{"id":18058,"date":"2014-02-20T11:50:36","date_gmt":"2014-02-20T15:50:36","guid":{"rendered":"http:\/\/thesocietypages.org\/cyborgology\/?p=18058"},"modified":"2014-02-20T12:20:54","modified_gmt":"2014-02-20T16:20:54","slug":"panopticon-for-whom","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/cyborgology\/2014\/02\/20\/panopticon-for-whom\/","title":{"rendered":"Panopticon For whom?"},"content":{"rendered":"<figure id=\"attachment_18086\" aria-describedby=\"caption-attachment-18086\" style=\"width: 415px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/twitter.com\/ibogost\/status\/435589426794598400\/photo\/1\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-18086 \" alt=\"thank you Ian Bogost for making this image for me\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/02\/5-415x500.png\" width=\"415\" height=\"500\" srcset=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/02\/5-415x500.png 415w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/02\/5-207x250.png 207w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/02\/5-332x400.png 332w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/02\/5-140x170.png 140w, https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/02\/5.png 577w\" sizes=\"auto, (max-width: 415px) 100vw, 415px\" \/><\/a><figcaption id=\"caption-attachment-18086\" class=\"wp-caption-text\"><a href=\"https:\/\/twitter.com\/ibogost\/status\/435589426794598400\/photo\/1\" target=\"_blank\">thank you for this, Ian Bogost<\/a><\/figcaption><\/figure>\n<p style=\"text-align: left;\">Sometimes it feels that to be a good surveillance theorist you are also required to be a good storyteller.\u00a0Understanding surveillance seems to uniquely rely on metaphor and fiction, like we need to first see another possible world to best grasp how watching is happening here. Perhaps the appeal to metaphor is evidence of how quickly watching and being watched is changing &#8211; as a feature of modernity itself in general and our current technological moment in particular. The history of surveillance is one of radical change, and, as ever, it is fluctuating and rearranging itself with the new, digital, technologies of information production and consumption. Here, I\u2019d like to offer a brief comment not so much on these new forms of self, interpersonal, cultural, corporate, and governmental surveillance as much as on the metaphors we use to understand them.<\/p>\n<p><!--more--><\/p>\n<p>This is partially inspired by <a href=\"https:\/\/medium.com\/matter\/76d9913c6011\" target=\"_blank\">a recent piece by the always-wise Zeynep Tufekci<\/a> who asks us to update our metaphors, to \u201crethink our nightmares about surveillance.\u201d Indeed, surveillance metaphors aren\u2019t hard to come by. Usually, there\u2019s an appeal to fiction, like Orwell\u2019s &#8220;1984&#8221;, Huxley\u2019s &#8220;Brave New World&#8221;, and Kafka\u2019s &#8220;The Trial&#8221;. Not far from fiction, Michel Foucault famously appealed to Jeremy Bentham\u2019s proposed Panopticon prison, and this is the metaphor that tends to dominate popular discourse around surveillance. I won\u2019t fully summarize the thesis here other than to remind you that panoptic surveillance, as metaphor, is a style of watching where you are potentially on display to some authority, causing you to modify behavior towards what that authority thinks is ideal. The Panopticon has come to be seen as pass\u00e9 within surveillance studies, and popular discourse has the complicated habit of overextending the metaphor, too flatly rejecting it, and\/or just getting it wrong.<\/p>\n<p>To be sure, the panoptic metaphor fails to describe contemporary surveillance in many ways. First, it doesn\u2019t account for surveillance unknown by those surveilled. Remember that it is the presence of the watch tower, which might house guards that can exert punishment, that causes the many to self-censor towards normalization. If you don\u2019t think that being watched is a real possibility, then whatever surveillance is happening is still surveillance, but it\u2019s just not of the <em>panoptic <\/em>sort\u00a0(instead, it might be said to be &#8220;<a href=\"http:\/\/www.english.illinois.edu\/-people-\/faculty\/debaron\/582\/582%20readings\/siva%20on%20privacy.pdf\" target=\"_blank\">nonoptic<\/a>&#8221; [pdf]). The panoptic metaphor also fails to account for when the center of surveillance isn\u2019t from the top-down, but lateral or bottom-up (<a href=\"http:\/\/www.surveillance-and-society.org\/articles1(3)\/sousveillance.pdf\" target=\"_blank\">coveillance and sousveillance<\/a>\u00a0[pdf]). Others might point to how the Panopticon wrongly understands everyday people as prisoners with too restricted freedom when it is precisely such freedom that is often leveraged for social control, as Tufekci points out in her piece and is central to, say, the Frankfurt School and other critics of the consumer society &#8211; especially <a href=\"http:\/\/books.google.com\/books?id=xZ0RAAAAQBAJ&amp;lpg=PP1&amp;dq=bauman%20liquid%20modernity&amp;pg=PT111#v=onepage&amp;q&amp;f=false\" target=\"_blank\">Bauman\u2019s critique<\/a>\u00a0that also takes the prisoner\u2019s gaze to be more important than the panoptic metaphor allows, himself positing the &#8220;Synopticon&#8221; that describes social control of the many watching the few cultural gatekeepers; the act of looking can modify behavior as deeply as being seen.\u00a0As such, many have concluded that we should forget the Panopticon as a useful metaphor for understand surveillance in a digital age.<\/p>\n<p>I think such a conclusion does a conceptual disservice. Instead, to best understand the usefulness of the panoptic metaphor, and thus contemporary surveillance in general, it might be better to ask, <em>Panopticon for whom?<\/em>\u00a0In short, discussions centered on if the Panopticon is right or wrong obscure its uneven distribution, how such surveillance comes to be unequally directed at some more than others. If you\u2019re tired of all these \u201copticons&#8221; and &#8220;veillances&#8221;, sorry, but there\u2019s even another term in frequent use within surveillance studies, is extremely useful, is almost entirely missing in popular discourse, and is centered exactly on this question of <i>the Panopticon for whom<\/i>.<\/p>\n<p style=\"text-align: center;\"><i>The Ban-Opticon <\/i><\/p>\n<p>Introduced by theorist Didier Bigo*, the Ban-opticon describes the process of sorting that precedes the surveillance apparatus, panoptic or not. It is a quite useful framework for understanding not just the process of watching, but how people are sorted into being watched or not. The Ban-opticon operates at many levels, for example, through discourse, like \u201cthreat levels\u201d or \u201caxis of evil\u201d that create and sort people in and out of different surveillance apparatuses. At the level of architecture, for example, you may notice how some people chose or are forced into different types of airport security depending on their income, name, ethnicity, country of origin, political history, and this architectural sorting comes to be more or less panoptic depending on who you are. Of course, at the legal level, people are routinely sorted into different surveillant treatments, a too simplistic way of describing <a href=\"http:\/\/www.people.fas.harvard.edu\/~ces\/conferences\/muslims\/Bigo.pdf\" target=\"_blank\">a more complex surveillance situation<\/a>\u00a0[pdf].<\/p>\n<p>Equally important to the actual process of watching is this preceding process: Given that I can see, whom should I look at? Under what rules, codes, and justifications do I look at one person and not another? By understanding this sorting and profiling \u2014usually into categories like criminal or not, safe or not\u2014 the ban-optic perspective highlights how, on the one hand, the Panopticon is certainly not an all-encompassing process but, on the other, the panoptic urge is quite alive and well &#8211; precisely because of its uneven application.<\/p>\n<p>While, in an aside, Tufekci mentions these &#8220;notable exceptions&#8221;, I think the general framing,\u00a0that \u201cthe Panopticon has little do to with what happens in liberal democracies\u201d, needs some correcting. The Panopticon continues to exist and has much to do with liberal democracies, even if it isn\u2019t the model that describes how the average Western consumer is commonly watched. What we know about, say, the NSA and drone programs that is so controversial is precisely this sorting in and out of Foucauldian panoptic surveillance, that surveillance some call pass\u00e9, but continues to exist exactly as the fear of always being watched by a coercive authority (usually the U.S. government).\u00a0The Panopticon has\u00a0much to do with what happens in liberal democracies because it is one tool such democracies use to keep people out, to maintain distinctions of \u201cother\u201d, and all this happens whether or not we\u2019re at the business end of the panoptic gaze.<\/p>\n<p>I think we need less surveillance theorizing that attempts to identify the one overarching metaphor to encompass all watching; instead, we need more work towards understanding the various types of surveillance and surveillant outcomes. Important to that project is taking the process of surveillant <i>sorting<\/i> as central.<\/p>\n<p>I could end this here, but I&#8217;d like to conclude by arguing that the ban-optic perspective is useful beyond just saving the panoptic metaphor. It also helps us think about Big Data surveillance specifically. The process of sorting, panoptic or not, is fundamental to Big Data\u2019s usefulness in the market. For example, sometimes people complain that one of the problems with Big Data is that sorting is done by algorithm rather than by humans. There\u2019s lots of truth in that, but there\u2019s a mostly semantic and technical correction that needs to be made: it\u2019s wrong to call humans and algorithms opposites since all algorithms are human, they are codified rules based on and written by humans with certain politics, histories, and interests. That said, algorithmic sorting, through such codification, adds to a certain bureaucratic rationality that removes some wiggle-room for situations not previously anticipated. Instead of decisions made on a case-by-case basis, algorithmic sorting occurs, which is itself a particularly harsh Ban-opticon. This perspective asks us to look at how Big Data sorting can act to create &#8220;others&#8221;, to keep certain people distant.<\/p>\n<p>That&#8217;s only a type of question this perspective can ask, certainly I haven&#8217;t done that analysis here. Instead, this is just a short note asking for not a single surveillance metaphor to understand Big Data, the NSA, and new surveillance technologies, but instead we might look to a ban-optic understanding. It would mean taking into account a larger array of players in the modern surveillance game, more than just top-down authorities such as the government, than typical surveillance and privacy writing allows for. The ban-optic perspective demands a multiplicity of surveillance metaphors, which is so crucial for Big Data that, at once, makes it presence known and hidden, encourages coercion and free expression, for different people at different times.\u00a0There\u2019s a lot of conceptual work to be done in theorizing Big Data, and I think this ban-optic perspective could be fruitful to include in this work.<\/p>\n<p><em>Nathan on <a href=\"http:\/\/nathanjurgenson.com\/\" target=\"_blank\">Tumblr<\/a> and <a href=\"https:\/\/twitter.com\/nathanjurgenson\" target=\"_blank\">Twitter<\/a><\/em><\/p>\n<p><a href=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/02\/rochester-mail-sorters-c1910.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter\" alt=\"rochester-mail-sorters-c1910\" src=\"https:\/\/thesocietypages.org\/cyborgology\/files\/2014\/02\/rochester-mail-sorters-c1910-500x385.jpg\" width=\"500\" height=\"385\" \/><\/a><\/p>\n<p>*see:<\/p>\n<p>Bigo, Didier (2006). Security, Exception, Ban and Surveillance. Theorizing Surveillance. The panopticon and beyond. D. Lyon. Davon, Willan Publishing, pp. 46-68.<\/p>\n<p>Bigo, Didier (2007). Detention of Foreigners, States of Exception, and the Social Practices of Control of the Banopticton. Borderscapes: Hidden Geographies and Politics at Territory&#8217;s Edge. P. K. Rajaram and C. Grundy-Warr, Minneapolis, University of Minnesota, pp. 57-101.<\/p>\n<p><a href=\"http:\/\/www.people.fas.harvard.edu\/~ces\/conferences\/muslims\/Bigo.pdf\" target=\"_blank\">Bigo, Didier (2008). Globalized (In)Security: The field and the Ban-Opticon. Terror, Insecurity and Liberty. Illeberal practices of liberal regimes after 9\/11. D. Bigo and A. Tsoukala. Oxon and New York, Routledge, pp. 10-48.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Discussions centered on if the Panopticon is right or wrong obscure its uneven distribution. The better question is: the Panopticon for whom?<\/p>\n","protected":false},"author":559,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[9967],"tags":[26566,2362,13319,26567,10794,2007,19986,1902,732,2143,26565,66,12067],"class_list":["post-18058","post","type-post","status-publish","format-standard","hentry","category-commentary","tag-ban-opticon","tag-bauman","tag-big-data","tag-bigo","tag-drones","tag-foucault","tag-nsa","tag-panopticon","tag-social-media","tag-surveillance","tag-synopticon","tag-theory","tag-tufekci"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/18058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/users\/559"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/comments?post=18058"}],"version-history":[{"count":13,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/18058\/revisions"}],"predecessor-version":[{"id":18097,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/posts\/18058\/revisions\/18097"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/media?parent=18058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/categories?post=18058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/cyborgology\/wp-json\/wp\/v2\/tags?post=18058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}