âBy various means of seduction, coercion, and co-optation, everyday life has been irresistibly colonized by forces collectively known as Big Data: the corporations and state agencies that use communications networks and digital surveillance to amass huge quantities of information on the activities of individuals and groups in hopes of predicting and containing their next moves.â
âShort of a total renunciation of the now routine conveniences of contemporary life and voluntary exile from the spaces where almost all social belonging and recognition takes place, you cannot escape.â
ââThe proximate reasons for the culture of total surveillance are clear,â the software developer Maciej CegĹowski explained in a recent talk. âStorage is cheap enough that we can keep everything. Computers are fast enough to examine this information, both in real time and retrospectively. Our daily activities are mediated with software that can easily be configured to record and report everything it sees upstream.ââ
âBut behind those proximate causes, as CegĹowski points out, are resilient, long-standing motives that have guided the direction of technological development for centuries: âState surveillance is driven by fear. And corporate surveillance is driven by money.ââ
âA data profile that seems innocent enough now could combine with future information and as-yet-untested analytical approaches to become a vector of persecution.â
âBig Data propagandists who insist mass data collection is always and ever for our own good, and that only selfish people would try to meddle with the reliability of omnipresent surveillance by being intentionally dishonest.â
âthe tactics of obfuscation do nothing to decrease the asymmetries of power and information they are designed to disrupt. At best, they only âpolluteâ the databases of the powerful, and spur them to do a better job justifying their data collection and analysis and clarifying exactly what good they are doingâ
âThey draw explicit inspiration from political scientist James C. Scottâs concept of âweapons of the weak.â In Scottâs 1985 book of that title, he analyzed how oppressed Malaysian peasants without political agency found other, less overtly political means to resist: squatting, poaching, petty theft, work slowdowns, furtive complaints, and so on. Obfuscation, in Brunton and Nissenbaumâs account, works similarly, granting a limited form of agency to those who canât rely on âwealth, the law, social sanction, and forceâ to protect their interests.â
âThe evasions of obfuscation are contingent on acceptance of the impossibility of genuine escape. They provide means of getting along under conditions of enemy occupation, not strategies of revolution or resistance. They consolidate rather than dismantle the asymmetries of power; they are fugitive, rearguard actions in the midst of an ongoing collective surrender.â
âWeapons of the weak are for those who have become resigned to remaining weak.â
âBrunton and Nissenbaum argue that it âoffers some measure of resistance, obscurity, and dignity, if not a permanent reconfiguration of control or an inversion of the entrenched hierarchy.â In other words, it permits gestures of independence that feel satisfying, without changing the actual conditions of domination.â
âthe tactics of obfuscation donât scale: the more people use them, the more incentive corporations and governments have to devote their superior resources to developing countertactics, thus quickly closing off whatever vulnerabilities were revealedâ
âNor is obfuscation an effective foundation for a collective democratic politics. As Brunton and Nissenbaum recognize, obfuscation relies on secrecy and deception, not transparency, making it much more useful for individual protection than for public advocacy.â
âprivacy-based obfuscation negates the tendency to protest: it caters to a self-protectiveness that runs counter to the self-sacrifice that civic engagement often requiresâ
âObfuscation tends to configure protest as an assertion of personal privacy rather than collective public risk-taking.â
âMany of us have learned to consume surveillance â even the surveillance of our own bodies â as entertainment.â
âThey encourage us to think of ourselves as enthralling yet solvable mysteries, stories we can enjoy vicariously.â
âIn this way, surveillance becomes both a means to self-knowledge and a precondition for it.â
âWhen surveillance makes us seek lines of flight, it sharpens our awareness of ourselves as selves, as people having selves worth protecting or concealing from view. We rely on surveillance to supply a sense of stakes for the self.â
âWhile obfuscation intends to spread disinformation at the expense of data collectors, it also undermines the information channels we rely on for social cohesion.â
âObfuscation assumes that the autonomy of the individual self is something precious that needs to be protected from violation. But in making the unmonitored self the ultimate prize, obfuscations colludes with existing systems of power which rely on our isolation, and our eagerness to assume responsibility for circumstances we canât entirely control. Surveillance is more effective the more we are guided by the threat it seems to represent to our personal integrity.â
âBut a merely illusory integrity, rooted in paranoia, may not be worth holding on to at all. So what if, instead of obfuscating, we stayed alert to the potential solidarities that are articulated by the very schemes designed to control us? What if, instead of trying to fly under the enemyâs radar, we let that radar help us find allies with whom we can fly in formation? If we can find a way to repurpose the resources of surveillance toward ends it canât perceive, we could begin to consume the system rather than be consumed by it.â
Navigation
Backlinks
There are no backlinks to this post.