and why some people choose to restrict (or even terminate) their participation in digital social life\u2014and in doing so raised the question, <em>is it truly possible to log off?<\/em> Taken together, the four talks by Jenny Davis (<a href=\"https:\/\/twitter.com\/#%21\/Jup83\">@Jup83<\/a>), Jessica Roberts (<a href=\"https:\/\/twitter.com\/jessyrob\">@jessyrob<\/a>), Laura Portwood-Stacer (<a href=\"https:\/\/twitter.com\/#%21\/lportwoodstacer\">@lportwoodstacer<\/a>), and Jessica Vitak (<a href=\"https:\/\/twitter.com\/#%21\/jvitak\">@jvitak<\/a>) suggested that, while most people express some degree of ambivalence about social media and other digital social technologies, the majority of digital social technology users find the burdens and anxieties of participating in digital social life to be vastly preferable to the burdens and anxieties that accompany <em>not <\/em>participating. The implied answer is therefore <em>NO: <\/em>though whether to use social media and digital social technologies remains a choice (in theory), the choice not to use these technologies is no longer a practicable option for number of people.<\/p>\n<p>In this essay, I first extend the \u201clogging off\u201d argument by considering that <strong>it may be technically impossible for <\/strong><em><strong>anyone<\/strong><\/em><strong>, even social media rejecters and abstainers, to disconnect completely from social media and other digital social technologies<\/strong> (to which I will refer throughout simply as \u2018digital social technologies\u2019). Consequently, decisions about our presence and participation in digital social life are made not only by us, but also by an expanding network of others. I then examine two prevailing privacy discourses\u2014one championed by journalists and bloggers, the other championed by digital technology companies\u2014to show that, although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control. <strong>Clinging to the myth of individual autonomy, however, leads us to think about privacy in ways that mask both structural inequality and larger issues of power.<\/strong> Finally, I argue that the reality of inescapable connection and the impossible demands of prevailing privacy discourses have together resulted in what I term <em>documentary consciousness<\/em>, or the abstracted and internalized reproduction of others&#8217; <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/05\/14\/the-faux-vintage-photo-full-essay-parts-i-ii-and-iii\/\">documentary vision<\/a>. <strong>Documentary consciousness demands impossible disciplinary projects, and as such brings with it a gnawing disquietude<\/strong>; it is not uniformly distributed, but rests most heavily on those for whom (in the words of Foucault) \u201cvisibility is a trap.\u201d I close by calling for new ways of thinking about both privacy and autonomy that more accurately reflect the ways power and identity intersect in augmented societies. <!--more--><\/p>\n<figure id=\"attachment_10279\" aria-describedby=\"caption-attachment-10279\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/?attachment_id=10279\" rel=\"attachment wp-att-10279\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10279 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/identities-are-fluid2.jpg-500x359.jpg\" alt=\"\" width=\"400\" height=\"287\" \/><\/a><figcaption id=\"caption-attachment-10279\" class=\"wp-caption-text\">We&#8217;re always connected, whether we&#8217;re connecting or not.<\/figcaption><\/figure>\n<p>For the skeptical reader in particular, I want to begin by highlighting that the effects of neither participation nor non-participation in digital sociality are uniform or determined, and that both are likely to vary considerably across different social positions and contexts. An illustrative (if somewhat extreme) example is the elderly: Alexandra Samuels caricatures the <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2012\/04\/own-it-social-media-isnt-just-something-other-people-do\/256212\/\">absurdity of fretting over seniors who refuse online engagement<\/a>, and my own socially active but offline-only grandmother makes a great case study in successful living without digital social technology. Though 84 years old, my grandmother is healthy and can get around independently; she lives in a seniors-only community of a few thousand adults (nearly all of whom are offline-only as well), and a number of her neighbors have become her good friends. She has several children, grandchildren, and great-grandchildren who live less than an hour away, and who call and visit regularly. As a financially stable retiree, she can say with confidence that there will be no job-hunting in her future; her surviving siblings still send letters, and her adult children print out digital family photos to show her. For these reasons and others, it would be hard to make the case that either she or any one of her similarly situated friends suffers from digital deprivation.<\/p>\n<p>In contrast, the \u201cLogging Off and Disconnection\u201d panel highlights how the picture of offline-only living shifts if some of the other factors I list above change. Whereas my grandmother has a number of friends with whom she spends time (and who, like her, do not use digital social technologies), Davis describes the isolation that digital abstainers experience when many of the friends with whom they spend time <em>do<\/em> use digital social technologies. Much to their dismay, non-participating friends of social media enthusiasts in particular can <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/03\/06\/the-high-cost-of-abstention\/\">find themselves excluded from both offline <em>and<\/em> online interaction<\/a> within their own social groups. Similarly, Roberts finds that even 24 hours of \u201clogging off\u201d can be impossible for students if their close friends, family members, or significant others expect them to be constantly (digitally) available. In these contexts, it becomes difficult to refuse digital engagement without seeming also to refuse obligations of care.<\/p>\n<p>Nor is what I will call <em>abstention-related atrophy<\/em> limited to relationships with friends and family members; professional relationships and even career trajectories can suffer as well. Vitak points out that, for job-seekers, the <a href=\"http:\/\/www.nytimes.com\/2012\/04\/22\/opinion\/sunday\/the-flight-from-conversation.html?_r=1\">much-maligned<\/a> proliferation of \u2018weak ties\u2019 that social media has been <a href=\"http:\/\/www.theatlantic.com\/magazine\/archive\/2012\/05\/is-facebook-making-us-lonely\/8930\/\">accused of fostering<\/a> is a greater asset for gaining employment than is a smaller assortment of \u2018strong ties.\u2019 Modern life has become sufficiently saturated with social media to support use of what Portwood-Stacer calls its \u201cconspicuous non-consumption\u201d as a status marker: in the United States, where <a href=\"http:\/\/blog.nielsen.com\/nielsenwire\/media_entertainment\/nielsen-estimates-number-of-u-s-television-homes-to-be-114-7-million\/\">96.7 percent<\/a> of households have at least one television, <a href=\"https:\/\/twitter.com\/#%21\/farman\/status\/191197313555894272\">\u201cI\u2019m not on Facebook\u201d is the new \u201cI don\u2019t even own a TV.\u201d<\/a> That even a few people read the purposeful rejection of social media as a privilege signifier implicitly demonstrates <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/03\/06\/the-high-cost-of-abstention\/\">the high cost of abstaining from social media<\/a>.<\/p>\n<figure id=\"attachment_10307\" aria-describedby=\"caption-attachment-10307\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/21\/a-new-privacy-pt-i-distributed-agency-the-myth-of-autonomy\/wadman-rockwell-telephone-2\/\" rel=\"attachment wp-att-10307\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10307 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/wadman-rockwell-telephone1.jpg\" alt=\"\" width=\"400\" height=\"320\" \/><\/a><figcaption id=\"caption-attachment-10307\" class=\"wp-caption-text\">You can opt-out, but you can&#8217;t make your friends opt-out.<\/figcaption><\/figure>\n<p>Conversations about logging off or disconnecting have continued in the weeks since TtW2012. Most recently, PJ Rey (<a href=\"https:\/\/twitter.com\/#%21\/pjrey\">@pjrey<\/a>) makes the case that <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/10\/social-media-you-can-log-off-but-you-cant-opt-out\/\">social media is a non-optional system<\/a>; because societies and technologies are always informing and affecting each other, \u201cwe can\u2019t escape social media any more than we can escape society itself.\u201d This means that the extent to which we can opt-out is limited; we can choose not to use Facebook, for example, but we can no longer choose to live in a world in which no one else uses Facebook (whether for planning parties or organizing protests). As does Davis, Rey argues that \u201cconscientious objectors of the digital age\u201d therefore risk losing social capital in a number of ways.<\/p>\n<p>I would like to suggest, however, that even those who are \u201c<a href=\"https:\/\/twitter.com\/#%21\/phenatypical\/statuses\/191203879617183744\">secure enough<\/a>\u201d to quit social media and other digital social technologies can not separate from them fully, nor can so-called \u201cFacebook virgins\u201d remain pure abstainers. Rejecters and abstainers continue to live within the same socio-technical system as adopters and everyone else, and therefore continue to affect and to be affected by digital social technology indirectly; they also continue to leave digital traces through the actions of other people. <strong>As I elaborate below, <em>not connecting<\/em> and <em>not being connected<\/em> are two very different things; we are always <em>connected<\/em> to digital social technologies, whether we are <em>connecting<\/em> to them or not.<\/strong> A number of digital social technology companies capitalize on this fact, and in so doing amplify the extent to which digital agency is increasingly distributed rather than individualized.<\/p>\n<p>Below, I use Facebook as a familiar example to illustrate the near-impossibility of erasing digital traces of one\u2019s self most generally. Many of the surveillance practices that follow here are not unique to Facebook, but the difficulty of achieving a full disengagement from Facebook can serve as an indicator of how much more difficult a full disengagement from all digital social technology would be. First, consider some of the issues that face people who actually have Facebook accounts (at minimum a username and password). Facebook has tracked its users\u2019 web behavior <a href=\"http:\/\/nikcub.appspot.com\/posts\/logging-out-of-facebook-is-not-enough\">even when they are logged out<\/a> of Facebook; the \u201cfixed\u201d version of the site\u2019s cookies <a href=\"http:\/\/nikcub.appspot.com\/posts\/facebook-fixes-logout-issue-explains-cookies\">still track potentially identifying information<\/a> after users log out, and these same cookies are deployed <a href=\"http:\/\/articles.economictimes.indiatimes.com\/2011-11-20\/news\/30422010_1_andrew-noyes-facebook-spokesman-social-networking-site\">whenever anyone <\/a>(even a non-user) views a Facebook page. Last year, a 24-year-old law student named Max Schrems discovered that Facebook retains a wide array of user profile data <a href=\"http:\/\/www.guardian.co.uk\/technology\/2011\/oct\/20\/facebook-fine-holding-data-deleted\">that users themselves have deleted<\/a>; Schrems subsequently launched <a href=\"http:\/\/www.identityblog.com\/?p=1201\">22 unique complaints<\/a>, started an initiative called <a href=\"http:\/\/www.europe-v-facebook.org\/EN\/en.html\">Europe vs. Facebook<\/a>, and earned Facebook\u2019s Ireland offices an <a href=\"http:\/\/mashable.com\/2011\/10\/21\/facebook-deleted-data-fine\/\">audit<\/a>.<\/p>\n<figure id=\"attachment_10281\" aria-describedby=\"caption-attachment-10281\" style=\"width: 243px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/?attachment_id=10281\" rel=\"attachment wp-att-10281\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10281  \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/shadow-profile.jpg\" alt=\"\" width=\"243\" height=\"324\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/shadow-profile.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/shadow-profile-225x300.jpg 225w\" sizes=\"auto, (max-width: 243px) 100vw, 243px\" \/><\/a><figcaption id=\"caption-attachment-10281\" class=\"wp-caption-text\">Are you my shadow profile?<\/figcaption><\/figure>\n<p>In one particular complaint, Schrems alleges that Facebook not only retains data it should have deleted, but also builds \u201c<a href=\"http:\/\/www.slashgear.com\/facebook-shadow-profiles-detail-non-members-prompt-investigation-21189885\/\">shadow profiles<\/a>\u201d of both users and non-users. These shadow profiles contain information that the profiled individuals themselves did not choose to share with Facebook. For a Facebook user, a shadow profile could include information about any pages she has viewed that have \u201cLike\u201d buttons on them, <a href=\"http:\/\/www.slashgear.com\/facebook-shadow-profiles-detail-non-members-prompt-investigation-21189885\/\">whether she has ever \u201cLiked\u201d anything or not<\/a>. User and non-user shadow profiles alike contain what I call <em>second-hand data,<\/em> or information obtained about individuals through other individuals\u2019 interactions with an app or website. Facebook harvests second-hand data about users\u2019 friends, acquaintances, and associates when users synchronize their phones with Facebook, import their contact lists from other email or messaging accounts, or simply search Facebook for individual names or email addresses. In each case, Facebook acquires and curates information that pertains to individuals other than those from whom the information is obtained.<\/p>\n<p>Second-hand data collection on and through Facebook is not limited to the creation of shadow profiles, however. As a recent article elaborated, <a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2012\/04\/on-facebook-your-privacy-is-your-friends-privacy\/256407\/\">Facebook\u2019s current photo tagging system<\/a> enables and encourages users to disclose a wealth of information not only about themselves, but also about the people they tag in posted photos. (Though not mentioned in the piece, the \u201ctag suggestions\u201d provided by Facebook\u2019s facial recognition software have made photo tagging nearly effortless for users who post photos, while removing tags now involves a cumbersome five-click process per each tag that a pictured user wants removed.) Recall, too, that other companies collect second-hand data through Facebook each time a Facebook user authorizes a third party app; by default, the third-party app can \u2018see\u2019 everything the user who authorized it can see, on each of that user\u2019s friends\u2019 profiles (<a href=\"https:\/\/www.facebook.com\/about\/privacy\/your-info-on-other#friendsapps\">the same holds true<\/a> for games and for websites that allow users to log-in with their Facebook accounts).<\/p>\n<p>Those users who dig through Facebook\u2019s privacy settings can prevent apps from accessing some of their information by repeating the <a href=\"http:\/\/www.facebook.com\/help\/?faq=121070141307903\">tedious, time-consuming process<\/a> required to block a specific app for each and every app that any one of their Facebook \u2018friends\u2019 might have authorized (though the irritation-price of doing so clearly aims to guide users away from this sort of behavior). Certain pieces of information, however\u2014a user\u2019s name, profile picture, gender, network memberships, username, user id, and \u2018friends\u2019 list\u2014remain accessible to Facebook apps, no matter what; Facebook states that this makes one\u2019s friends\u2019 experiences on the site (if not one\u2019s own) \u201c<a href=\"https:\/\/www.facebook.com\/about\/privacy\/your-info-on-other#friendsapps\">better and more social<\/a>.\u201d Users do have the \u2018nuclear option\u2019 of turning off <em>all<\/em> apps, though this action means they cannot use apps themselves; their information also still remains available for collection through their friends\u2019 other Facebook-related activities.<\/p>\n<p>Facebook representatives have <a href=\"http:\/\/www.slashgear.com\/facebook-denies-shadow-profile-claims-risks-e100k-privacy-fine-24190251\/\">denied any wrongdoing<\/a>, denied the existence of shadow profiles <em>per se <\/em>(though a former Facebook employee recently confirmed that the company builds &#8220;<a href=\"http:\/\/www.washingtonpost.com\/business\/economy\/fugitive-from-facebook-questions-the-social-media-life\/2012\/08\/03\/5e4f855c-d0f3-11e1-adf2-d56eb210cdcd_print.html\">dark profiles<\/a>&#8221; of non-users), and maintained that there is <a href=\"http:\/\/articles.economictimes.indiatimes.com\/2011-10-24\/news\/30316406_1_andrew-noyes-users-profiles\">nothing non-standard<\/a> about the company\u2019s data collection practices. Nonetheless, even the possibility of shadow profiles raises <a href=\"http:\/\/yro.slashdot.org\/story\/11\/10\/18\/1429223\/facebook-is-building-shadow-profiles-of-non-users\">a complicated question<\/a> about where to draw the line between information that individuals \u2018choose willingly\u2019 to share (and are therefore responsible for assuming it will end up on the Internet), and \u201cinformation that accumulates <a href=\"http:\/\/yro.slashdot.org\/comments.pl?sid=2481922&amp;cid=37750358\">simply by existing<\/a>.\u201d <strong>The difficulty of making this determination reflects not only the tensions between prevailing privacy discourses, but also the growing ruptures between the ways in which we conceptualize privacy and the increasingly augmented world in which we live.<\/strong><\/p>\n<figure id=\"attachment_10287\" aria-describedby=\"caption-attachment-10287\" style=\"width: 238px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/21\/a-new-privacy-pt-i-distributed-agency-the-myth-of-autonomy\/kids-secret-shhh\/\" rel=\"attachment wp-att-10287\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10287 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/kids-secret-shhh.jpg\" alt=\"\" width=\"238\" height=\"162\" \/><\/a><figcaption id=\"caption-attachment-10287\" class=\"wp-caption-text\">Your privacy is your friends&#8217; privacy&#8211;and vice versa.<\/figcaption><\/figure>\n<p>As a headline in <em>The Atlantic<\/em> put it recently, \u201c<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2012\/04\/on-facebook-your-privacy-is-your-friends-privacy\/256407\/\">On Facebook, Your Privacy is Your Friends\u2019 Privacy<\/a>\u201d\u2014but what does that mean? How should we weigh which of our friends\u2019 desires against which of our own? How are we to anticipate the choices our friends might make, and on whom does the responsibility fall to choose correctly? The problem is that we tend to think of privacy as a matter of individual control and concern, even though privacy\u2014however we define it\u2014is now (and has always been) both enhanced and eroded by networks of others. In a society that places so much emphasis on radical individualism, we are ill-prepared to grapple with the rippling and often unintended consequences that our actions can have for others; we are similarly disinclined to look beyond the level of individual actions in asking why such consequences play out in the ways that they do.<\/p>\n<p>\u2018Simply existing\u2019 does generate more information than it did two generations ago, in part because so many different corporations and institutions are attempting to capitalize on the potentials for targeted data collection afforded by a growing number of digital technologies. At the same time, surveillance of individual behavior for commercial purposes is nothing new, and Facebook is <a href=\"http:\/\/www.msnbc.msn.com\/id\/42239031\/ns\/business-consumer_news\/t\/whos-watching-you-online-ftc-pushes-do-not-track-plan\/\">hardly<\/a> <a href=\"http:\/\/online.wsj.com\/article\/SB10001424052970204880404577225380456599176.html\">the only company<\/a> <a href=\"http:\/\/online.wsj.com\/article\/SB10001424052748703309704575413553851854026.html\">building<\/a> <a href=\"http:\/\/www.betabeat.com\/2012\/02\/29\/even-trained-professionals-dont-know-what-google-has-on-you\/\">data profiles<\/a> to which the profiled individuals themselves have incomplete access (if any access at all). What <em>is<\/em> comparatively new about Facebook-style <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-17051910\">surveillance in social media<\/a> is the degree to which disclosure of our personal information has become a product not only of choices we make (knowingly or unknowingly), but also of <a href=\"http:\/\/online.wsj.com\/article\/SB10001424052702303302504577327744009046230.html\">choices made by our family members, friends, acquaintances, or professional contacts<\/a>.<\/p>\n<p><strong>Put less eloquently: if Facebook were an STI, it would be one that <em>you<\/em> contract whenever any of your old classmates have unprotected sex.<\/strong> Even one\u2019s own abstinence is no longer effective protection against catching another so-called \u2018data double\u2019 or \u201c<a href=\"http:\/\/thenewinquiry.com\/blogs\/marginal-utility\/dumb-bullshit\/\">data self<\/a>,\u201d yet we still think about privacy and disclosure as matters of individual choice and responsibility. If your desire is to disconnect completely, the onus is on you to keep any and all information about yourself\u2014even your name\u2014from anyone who uses Facebook, or who might use anything like Facebook in the future.<\/p>\n<p>If we dispense with <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/02\/24\/digital-dualism-versus-augmented-reality\/\">digital dualism<\/a>\u2014the idea that the \u2018virtual,\u2019 \u2018digital,\u2019 or \u2018online\u2019 world is somehow separate and distinct from the \u2018real,\u2019 \u2018physical,\u2019 or \u2018face to face\u2019 world\u2014it becomes apparent that <strong><em>not connecting<\/em> to digital social technologies and <em>not being connected<\/em> to digital social technologies are two different things.<\/strong> Whether as a show of conspicuous non-consumption, an act of atonement and catharsis (as portrayed in Kelsey Brannan\u2019s [<a href=\"https:\/\/twitter.com\/#%21\/KelsBran\">@KelsBran<\/a>] film <a href=\"http:\/\/www.overandoutfilm.com\/\"><em>Over &amp; Out<\/em><\/a>), or for other reasons entirely, we can choose to accept the social risks of deleting our social media profiles, dispensing with our gadgetry, and no longer <em>connecting<\/em> to others through digital means.<\/p>\n<p>Yet whether we feel liberated, isolated, or smugly self-satisfied in doing so, we have not exited the \u2018virtual world\u2019; we remain situated within the same <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/04\/06\/ttw2012-panel-spotlight-augmented-reality\/\">augmented reality<\/a>, <em>connected<\/em> to each other and to the only world available through flows that are both physical and digital. I email photographs, my mother prints them out, and my grandmother hangs them in frames on her wall; a social media refuser meets her own searchable reflection in traces of book reviews, grant awards, department listings, and <a href=\"http:\/\/www.ratemyprofessors.com\/\">RateMyProfessors.com<\/a>; a nearby friend sees you check-in early at your office, and drops by to surprise you with much needed coffee. A news story is broken and researched via Twitter, circulated in a newspaper, amplified by a TV documentary, and referenced in a book that someone writes about on a blog. <strong>Whether the interface at which we connect is screen, skin, or something else, the digital and physical spaces in which we live are always already enmeshed.<\/strong> Ceasing to connect at one particular type of interface does not change this.<\/p>\n<figure id=\"attachment_10280\" aria-describedby=\"caption-attachment-10280\" style=\"width: 217px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/?attachment_id=10280\" rel=\"attachment wp-att-10280\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10280  \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/houdini-chains.jpg\" alt=\"\" width=\"217\" height=\"360\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/houdini-chains.jpg 301w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/houdini-chains-180x300.jpg 180w\" sizes=\"auto, (max-width: 217px) 100vw, 217px\" \/><\/a><figcaption id=\"caption-attachment-10280\" class=\"wp-caption-text\">Even Houdini can&#8217;t escape digital social technology.<\/figcaption><\/figure>\n<p>In stating that connection is inescapable, I do not mean to suggest that all patterns of connection are equitable or equivalent in form, function, or impact. Connection does not operate independent of variables such as race, class, gender, ability, or sexual orientation; digital augmentation is not a panacea for oppression, and neither has nor will magically eliminate social and structural inequality to birth a technoutopian future. My intent here in focusing on broader themes is not to diminish the importance of these differences, but to highlight three key points about digital social technology in an augmented world:<\/p>\n<p>1.) First, our individual choices to use or reject particular digital social technologies are structured not only by cultural, economic, <a href=\"http:\/\/news.cnet.com\/8301-1023_3-57407347-93\/no-joke-al-franken-rings-alarm-over-facebook-google\/\">and technological factors<\/a>, but also by our social, emotional, and professional ties to other people;<\/p>\n<p>2.) Second, regardless of how much or how little we choose to use digital social technology, there are more digital traces of us than we are able to access or to remove;<\/p>\n<p>3.) Third, even if we choose not to participate in digital social life ourselves, the participation of people we know still leaves digital traces of us. We are always <em>connected<\/em> to digital social technologies, whether we are <em>connecting<\/em> through them or not.<\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong><em>\u00a0<\/em><a href=\"Disclosure (Damned If You Do, Damned If You Don\u2019t)\">Part II: Disclosure (Damned If You Do, Damned If You Don\u2019t)<\/a><\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/peeping-tom-bathroom-2\/\" rel=\"attachment wp-att-10461\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10461 aligncenter\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/peeping-tom-bathroom1.jpg\" alt=\"\" width=\"400\" height=\"284\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/peeping-tom-bathroom1.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/peeping-tom-bathroom1-300x213.jpg 300w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>So far I&#8217;ve argued that <strong>whether we leave digital traces is not a decision we can make autonomously, because our friends, acquaintances, and contacts also make these decisions for us<\/strong>. These traces are largely unavoidable, as we cannot escape being connected to digital social technologies anymore than we can escape society itself. But do our current notions of privacy reflect this fact? I now consider two different privacy discourses to show that 1) although our connections to digital social technology are out of our hands, we still conceptualize privacy as a matter of individual choice and control, and 2)\u00a0<strong>clinging to the myth of individual autonomy leads us to think about privacy in ways that mask both structural inequality and larger issues of power.<\/strong><\/p>\n<figure id=\"attachment_10437\" aria-describedby=\"caption-attachment-10437\" style=\"width: 200px\" class=\"wp-caption alignright\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/privacy-not-up-to-you\/\" rel=\"attachment wp-att-10437\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10437 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/privacy-not-up-to-you-300x225.jpg\" alt=\"\" width=\"200\" height=\"150\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/privacy-not-up-to-you-300x225.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/privacy-not-up-to-you.jpg 500w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><figcaption id=\"caption-attachment-10437\" class=\"wp-caption-text\">Your privacy is out of your hands, but protecting it is still your responsibility.<\/figcaption><\/figure>\n<p>Inescapable connection notwithstanding, we still largely conceptualize disclosure as an individual choice, and privacy as a personal responsibility. This is particularly unsurprising in the United States, where an obsession with self-determination is foundational not only to the radical individualism that increasingly characterizes American culture, but also to much of our national mythology (to let go of the \u2018autonomous individual\u2019 would be to relinquish the \u201cbootstrap\u201d narrative, the mirage of meritocracy, and the shaky belief that bad things don\u2019t happen to good people, among other things).<\/p>\n<p>Though the intersection of digital interaction and personal information is hardly localized to the United States, major digital social technology companies such as Facebook and Google are headquartered in the U.S.; perhaps relatedly, the two primary discourses of privacy within that intersection share a good deal of underlying ideology with U.S. national mythology. The first of these discourses centers on a paradigm that I\u2019ll call <em>Shame On You<\/em>, and spotlights issues of privacy and agency; the second centers on a paradigm that I\u2019ll call <em>Look At Me<\/em>, and spotlights issues of privacy and identity.<\/p>\n<figure id=\"attachment_10445\" aria-describedby=\"caption-attachment-10445\" style=\"width: 240px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/dear-victim\/\" rel=\"attachment wp-att-10445\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10445 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dear-victim-300x228.jpg\" alt=\"\" width=\"240\" height=\"182\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dear-victim-300x228.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dear-victim-500x381.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dear-victim.jpg 620w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/a><figcaption id=\"caption-attachment-10445\" class=\"wp-caption-text\">Blaming the victim.<\/figcaption><\/figure>\n<p>\u201cYou shouldn\u2019t have put it on the Internet, stupid!\u201d Within the <em>Shame On You<\/em> paradigm, <strong>the control of personal information and the protection of personal privacy are not just individual responsibilities, but also moral obligations<\/strong>. Choosing to disclose is at best a risk and a liability; at worst, it is the moment we bring upon ourselves any unwanted social, emotional, or economic impacts that will stem (at any point, and in any way) from either an intended or an unintended audience\u2019s access to something we have made digitally available. Disclosure is framed as an individual choice, though we need not choose intentionally or even knowingly; it can be the choice to disclose information, the choice to make incorrect assumptions about to whom information is (or will be) accessible, or the choice to remain ignorant of what, when, by whom, how, and to what end that information can be made accessible.<\/p>\n<p>A privacy violation is therefore ultimately a failure of vigilance, a failure of prescience; it redefines as disclosure the instant in which we should have known better, regardless of what it is we should have known. Accordingly, <strong>the greatest shame in compromised privacy is not what is exposed, but the fact of exposure itself<\/strong>. We judge people less for <a href=\"http:\/\/swampland.time.com\/2011\/05\/31\/weinergate-anatomy-of-a-social-media-scandal\/\">showing women their genitals<\/a>, and more for being reckless enough <a href=\"http:\/\/abcnews.go.com\/Politics\/rep-anthony-weiner-picture\/story?id=13774605\">to get caught<\/a> <a href=\"http:\/\/thehill.com\/capital-living\/in-the-know\/217437-a-year-after-scandal-anthony-weiners-twitter-page-still-up\">doing so on Twitter<\/a>.<\/p>\n<p><em>Shame On You<\/em> was showcased most recently in the commentary surrounding the controversial iPhone app \u201cGirls Around Me,\u201d which used a combination of public Google Maps data, public Foursquare check-ins, and \u2018publicly available\u2019<a title=\"\" href=\"#_edn1\">[i]<\/a> Facebook information to create a display of nearby women. The creators of Girls Around Me claimed their so-called \u201ccreepy\u201d app was being <a href=\"http:\/\/mashable.com\/2012\/04\/02\/girls-around-me-defense\/\">targeted as a scapegoat<\/a>, and insisted that the app could just as well be used to locate men instead of women. Nonetheless, the creators\u2019 use of the diminutive term \u201cgirls\u201d rather than the more accurate term \u201cwomen\u201d exemplifies <a href=\"http:\/\/www.wakemag.org\/voices\/i%E2%80%99m-a-woman-not-a-girl-you-sexist-shit-head\/\">the sexism<\/a> and the objectification of women on which the app was designed to capitalize. (If the app\u2019s graphic design somehow failed to make this clear, see also one developer\u2019s comments about using Girls Around Me to \u201c<a href=\"http:\/\/www.cultofmac.com\/158764\/developers-behind-girls-around-me-stalking-app-explain-themselves-exclusive-interview\/\">[avoid] ugly women on a night out<\/a>\u201d).<\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/location-pinpoint\/\" rel=\"attachment wp-att-10436\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10436 alignright\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/location-pinpoint.jpg\" alt=\"\" width=\"196\" height=\"146\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/location-pinpoint.jpg 425w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/location-pinpoint-300x224.jpg 300w\" sizes=\"auto, (max-width: 196px) 100vw, 196px\" \/><\/a>The telling use of \u201cgirls\u201d seemed to pass uncommented upon, however, and most accounts of the controversy (with <a href=\"http:\/\/www.huffingtonpost.co.uk\/helen-crane\/girls-around-me-dont-blame-the-technology_b_1401124.html\">few<\/a> <a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/04\/02\/the-reaction-to-girls-around-me-was-far-more-disturbing-than-the-creepy-app-itself\/\">exceptions<\/a>) omitted gender and power dynamics from the discussion\u2014as well as \u201c<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/12\/04\/the-girls-around-me-problem-isnt-just-about-data-but-sexism\/255424\/\">society, norms, politics, values and everything else confusing about the analogue world<\/a>.\u201d The result was <strong>a powerful but unexamined synergy between <em>Shame On You<\/em> and the politics of sex and visibility, one that cast as transgressors women who had dared not only to go out in public, but to publicly declare where they had gone<\/strong>.<\/p>\n<p><a href=\"http:\/\/www.pcworld.com\/article\/253089\/girls_around_me_one_womans_defense_of_the_stalking_app.html\">Women<\/a> and <a href=\"http:\/\/www.cultofmac.com\/157641\/this-creepy-app-isnt-just-stalking-women-without-their-knowledge-its-a-wake-up-call-about-facebook-privacy\/\">men<\/a> alike <a href=\"http:\/\/open.salon.com\/blog\/spelzmann\/2012\/03\/30\/girls_around_me_creeper_app_just_might_get_people_to_pay_attention_to_privacy_settings\">uncritically reproduced<\/a> the app\u2019s demeaning language by referring to \u201cgirls\u201d throughout their commentaries; many argued that <a href=\"http:\/\/www.antipope.org\/charlie\/blog-static\/2012\/03\/not-an-april-fool-1.html\">the app was not the problem<\/a>, and insisted furthermore that its developers<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2012\/04\/deconstructing-the-creepiness-of-the-girls-around-me-app-151-and-what-facebook-could-do-about-it\/255351\/\"> had done nothing wrong<\/a>. The blogger who broke the Girls Around Me story explicitly states that \u201c<a href=\"http:\/\/www.cultofmac.com\/157641\/this-creepy-app-isnt-just-stalking-women-without-their-knowledge-its-a-wake-up-call-about-facebook-privacy\/\">the real problem<\/a>\u201d is not the app (which was made by \u201cguys\u201d who are \u201csuper nice,\u201d and which was \u201cmeant to be all in good fun\u201d), but rather people who, \u201cout of ignorance, apathy or laziness,\u201d do not opt-out of allowing strangers to view their information. He and a number of others hope Girls Around Me will serve as \u201ca wake up call\u201d to \u201c<a href=\"http:\/\/open.salon.com\/blog\/spelzmann\/2012\/03\/30\/girls_around_me_creeper_app_just_might_get_people_to_pay_attention_to_privacy_settings\">girls who have failed to lock down their info<\/a>\u201d and to \u201c<a href=\"http:\/\/www.pcworld.com\/article\/253089\/girls_around_me_one_womans_defense_of_the_stalking_app.html\">those who publicly overshare<\/a>,\u201d since \u201c<a href=\"http:\/\/www.huffingtonpost.com\/larry-magid\/girls-around-me-app_b_1419123.html\">we all have a responsibility to protect our own privacy<\/a>\u201d instead of leaving \u201c<a href=\"http:\/\/www.forbes.com\/sites\/rogerkay\/2012\/04\/02\/what-girls-around-me-says-about-us\/\">all our information out there waving in the wind<\/a>.\u201d<\/p>\n<p>Another blogger admonishes that, \u201c<a href=\"http:\/\/www.cultofmac.com\/158170\/stop-apps-from-tracking-you-using-foursquare-and-facebook-how-to\/\">the only way to really stay off the grid<\/a> is to never sign up for these services in the first place. Failing that, you really should take your online privacy seriously. After all, Facebook isn\u2019t going to help you, as the more you share, the more valuable you are to its real customers, the advertisers. You really need to take responsibility for yourself.\u201d Still another argues that conventional standards of morality and behavior no longer apply to digitally mediated actions, because \u201c<a href=\"http:\/\/news.cnet.com\/8301-31322_3-57408165-256\/girls-around-me-and-the-end-of-internet-innocence\/\">publishing anything <em>publicly<\/em> online means you have, in fact, opted in<\/a>\u201d\u2014to any and every conceivable (or inconceivable) use of whatever one might have made available. The pervasive tone of moral superiority, both in these articles and in others like them, proclaims loudly and clearly: <em>Shame On You<\/em>\u2014for being foolish, ignorant, careless, na\u00efve, or (worst of all) <a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2012\/04\/02\/the-reaction-to-girls-around-me-was-far-more-disturbing-than-the-creepy-app-itself\/\">deliberately choosing<\/a> to put yourself on digital display.<\/p>\n<figure id=\"attachment_10442\" aria-describedby=\"caption-attachment-10442\" style=\"width: 150px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/anti-woman\/\" rel=\"attachment wp-att-10442\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10442 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/anti-woman.jpg\" alt=\"\" width=\"150\" height=\"150\" \/><\/a><figcaption id=\"caption-attachment-10442\" class=\"wp-caption-text\">Sexism: still alive and well.<\/figcaption><\/figure>\n<p><strong>Accounts such as these serve not only to deflect attention away from problems like sexism and objectification, but to normalize and naturalize a veritable litany of questionable phenomena:<\/strong> pervasive surveillance, predatory data collection, targeted ads, deliberately obtuse privacy policies, <a href=\"http:\/\/howto.cnet.com\/8301-11310_39-20033968-285\/how-to-take-back-your-privacy-from-data-brokers\/\">onerous opt-out procedures<\/a>, neoliberal self-interest, the <a href=\"http:\/\/news.cnet.com\/8301-1023_3-57407347-93\/no-joke-al-franken-rings-alarm-over-facebook-google\/\">expanding power of social media companies<\/a>, the <a href=\"http:\/\/www.antipope.org\/charlie\/blog-static\/2012\/03\/not-an-april-fool-1.html\">repackaging of users as products<\/a>, and the simultaneous monetization and commoditization of information, to name just a few. These accounts perpetuate the myth that we are all autonomous individuals, isolated and distinct, endowed with indomitable agency and afforded infinite arrays of choices.<\/p>\n<p>With other variables obfuscated or reduced to the background noise of normalcy, the only things left to blame for unanticipated or unwanted outcomes&#8211;or for our disquietude at observing such outcomes&#8211;are those individuals who choose to expose themselves in the first place. <em>Of course<\/em> corporations try to coerce us into \u201cputting out\u201d information, and <em>of course <\/em>they will take anything they can get if we are not careful; this is just their nature. It is up to us to be good users, to keep telling them no, to remain vigilant and distrustful (even if we like them), and <em>never<\/em> to let them go all the way. <strong>We are to <a href=\"http:\/\/www.washingtonpost.com\/blogs\/the-fix\/post\/foster-freiss-santorum-backer-jokes-about-using-aspirin-as-birth-control\/2012\/02\/16\/gIQA5yoAIR_blog.html\">keep the aspirin between our knees<\/a>, and our data to ourselves<\/strong>.<\/p>\n<p><em>Shame On You<\/em> extends beyond disclosure to corporations, and\u2014for all its implicit digital dualism\u2014beyond digitally mediated disclosure as well. Case in point: during the course of writing this essay, I received a mass-emailed \u201cCommunity Alert Bulletin\u201d in which the Chief of Police at my university campus warned of \u201csuspicious activity.\u201d On several occasions, it seems, two men have been seen \u201croaming the library;\u201d one of them typically \u201cacts as a look out,\u201d while the other approaches a woman who is sitting or studying by herself. What does one man do while the other keeps watch? He \u201cengages\u201d the woman, and \u201casks for personal information.\u201d The \u201cexact intent or motives of the subjects\u201d is unknown, but the \u2018Safety Reminders\u2019 at the end of the message instruct, \u201cNever provide personal information to anyone you do not know or trust.\u201d<\/p>\n<figure id=\"attachment_10444\" aria-describedby=\"caption-attachment-10444\" style=\"width: 240px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/dont-rape-sign\/\" rel=\"attachment wp-att-10444\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10444 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dont-rape-sign-300x263.jpg\" alt=\"\" width=\"240\" height=\"210\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dont-rape-sign-300x263.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dont-rape-sign-500x439.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/dont-rape-sign.jpg 580w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/a><figcaption id=\"caption-attachment-10444\" class=\"wp-caption-text\">Who escapes blame when we blame the victim?<\/figcaption><\/figure>\n<p>If ill-advised disclosure were always this simple\u2014suspicious people asking us outright to reveal information about ourselves\u2014perhaps the moral mandate of <em>Shame On You<\/em> would seem slightly less ridiculous. As it stands, holding individuals primarily responsible for violations of their own privacy expands the operative definition of \u201cdisclosure\u201d to absurd extremes. If we post potentially discrediting photos of ourselves, we are guilty of disclosure through posting; if friends (<a href=\"http:\/\/thenewinquiry.com\/essays\/your-friends-and-neighbors\/\">or former lovers<\/a>) post discrediting photos of us, we are guilty of disclosure through allowing ourselves to be photographed; if we did not know that we were being photographed, we are guilty of disclosure through our failure to assume that we would be photographed and to alter our actions accordingly. If we do not want Facebook to have our names or our phone numbers, we should terminate our friendships with Facebook users, forcibly erase our contact information from those users\u2019 phones, and thereafter give false information to any suspected Facebook users we might encounter. This is untenable, to say the least. <strong>The inescapable connection of life in an augmented world means that exclusive control of our personal information, as well as full protection of our personal privacy, is quite simply out of our personal hands<\/strong>.<\/p>\n<p align=\"center\">* * * * *<\/p>\n<figure id=\"attachment_10438\" aria-describedby=\"caption-attachment-10438\" style=\"width: 400px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/nothing-to-hide-2\/\" rel=\"attachment wp-att-10438\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10438  \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/nothing-to-hide-500x333.jpg\" alt=\"\" width=\"400\" height=\"266\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/nothing-to-hide-500x333.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/nothing-to-hide-300x200.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/nothing-to-hide.jpg 768w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><figcaption id=\"caption-attachment-10438\" class=\"wp-caption-text\">This couple has &#8220;nothing to hide.&#8221;<\/figcaption><\/figure>\n<p>The second paradigm, <em>Look At Me<\/em>, at first seems to represent a competing discourse. Its most vocal proponents are executives at social- and other digital media companies, along with assorted technologists and other Silicon Valley \u2018<a href=\"http:\/\/en.wikipedia.org\/wiki\/Digerati\">digerati<\/a>\u2019. This paradigm looks at you askance not for putting information on the Internet, but for forgetting that \u201c<a href=\"http:\/\/www.wired.com\/wired\/archive\/2.03\/economy.ideas_pr.html\">information wants to be free<\/a>\u201d\u2014because within this paradigm, <strong><em>disclosure<\/em> is the new moral imperative<\/strong>. Disclosure is no longer an action that disrupts the guarded default state, but the default state itself; it is not something one chooses or does, but something one is, something one has always-already done. <strong>Privacy, on the other hand, is a homespun relic of a bygone era, as droll as notions of a flat earth<\/strong>; it is particularly impractical in the 21<sup>st<\/sup> century. After all, who really <a href=\"http:\/\/www.ethanzuckerman.com\/blog\/2011\/05\/29\/kevin-kelly-on-context-for-the-quantified-self\/\">owns a friendship<\/a>? \u201c<a href=\"https:\/\/twitter.com\/#%21\/phenatypical\/statuses\/74991203350884352\">Who owns your face if you go out in public?<\/a>\u201d<\/p>\n<p>Called both \u201copenness\u201d and \u201cradical transparency,\u201d disclosure-by-default is touted as a social and political panacea; it will promote kindness and tolerance toward others, fuel progress and innovation, create accountability, and bring everyone closer to a better world. Alternatively, clinging to privacy will merely harbor <a href=\"https:\/\/plus.google.com\/117378076401635777570\/posts\/2y7vqXBtLny\">evil people<\/a> and condemn us to \u201c<a href=\"http:\/\/www.ethanzuckerman.com\/blog\/2011\/05\/29\/kevin-kelly-on-context-for-the-quantified-self\/\">generic relationships<\/a>.\u201d The enlightened \u201c<a href=\"http:\/\/techcrunch.com\/2011\/07\/26\/five-things-myspace-google-plus\/\">don&#8217;t believe that privacy is a real issue<\/a>,\u201d and anyone who maintains otherwise is suspect; as even WikiLeaks activist Jacob Appelbaum (<a href=\"https:\/\/twitter.com\/#%21\/ioerror\">@ioerror<\/a>) has lamented, privacy is cast \u201c<a href=\"https:\/\/twitter.com\/#%21\/sfslim\/status\/193498142325485568\">as something that only criminals would want<\/a>.\u201d Our greatest failings are no longer what do or what we choose, but who we are; <strong>our greatest shame is not in exposure, but in having or being something to hide<\/strong>.<\/p>\n<figure id=\"attachment_10435\" aria-describedby=\"caption-attachment-10435\" style=\"width: 293px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/screen-shot-2012-05-29-at-1-27-34-am\/\" rel=\"attachment wp-att-10435\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10435  \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/Screen-shot-2012-05-29-at-1.27.34-AM.png\" alt=\"\" width=\"293\" height=\"220\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/Screen-shot-2012-05-29-at-1.27.34-AM.png 406w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/Screen-shot-2012-05-29-at-1.27.34-AM-300x225.png 300w\" sizes=\"auto, (max-width: 293px) 100vw, 293px\" \/><\/a><figcaption id=\"caption-attachment-10435\" class=\"wp-caption-text\">if you have nothing to hide, you have nothing to fear&#8230;right?<\/figcaption><\/figure>\n<p><em>Look At Me<\/em> has benefitted, to some degree, from a synergy of its own: \u201copenness,\u201d broadly conceived, has gained traction as more \u2018open\u2019 movements and initiatives attract attention and build popular support. In 1998, the <a href=\"http:\/\/www.opensource.org\/docs\/osd\">Open Source Initiative<\/a> was the first to claim \u2018open\u2019 as a moniker; it is now joined by <a href=\"http:\/\/www.wired.com\/wiredscience\/tag\/research-works-act\/\">what one writer has called<\/a> an \u201c<a href=\"http:\/\/thecostofknowledge.com\/\">open science revolt<\/a>,\u201d by <a href=\"http:\/\/opensciencesummit.com\/about\/\">not one<\/a>, <a href=\"http:\/\/www.openscience.org\/blog\/?page_id=44\">but two<\/a> Open Science movements, by <a href=\"http:\/\/www.whitehouse.gov\/open\/about\">President Obama\u2019s Open Government Initiative<\/a>, by the somewhat meta <a href=\"http:\/\/www.openmovements.org\/about-us\/\">Open Movements<\/a> movement, and by a <a href=\"http:\/\/www.arl.org\/sparc\/openaccess\/\">number<\/a> of <a href=\"http:\/\/www.opencontent.org\/definition\/\">other<\/a> <a href=\"http:\/\/www.opendatafoundation.org\/\">initiatives<\/a> <a href=\"http:\/\/www.open-research.org.uk\/\">aimed<\/a> at <a href=\"http:\/\/www.plos.org\/\">reforming<\/a> <a href=\"http:\/\/pkp.sfu.ca\/?q=ojs\">academic<\/a> <a href=\"http:\/\/openwetware.org\/wiki\/Main_Page\">research<\/a> <a href=\"http:\/\/www.doaj.org\/\">and<\/a> <a href=\"http:\/\/peerj.com\/\">publishing<\/a>.<\/p>\n<p>\u201cTransparency,\u201d too, has been popularized into a buzzword (try web-searching \u201cgreater transparency,\u201d with quotes). In an age of what Jurgenson and Rey (<a href=\"https:\/\/twitter.com\/#!\/nathanjurgenson\">@nathanjurgenson<\/a> and <a href=\"https:\/\/twitter.com\/#!\/pjrey\">@pjrey<\/a>) have called <a href=\"http:\/\/www.pjrey.net\/documents\/Liquid%20Information%20Leaks%2011.15.2011.pdf\"><em>liquid politics<\/em><\/a>, people demand transparency from institutions in the hope that <a href=\"http:\/\/www.guardian.co.uk\/commentisfree\/2012\/apr\/21\/digital-era-society-social-media\">exposure will encourage the powerful to be honest<\/a>; in return, institutions offer cryptic policy documents, unreadable reports, and \u201c<a href=\"http:\/\/www.wired.com\/gadgetlab\/2011\/11\/google-ad-transparency-target\/\">rabbit hole[s] of links<\/a>\u201d as transparency simulacra. Yet we continue to push for transparency from corporations and governments alike, which suggests that, to some degree, we do believe in transparency as a means to progressive ends. Perhaps it is not such a stretch, then, for social media companies (and others) to ask that we accept radical transparency for ourselves as well?<\/p>\n<figure id=\"attachment_10433\" aria-describedby=\"caption-attachment-10433\" style=\"width: 360px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/googleplus-2\/\" rel=\"attachment wp-att-10433\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10433  \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/googleplus-500x262.png\" alt=\"\" width=\"360\" height=\"189\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/googleplus-500x262.png 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/googleplus-300x157.png 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/googleplus.png 535w\" sizes=\"auto, (max-width: 360px) 100vw, 360px\" \/><\/a><figcaption id=\"caption-attachment-10433\" class=\"wp-caption-text\">G+ was supposed to be the Anti-Facebook&#8230;or was it?<\/figcaption><\/figure>\n<p>The 2011 launch of social network-<em>cum<\/em>-\u201c<a href=\"http:\/\/www.sfgate.com\/cgi-bin\/article.cgi?f=\/g\/a\/2011\/08\/28\/businessinsider-google-isnt-just-a-social-network-its-an-identity-service-2011-8.DTL\">identity service<\/a>\u201d Google+ served to test this theory, but the protracted \u201c#<a href=\"https:\/\/twitter.com\/#%21\/search\/realtime\/%23nymwars\">nymwars<\/a>\u201d controversy that followed seemed not to be the result that Google had anticipated. Although G+ had been positioned as \u2018the anti-Facebook\u2019 in advance of its highly anticipated beta launch, within four weeks of going live Google decided not only to enforce a strict \u2018real names only\u2019 policy, but to do so through a \u201c<a href=\"http:\/\/www.techi.com\/2011\/07\/the-google-honeymoon-is-over\/\">massive deletion spree<\/a>\u201d that quickly grew into a public relations debacle. The mantra in Silicon Valley is, \u201c<a href=\"http:\/\/nwn.blogs.com\/nwn\/2011\/07\/google-profiles-pseudonym-avatar-names-suspension-policy.html\">Google doesn\u2019t get social<\/a>,\u201d and this time Google managed to (as one blogger put it) \u201c<a href=\"http:\/\/www.tamurajones.net\/PlussingPeople.xhtml\"><em>out-zuck<\/em> the Zuck<\/a>.\u201d Though sparked by G+, #nymwars did not remain confined to G+ in its scope; nor were <a href=\"http:\/\/www.nytimes.com\/2007\/04\/09\/technology\/09blog.html?_r=2&amp;th&amp;emc=th&amp;oref=slogin\">older<\/a> <a href=\"http:\/\/nielsenhayden.com\/makinglight\/archives\/008856.html\">battle<\/a> <a href=\"http:\/\/www.scalzi.com\/whatever\/005024.html\">lines<\/a> <a href=\"http:\/\/www.40tech.com\/2010\/01\/07\/is-google-the-devil\/\">around<\/a> <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=998565\">privacy<\/a> and <a href=\"http:\/\/www.betabeat.com\/2012\/02\/21\/scroogle-privacy-first-search-engine-shuts-down-for-good\/\">anonymity<\/a> redrawn for this particular occasion.<\/p>\n<p>On one side of the conflagration, rival data giants <a href=\"http:\/\/www.wired.com\/epicenter\/2011\/07\/google-plus-user-names\/\">Google and Facebook<\/a> both pushed their versions of \u2018personal radical transparency\u2019; they were more-or-less supported by a <a href=\"https:\/\/news.ycombinator.com\/item?id=2932331\">loose assortment<\/a> of <a href=\"http:\/\/www.jillianney.com\/google-and-the-real-name-debate-why-it-might-be-a-good-thing\/\">individuals<\/a> who either had \u201c<a href=\"http:\/\/forums.redflagdeals.com\/archive\/index.php\/t-1135371.html\">nothing to hide<\/a>,\u201d or who <a href=\"https:\/\/plus.google.com\/102533732658641069172\/posts\/GmKu35b7nNC\">preached<\/a> the <a href=\"http:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=998565\">fallacy<\/a> that, \u2018if you have nothing to hide, you have nothing to fear.\u2019 The \u2018nothing to hide\u2019 argument in particular has been a perennial favorite for Google; well before the advent of G+ and #nymwars, CEO Eric Schmidt rebuked, \u201cIf you have something that you don&#8217;t want anyone to know, <a href=\"http:\/\/weblogs.mozillazine.org\/asa\/archives\/2009\/12\/if_you_have_nothing.html\">maybe you shouldn&#8217;t be doing it in the first place<\/a>.\u201d Unsurprisingly, Schmidt\u2019s dismissive response to G+ users with privacy concerns was a smug, \u201c<a href=\"http:\/\/mashable.com\/2011\/08\/28\/google-plus-identity-service\/\">G+ is completely optional. No one is forcing you use it.<\/a>\u201d If G+ is supposed to be an \u2018identity service,\u2019 it seems only some identities are worthy of being served.<\/p>\n<figure id=\"attachment_10441\" aria-describedby=\"caption-attachment-10441\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/transparency-is-hot\/\" rel=\"attachment wp-att-10441\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10441 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-is-hot-300x163.jpg\" alt=\"\" width=\"300\" height=\"163\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-is-hot-300x163.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-is-hot-500x272.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-is-hot.jpg 828w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-10441\" class=\"wp-caption-text\">Transparent is the new black, right?<\/figcaption><\/figure>\n<p>On the other side was a \u2018<a href=\"http:\/\/www.informationweek.com\/news\/232500806\">vocal minority<\/a>\u2019 who, despite their purportedly fewer numbers, still seemed to generate most of the <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/05\/design-social-norms.html\">substantive<\/a> <a href=\"http:\/\/www.marrowbones.com\/commons\/technosocial\/\">digital<\/a> <a href=\"http:\/\/epeus.blogspot.com\/2011\/08\/google-plus-must-stop-this-identity.html\">content<\/a> about #nymwars<a title=\"\" href=\"#_edn2\">[ii]<\/a>. The pro-pseudonym-and\/or-privacy camp included the <a href=\"https:\/\/www.eff.org\/deeplinks\/2011\/07\/case-pseudonyms\">Electronic Frontier<\/a> <a href=\"https:\/\/www.eff.org\/deeplinks\/2011\/12\/2011-review-nymwars\">Foundation<\/a> (<a href=\"https:\/\/twitter.com\/#%21\/eff\">@EFF<\/a>), a new website called <a href=\"http:\/\/my.nameis.me\/\">My Name Is Me<\/a>, researcher <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/04\/real-names.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+zephoria%2Fthoughts+%28apophenia%29\">danah boyd<\/a> (<a href=\"https:\/\/twitter.com\/#%21\/zephoria\">@zephoria<\/a>), pseudonymity advocate and former Google employee <a href=\"http:\/\/infotrope.net\/2011\/07\/22\/ive-been-suspended-from-google-plus\/\">Skud<\/a> (<a href=\"https:\/\/twitter.com\/#%21\/Skud\">@Skud<\/a>, \u2018Kirrily Robert\u2019 on her passport at the time and \u2018<a href=\"http:\/\/infotrope.net\/2011\/09\/20\/announcement-i%E2%80%99ve-changed-my-name-to-alex-bayley\/\">Alex Skud Bayley<\/a>\u2019 on it now), security technologist <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2011\/08\/pseudonymity.html\">Bruce Schneier<\/a> (<a href=\"https:\/\/twitter.com\/#%21\/schneierblog\">@schneierblog<\/a>, who had argued previously <a href=\"http:\/\/www.schneier.com\/blog\/archives\/2009\/12\/my_reaction_to.html\">against Schmidt\u2019s view of privacy<\/a>), the <a href=\"http:\/\/www.geek.com\/articles\/news\/anonymous-kicked-off-of-google-makes-own-social-network-in-response-20110718\/\">hacker group Anonymous<\/a> (unsurprisingly), and a <a href=\"https:\/\/plus.google.com\/u\/0\/110295984969329522620\/posts\/ExKJZgBAYxM\">substantive minority of Google employees<\/a> (or \u201cGooglers\u201d). There was a long list of <a href=\"http:\/\/infotrope.net\/2011\/07\/25\/preliminary-results-of-my-survey-of-suspended-google-accounts\/\">pseudonymous and &#8216;real named&#8217; users<\/a> who had been <a href=\"http:\/\/infotrope.net\/2011\/07\/25\/preliminary-results-of-my-survey-of-suspended-google-accounts\/\">kicked off the site<\/a>, an irate individual <a href=\"http:\/\/stilgherrian.com\/only-one-name\/right-google-you-stupid-cunts-this-is-simply-not-on\/\">banned because of his &#8220;unusual&#8221; real name<\/a>, and an individual with an unremarkable name <a href=\"http:\/\/gewalker.blogspot.com\/2011\/08\/firsthand-examination-of-google-profile.html\">who couldn\u2019t seem to get banned<\/a> no matter how hard he tried.<\/p>\n<p>Digital dualists took issue, too; one declared the \u2018real names\u2019 policy to be \u201c<a href=\"http:\/\/www.theatlantic.com\/technology\/archive\/2011\/08\/why-facebook-and-googles-concept-of-real-names-is-revolutionary\/243171\/\">a radical departure from the way identity and speech interact in the real world<\/a>,\u201d while another came to the conclusion that,\u201c<a href=\"http:\/\/www.nytimes.com\/2011\/09\/05\/technology\/naming-names-on-the-internet.html?_r=1\">The real world is often messy, chaotic and anonymous. The Internet is mostly better that way, too<\/a>.\u201d And in what may be one of my favorite #nymwars posts, <a href=\"http:\/\/antimatter15.com\/wp\/2011\/07\/google-profile-suspended\/\">a sixteen year old blogger<\/a> took on the absurdity of equating not only \u2018real name\u2019 with \u2018known as,\u2019 but also \u2018network\u2019 with \u2018community\u2019\u2014and then went on to argue that Shakespeare\u2019s Juliet had it right in asking, \u201cWhat\u2019s in a name?\u201d whereas Google\u2019s Eric Schmidt sounded \u201cshockingly similar\u201d to the head of \u201c<a href=\"http:\/\/antimatter15.com\/wp\/2011\/07\/google-profile-suspended\/\">the evil, Voldemort-controlled Ministry of Magic<\/a>\u201d in J. K. Rowling\u2019s first <em>Harry Potter<\/em> book.<\/p>\n<p>Issues of power are conspicuously absent from <em>Look At Me<\/em>, and Google makes use of this fact to gloss the profound difference between individuals pressuring a company to be transparent and a company pressuring (or forcing) individuals to be transparent. Google is transparent, for example, <a href=\"http:\/\/www.wired.com\/gadgetlab\/2011\/11\/google-ad-transparency-target\/\">in its ad targeting<\/a>, but allowing users either to opt-out of targeted advertising or to edit the information used in targeting them does not change the fact that Google users are being tracked, and that information about them is being collected. This kind of \u2018transparency\u2019 offers users not empowerment, but what Davis (<a href=\"https:\/\/twitter.com\/#!\/jup83\">@Jup83<\/a>) calls \u201c<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/04\/30\/curating-reality\/\">selective visibility<\/a>\u201d: <strong>users can reduce their awareness of being tracked by Google, but can do little (short of complete Google abstention) to stop the tracking itself. <\/strong><\/p>\n<figure id=\"attachment_10439\" aria-describedby=\"caption-attachment-10439\" style=\"width: 240px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/transparency-drag\/\" rel=\"attachment wp-att-10439\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-10439 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-drag-300x198.jpg\" alt=\"\" width=\"240\" height=\"158\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-drag-300x198.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-drag.jpg 468w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/a><figcaption id=\"caption-attachment-10439\" class=\"wp-caption-text\">Transparency can be a real drag.<\/figcaption><\/figure>\n<p>Such \u2018transparency\u2019 therefore has little effect on Google in practice; with plenty more fish in the sea (and hundreds of millions of userfish already in its nets), Google has little incentive to care whether any particular user does or does not continue to use Google products. Individual users, on the other hand, <a href=\"http:\/\/eggfreckles.net\/files\/a-month-without-google.html\">can find quitting Google to be a right pain<\/a>, and this imbalance in the Google\/user relationship effectively gives carte blanche to Google policymakers. This is <em>especially<\/em> problematic with respect to transparency, which has a far greater impact on individual Google users than it does on Google itself.<\/p>\n<p>Google may have \u2018corporate personhood\u2019, but persons have identities; in the present moment, many identities still serve to mark people for discrimination, oppression, and persecution, whether they are \u201c<a href=\"https:\/\/plus.google.com\/117378076401635777570\/posts\/2y7vqXBtLny\">evil<\/a>\u201d or not. <em>Look At Me<\/em> claims personal radical transparency will solve these problems, yet <strong>social media spaces are neither digital utopias nor separate worlds; all regular \u201c*-isms\u201d still apply<\/strong>, and real names <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/05\/design-social-norms.html\">don\u2019t stop bullies or trolls<\/a> in digital spaces any more than they do in conventional spaces. At the height of irony, even \u2018real-named\u2019 G+ users who supported Google\u2019s policy still <a href=\"http:\/\/epeus.blogspot.com\/2011\/08\/google-plus-must-stop-this-identity.html\">trolled other users who supported pseudonyms<\/a>.<\/p>\n<p>boyd offers a different assessment of \u2018real names\u2019 policies, one that stands in stark contrast to the doctrine of radical transparency. She argues that, far from being empowering, \u2018real name\u2019 policies are \u201can <a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/04\/real-names.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+zephoria%2Fthoughts+%28apophenia%29\">authoritarian assertion of power<\/a> over vulnerable people.\u201d Geek Feminism hosts <a href=\"http:\/\/geekfeminism.wikia.com\/wiki\/Who_is_harmed_by_a_%22Real_Names%22_policy%3F\">an exhaustive list<\/a> of the many groups and individuals who can be vulnerable in this way, and Audrey Watters (<a href=\"https:\/\/twitter.com\/#%21\/audreywatters\">@audreywatters<\/a>) explains that many people in positions of power <a href=\"http:\/\/www.hackeducation.com\/2011\/07\/25\/should-students-use-pseudonyms-online\/\">do not hesitate to translate their disapproval<\/a> of even ordinary activities into adverse hiring and firing decisions. Though tech CEOs call for radical transparency, a senior faculty member (for example) condemns would-be junior faculty <a href=\"http:\/\/chronicle.com\/article\/Bloggers-Need-Not-Apply\/45022\">whose annoying \u201cquirks\u201d turn up online<\/a> instead of remaining \u201cstifle[d]\u201d and \u201chidden\u201d during the interview process. As employers begin not only to Google-search job applicants, but also <a href=\"http:\/\/abcnews.go.com\/Technology\/facebook-passwords-employers-schools-demand-access-facebook-senators\/story?id=16005565\">to demand Facebook passwords<\/a>, belonging to what Erving Goffman calls a \u201c<a href=\"http:\/\/www.nd.edu\/%7Erwilliam\/xsoc530\/deviance.html\">discreditable group<\/a>\u201d carries not just social but economic consequences.<\/p>\n<figure id=\"attachment_10440\" aria-describedby=\"caption-attachment-10440\" style=\"width: 265px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/transparency-grenade\/\" rel=\"attachment wp-att-10440\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-10440\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-grenade-265x300.jpg\" alt=\"\" width=\"265\" height=\"300\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-grenade-265x300.jpg 265w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-grenade-442x500.jpg 442w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparency-grenade.jpg 640w\" sizes=\"auto, (max-width: 265px) 100vw, 265px\" \/><\/a><figcaption id=\"caption-attachment-10440\" class=\"wp-caption-text\">Transparency can be a weapon. Who&#8217;s pointing it at whom?<\/figcaption><\/figure>\n<p>Rey points out that there are big differences between <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/11\/08\/julian-assange-cyber-libertarian-or-cyber-anarchist\/\">cyber-libertarianism and cyber-anarchism<\/a>; if &#8220;information&#8221; does, in fact, &#8220;want to be free,&#8221; it does not always &#8220;want&#8221; to be free for the same reasons. \u2018Openness\u2019 does not neutralize preexisting inequality (<a href=\"http:\/\/geekfeminism.wikia.com\/wiki\/Open_Source_Male_Privilege_Checklist\">as the Open Source movement itself demonstrates<\/a>), whereas forced transparency can be <a href=\"http:\/\/www.guardian.co.uk\/commentisfree\/2012\/apr\/21\/digital-era-society-social-media\">a form of outing<\/a> with dubious efficacy for encouraging either tolerance or accountability. As boyd, Watters, and Geek Feminism demonstrate, those who call most loudly for radical transparency are neither those who will supposedly receive the greatest benefit from it, nor those who will pay its greatest price. Though some (economically secure, middle-aged, heterosexual, able-bodied) white men <a href=\"http:\/\/www.marrowbones.com\/commons\/technosocial\/2011\/08\/im_just_some_middle_aged_white.html\">acknowledged their privilege<\/a> and tried to <a href=\"http:\/\/www.jwz.org\/blog\/2011\/08\/nym-wars\/\">educate others like them<\/a> about why pseudonyms are important, the loudest calls for \u2018real names\u2019 were ultimately the \u201c<a href=\"http:\/\/www.zephoria.org\/thoughts\/archives\/2011\/08\/04\/real-names.html?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+zephoria%2Fthoughts+%28apophenia%29\">most privileged and powerful<\/a>\u201d calling for the increased exposure of marginalized others. Maybe the full realization of an egalitarian utopia would lead more people to choose \u2018openness\u2019 or \u2018transparency\u2019, or maybe it wouldn\u2019t. <strong>But strong-arming more people into \u2018openness\u2019 or \u2018transparency\u2019 certainly will not lead to an egalitarian utopia; it will only exacerbate existing oppressions.<\/strong><\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/transparent-toaster\/\" rel=\"attachment wp-att-10443\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-10443 alignright\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/transparent-toaster.jpg\" alt=\"\" width=\"210\" height=\"164\" \/><\/a>The #nymwars arguments about \u2018personal radical transparency\u2019 reveal that <em>Shame On You<\/em> and <em>Look At Me<\/em> are at least as complementary as they are competing. Both preach in the same superior, moralizing tone, even as one lectures about reckless disclosure and the other levels accusations of suspicious concealment. Both would agree to place all blame squarely on the shoulders of individual users, if only they could agree on what is blameworthy. Both serve to naturalize and to normalize the same set of problematic practices, from pervasive surveillance to the commoditization of information.<\/p>\n<p>Most importantly, both turn a blind eye to issues of inequality, identity, and power, and in so doing gloss distinctions that are of critical importance. If these two discourses are as much in cahoots as they are in conflict, what is the composite picture of how we think about privacy, choice, and disclosure? <strong>What is the impact of most social media users embracing one paradigm, and most social media designers embracing the other?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: center;\"><strong><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/\">Part III: Documentary Consciousness<\/a><\/strong><\/p>\n<figure id=\"attachment_11052\" aria-describedby=\"caption-attachment-11052\" style=\"width: 403px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/weather-on-the-bayou-2\/\" rel=\"attachment wp-att-11052\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11052 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/looming.jpg\" alt=\"\" width=\"403\" height=\"268\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/looming.jpg 800w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/looming-300x199.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/looming-500x333.jpg 500w\" sizes=\"auto, (max-width: 403px) 100vw, 403px\" \/><\/a><figcaption id=\"caption-attachment-11052\" class=\"wp-caption-text\">Documentary consciousness entails the ever-present sense of a looming future failure.<\/figcaption><\/figure>\n<p>I now consider one of the many impacts that follow from being inescapably connected in a society that still masks issues of power and inequality through conceptualizations of \u2018privacy\u2019 as an individual choice. I argue that <strong>the reality of inescapable connection and the impossible demands of prevailing privacy discourses have together resulted in what I term <em>documentary consciousness<\/em><\/strong>, or the abstracted and internalized reproduction of others&#8217; <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/05\/14\/the-faux-vintage-photo-full-essay-parts-i-ii-and-iii\/\">documentary vision<\/a>. Documentary consciousness demands impossible disciplinary projects, and as such brings with it a gnawing disquietude; it is not uniformly distributed, but rests most heavily on those for whom (in the words of Foucault) \u201cvisibility is a trap.\u201d I close by calling for new ways of thinking about both privacy and autonomy that more accurately reflect the ways power and identity intersect in augmented societies.<\/p>\n<figure id=\"attachment_11046\" aria-describedby=\"caption-attachment-11046\" style=\"width: 243px\" class=\"wp-caption alignright\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/digital-watching\/\" rel=\"attachment wp-att-11046\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11046 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/digital-watching-300x187.jpg\" alt=\"\" width=\"243\" height=\"151\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/digital-watching-300x187.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/digital-watching.jpg 400w\" sizes=\"auto, (max-width: 243px) 100vw, 243px\" \/><\/a><figcaption id=\"caption-attachment-11046\" class=\"wp-caption-text\">Always maybe watching.<\/figcaption><\/figure>\n<p>Just before the turn of the 19<sup>th<\/sup> century, Jeremy Bentham designed a prison he called the <a href=\"http:\/\/en.wikipedia.org\/wiki\/File:Panopticon.jpg\">Panopticon<\/a>. The idea behind the prison\u2019s circular structure was simple: a guard in a central tower could see into any of the prisoners\u2019 cells at any given time, but no prisoner could ever see into the tower. The prisoners would therefore be subordinated by this asymmetrical gaze: because they would always know that they <em>could<\/em> be watched, but would never know <em>if<\/em> they werebeing watched, the prisoners would be forced to act at all times as if they were being watched, whether they were being watched or not. In contemporary parlance, Bentham\u2019s Panopticon basically sought to crowd-source the labor of monitoring prisoners to the prisoners themselves.<\/p>\n<p>Though Bentham\u2019s Panopticon itself was never built, Michel Foucault used Bentham\u2019s design to build his own concept of <em>panopticism<\/em>. For Foucault, the Panopticon represents not power wielded by particular individuals through brute force, but power abstracted to the subtle and ideal form of a <em>power relation<\/em>. The Panopticon itself is a mechanism not just of power, but of <em>disciplinary power<\/em>; this kind of power works in prisons, in other types of institutions, and in modern societies generally because citizens and prisoners alike, aware at all times that they could be under surveillance, internalize the panoptic gaze and reproduce the watcher\/watched relation within themselves by closely monitoring and controlling their own conduct. Discipline (and other technologies of power) therefore produce <em>docile bodies<\/em>, as individuals self-regulate by acting on their own minds, bodies, and conduct through technologies of the self.<\/p>\n<p>Foucault famously held that \u201c<a href=\"http:\/\/foucault.info\/documents\/disciplineAndPunish\/foucault.disciplineAndPunish.panOpticism.html\">visibility is a trap<\/a>\u201d; <strong>were he alive today, it is unlikely Foucault would be on board with radical transparency.<\/strong> Accordingly, it has become well-worn analytic territory to critique social media and digital social technologies by linking to Foucault\u2019s panoptic surveillance. As early as 1990, Mark Poster argued that databases of digitalized information constituted what he termed the \u201cSuperpanopticon.\u201d Since then, others have pointed out that \u201c<a href=\"http:\/\/books.google.com\/books?id=b646qRTbOuYC&amp;pg=PA201&amp;source=gbs_toc_r&amp;cad=4#v=onepage&amp;q&amp;f=false\">[even] minutiae can create the Superpanopticon<\/a>\u201d\u2014and it would be difficult to argue that social media websites don\u2019t help to circulate a lot of minutiae.<\/p>\n<figure id=\"attachment_11047\" aria-describedby=\"caption-attachment-11047\" style=\"width: 240px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/minutiae-panopticon\/\" rel=\"attachment wp-att-11047\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-11047 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/minutiae-panopticon-300x300.jpg\" alt=\"\" width=\"240\" height=\"240\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/minutiae-panopticon-300x300.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/minutiae-panopticon-150x150.jpg 150w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/minutiae-panopticon.jpg 499w\" sizes=\"auto, (max-width: 240px) 100vw, 240px\" \/><\/a><figcaption id=\"caption-attachment-11047\" class=\"wp-caption-text\">Even minutiae can create the Superpanopticon.<\/figcaption><\/figure>\n<p>Facebook itself has been likened to a <a href=\"http:\/\/www.counterpunch.org\/2007\/08\/07\/giving-good-face\/\">digital panopticon<\/a> since at least 2007, though there are issues both with some of these critiques and with responses to them. The &#8220;Facebook=Panopticon&#8221; theme emerges anew each time the site redesigns its privacy settings\u2014for instance, following the launch of <a href=\"http:\/\/www.theverge.com\/2011\/9\/26\/2450405\/editorial\">so-called \u201cfrictionless sharing\u201d<\/a>\u2014or, <a href=\"http:\/\/bits.blogs.nytimes.com\/2012\/06\/26\/for-facebook-visibility-is-not-privacy-while-others-disagree\/\">in more recent Facebook-speak<\/a>, every time the site redesigns its \u201c<a href=\"http:\/\/bits.blogs.nytimes.com\/2012\/06\/25\/facebook-changes-e-mail-settings-without-user-consent\/\">visibility settings<\/a>.\u201d Others express skepticism, however, as to whether the social media site is really what I jokingly like to call \u201cthe Panoptibook\u201d; they claim that Facebook\u2019s goal is supposedly \u201c<a href=\"http:\/\/divebombmedia.com\/2011\/02\/is-facebook-the-new-panopticon-and-why-thats-a-good-thing\/\">not to discipline us<\/a>,\u201d but to <em>coerce<\/em> <em>us<\/em> into reckless sharing (though I would argue that the latter is merely an instance of the former).<\/p>\n<p>Others point to the fact that using Facebook is still \u201c<a href=\"http:\/\/foucaultblog.wordpress.com\/2007\/08\/07\/facebook-is-the-new-panopticon\/\">largely voluntary<\/a>\u201d; therefore, it cannot be the Panopticon. \u2018Voluntary,\u2019 however, is predicated on the notion of free choice, and as I argued in <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/21\/a-new-privacy-pt-i-distributed-agency-the-myth-of-autonomy\/\">Part I<\/a>, our choices here are constrained; at best, each of us can only choose whether or not to interact with Facebook (or other digital social technologies) directly. Infinitely expanding definitions of \u2018disclosure\u2019 notwithstanding, whether we leave digital traces on Facebook depends not just on the choices we make as individuals, but on the choices made by people to whom we are connected in any way. For most of us, this means that leaving traces on Facebook is largely inevitable, whether \u201cvoluntary\u201d or not.<\/p>\n<figure id=\"attachment_11053\" aria-describedby=\"caption-attachment-11053\" style=\"width: 164px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/concert-document-anxiety-2\/\" rel=\"attachment wp-att-11053\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-11053   \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/concert-document-anxiety1-224x300.jpg\" alt=\"\" width=\"164\" height=\"219\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/concert-document-anxiety1-224x300.jpg 224w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/concert-document-anxiety1-374x500.jpg 374w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/concert-document-anxiety1.jpg 412w\" sizes=\"auto, (max-width: 164px) 100vw, 164px\" \/><\/a><figcaption id=\"caption-attachment-11053\" class=\"wp-caption-text\">Looks like someone has a case of documentary vision!<\/figcaption><\/figure>\n<p>What may not be as readily apparent is that whether or not we interact with the site directly, Facebook and other social media sites<em> also leave traces on us<\/em>. Nathan Jurgenson (<a href=\"https:\/\/twitter.com\/#%21\/nathanjurgenson\">@nathanjurgenson<\/a>) describes \u201c<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/05\/14\/the-faux-vintage-photo-full-essay-parts-i-ii-and-iii\/\">documentary vision<\/a>\u201d as an augmented version of the photographer\u2019s \u2018camera eye,\u2019 one through which the infinite opportunity for self-documentation afforded by social media leads us not only to view the world in terms of its documentary potential, but also to experience our own present \u201cas always a future past.\u201d In this way, \u201c<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2011\/10\/27\/experiencing-life-through-the-logic-of-facebook\/\">the logic of Facebook<\/a>\u201d affects us most profoundly <em>not<\/em> when we are using Facebook, but when we are doing nearly anything else. Away from our screens, the experiences we choose and the ways we experience them are inexorably colored not only by the ways we imagine they could be read by others in artifact form, but by the range of idealized documentary artifacts we imagine we could create from them. <strong>We see and shape our moments based on the stories we might tell about them, on the future histories they could become.<\/strong><\/p>\n<p>I argue here, however, that Facebook\u2019s phenomenological impact is not limited to opportunities for self-documentation. <strong>More and more, we are attuned not only to possibilities of documenting, but also to possibilities of being documented.<\/strong> As I explored in Part I of this essay, living in an augmented world means that we are always connected to digital social technologies (whether we are connecting to them or not). As I elaborated in last month\u2019s <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/\">Part II<\/a>, the <em>Shame On You<\/em> paradigm reminds us that virtually any moment can be a future past disclosure; we also know that social media and digital social technologies are structured by the <em>Look At Me <\/em>paradigm, which insists that \u201c<a href=\"http:\/\/qswiki.com\/index.php\/What_technology_wants\">any data that can be shared, WILL be shared<\/a>.\u201d <strong>Consequently, if augmented reality has seen the emergence of a new kind of \u2018camera eye\u2019, it has seen as well the emergence of <\/strong><a href=\"http:\/\/www.facade.fi\/2010\/03\/is-facebook-becoming-the-social-panopticon\/\"><strong>a new kind of camera shyness<\/strong><\/a><strong>. <\/strong>Much as Bentham designed the Panopticon to crowd-source the disciplinary work of prison guards, Facebook&#8217;s design ends up crowd-sourcing the disciplinary functions of <a href=\"https:\/\/twitter.com\/marginalutility\/status\/207917757617016833\">the paparazzi<\/a>.<\/p>\n<figure id=\"attachment_11049\" aria-describedby=\"caption-attachment-11049\" style=\"width: 365px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/maja_camera_shy\/\" rel=\"attachment wp-att-11049\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-11049   \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/maja_camera_shy-500x333.jpg\" alt=\"\" width=\"365\" height=\"243\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/maja_camera_shy-500x333.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/maja_camera_shy-300x200.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/maja_camera_shy.jpg 1600w\" sizes=\"auto, (max-width: 365px) 100vw, 365px\" \/><\/a><figcaption id=\"caption-attachment-11049\" class=\"wp-caption-text\">Camera shy.<\/figcaption><\/figure>\n<p>Accordingly, I extend Jurgenson\u2019s concept of documentary vision\u2014through which we are simultaneously documenting subjects and documented objects, perpetually aware of each moment\u2019s documentary potential\u2014into what I term <strong><em>documentary consciousness<\/em>, or the perpetual awareness that, at each moment, we are potentially the documented objects of others. <\/strong>I want to be clear that it is not Facebook itself that is &#8220;the Panoptibook&#8221;; knowing something about nearly everyone is not nearly the same thing as seeing everything about anyone. Moreover, what Facebook \u2018knows\u2019 comes not only from what it \u2018sees\u2019 of our actions online, but also from the online and offline actions of our family members, friends, and acquaintances. Our loved ones\u2014and our &#8220;liked&#8221; ones, and untold scores of strangers\u2014are at least as much the guard in the Panopticon tower as is Facebook itself, if not moreso. As a result, <strong>we are now subjected to a second-order asymmetrical gaze:<\/strong> we can never know with certainty whether we are within the field of someone else\u2019s documentary vision, and we can never know when, where, by whom, or to what end any documentary artifacts created of us will be viewed.<\/p>\n<p>As Erving Goffman elaborated more than 50 years ago, we all take on different roles in different social contexts. For Goffman, this represents not \u201c<a href=\"http:\/\/venturebeat.com\/2010\/05\/13\/zuckerberg-privacy\/\">a lack of integrity<\/a>,\u201d but the work each of us does, and is expected to do, in order to make social interaction function. In fact, it is those individuals who refuse to play appropriate roles, or whose behavior deviates from what others expect based on the situation at hand, who <em>lose face<\/em> and tarnish their credibility with others. The <a href=\"http:\/\/www.tiara.org\/blog\/wp-content\/uploads\/2010\/07\/marwick_boyd_twitter_nms.pdf\">context collapse<\/a> designed into most social media therefore complicates profoundly even the purposeful, asynchronous self-presentation that takes place on such websites, which has come to require \u201c<a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/04\/30\/curating-reality\/\">laborious practices of protection, maintenance, and care<\/a>.\u201d<\/p>\n<figure id=\"attachment_11050\" aria-describedby=\"caption-attachment-11050\" style=\"width: 141px\" class=\"wp-caption alignright\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/impossible-task\/\" rel=\"attachment wp-att-11050\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-11050 \" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/impossible-task-202x300.jpg\" alt=\"\" width=\"141\" height=\"209\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/impossible-task-202x300.jpg 202w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/impossible-task-337x500.jpg 337w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/impossible-task.jpg 387w\" sizes=\"auto, (max-width: 141px) 100vw, 141px\" \/><\/a><figcaption id=\"caption-attachment-11050\" class=\"wp-caption-text\">Attempting the impossible.<\/figcaption><\/figure>\n<p>When we internalize the abstracted and compounded documentary gaze, we are left with a Sisyphean disciplinary task: <strong>we become obligated to consider not just the situation at hand, and not just the audiences we choose for the documentary artifacts we create, but also every future audience for every documentary artifact created by anyone else.<\/strong> It is no longer enough to play the appropriate social role in the present moment; it is no longer enough to craft and curate images of selves we dream of becoming, selves who will have lived idealized versions of our near and distant pasts. Applying technologies of self starts to bring less pleasure and more resignation, as documentary consciousness stirs a subtle but persistent disquietude; documentary consciousness haunts us with the knowledge that we cannot be all things, at all times, to all of the others that we (or our artifacts) will ever encounter.<strong> Documentary consciousness entails the ever-present sense of a looming future failure. <\/strong><\/p>\n<p>As I discussed in <a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/06\/13\/a-new-privacy-pt-2-disclosure-damned-if-you-do-damned-if-you-dont\/\">Part II<\/a>, the impacts of these inevitable failures are not evenly distributed. Those who have the most to lose are not people who are \u201cevil\u201d or who are \u201cdoing something they shouldn\u2019t be doing,\u201d but people who live ordinary lives within marginalized groups. Those who have the most to gain, on the other hand, are people who are already among the most privileged, and corporations that already wield a great deal of power. The greatest burdens of documentary consciousness itself are therefore likely to be carried by people who are already carrying other burdens of social inequality.<\/p>\n<p>Recent attention to a website called WeKnowWhatYoureDoing.com showcased much of this yet again. The speaker behind the \u201cwe\u201d is a white, 18-year-old British man named Callum Haywood (who\u2019s economically privileged enough to own <a href=\"http:\/\/callumhaywood.com\/about.php\">an array<\/a> of computer and networking hardware), who built a site that aggregates potentially incriminating Facebook status updates and showcases them with the names and photos of the people who posted them. Because all the data used is \u201cpublicly accessible via the Graph API,\u201d Haywood states in a <a href=\"http:\/\/weknowwhatyouredoing.com\/\">disclaimer on the site<\/a> that he \u201ccannot be held responsible for any persons [<em>sic<\/em>] actions\u201d as a result of using what he terms \u201cthis experiment\u201d; he has further stated that his site (which is subtitled, \u201c\u2026and we think you should stop\u201d) is intended to be \u201c<a href=\"http:\/\/articles.nydailynews.com\/2012-06-27\/news\/32444902_1_privacy-settings-privacy-options-facebook-users\">a learning tool<\/a>\u201d for those users who have failed to \u201cproperly [understand] their privacy options\u201d on Facebook.<\/p>\n<figure id=\"attachment_11054\" aria-describedby=\"caption-attachment-11054\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/facebook-sucks\/\" rel=\"attachment wp-att-11054\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-11054\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/facebook-sucks-300x260.jpg\" alt=\"\" width=\"300\" height=\"260\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/facebook-sucks-300x260.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/facebook-sucks.jpg 480w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-11054\" class=\"wp-caption-text\">Not everyone thinks Facebook&#8217;s privacy settings are easy to understand.<\/figcaption><\/figure>\n<p>Coverage of the site\u2019s rapid rise to popularity (or at least high visibility) was similar to coverage surrounding Girls Around Me: a lot of <em>Shame On You<\/em>, and the occasional critique that stopped at \u201c<a href=\"http:\/\/www.theatlanticwire.com\/topics\/we-know-what-youre-doing\/\">creepy<\/a>.\u201d <a href=\"http:\/\/news.ycombinator.com\/item?id=4159422\">Tech<\/a>&#8211;<a href=\"http:\/\/news.yahoo.com\/know-doing-website-outs-drug-users-boss-haters-143543555.html\">savvy<\/a> <a href=\"http:\/\/www.digitaltrends.com\/social-media\/we-know-what-youre-doing-website-exposes-facebook-stupidity\/\">white<\/a> <a href=\"http:\/\/www.cnn.com\/2012\/06\/26\/tech\/social-media\/facebook-site-privacy-mistakes\/index.html\">men<\/a> thought the site was great; a young white woman starting college at Yale this fall explained that her digital cohort\u2014\u201c<a href=\"http:\/\/www.policymic.com\/articles\/10821\/fb-privacy-settings-scandal-new-site-outs-your-worst-facebook-posts-to-teach-you-a-lesson\">the youngest millennials, the real Facebook Generation<\/a>\u201d\u2014has learned from the mistakes of \u201cthose who are ten years older than us.\u201d As a result, her generation thinks Facebook\u2019s privacy settings are easy, obvious, and normal; if your mileage has varied, \u201cyou have no one to blame but yourself.\u201d In examining the screenshots from WeKnowWhatYoureDoing.com that these articles feature, I have yet to find one featured Facebook user who writes like a Yale-bound preparatory school graduate; unlike the articles\u2019 authors, the majority of featured Facebook users in these screenshots are people of color. <strong>It is hard not to see WeKnowWhatYoureDoing.com as doing anything other than offering self-satisfied amusement to privileged people, at the acknowledged potential expense of less privileged people\u2019s employment.<\/strong><\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/facebook-transparent\/\" rel=\"attachment wp-att-11055\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft  wp-image-11055\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/facebook-transparent-300x300.jpg\" alt=\"\" width=\"144\" height=\"144\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/facebook-transparent-300x300.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/facebook-transparent-150x150.jpg 150w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/facebook-transparent.jpg 400w\" sizes=\"auto, (max-width: 144px) 100vw, 144px\" \/><\/a>Even overlooking the facts that Facebook\u2019s privacy policy may be \u201c<a href=\"http:\/\/www.technolog.msnbc.msn.com\/technology\/technolog\/google-facebook-privacy-policies-more-confusing-credit-card-agreements-survey-734968\">more confusing and harder to understand<\/a> than the small print coming from credit card companies,\u201d and that the data in Facebook\u2019s <a href=\"https:\/\/developers.facebook.com\/docs\/reference\/api\/\">Graph API<\/a> is really only \u201cpublicly accessible\u201d in reference to a \u2018public\u2019 comprised entirely of software developers, the story Haywood wants to tell with WeKnowWhatYoureDoing.com is fundamentally flawed. It is a story in which \u201cpeople <a href=\"http:\/\/www.digitaltrends.com\/social-media\/we-know-what-youre-doing-website-exposes-facebook-stupidity\/\">violate their own privacies<\/a> on a regular basis,\u201d in a world where digital surveillance, companies like Facebook, and smug self-important software developers fade into the background of the setting\u2019s \u2018natural\u2019 world. Haywood states, \u201c[p]eople have lost their jobs in the past due to some of the posts they put on Facebook, <a href=\"http:\/\/www.weknowwhatyouredoing.com\/?action=about\">so maybe this demonstrates why<\/a>\u201d; what he seems to be missing is that his site demonstrates not only \u201cwhy,\u201d but <em>how<\/em> people come to lose their jobs.<\/p>\n<p>In pretending that \u201cinformation wants to be free\u201d and holding individuals responsible for violations of their own privacy, we neglect to consider the responsibility of other individuals who write code for companies like Facebook, or who use the data available through the Graph API, or who circulate Facebook data more widely, or who help Facebook generate and collect data (yes, even by tagging their friends in photographs). <strong>If we cannot control our own privacy, it is because we can so easily impact the privacy of everyone we know\u2014and even of people we don\u2019t know.<\/strong><\/p>\n<figure id=\"attachment_11056\" aria-describedby=\"caption-attachment-11056\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/07\/19\/a-new-privacy-part-3-documentary-consciousness\/morphosesbacchaedancer-frances-chiaverini\/\" rel=\"attachment wp-att-11056\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-11056\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/new-look-300x239.jpg\" alt=\"\" width=\"300\" height=\"239\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/new-look-300x239.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/07\/new-look.jpg 494w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-11056\" class=\"wp-caption-text\">We need to take a new look at &#8220;privacy&#8221; and &#8220;autonomy.&#8221;<\/figcaption><\/figure>\n<p>We urgently need to rethink \u2018privacy\u2019 in ways that expand beyond the level of individual conditions, obligations, or responsibilities, yet also take into account differing intersections of visibility, context, and identity in an unequal but intricately connected society. <strong>And we need as well to turn much of our thinking about privacy and individual autonomy on its head.<\/strong> Due justice to questions of who is visible, and to whom, to what end, and to what effect cannot be done so long as we continue to believe that privacy and visibility are simply neutral consequences of individual choices, or that such choices are individual moral responsibilities.<\/p>\n<p>We must reconceptualize privacy as a <em>collective<\/em> condition, one that entails more than simply \u2018lack of visibility\u2019; privacy must be also a collective responsibility, one that individuals and institutions alike honor in ways that go beyond \u2018opting out\u2019 of the near-ubiquitous state and corporate surveillance we seem to take for granted. <strong>It is time to stop critiquing the visible minutiae of individual lives and choices, and to start asking critical questions about who is looking, and why, and what happens next. <\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/2012\/05\/21\/a-new-privacy-pt-i-distributed-agency-the-myth-of-autonomy\/breaker2\/\" rel=\"attachment wp-att-10349\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-10349\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/breaker2-500x2.jpg\" alt=\"\" width=\"500\" height=\"2\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/breaker2-500x2.jpg 500w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/breaker2-300x1.jpg 300w, https:\/\/thesocietypages.org\/cyborgology\/files\/2012\/05\/breaker2.jpg 900w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Private browsing image from <a href=\"http:\/\/appadvice.com\/appnn\/2011\/05\/apple-tackles-set-privacy-concerns-newest-published-patent\">http:\/\/appadvice.com\/appnn\/2011\/05\/apple-tackles-set-privacy-concerns-newest-published-patent<\/a><\/p>\n<p><em>Performance image by Neil Girling, <a href=\"http:\/\/www.theblight.net\">http:\/\/www.theblight.net<\/a>. Used with permission.<\/em><\/p>\n<p><em>Modernized Rockwell image by William George Wadman, from <a title=\"http:\/\/fadedandblurred.com\/blog\/great-art-for-a-great-cause\/\" href=\"http:\/\/fadedandblurred.com\/blog\/great-art-for-a-great-cause\/\">http:\/\/fadedandblurred.com\/blog\/great-art-for-a-great-cause\/<\/a><\/em><\/p>\n<p><em>Shadow image by yalayama, from <a href=\"http:\/\/braingasmic.tumblr.com\/post\/22348601967\/how-pcbs-promote-dendrite-growth-may-increase-autism\">http:\/\/braingasmic.tumblr.com\/post\/22348601967\/how-pcbs-promote-dendrite-growth-may-increase-autism<\/a><\/em><\/p>\n<p><em>Kids image from <a href=\"http:\/\/www.eyesonbullying.org\/about.html\">http:\/\/www.eyesonbullying.org\/about.html<\/a><\/em><\/p>\n<p><em>Houdini image from <a href=\"http:\/\/www.thestar.com\/article\/914083--houdini-s-inescapable-influence\">http:\/\/www.thestar.com\/article\/914083&#8211;houdini-s-inescapable-influence<\/a><\/em><\/p>\n<p><em>Baby bathtub image from <a href=\"http:\/\/www.mommyshorts.com\/2011\/11\/caption-contest.html\">http:\/\/www.mommyshorts.com\/2011\/11\/caption-contest.html<\/a><\/em><\/p>\n<p><em>Peeping bathroom image from <a href=\"http:\/\/gweedopig.com\/index.php\/2009\/11\/03\/peeping-tom-hides-video-camera-in-christian-store-bathroom\/\">http:\/\/gweedopig.com\/index.php\/2009\/11\/03\/peeping-tom-hides-video-camera-in-christian-store-bathroom\/<\/a><\/em><\/p>\n<p><em>Dear Victim image from <a href=\"http:\/\/news.nationalpost.com\/2011\/11\/24\/let-me-run-through-your-dumb-mistakes-teen-burglars-apology-letter-to-victims\/\">http:\/\/news.nationalpost.com\/2011\/11\/24\/let-me-run-through-your-dumb-mistakes-teen-burglars-apology-letter-to-victims\/<\/a><\/em><\/p>\n<p><em>Pushpin image from <a href=\"http:\/\/www.pinewswire.net\/article\/to-warrant-or-not-to-warrant-aclu-police-clash-over-cellphone-location-data\/\">http:\/\/www.pinewswire.net\/article\/to-warrant-or-not-to-warrant-aclu-police-clash-over-cellphone-location-data\/<\/a><\/em><\/p>\n<p><em>Don&#8217;t rape sign image from <a href=\"http:\/\/higherunlearning.files.wordpress.com\/2012\/05\/dsc7600r.jpg?w=580&amp;h=510\">http:\/\/higherunlearning.files.wordpress.com\/2012\/05\/dsc7600r.jpg?w=580&amp;h=510<\/a><\/em><\/p>\n<p><em>Anti-woman image from <a href=\"http:\/\/www.feroniaproject.org\/fired-for-using-contraception-maybe-in-arizona\/\">http:\/\/www.feroniaproject.org\/fired-for-using-contraception-maybe-in-arizona\/<\/a><\/em><\/p>\n<p><em>Naked wedding photo from <a href=\"http:\/\/www.mccullagh.org\/photo\/1ds-10\/burning-man-cathedral-wedding\">http:\/\/www.mccullagh.org\/photo\/1ds-10\/burning-man-cathedral-wedding<\/a><\/em><\/p>\n<p><em>Cop image from <a href=\"http:\/\/www.quickmeme.com\/meme\/6ajf\/\">http:\/\/www.quickmeme.com\/meme\/6ajf\/<\/a><\/em><\/p>\n<p><em>G+ vs. Facebook comic by Randal Munroe, from xkcd: <a href=\"http:\/\/xkcd.com\/918\/\">http:\/\/xkcd.com\/918\/<\/a><\/em><\/p>\n<p><em>Transparency word cluster from <a href=\"http:\/\/digiphile.wordpress.com\/2010\/03\/28\/transparency-camp-2010-government-transparency-open-data-and-coffee\/\">http:\/\/digiphile.wordpress.com\/2010\/03\/28\/transparency-camp-2010-government-transparency-open-data-and-coffee\/<\/a><\/em><\/p>\n<p><em>Transparent sea creature image from <a href=\"http:\/\/halfelf.org\/2012\/risk-vs-transparency\/\">http:\/\/halfelf.org\/2012\/risk-vs-transparency\/<\/a><\/em><\/p>\n<p><em>Transparent grenade image from <a href=\"http:\/\/www.creativeapplications.net\/objects\/the-transparency-grenade-by-julian-oliver-design-fiction-for-leaking-data\/\">http:\/\/www.creativeapplications.net\/objects\/the-transparency-grenade-by-julian-oliver-design-fiction-for-leaking-data\/<\/a><\/em><\/p>\n<p><em>Transparency and toast image from <a href=\"http:\/\/time2morph.files.wordpress.com\/2012\/01\/transparent-toaster.jpg?w=300&amp;h=234\">http:\/\/time2morph.files.wordpress.com\/2012\/01\/transparent-toaster.jpg?w=300&amp;h=234<\/a><\/em><\/p>\n<p><em>Looming storm photo by Whitney Erin Boesel. Used with permission.<\/em><\/p>\n<p><em>Digital eye image from <a href=\"http:\/\/www.indypendent.org\/2012\/04\/28\/facebook-lobbies-washington-spying-users\">http:\/\/www.indypendent.org\/2012\/04\/28\/facebook-lobbies-washington-spying-users<\/a> <\/em><\/p>\n<p><em>Store surveillance image from <a href=\"http:\/\/mastersofmedia.hum.uva.nl\/2010\/10\/30\/facebook-open-minded-panopticon\/\">http:\/\/mastersofmedia.hum.uva.nl\/2010\/10\/30\/facebook-open-minded-panopticon\/<\/a> <\/em><\/p>\n<p><em>Stick figure comic by Luke Simpson, from <a href=\"http:\/\/www.stickworldcomics.com\/comics\/2009\/11\/\">http:\/\/www.stickworldcomics.com\/comics\/2009\/11\/<\/a> <\/em><\/p>\n<p><em>Camera shy photo by M1L4N, from <a href=\"http:\/\/m1l4n.com\/camerashy\/\">http:\/\/m1l4n.com\/camerashy\/<\/a><\/em><\/p>\n<p><em>Impossible task image by Hyeyoung Kim, from <a href=\"http:\/\/www.co-mag.net\/2008\/dark-word-hyeyoung-kim\/\">http:\/\/www.co-mag.net\/2008\/dark-word-hyeyoung-kim\/<\/a><\/em><\/p>\n<p><em>Facebook traffic sign photo from <a href=\"http:\/\/epicfails.net\/2011\/10\/facebook-fail\/\">http:\/\/epicfails.net\/2011\/10\/facebook-fail\/<\/a><\/em><\/p>\n<p><em>Facebook gunshot image from <a href=\"http:\/\/www.buzzingup.com\/2010\/09\/facebook-is-infected-by-the-failwhale\/\">http:\/\/www.buzzingup.com\/2010\/09\/facebook-is-infected-by-the-failwhale\/<\/a><\/em><\/p>\n<p><em>New look image by Kyle Froman from <a href=\"http:\/\/www.artsjournal.com\/tobias\/2011\/10\/starting_over.html\">http:\/\/www.artsjournal.com\/tobias\/2011\/10\/starting_over.html<\/a> <\/em><\/p>\n<p>&nbsp;<\/p>\n<div>\n<hr align=\"left\" size=\"1\" width=\"33%\" \/>\n<div>\n<p><a title=\"\" href=\"#_ednref1\">[i]<\/a> Note that \u201cpublicly available\u201d is tricky here: Girls Around Me users were ported to Facebook to view the women\u2019s profiles, and so could also have accessed <em>non-public<\/em> information if they happened to view profiles of women with whom they had friends or networks in common.<\/p>\n<\/div>\n<div>\n<p><a title=\"\" href=\"#_ednref2\">[ii]<\/a> Alternatively, my difficulty finding posts written in support of Google\u2019s policy may simply reflect Google\u2019s \u2018personalization\u2019 of my search results, both then and now.<\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>This is the complete version of a three-part essay that I posted in May, June, and July of this year: Part I: Distributed Agency and the Myth of Autonomy Part II: Disclosure (Damned If You Do, Damned If You Don\u2019t) Part III: Documentary Consciousness Part I: Distributed Agency and the Myth of Autonomy Last spring [&hellip;]<\/p>\n","protected":false},"author":1875,"featured_media":11314,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967],"tags":[4195,2324,9227,18349,10789,10447,18353,16002,18300,10682,942,2007,18351,775,18352,347,13,16070,1902,424,3312,99,1528,816,732,2143,16038,10125,190],"class_list":["post-11304","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-commentary","tag-anxiety","tag-augmented-reality","tag-autonomy","tag-choice","tag-connection","tag-digital-dualism","tag-digital-social-technology","tag-disconnection","tag-documentary-consciousness","tag-documentary-vision","tag-facebook","tag-foucault","tag-g","tag-google","tag-google-plus","tag-identity","tag-inequality","tag-opt-out","tag-panopticon","tag-privacy","tag-privilege","tag-relationships","tag-sexism","tag-social-capital","tag-social-media","tag-surveillance","tag-ttw2012","tag-visibility","tag-women"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/thesocietypages.org\/cyborgology\/files\/2013\/08\/digital-privacy.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/11304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/1875"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=11304"}],"version-history":[{"count":22,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/11304\/revisions"}],"predecessor-version":[{"id":18803,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/11304\/revisions\/18803"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media\/11314"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=11304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=11304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=11304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}