Thursday, April 19, 2007
Privacy and Control: The Function of Surveillance in Society
The growth of information technology has brought with it a growth in our social, cultural, and political awareness. We are now accountable for our everyday lives more than ever before, as even the most unlikely individuals are subjected to ongoing monitoring and disclosure. This increased self-awareness has influence over our daily lives in ways that are not easily recognizable. In Surveillance and Security: Technological Politics and Power in Everyday Life, a discussion of technology's control over institutions and individuals, whether it may be law-enforcement, transportation, diplomacy, or parenting. Its collection of essays questions the limits which information technologies have created in our social networks and collective security. Our present climate of social and political deliberation and mistrust make this book a timely confrontation of surveillance methods and their effects on individual freedom and privacy. It raises questions about the ultimate costs and benefits of surveillance through several contemporary case studies. Overall, the book presents a detailed analysis of current surveillance trends and outcomes without any of today's obligatory flag-waving or defiant neoliberalism.
Surveillance and Security: Technological Politics and Power in Everyday Life features essays from various professionals from the fields of political science, sociology, criminology, and cultural studies. The book appeals to an audience interested in surveillance studies, criminal justice, the sociology of science and technology, and women's studies. An analysis of everyday technologies is presented, ranging from biometric technologies at airports and borders, video surveillance in schools/public housing, radio frequency identification (RFID) tags in hospitals and public transport, national ID cards, and magnetic strips on welfare food cards. The motivations and functions of surveillance technologies used in everyday life are investigated by the essayists. The central issue of the book revolves around the system of tradeoffs linked to surveillance technologies, such as security versus liberty, and security versus privacy. Its authors argue that tradeoffs provide for only brief discussion of the consequences of the current growth of electronic surveillance. Its editor, law professor Torin Monahan, argues: "Some of the obvious issues not discussed when talking about trade-offs are how surveillance contributes to spatial segregation and social inequality, how private high-tech industries are benefiting from the public revenue generated for these systems, and what the ramifications are of quantifying 'security' (e.g. by the number of video cameras for political purposes)" (2). The book investigates the larger motivations and function of surveillance technologies used in everyday life.
In her essay The State Goes Home: Local Hyper vigilance of children and the Global Retreat from Social Reproduction Cindi Katz comments on the growth in child surveillance and paranoid parenting across America. This domestic dystopia reflects the larger national surveillance crisis involving banking and the government. As Katz emphasizes: "But one thing is certain: the discourse of fear has provoked an increasingly serious domestic response to the perceived dangers in our midst" (28). Surveillance and Security: Technological Politics and Power in Everyday Life is also a response to national security, a discussion of the right to privacy and the social aspects of technology, as well as whose interests electronic surveillance actually serves.
Although the book gathers together essays from a diverse background of professionals and researchers, all of the essays come to the conclusion that most forms of surveillance are unnecessarily invasive and overly expensive. In his essay The Growth of Mandatory Volunteerism in Collecting Personal Information- 'Hey Buddy Can You Spare a DNA?" Gary T. Marx investigates the emerging consumer trend of soft surveillance. This surveillance appears to protect and empower consumers, yet Marx argues that this facade serves only the interests of big business, as it is: "Requesting volunteers based on appeals to good citizenship or patriotism, using dangerous communication, trading personal information for rewards, or convenience and using hidden or low-visibility information-collection technologies" (38). These newly emerging forms of technology, from barcodes to biometrics, intrude on our everyday lives without recognition. As Marx continues: "New hidden or low-visibility technologies increasingly offer the tempting possibility of bypassing awareness and any need for direct consent altogether" (41). Surveillance has become an intimate player in our personal lives, determining our social, consumer, and political identities, without any invitation or acceptance on our part.
The increasing costs and supervision created by surveillance has reinforced social hierarchies, as the essayists describe the priorities and agendas of everyday lives and the balance of power created by them. The essayists conclude that many of our everyday surveillance technologies are unnecessary and, in most cases, unwarranted. The goals and objectives of electronic surveillance are too hindered by bureaucracy and capitalism to produce any benefits to society. As editor Torin Monahan writes: "Indeed, most crimes-violent or otherwise-are not prevented by surveillance" (5). Throughout the book, the current ramifications of the global "War on Terror" are investigated. Monahan considers surveillance to be an inadequate approach to terrorism and crime. He notes: "The root causes for crime or terrorism are not engaged and deeper social changes brought about by surveillance and security systems are left interrogated" (10). The essayists of the book agree that surveillance only succeeds in reinforcing social and economic divides, as the poor are often victims of surveillance of the rich, as their personal activities and economic transactions are monitored and criticized. Nancy D. Campbell comments on the phenomenon of workplace drug testing in her essay Everyday Insecurities: The Micro behavioral Politics of Intrusive Surveillance. She writes: "Drug testing in nontherapeutic contexts will remain an unfair and unjust 'new-surveillance' scheme until the day when the poor begin testing the rich" (73). The essayists conclude that surveillance fails to protect identities or prevent crime. Simon A. Cole and Henry N. Pont ell elaborate this perspective in their essay "Don't Be Low Hanging Fruit: Identity Theft as Moral Panic". They argue: "Thus, in neglecting the larger social reality of identity fraud, such narratives allow systematic problems related to such crimes remain unaddressed, which increases the likelihood that the problem will become worse and that a fearful public will support even greater surveillance in the hope of rectifying it" (146). The book concludes by saying that surveillance does succeed in cultivating fear and mistrust, though not in the surveillance itself but the people controlling our society and supposedly provide protection for us.
The book thoroughly analyzes surveillance in our everyday lives and its effect on democratic values. The government and advertising companies hold tremendous power in monitoring our everyday lives. Today, millions unknowingly surrender personal information, social status, and geographic details by simply using a credit card, boarding public transport, or using a mobile phone. The most interesting chapter of the book is Heather Cameron's Using Intelligent Systems to Track Buses and Passengers. Cameron describes London Transport's recent efforts to provide a "transport system that serves the needs of all those who live, work, or visit London, irrespective of economic status or social identity" (226). In their effort to improve customer service, London Transport has applied several technologies to ensure efficiency and security for all of its passengers and employees. It is not surprising for London to be the first city worldwide to incorporate RFID, GPS, and security cameras into its buses. After all: "With the equivalent of one camera for every fourteen people, it is estimated that the average person in a large city like London is filmed three hundred times a day" (3). However, it is surprising to learn exactly how much surveillance these technologies provide. Security cameras both onboard buses and outside of bus lanes monitor passengers and vehicles illegally driving in bus lanes. These cameras may capture the driver's license plate and the driver may then be fined by mail for their violation. Similarly, passenger behavior is captured on video. Passengers can be caught on tape applying graffiti to bus interiors or harassing bus drivers. This video may then be used to identify such criminals and aid in their prompt prosecution. Although these security measures benefit transport users, other forms of surveillance infringe on their right to privacy. By using a London Transport Oyster card, passengers save on their fares but these RFID cards in turn communicate their names, addresses, legal status (i.e. student/senior), credit card information, travel behavior, and geographical location to London Transport. This information can then be sold to advertisers and targeted commercials can be shown on video monitors strategically placed near the doors of each bus. By using RFID, London Transport creates enormous revenues, yet passenger fares continue to rise. Bus fares on London buses are nearly comparable to London Underground fees. Yet bus passengers experience little of the comfort, convenience, and dramatically decreased travel times than that of their Underground counterparts. Through her essay, Cameron emphasizes the need for passengers and government agencies to address such surveillance issues and collaborate on protecting citizen privacy. Surveillance and Security: Technological Politics and Power in Everyday Life presents a thoughtful and provocative discussion of the exchange of information and the role of surveillance in our social networks and personal identities.
Wednesday, April 18, 2007
Book Review: From Counterculture to Cyberculture
In this book, Turner traces the evolution of the personal computer and the freewheeling Internet from its unlikely origins in buttoned-down Cold War cybernetics. His focus is on Stewart Brand, creator of the Whole Earth Catalog, CoEvolution Quarterly, the WELL and a force behind the influential magazine Wired. Prominent here too is the
Turner suggests that this evolution is not merely technological—it was not simply the case that computers became smaller and thus more accessible. The origins of computing in a military-industrial setting and the development of small desktop computers might just as easily have led to computers as simply part of a repressive bureaucracy. The development of personal computers as instruments for flattening of hierarchies, removal of geographic barriers, creation of online “virtual”communities and the like are the result in part of a utopian Zeitgeist that can be linked to the counterculture of the 1960’s and 1970’s, and more specifically to the role of Stewart Brand as a figure who brought the counterculture to the world of computing. This development is intertwined as well with a collaborative interaction within the confines of military and scientific institutions—a culture exemplified by lab work at MIT and Stanford which also interrelated with Brand’s ideas and the processes he exemplified. It is with this evolution from idealistic counterculture to vibrant cyberculture that this book is concerned.
Turner gives the label “ New Communalism” to the utopian impulses that led both to the portion of the sixties counterculture which found its central text in the Whole Earth Catalog, and to the embrace of technology which found itself eventually at home in the 1990’s with some aspects of insurgent Republicanism. He suggests further that the values of the communal 1960’s utopian movement exemplified by Brand and his Whole Earth Catalog were not co-opted and distorted in later years by the forces of capitalism or the state as some believe, but rather became a part of the cyberculture of both creators and users of computers and new forms of computing.
The book opens with the defining computational metaphor as expressed by contemporary writers such as Esther Dyson, Perry Barlow (a former lyricist for the Grateful Dead and now an information technology journalist and pundit) and Kevin Kelly (former executive director of Wired magazine): digital technologies transcend the world of governments and restrictions, and are instead tools by which stultifying bureaucracies can be overthrown and new, flexible ways of living, working, and producing for a strong economy can be achieved. Yet, to the students of the Berkeley Free Speech movement in which these writers began and which provided the origin of the counterculture, cybernetics represented a militarized and menacing force antithetical to the longed-for new society. The students of the Berkely Free Speech movement of the 1960’s and their colleagues across the country sometimes demonstrated and protested using computerized punch cards as the emblem of a repressive society.
In spite of the 1960’s students’ perceptions, Turner suggests that the seemingly closed world of the military-industrial complex was not monolithic. Within that complex, beginning with the great collaborative research enterprises of World War II, could be found a computation subculture bound by, in anthropological terms, a “trading language” and a “legitimacy exchange” which facilitated border-crossing and group work by professionals from various backgrounds. At the same time, Norbert Wiener and his associates, pioneers of cybernetics and associated with the wartime computing effort, expressed an idea of human being as automated mechanical information processors but with an added, more benign idea of a system in which men and machines collaborated. Thus it seems, even in the founding metaphors of computing, there were possibilities for divergence in how computing was regarded, along with spaces in which computing work was boundary-spanning and non-hierarchical.
It was the youth culture of the 1960’s, emerging as it did as a reaction against the systems which included the computing of the time, which added the notion of a liberated egalitarian society and communal ideals. It was during this time that two youth movements emerged. One was political, as represented by the SDS and the civil rights struggle, which became the so-called New Left. The other, more inward-turning, embracing new ways of consciousness and relationships and accompanied by drugs and rock and roll music, became the “counterculture”. It is in this non-political, utopian stream that Turner places the countercultural origins of cyberculture in the New Communalism. It is here that Turner arrives at the central questions he hopes to answer: how did the systems visions of the cold war and the seemingly antithetical communitarian visions of the New Communalists become so entwined that, years later as the Internet evolved out of the Cold War systems, it could appear to many to be the New Communalist ideal reborn? Here, Turner suggests, is the pivotal role of Steward Brand as the node connecting these networks.
Brand’s own intellectual journey into the counterculture began as a Stanford student learning about the then-new system-oriented ecological theories of population biologist Paul Ehrlich. After college and military service, he found his way into the avant-garde arts scene in
Migrating back to the West Coast, Brand became involved with Ken Kesey and his Merry Pranksters, who offered a model of an alternative community involving borderless and interrelated self, technology and community consciousness via drugs. As a result of this collaboration with Kesey, Brand became the entrepreneur of the wildly successful countercultural San Francisco Trips Festival—a multimedia event featuring an amalgam of technology in lighting, images,sound, dance and music. Turner suggests that it was this techno-social amalgamation which formed the beginning ot the fusion of New Communalist social ideals and technological products which had their origin in the Cold War.
Once the Festivals were over, Brand joined the countercultural Portola Institute, newly formed in
In the early 1970’s after the Whole Earth catalog ceased, Brand, by now comfortably well-off, moved back and forth between the counterculture and the new centers of computer research in an environment in which the computer industry, computer hobbyists, and counterculturalists lived next to one another and interacted freely. By this time, smaller computers were being developed and the Portola Institute continued to serve as a space where researchers and counterculturalists could meet. For computer researchers such as Alan Kay, who was working at Xerox Parc on small computers and graphical user interfaces, the Whole Earth Catalog embodied a vision of technology as a source of individual and technological transformation and its format was a kind of hyperlinked peer-to-peer information system which seemed like a model for what the new computers should become.
As the New Communal movement began to die out in the 1970’s Brand became interested in the ideas of Gregory Bateson, whose encounter with cybernetics had led to communication-based social theories. Bateson’s ideas provided much of the intellectual background to the CoEvolution Quarterly, which replaced the Whole Earth Catalog. Brand’s flair for networking and entrepreneurship and his role in inspiring small-computer pioneers continued in the 1980’s as he became enamored of the emerging hacker culture. Through his attendance at the seminal hacker conferences he became interested in software and engaged in the developing computer community. As he began to publish software-related catalogs and to involve himself more in the the countercultural aspects of the growing computer industry, his function as a link between the countercultural ideals and computing became more pronounced. As computing changed, he wanted to be part of it, but on the terms which had formed his life experiences. This led to the leap into formation of the WELL—the Whole Earth Lectronic Link—in 1985. On its surface a teleconferencing system like others at the time, its membership and governance brought together former counterculturalists, hackers and journalists who collaborated in a network forum that had been shaped by countercultural ideals.
As digital technology became networked and as the technology industry in the
In the 1980’s Brand began to look for new horizons and discovered MIT’s new Media Lab as well as the conferences and networks associated with this new media technology. As he met with the computer entrepreneurs of the developing new economy, he formed the Global Business Network, which continued some of the countercultural ideals but in an overlapping series of business, social , technological and informational networks. This networking led in time to the founding of Wired magazine by GBN members, and the alliance of techno-libertarians of the computer industry, former counterculturalists, and social conservatives of the New Right. Included in this mix were the ideals of a New Economy, the notion that twentieth-century economics and the twentieth-century bureaucracy had been left behind. By the time of the collapse of the dot-com bubble, the notions surrounding the social possibilities of computing and computer networking begun by Stewart Brand and his countercultural colleagues had become so ingrained with the New Communalist notions of tool use and indivual consciousness, that the dot-com collapse could not shake them. New Communalists had succeed in fusing a collaborative tradition found within the hierarchical military-industrial complex with their individualistic search for alternative communities. Coming as it did at the right place and the right time, propelled by a clever and entrepreneurial node in the network in the form of Stewart Brand, the ethos of New Communalism counterculture fused with a subculture of the military/industrial culture to form a vision and a practice of cyberspace that might otherwise have been—and indeed might still otherwise become—quite different.
This intriguing book has been well-reviewed, and rightly so. The author has successfully melded anthropological, historical, cultural, and a degree of spatial/geographical, insight into a convincing study of the impact of a countercultural movement which has been taken for dead or irrelevant in many circles. The notion of a clever, thoughtful, and entrepreneurial individual’s influence as a node in a network fits well into contemporary thinking and seems to be very relevant to Brand and his impact. However, from this book alone it is difficult to see what other streams of thought might have contributed to the development of the utopian ideal of digital culture. The impact of Tim Berners-Lee, the rise of the open access movement in the field of information, the open-source coding movement, the information superhighway ideals of Al Gore, the concerns about the Digital Divide, for instance, find no place in this consideration of digital utopianism. Although Silicon Valley and