By Gordon Hull
A current paper by Mireille Hildebrandt sent me to a paper from 1994 that I’m embarrassed to say I hadn’t read before: Philip Agre’s “Surveillance and Capture.” Agre’s paper has been cited over 300 times, but it’s missing in a lot of the privacy literature I know. After reading it, I’ve decided that’s a mistake, and it’s time to make amends. I’ll begin by saying why I think Hildebrandt is exactly right to bring the paper up in a context of big data.
Agre starts with quotidian examples of tracking, things like employee ID cards that let systems know where they are, to UPS package tracking. The core argument of Agre’s paper is that there’s two conceptual models of privacy that need to be distinguished in making sense of phenomena like these: one, the one that we all talk about all the time, is surveillance. The surveillance model grew out of experience with state bureaucracies, particularly in the Soviet bloc, and features visual metaphors (typically Orwell and Bentham); assumes that the watching is nondisruptive and secret; involves territorial metaphors like invasion of space, which tend to then lead to a dichotomy between coercion and consent; involves centralized orchestration; and is identified with the state. This model, though ubiquitous, isn’t the only or even the best one. Agre spends most of his time developing the alternative model, though he notes that “when applied as the sole framework of computing and privacy, the surveillance model can lead to oversimplified analysis” and suggests that it lends itself to caricature and easy dismissals such that “genuinely worrisome developments can be seen as ‘not so bad’ simply for lacking the overt horrors of Orwell’s dystopia” (116). It’s not hard to say that Agre got this one right: whether it’s the well-trodden problems with notice-and-consent or the stubborn persistence of the “I’ve got nothing to hide” deflection, the surveillance model isn’t adequate to privacy worries now.
The second model, which Agre ties to computer science and information systems management, is built around the idea of “capture.” The capture model also has five characteristics, which Agre develops as a contrast with surveillance. Capture: uses linguistic metaphors for human activities; assumes that linguistic parsing of activities is active intervention; defaults to structural metaphors; is decentralized; and is driven by to reconstruct human activity “through [its] assimilation to a transcendent (‘virtual’) order of mathematical formalism” (107). The core concept here is grammar: the basic mechanism of capture is to pick a set of atomic elements (people, UPS packages) and to then develop a grammar that describes their possible movements or changes. This model is then imposed – sometimes coercively – on the activities it purports to describe, mechanisms are used to then track and measure the activity according to the grammar; the system can then be further calibrated.
Continue reading "Philip Agre on Privacy and Big Data (part 1)" »
Recent Comments