Title: Knowing Glances:
1Knowing Glances From Privacy to Visibility in
Information Infrastructures
David J. Phillips Department of Radio-Television
Film University of Texas at Austin djp_at_mail.utexas
.edu Anonymity Project Ottawa, ON June 2004
2THE PUNCH LINE Identities are performed in
communities of meaning. In talking about
appropriate forms of identification, we have to
talk about forms of performance, community,
and sense-making.
3Surveillance a 4 stage process individuation
and identification tracking and
monitoring statistical analysis response Sur
veillance produces social identities, social
relations. It mediates social power.
4Think of GeePS a location-based marketing
system as a local market, a one-mile circle of
energy around a potential customer, which moves
with him or her, providing local information that
fits individual needs. This information is
dynamic and controlled by the merchants,
communities and establishments in that radius.
5Can the surveillance process be used by the
known population itself, to make sense of the
world from alternative perspectives, to
maintain subcultural identity and to
articulate that identity within the larger
social order.
6Queer theory studies the creation and
maintenance of social divisions/positions/power
through identity categories It aspires toward
changed possibilities of identity,
intelligibility, and publics. It probes
opportunities for discursive
counterpractices. (queering the discourse)
7- Practices of identity, visibility, presence
- claiming a recognized identity
- negotiating identity among various social
contexts - recognizing others who share our identity
- creating, defending, and acting upon
subcultural knowledge - occupying public space
8How do surveillance infrastructures potentially
mediate transgressive, contingent
identities regenerative places and communities
9Identities are performed toward certain
ideals, in certain contexts, and using
certain resources
10Resources for identity performance Mirrors
11Resources for identity performance
Mirrors Familiarity with ideal identities
12Resources for identity performance
Mirrors Familiarity with ideal
identities Awareness of context
13Resources for identity performance
Mirrors Familiarity with ideal
identities Awareness of context Ability to
signal within a subculture
14Resources for identity performance
Mirrors Familiarity with ideal
identities Awareness of context Ability to
signal within a subculture Availability of
public space
15Resources for identity performance
Mirrors Familiarity with ideal
identities Awareness of context Ability to
signal within a subculture Availability of
public space Availability of public presence
16(No Transcript)
17Case Study U.S. E9-1-1 Political analysis of
an infrastructure of visibility an ecology of
surveillance
18Infrastructure Intertwining of law,
institutions, economics, culture and everyday
practice shaping and mediating law,
institutions, economics, culture and everyday
practice
19Why 9-1-1? Its the killer app of locational
surveillance
20- structuring elements
- legacy technical configuration
- telecomm industry competition
- mobile telephony
- E9-1-1 regulation
- information policies and laws
- profit motive
- a culture of fear and safety
21 Wireline carrier switching office
Public Service Answering Point
Caller dials 911
Dedicated 911 switching network
Basic 9-1-1
22Wireline carrier switching office
Public Service Answering Point
Caller dials 911
ANI / ALI DATABASE
PHONE ADDRESS
512 471 8083 512 353 3664 340 Oak St. 1823 Elm Ave.
Dedicated 911 switching network
Wireline carrier business office
Wireline Enhanced 9-1-1
23Wireline carrier switching office
Public Service Answering Point
Caller dials 911
ANI / ALI DATABASE
PHONE ADDRESS
512 471 8083 512 353 3664 340 Oak St. 1823 Elm Ave.
Dedicated 911 switching network
Wireline carrier business office
Wireline carrier business office
Wireline carrier business office
Enhanced 9-1-1 with Wireline Competition
24Wireline carrier switching office
Public Service Answering Point
Caller dials 911
ANI / ALI Database
PHONE ADDRESS LAT LON
512 471 8083 512 353 3664 610 242 8811 340 Oak St. 1823 Elm Ave. 30 15 98 30
Dedicated 911 switching network
Mobile carrier switching office
Wireline carrier business office
Wireline carrier business office
Wireline carrier business office
Location service
Wireless Enhanced 9-1-1
25New markets for geographic database management
for geographically aware call-delivery
systems for location-determining
systems for automated dispatching
systems served by private companies but funded
by mandated surcharges.
26- Information Policy and Laws
- No opt out of E9-1-1
- Info used only to deliver emergency services
- Use of locational information (not generated in
9-1-1) requires express prior authorization - Only data itself, not infrastructure is
protected - De-identified info might not be covered
- Whats emergency service?
27- Market Imperatives
- unused systems capacity is a resource to be
profitably mined - pressure to design and deploy general purpose,
modular, and reconfigurable systems - linking locational databases to other
databases - Multi-purpose call delivery (fleet management,
targeted ads.)
28- Context of infrastructure development
- private, volatile, fractured, profit-seeking
telecomm industry - well-funded cultural and legal mandate for
emergency service - a patchwork of privacy laws
29- Resulting resources
- Legible landscape
- Individual visibility to telcos
- Privately owned data space data available for
sense-making through - consent
- de-identification
- power
- Privately owned call-routing systems
30Desiderata for appropriable surveillance
infrastructures Mirrors Familiarity with
ideal identities Awareness of context Ability
to signal within a subculture Availability of
public space Availability of public presence
31- Publicness of data space / Availability for many
modes of sense making - Attributes of landscape (maps) differentially
available. - Data produced by individuals actions available
through - consent
- de-identification
- power (emergencies, subpoenas)
32- Signaling within subcultures / Publicness of
performance - Different places for individuals in same space
- Segmenting
33 A generic, modular, malleable system Potentially
responsive to all sorts of patterns of data
exchange and analysis (like the internet?) But
who can harness the consent, money, and authority
to populate, use, and apply the private
dataspaces? Therefore, dominated by the
interests of state and market institutions (like
the internet?)
34In general, the infrastructure facilitates an
imbalance in the creation, acquisition, and
control of social knowledge in favor of
corporate and state interests. This, despite
the strongest privacy laws in the U.S.
35- Possibilities for Intervention
-
- opt-out of emergency services
- independent oversight of homeland security
- all aspects of system
- restricted to emergency operations OR
- operated as a public resource
- mine rifts between state and corporate interests
- address culture of fear
36- Look at other legal regimes,
- (in addition to privacy rights)
- anti-trust
- cultural rights
- data is extracted from the
- cultural context of its production,
- commodified and marketed
- to the detriment of the culture from
- which it was drawn.
37David J. Phillips Department of
Radio-Television-Film University of Texas at
Austin 1 University Station A0800 Austin, TX
78712 USA 512-471-6624 djp_at_mail.utexas.edu