Professional Documents
Culture Documents
1NC Sousveillance
Institutional restrictions on surveillance crowds out activism and replicates the very
practices they were purported to reform.
Genosko 6 [Gary, (Im)Possible Exchange: The Arts of Counter-Surveillance, Canadian Cultural Poesis: Essays on Canadian
Culture. Ed. Sheila Petty, Garry Sherbert, and Annie Gerin. Library and Archives Canada Cataloguing in Publication. pp. 33-34]
Still, social theorist have been struck by the absence of broadly based, unified social movements specifically contesting the rise of
societies of surveillance. Resistance to the diverse modes of surveillance, new social relations, and subordinations of the information
economy by individuals, groups, and institutions have, however, certainly proliferated and become more and more commonplace,
even if these lack a unique, unifying imaginary or shared organizational base. Attention has turned to specific, spontaneous
mobilizations that pose a range of challenges from the non-serious to serious: from teenage pranksterism to workplace avoidance
tactics. Such theorists have not of course been blind to the
that are not stable from the outset (contra classist apriorism). New context-dependent identities are only won through struggles of
articulation in the moving equilibria of the field of antagonisms of hegemonic power (struggles articulating the range of differences,
shifting boundaries, relative unities, and elastic hierarchies [subordination by consent] from which they derive their character, and
importantly, create problems around identity formation). The language of new alliances, rainbow coalitions, transversal connections,
alternative flows, and remaking of territories and singularities in the process of subject formation all speak of the fluidity and plurality
of the ideological field int which resistances arise. The
State power has grown so big that it now uses technology to maintain a constant
state of emergency which justifies endless wars, military growth, and structural
violence. The impact is even more unregulated domestic surveillance, which turns
the case.
Steinmetz 2003 (George, Prof. of Sociology @ Univ. of Michigan, The State of Emergency and the Revival of American
Imperialism: Toward an Authoritarian Post-Fordism, Public Culture 15:2)
The
current state of emergency, the threat of terrorism, is constructed as a specifically political
crisis, a shaken sense of political sovereignty. This massive campaign to recentralize power began, somewhat
The manifest regulatory changes over the past year have focused primarily on the structure and role of the (U.S.) state.
ironically, just at the moment when globalization theorists (including Hardt and Negri) were reaching a consensus that the state was
being overshad- owed by transnational, regional, and local organizations. The
MP3 technology, for instance, is popularly subversive, not only because it is widespread but also because it seems to engender no
more popular disapproval than the use of blank cassettes for taping music off the radio. Another
example of subversion
can be found in the kind of counter- surveillance that some individuals pursue against the
surveillance apparatus; this can mean filming the police who film demonstrations or it can mean
using data protection legislation to expose corporate misdemeanours. At its best, then, subversion
can constitute a counter-cultural movement that, like their predecessors in the 1960s, is not anti-capitalist per se but
does represent a form of resistance against powerful corporations and state agencies. To be subversive, then, hacking et al.
must not be done for its own sake (still less for personal gain) but in order to undermine the information
systems of economic and political power. Subversion can occur both outside the law but also
within it, by exploiting ambivalences within the law and/or by encouraging the legal apparatus to catch up with
developments in ICT, a time lag that governments and corporations are often able to exploit for undesirable ends. Organized acts by
groups can be termed rebellious. For instance, many businesses have found their websites subjected to denial of service attacks,
effectively putting much of that company out of operation for signifcant periods of time of course such attacks can also be the result
of individual grudges against the company in question, or even of random and capricious malevolence. How- ever, the
most
famous example of rebellion remains the Zapatista movements successful and continued
mobilization of world opinion against the attempt by the Mexican government to deprive them of
their land rights (Castells 1997: 7283). In addition, we might also consider the kind of opposition, mentioned in the above
discussion of RIPA, to legislation that threatens civil liberties. The USA has been an important source of
opposition to other attempts at over-regulating cyberspace (Jordan 1999). Acts of resistance, therefore,
consist of material and/or discursive actions that disclose social alternatives by attempting to open
what economic and political powers attempt to close: the heterotopic spaces of autonomy that are
the source of alternative visions of individuality and society (Foucault 1986) but which risk being
silenced by informatic capitalism in its attempt to reduce human diversity to digital bytes and data
streams. Resistance is always a strategy that positions itself against the hegemony of the
dominant nodes of money and power that are embedded in sites of work and consumption (see
above). An act of resistance therefore requires sites of resistance: the sites are the sine qua non of
the acts that simultaneously confirm and destabilize the condition of their existence. A site of
resistance is both materially and culturally transformed by the acts of resistance to which it gives
rise. A site makes an act possible and an act is the means by which we become aware of a sites
transformative potential. Therefore, a site must facilitate an ideological orientation , i.e. a critique of
existing power and its alternatives.
LinkCurtailment
[1NC Evidence] Institutional restrictions on surveillance not only crowd out activist,
but replicate the very practices they were purported to reform.
Genosko 6 [Gary, (Im)Possible Exchange: The Arts of Counter-Surveillance, Canadian Cultural Poesis: Essays on Canadian
Culture. Ed. Sheila Petty, Garry Sherbert, and Annie Gerin. Library and Archives Canada Cataloguing in Publication. pp. 33-34]
Still, social theorist have been struck by the absence of broadly based, unified social movements specifically contesting the rise of
societies of surveillance. Resistance to the diverse modes of surveillance, new social relations, and subordinations of the information
economy by individuals, groups, and institutions have, however, certainly proliferated and become more and more commonplace,
even if these lack a unique, unifying imaginary or shared organizational base. Attention has turned to specific, spontaneous
mobilizations that pose a range of challenges from the non-serious to serious: from teenage pranksterism to workplace avoidance
tactics. Such theorists have not of course been blind to the
that are not stable from the outset (contra classist apriorism). New context-dependent identities are only won through struggles of
articulation in the moving equilibria of the field of antagonisms of hegemonic power (struggles articulating the range of differences,
shifting boundaries, relative unities, and elastic hierarchies [subordination by consent] from which they derive their character, and
importantly, create problems around identity formation). The language of new alliances, rainbow coalitions, transversal connections,
alternative flows, and remaking of territories and singularities in the process of subject formation all speak of the fluidity and plurality
of the ideological field int which resistances arise. The
LinkFacial Obfuscation
The politics of facelessness presumes a universal plasticity of all subjectseffacing
difference.
Monahan 15 [Torin, Associate Professor of Communication Studies at the University of North Carolina at Chapel Hill. The
Right to Hide? Anti-Surveillance Camouflage and the Aestheticization of Resistance, Communication and Critical/Cultural Studies
Vol. 12 No. 2]
Rather than simply substitute one bizarre collective representation for an alienating singular one, the Facial Weaponization Suite aspires to erase identity
markers altogether. It denies the legitimacy of a market of discrete identities and the systems that would reduce people to them. Blas and colleagues
explain: We want a technology that allows us to
The aestheticization of resistance enacted by anti-surveillance camouflage and fashion ultimately fails to address
the exclusionary logics of contemporary state and corporate surveillance . These anti-surveillance practices
emerge at this historical juncture because of a widespread recognition of unchecked, pervasive surveillance and popular criticism of
government and corporate overreach. The key to the
public property, these interventions may have the effect of fostering in audiences a critique of policing priorities and the
commodification of public space. Play of this sort may be an effective form of resistance that alters public awareness and cultural
sensibilities, but it can be a difficult task for such interventions to problematize inequalities that can fester within assumptions of
shared rights. Ultimately, discourses
enemy
of the surveillance society is the enemy of the archive or its sovereign, always an internal enemy .
In contrast to how political theorists usually see it, any infiltration from the outside world only strengthens the justifications for the
databases existence, reinforcing the sovereigns control and use of the data. In contrast to the state of exception, as defined by
Agamben, the
biometric database enables us to see that there is no need to suspend the law. The
antinomic structure of the system is the law. It is the norm. As mentioned above, what 9/11 gained for the
biopolitical system was simply the popular legitimacy to make the concealment of the system part and parcel of its operation, its
explicit principle of existence. In What Is an Apparatus? Agamben identifies a new European norm [that] imposes biometric
apparatuses on all its citizens by developing and perfecting anthropometric technologies invented in the nineteenth century in order to
identify recidivist criminals. Surveillance
where the politicians revive an ancient power of the apparatus, which the
information age allows them to hide or cover with the cloth o f divine legitimacy, nicknamed
security. Accordingly, any attempt at resistance has to focus on the issues themselves, rather than the ideological rhetoric
surrounding them. The attempt to stop the legislation and activation of the biometric database in Israel
has failed. In its failure it projected a new light on the possibility of opposing unconstitutional
means of control. What alternative is there? In light of the failure to change democracy from within , new
groups of activists have opted to play by different rules. German and British activists, exhausted by the political maneuvers of both
liberal and conservative politicians, have taken a rather direct course, attacking closed-circuit television cameras in
the public way. This is the unavoidable result of a democratic failure and the zone of indifference
surrounding the heart of politics in general and the society of control in particular . When our bodies are
abstracted from the cycle of birth, maturation, and death, an increasingly ungovernable element will exploit, as Agamben correctly
identifies, the vanishing point of every politics. If inside and outside, inclusion and exclusion, threat and violence are diffused, we
might as well knock down the remaining barriers between these formerly opposed pairs. What I imply is
LinkEncryption
Rather than eliminating surveillance technologies, the open source movement shows
how democratizing software and making it freely available acts as an explicit
political act that promotes social revolution.
Milberry 2012 [Kate, Faculty of Info @ Univ. of Toronto, Hacking for Social Justice: The Politics of Prefigurative
Technology, (Re)Inventing the Internet: Critical Case Studies, Feenberg & Frieson, Sense Publishers ISBN 978-94-6091-734-9]
Stallman (1999) took the principled stance that proprietary software was antisocial and unethical. He challenged the
assumption that we computer users should not care what kind of society we are allowed to
have. He began developing an operating system, GNU (Gnus Not Unix) that was completed with the addition of the Linux kernel
in 1992 (gnu.org). The free software movement was based upon four essential freedoms: the freedom
to run a program; the freedom to modify a program; the freedom to redistribute copies (either gratis or
for a fee); and the freedom to distribute modified versions of the program. Because freedom is considered in
the context of knowledge rather than markets, the sharing of source code is not regarded as incompatible with selling a finished
program. The
The plan directly hurts the open source movement by further privatizing encryption
technology. This prevents that technology from being used to subvert the dominant
social order.
Milberry 2012 [Kate, Faculty of Info @ Univ. of Toronto, Hacking for Social Justice: The Politics of Prefigurative
Technology, (Re)Inventing the Internet: Critical Case Studies, Feenberg & Frieson, Sense Publishers ISBN 978-94-6091-734-9]
In keeping with its business-friendly approach, the Open Source Definition logically abandoned all reference to the social and ethical
means and motives of free software, not to mention the fight for freedom as a primary aim (Obscura 2005). The OSI does not disguise
its efforts to make free software more compatible with capitalist discourse, describing itself as a marketing program for free software.
Its a pitch for free software on solid pragmatic grounds rather than ideological tub-thumping. The winning substance has not
changed, the losing attitude and symbolism have... (OSI, FAQ). For free software advocates, however, the
The plan makes it easier for private companies to encrypt information, which
decreases the ability of the public to repurpose software to achieve social justice.
Milberry 2012 (Kate, Faculty of Info @ Univ. of Toronto, Hacking for Social Justice: The Politics of Prefigurative
Technology, (Re)Inventing the Internet: Critical Case Studies, Feenberg & Frieson, Sense Publishers ISBN 978-94-6091-734-9)
Tech activists combat power imbalances in the technical sphere through their development
and use of free software. In this way, they carve out their own virtual terrain oriented
toward the community model of the Internet, which is based on democratic practice. This
model, which contrasts with the commercial model in objectives and orientation, has
profound ethical implications for the future of the Internet (Feenberg & Bakardjieva 2004, p. 2).
Recognizing communication as central to achieving the goals of the global justice movement,
activists created their own media system. In the case of the ongoing hacking of Active10, the geeks of IMC-Tech were
keenly aware that each technological design or set of features creates a particular publishing structure and, as a result, empowers
users...in an equally particular way (Hill 2003, p. 2). However, it also became apparent that transmitting
movement ideals
of social, economic and environmental justice to the world through a global digital newswire
depended upon internal communication within Indymedia. The IMC tech collective initially communicated by email
lists and Internet Relay Chat (IRC). But by 2002, a number of wikis were set up with the idea of creating a sustainable system for
documenting IMCs history and ongoing activities. A wiki is a dynamic website made up of a series of interlinked webpages that can
be created and edited by users. As one member of the Docs Tech Working Group observed early on: Getting a functioning and used
wiki is really vital for the network...Email lists just arent cutting it for the level of organizing and information exchange and growth
we need to help facilitate.11 Techs needed a virtual workspace with a constant online presence, where they could work jointly yet
asynchronously, on common projects and tasks. In addition to facilitating workflow, the wiki had the benefit of constructing and
cohering an online community of tech activists who identified with the goals of the GJM and worked to provide the technical
infrastructure and support the movement required.
LinkFoucault
Foucauldian concepts of surveillance misread digital and algorithmic monitoring
practices and disempower those who actively resist surveillance in the technological
age.
Martin 2009 [Aaron & Rosamunde van Brakel & Daniel Bernhard, London School of Econ. Understanding Resistance to
Digital Surveillance: Towards a Multi-Disciplinary, Multi-Actor Framework, Surveillance and Society 6:3]
According to Haggerty and Ericson (2000), surveillance
of resistance within surveillance studies must thus take into account these digital,
algorithmic and rhizomatic aspects of new surveillance practices. Traditional ways of
understanding surveillance, by focussing on the increasing capabilities of the surveyors and the
expansion of surveillance to include previously exempt groups, reinforce the conception that
surveillance is a party for two: an exclusive relationship between the surveyor and her subjects.
Looking at the world this way not only ignores some of the actors who resist surveillance, but
also excludes the assemblages that conduct the surveillance. We seek to bring these other actors to the fore. To
this end, the remainder of this paper is structured as follows. In the next section we review how resistance has been discussed to date
by authors normally associated with surveillance studies. Then, after briefly introducing our case study, we review resistance
discourses from other academic fields and disciplines. We then return to the case study to apply lessons learned from these other fields
and disciplines. This allows us to better understand current and emerging resistance between the various actors. Finally, we ask: how
might we generalise a new framework for understanding resistance in surveillance studies that takes into account these additional
actors and their multi-dimensional interactions?
The panopticon fails to account for the infinite encounters that take place in urban
space the panopticon is not a meaningful analogy to understand power in digital
and urban spaces.
Koskela 2003 [Hille, Dept. of Geography @ Univ. of Helsinki Finland, Cam Era: the Contemporary Urban Panopticon,
Surveillance and Society 1:3]
He writes about space of our dreams, internal and external space, and a space that can be flowing like a sparkling water.
Foucault glorifies space by talking about the epoch of space (1986: 22) which is replacing the important role of time (i.e. history)
but simultaneously builds concepts that are disengaged from architecture and come close to the idea of the social production of space.
Rather than politics and economy (which have quite often been the basis for the argument that space is socially produced) he describes
the spaces created by human habits, cultures and religions. This means that Foucaults
In everyday experience, we engage in transactions, fill out forms , create online profiles, pass through security
checks, and participate in myriad other situations in which our movements are registered, our
identities verified, and the minutiae of our lives recorded. The vicissitudes of these everyday
experiences reveal an ambivalent mix of free- dom and control, security and uncertainty . On the one
hand, the Internet and other forms of data transmission coupled with cameras, databases, detectors, etc.have
enabled powerful subject-generating structures and pro- cesses . These have received theoretical treatment in a
wide range of texts referencing Michel Foucaults early analyses of panoptic and other controlling structures. On the other hand,
these subject-forming social mechanisms do not generally produce the pathological consequences
evoked in such analyses of surveillance. We are not, as a rule, rendered clinically paranoid by the
panoptic power of omnipresent security cameras, motion detectors, and myriad other tracking and
recording devices. But how can an account of the ambivalences of surveillance in our everyday life be articulated? Such an
articulation would involve consideration not only of the subject-forming pow- ers of the
mechanisms of surveillance and dataveillance, but also of the interiority of the corresponding
forms of subjectivity. When Foucault was looking into the role of surveil- lance and control in the
formation of the subject, he was also in full flight from phenomenology, existential- ism, and the general
philosophy of consciousness with which he might have produced an account of the everyday
experience of surveillance. His emphasis instead was on macro-social factors; as a result, the issue of the experien- tial
reality of surveillance is undertheorized in Foucaults writings and in surveillance studies that have followed in his wake. In this
article, we return to the overlooked question of the shaping of modern subjective experience
through surveillance. We are not engaged in the polemics of Fou- caults generation of French
intellectuals for or against phenomenology and existentialism. Instead, we affirm the considerable
heuristic value of phenomenology as a means of studying the subjectivity said to be produced
through social and institutional structures and practices . We first address the issue of surveillance in an individual
con- text and then consider the implications of our analy- sis for the institutionalization of surveillance in modern societies.
The affs rejection of all surveillance doesnt understand the fact that surveillance is
reciprocal This means that they get rid of Sousveillance as well
Lyon 94[David. David Lyon is Director of the Surveillance Studies Centre. He is also Queen's Research Chair in Surveillance
Studies and Professor of Sociology and of Law. The Electronic Eye Blackwell Publishers. Pages 219-220]
Rather late in the day, sociology
Recent theorizing about surveillance practices has turned to the centrality of the body, not least in
those at the workplace. Although many acknowledge Foucaults nod towards the rehabilitated
body of the incarcerated subject in the panopticon and the political technologies of the body
identified in The History of Sexuality (Foucault, 1976), the theoretical inclination is towards Latourian and Deleuzian ideas.
These approaches highlight the disparate arrays of people, technologies and organizations that
become connected to make surveillance assemblages, in contrast to the static, unidirectional
panopticon metaphor. Indeed, Gandy (1998) asserts that it would be a mistake to assume that surveillance
in practice is as complete and totalizing as the panoptic ideal type would have us believe. Similarly,
Rule (1998: 68) observes that the panopticon alone offers little help in understanding new forms of
electronic surveillance, particularly if the question is whether people are subject to more or more
severe forms of control. Moreover, Boyne (2000) observes that disciplinary power, with its perfection through
technology, and the resultant docile, accepting, self-disciplining population are the exception
rather than the norm. It is, rather, how individuals, organizations, state bodies and the media
connect to these technologies that influences whose data are collected, where they go and what
happens as a result. Ball (2002) begins to address this point. In a paper entitled Elements of Surveillance, she describes four elements in a
surveillance domain. Representation refers to the technological element, acknowledging how
surveillance technologies can re-present data that are collected at source or gathered from another
technological medium. Meaning refers to the potential of new surveillance technologies to
enable different interpretations of life to be made, as well as interpretations of surveillance itself.
At least three common meanings are attributed to surveillance practice: surveillance as
knowledge; surveillance as information; and surveillance as protection from threat.
Manipulation refers to the inevitability of power relations under surveillance, not least because
surveillance practices capture and create different versions of life as lived by surveilled subjects.
Power relations are evident in the way in which watching institutions or groups are able to
regulate the flow of information and knowledge about the surveilled domain between various
parties; resistance strategies concern breaking or disrupting those flows and creating spatio-
temporal gaps between watcher and watched. Finally, Ball refers to actors within a surveilled domain as
intermediaries where meaning is inscribed, where technologies re-present information, where
power/resistance operates, and where networks are bound together. Each party, at each level of
analysis, assumes a role in a surveillance network and becomes inscribed as such through
embodied compliance, the exchange of money, the inscription of text and the use of artefacts
(Michael, 1996). Ball argues that intermediation is an important socio-technical process in the perpetuation of
surveillance practices. Using Deleuze and Guatarris (1987) concept of the assemblage, Haggerty and Ericson (2000) also describe the
convergence and spread of data-gathering systems between different social domains and at multiple levels. Their argument centres on
the notion that the target of the generic surveillance assemblage is the human body, which is
broken into a series of data flows to the end of feeding the information categories on which the
surveillance process is based (Hier, 2003). Thus, it is not the identity or subjectivity of individuals that
is of interest, but rather the data individuals can yield and the categories to which they can
contribute; these are then reapplied to the body as part of the influencing and managing process
to which Lyon refers. Accordingly Haggerty and Ericson argue that surveillance has a rhizomatic character: it has many and diverse instances
connected to an underlying, invisible infrastructure, which concerns interconnected technologies in multiple contexts.
LinkBoarders
Surveillance at the border is inevitable. Counter surveillance and de-bordering are
necessary acts of counter-hegemonic resistance. The plan makes it harder to deploy
counter surveillance along the border.
Walsh 2010 [James, Prof. @ UC Santa Barbara, Form Border Control to Border Care: The Political and Ethical Potential of
Surveillance, Surveillance and Society 8:2]
Although existing
research has illuminated the role of surveillance in monitoring and managing mobile populations, it has
tended to overlook other important activities, including the strategic use of surveillance by activist groups .
As a result, scholarship has generally interpreted watching, locating, and identifying as innately
authoritative and disempowering practices directed toward gatekeeping and exclusion. But what
happens when observational technologies and strategies are turned against the states gatekeepers
and surveillance systems? How should such instances impact scholarly understandings of surveillance as a potential tool of
resistance, empowerment and democratization? In addressing these questions, I assess two interventions employed to address the
human consequences of contemporary immigration control: (1) counter-surveillance
The same technology that is used to monitor and observe migrants on the border
has been used by border activists as mechanisms of empowerment and resistance.
Walsh 2010 [James, Prof. @ UC Santa Barbara, Form Border Control to Border Care: The Political and Ethical Potential of
Surveillance, Surveillance and Society 8:2]
Many scholars
have already noted how border control and surveillance exceed the exclusive
purview of nation-states and are also carried out by emergent practitioners such as supranational
institutions, municipalities, private security firms, airlines, travel agents, and vigilante patrols
(Guiraudon 2001; Walsh 2008). While emphasizing the distributed and heterogeneous nature of
surveillance, I also intend to reorient analysis by illuminating how private citizens and civilsociety actors have used observational technologies and practices as mechanisms of
empowermenthere defined as a demonstrable improvement in the economic, juridical,
social, or symbolic status of marginalized groups. Paying attention to such dynamicsshould
result in a more nuanced understanding of border control as a complex institutional field
defined by negotiation and struggle among multiple actors, both internal and external to the
state, and help assess the activists use of surveillance in protecting migrants and in
promoting a moral geography of recognition, responsibility and hospitality. This paper is divided as
follows. First, with particular attention to the US-/Mexico border, I summarize received scholarship on globalization, surveillance, and
national boundaries. Second, I apply studies emphasizing surveillances flexibility and ambiguity to the institutional field of the
border. Here I argue that, along
empirically, analyzing the use and framing of surveillance by border activists. This third section also
assesses each groups transformative potential and its relations with state authorities and official border practitioners.
The government is not alone in its aggressive efforts, as vigilante organizations have
emerged to provide additional surveillance and policing. Although existing in numerous forms over the past
150 years, border vigilantes, which now include the Minuteman Project, Minutemen Civil Defense Corps, American Border
Patrol, Border Patrol Auxiliary and Cyber-vigilantes, have recently proliferated (Walker 2007). Guided by insular
nationalism and viewing undocumented migration as an affront to national sovereignty and
security, vigilantes have engaged in civilian-led border watches and patrols, the use of unmanned
surveillance drones, and the installation of their own high-tech fencing and surveillance cameras
near the border.4 Heightened securitization efforts have had egregious human consequences. While failing to curb
illicit entries, forward deployment strategies have instead forced migrants into the unforgiving
desert, and mountain terrain of Southern Arizona. As a result, the number of deaths due to dehydration, drowning, and exposure has
drastically increased.5Since 1994 over 5,000 migrants have perished in transit; this is likely a conservative estimate given the vast
desert landscape likely holds hundreds, if not thousands, of more bodies.6 Although often labelledunintended consequences
(Cornelius 2001), given current policies stated intent of escalating the risks, dangers, and physical costs associated with illicit entry,
migrant fatalities are hardly unanticipated. Additionally,
Despite growing attention to the ambiguous and multivalent nature of surveillance, research on
migration and mobility has continued to assume a framework of border control in which watching
and monitoring are aligned with gatekeeping, regulating access, and excluding and expelling
unwanted populations (see Inda 2006; Salter 2007; Shamir 2005; Torpey 2000; Walters 2006). Consequently, when
studying instances of resistance and empowerment, researchers treat surveillance as a target,
rather than tool, of resistance and analysis centres on if and how it may be eliminated. While the
impact of official practices of territorial and social boundary maintenance can hardly be
overestimated, many of the techniques and tools implicated in the administration of political
borders can also be appropriated by opposing actors. In the following discussion I draw on the work of three
activist organizations to inform and add complexity to extant scholarship, shifting analysis to forms of border care neglected by
scholars interested in surveillance, borders and mobility.
the administration of
territorial borders remains a significant instantiation of state authority central to the exercise and
accumulation of political and symbolic power, treating the state as the exclusive agent of border
surveillance or assuming that surveillance is inherently repressive endorses a narrow and
undersocialized view of observational techniques and practices . Noting there is more to surveillance
than initially meets the eye, this paper has advanced a broader definition, recognizing that observing,
locating, and classifying may be conducted in the interest of protecting rights, redressing
injustices, enabling democratic participation, buttressing moral criticism, and advocating
for alternative practices. Further, this paper calls attention to the need to study surveillance as a dynamic and interactive
process in which the boundaries between watcher and watched are often indeterminate and where, despite inequalities of power,
subordinates are able to contest and challenge gatekeepers, order enforcers, and other formal authorities. Acknowledging
this
duality allows the researcher to venture beyond the empirically obvious, challenge excessively
authoritarian accounts, and, most importantly, advance a publicly engaged brand of scholarship
that explores surveillances empowering potential. Examining the collective actions and cultural
framings of border activists provides a window into the uses of surveillance in constructing
counter-geographies of hope, and promoting a more inclusive and egalitarian social order. Though I
have noted various limitations in these groups strategiesincluding Humane Borders reluctant cooperation with the Border Patrol
and DHS, and the ACLUs neutral monitoring of authority or ideational frameworks based on grammars of privacy and liberal
individualismI do not mean to imply that activists should dispense with their practices. Their efforts are best conceived as
complementary approaches and components of a multi-pronged challenge to the emergent homeland security state. Using
surveillance to assist migrants and monitor authority is unlikely to bring a halt to the tragic border crisis but they are certainly stops in
the right direction. In opposing the criminalization and securitization of migration activists face daunting and seemingly
insurmountable obstacles, but, as Weber (1946, 128) reminded us, All historical experience confirms... that man [sic] would not have
attained the possible unless time and again he had reached out for the impossible.
LinkInternet Freedom
The US is historically hypocritical on issues of internet freedomeven if they
champion it within the states, they wont stop selling cyber programs to other
countries
[Cary, writer for online news source RT and director and editor of
the Wikileaks documentary. Gayane, writer for online news source RT. Good freedom, bad freedom: Irony of cybersecurity. RT.
http://www.rt.com/usa/usa-internet-cybersecurity-cispa-299/]
US lawmakers are having another go at regulating the Internet, despite the recent embarrassing climbdown, when public outrage saw
anti-piracy plans shelved. With a new cybersecurity bill, CISPA, activists fear their nightmares may now be realized. The
US
government continues spending millions of dollars to support freedom of the Internet around the
world. But is it freedom for all? The whistleblower website WikiLeaks, which to many has
become the symbol of Internet freedom, has been under fire from US officials and lawmakers .
Because WikiLeaks published documents which embarrassed the American government in many ways, WikiLeaks becomes the
enemy, a former employee of the US State Department, Peter van Buren, told RT. The US has reportedly issued a secret indictment
against Julian Assange, the head of the website which leaked hundreds of thousands of documents, revealing embarrassing details
about the wars in Iraq and Afghanistan. Five major US financial institutions VISA, MasterCard, PayPal, Western Union and the
has embarked on an unprecedented campaign against whistleblowers. In this culture, where this administration is going after
whistleblowers in an unprecedented way, we all have an obligation to protect our sources, says Jeremy Scahill, an investigative
journalist. I myself, Im really nervous about the safety of some of the people that Ive talked to. As a national security journalist who
covers national security, Im talking all the time with people who are in the intelligence and the military community. While
trying to stifle inconvenient leaks at home, the US perceives the Internet and social networking
platforms as major tools for spreading democracy, and spends millions of dollars to help people in
the Middle East and China get around Internet-blocking firewalls . At the same time, ironically
enough, American companies provide Bahrain, Saudi Arabia and Kuwait with the technology to
effectively block websites. A lot of the tools of control that are used by the so-called repressive
governments are provided by American companies, Peter van Buren explains. The difference is that
corporations, for better or worse, talk about profit as their motivation. However, the American government talks about freedom and
democracy as its motivation, when in fact in many ways it seems to act in the opposite direction. Some argue that if left
uncontrolled, the export of surveillance and site-blocking tools by American companies could undermine Internet freedom in the same
way as arms exports undermine peace initiatives. And as
LinkFirst Amendment
The first amendment creates a bubble for socially acceptable activism that is
regulated by the neoliberal state agenda.
Fiss 91[Owen M. Fiss, Sterling Professor at Yale Law School., The Yale Law Journal, Vol. 100, No. 7 (May, 1991), pp.
2087-2106, The Yale Law Journal Company, Inc., http://www.jstor.org/stable/796816]
In recent years we have come to understand that the state does not act just as policeman, but also
as educator, employer, landlord, librarian, broadcaster, banker, and patron of the arts. The
twentieth century has witnessed an enormous growth of state power and , even more, a proliferation
of the ways in which this power has come to be exercised. In speaking of the rise of the activist
state in America, we refer not simply to the quantitative growth of state intervention, but more importantly to the changes in the
ways that the state has intervened: a movement from negative to affirmative modalities. This development
has been of considerable importance politically and socially and, at the same time, has created new
challenges for the First Amendment. Is it an infringement of freedom of speech for a public
library to exclude certain radical books? Or for a public school to offer a course on evolution but
not creationism? Or for a state-owned television station to promote the development of nuclear
power and not provide an opportunity for environmental groups to voice their opposition? In
grappling with these questions the Supreme Court has acknowledged that the First Amendment applies to
the affirmative as well as the negative modes of exercising state power, but it has encountered
great difficulty in specifying exactly how it applies. Stated in the most general terms, the question is
whether the Court should apply a double standard-should the Court be more lax in its review of these affirmative
exercises of power than it is when it reviews the enforcement of the criminal law? This is the question I wish to address, and to
do so I will focus on the constitutional and political controversy concerning Robert Mapplethorpe and the National Endowment for the
Arts (NEA). That controversy was spurred by a number of public statements by Senator Jesse 2. For
a consideration of the
various theories of the First Amendment, and the argument in favor of viewing the First
Amendment more as a protection of collective self-determination than of individual selfexpression, see
Fiss, Why the State?, 100 HARV. L. REV. 781 (1987). For a more recent examination of these issues, see Note, A Pluralistic Reading
of the First Amendment and Its Relation to Public Discourse, 99 YALE L.J. 925 (1990). This content downloaded from
128.83.206.115 on Wed, 29 Jul 2015 00:51:52 UTC All use subject to JSTOR Terms and Conditions 1991] State
Activism
2089 Helms of North Carolina objecting to the use of public funds to support the show. Although
it did not reach the Supreme Court, for more than a year the Mapplethorpe controversy was a
matter of national importance. It was in the newspapers almost on a daily basis, resulted in one
criminal prosecution, the appointment of a presidential commission and several rounds of
legislation, and raised complex issues that every modern democracy must confront in adjusting to
the changes in the way state power is exercised.
LinkEO 12333
All future restrictions on EO 12333 are vulnerable to existing loopholesmovement
to foreign surveillance.
Arnbak and Goldberg, 2014 [Axel, Berkman Center for Internet & Society, Harvard University, Cambridge. Sharon,
Computer Science Department, Boston University, Boston. Loopholes for Circumventing the Constitution: Warrantless Bulk
Surveillance on Americans by Collecting Network Traffic Abroad, Michigan Telecommunications and Technology Law Review, 317,
p 13]
The legal
loopholes we identified are exploitable, since the vagaries of Internet protocols can sometimes cause traffic sent
between two US endpoints to be routed abroad. Even when this is not the case, core Internet protocols like BGP and DNS
can be deliberately manipulated to ensure that traffic between US endpoints takes an unusual path
through a device located abroad. If the two main criteria are met, these interdependent legal and technical
loopholes enable largely-unrestrained surveillance on Americans communications. For instance, these
techniques can be used to collect, in bulk, all communications sent from an autonomous system like Boston University to a given IP
address block (with a BGP manipulation), or from an autonomous system to a particular domain like www.facebook.com (with a DNS
manipulation). In future work, we will consider additional technical loopholes, as well as legal and technical remedies that can address
the difficulties highlighted by our analysis. We will discuss why technical
RPKI can help combat these risks, but still are no panacea. Even encrypted traffic, for example, exposes \metadata" (including
who is communicating, the length of the communication, etc.); moreover, FISA and USSID 18 minimization procedures permit
retention and analysis of encrypted communications even if two communicants are known to be U.S. persons. Meanwhile, the RPKI
can limit the scope and impact of BGP manipulations, but does not completely eliminate them. Future work will also discuss possible
solutions in the legal and policy space, including a more comprehensive analysis of the USA Freedom Act; 21 on the face of it, the
proposed U.S.A. Freedom Act and 4th Amendment case- law
executive branch because the U.S. Constitution grants it wide national security authorities to protect the nation against threats
overseas. The implications for long term reform are real: even if the legislative or judiciary branches of
Government address the loopholes in the Patriot Act and FISA, the U.S. Constitution emerges as a
significant obstacle to the long term reform of EO 12333 . We have argued that consolidation of the loopholes in
EO 12333 within the Executive branch could leave Americans' Internet traffic as vulnerable to surveillance, and as unprotected by
U.S. law, as the traffic of foreigners. Going forward, without a fundamental reconsideration of the lack of privacy and due process
safeguards for non-U.S. persons, U.S.
LinkCell Phones
Camera Phones are a critical site of counter surveillance, which empowers
individuals in significant ways.
Chen 2007 [Judy, PhD University of California Irvine in Information and Computer Sciences. Over and Under Surveillance,
Position paper for the CHI 2007 Workshop Imaging the City, Irvine, CA]
Counter-surveillance is a reaction to the tension between those being watched and those doing the
watching. It is a form of activism that often involves the intentional misuse of surveillance
technologies to publicize the prevalence of surveillance in society [6]. Counter-surveillance can
also be as simple as surveilling the surveillants themselves. Surveilling Ourselves An emerging
technology that is democratizing surveillance is the camera phone. Tiny cameras embedded into
cell phones and wireless infrastructures equip the everyday consumer with a cheap, portable
surveillance device. While camera phones are mostly used for recreational purposes, recent reports have
documented the use of camera phones for technological vigilantism . In 2003, an alleged act of racism by
police was captured by a camera phone. A police car with a stuffed gorilla attached to the front of the car was parked outside a
restaurant in Portland, Oregon. Coincidentally, the population of the restaurant at the time was primarily African American. Several
restaurant-goers saw the vehicle and took photos with their cell phones [3]. There have been other reports of victims using cell phones
to capture the faces and license plates of their attackers. The
Internal LinkStatism
State power is barreling towards complete control of everyday life with the
hegemonic use of surveillance. Without challenge, surveillance is used to maintain
power over others.
Ganascia 2010 [Jean-Gabriel, Prof. of Comp. Science @ Paris VI Univ., The Generalized Sousveillance Society, Social
Science Information 49:3]
The spectre of Nineteen eighty-four (Orwell, 1949) still haunts the contem- porary world. With webcams,
RFID tags and many other recent information technologies, it now becomes possible to record continuously
anybodys daily activities (Bailey & Kerr, 2007). As soon as it is switched on, the mobile phone makes it easy to identify and
localize its owner. Location- Based Services (Joore, 2008), which have been perceived as an incredible contribution to individual
empowerment, allow for continuous tracking of any movement. With remote-sensing techniques, it is now possible to track people as
they change places, even when they decide to resign from public life to cultivate their garden. In
must now
come to grips with being under the microscope of the public eye, where the ability to deceive the
population can no longer be taken for granted. Yet at the same time , and somewhat paradoxically,
sovereignty has also been closed down, where states attempt to manage increasing information
flows and the probing that comes with such accessibility by amplifying authoritarian responses
such as shutting down websites and cutting off access to revenue in an attempt to curb the flow of
knowledge. It is our contention that the significance of Wikileaks is that it brings emergent geopolitical issues into sharp relief,
which requires some reflection on what this all means in relation to the current geopolitical order and its potential transformation as a
result of the probable emergence of multiple Wikileaks-style operations in the future. Will sovereign authority be able to respond fast
enough to the changing field of power and find new modes of adaptation to maintain its monopoly on legitimacy, or will it ultimately
collapse beneath the its own weight as more and more light is shed on the misdeeds and abuse that seem to come concomitant to
sovereign rule? We do not presume an answer to this question, as the future is not yet writ- ten. We also want to be careful not to reify
positions here either, as our interpretation of sovereignty is, following Foucault, circuitous, meaning that it flows from and between
people and states in a protean and reciprocat- ing exchange. 3 So the question is not so much a binary case of the people versus the
state, as it is a taking stock of the role, meaning, and place of sovereignty in an age of increasing digital connectivity. Increasing
knowl- edge and awareness for the actions of states transforms the way sovereignty is operationalised in any given context. As public
political will begins to shift on the basis of newly acquired information, so too does the orientation of sovereign power. In an effort to
initiate different kinds of interrogations concerning the present and future of geopolitical configurations of power, we propose a series
of five discussion points that we feel are worthy of engagement, debate, and further reflection by human geographers:
ImpactStatism
[1NC Evidence] State power has grown so big that it now uses technology to
maintain a constant state of emergency which justifies endless wars, military
growth, and structural violence. The impact is even more unregulated domestic
surveillance, which turns the case.
Steinmetz 2003 (George, Prof. of Sociology @ Univ. of Michigan, The State of Emergency and the Revival of American
Imperialism: Toward an Authoritarian Post-Fordism, Public Culture 15:2)
The
current state of emergency, the threat of terrorism, is constructed as a specifically political
crisis, a shaken sense of political sovereignty. This massive campaign to recentralize power began, somewhat
The manifest regulatory changes over the past year have focused primarily on the structure and role of the (U.S.) state.
ironically, just at the moment when globalization theorists (including Hardt and Negri) were reaching a consensus that the state was
being overshad- owed by transnational, regional, and local organizations. The
The bridge has already been crossed and we now live in a surveillance state that is
literally ubiquitous. This makes communication impossible and establishes a
framework for complete social control and a mechanism for eliminating those who
resist.
Greenwald 2012 [Glenn, Journalist, lawyer & Author, Surveillance State Evils, Salon.com, April 21]
At the time of the Church Committee, it was the FBI that conducted most domestic surveillance. Since its inception, the NSA was
strictly barred from spying on American citizens or on American soil. That prohibition was centrally ingrained in the mindset of the
agency. Church issued that above-quoted warning out of fear that, one day, the NSAs massive, unparalleled surveillance capabilities
would be directed inward, at the American people. Until the Church Committees investigation, most Americans, including its highest
elected officials, knew almost nothing about the NSA (it was referred to as No Such Agency by its employees). As James Bamford
wrote about Churchs reaction to his own findings about the NSAs capabilities, he came away stunned. At the time, Church also
said: I dont want to see this country ever go across the bridge. I know the
AlternativeCounter Surveillance
[1NC Evidence] Counter surveillance is subversive because it constitutes a countercultural movement intended to challenge economic and political power.
Fitzpatrick 2010 [Tony, Univ. of Nottingham UK, Critical Theory , Information Society and Surveillance Technologies,
Information, Communication and Society 5:3]
Organized acts by individuals are here termed subversive. Hacking
example of subversion
can be found in the kind of counter- surveillance that some individuals pursue against the
surveillance apparatus; this can mean filming the police who film demonstrations or it can mean
using data protection legislation to expose corporate misdemeanours. At its best, then, subversion
can constitute a counter-cultural movement that, like their predecessors in the 1960s, is not anti-capitalist per se but
does represent a form of resistance against powerful corporations and state agencies. To be subversive, then, hacking et al.
must not be done for its own sake (still less for personal gain) but in order to undermine the information
systems of economic and political power. Subversion can occur both outside the law but also
within it, by exploiting ambivalences within the law and/or by encouraging the legal apparatus to catch up with
developments in ICT, a time lag that governments and corporations are often able to exploit for undesirable ends. Organized acts by
groups can be termed rebellious. For instance, many businesses have found their websites subjected to denial of service attacks,
effectively putting much of that company out of operation for signifcant periods of time of course such attacks can also be the result
of individual grudges against the company in question, or even of random and capricious malevolence. How- ever, the
most
famous example of rebellion remains the Zapatista movements successful and continued
mobilization of world opinion against the attempt by the Mexican government to deprive them of
their land rights (Castells 1997: 7283). In addition, we might also consider the kind of opposition, mentioned in the above
discussion of RIPA, to legislation that threatens civil liberties. The USA has been an important source of
opposition to other attempts at over-regulating cyberspace (Jordan 1999). Acts of resistance, therefore,
consist of material and/or discursive actions that disclose social alternatives by attempting to open
what economic and political powers attempt to close: the heterotopic spaces of autonomy that are
the source of alternative visions of individuality and society (Foucault 1986) but which risk being
silenced by informatic capitalism in its attempt to reduce human diversity to digital bytes and data
streams. Resistance is always a strategy that positions itself against the hegemony of the
dominant nodes of money and power that are embedded in sites of work and consumption (see
above). An act of resistance therefore requires sites of resistance: the sites are the sine qua non of
the acts that simultaneously confirm and destabilize the condition of their existence. A site of
resistance is both materially and culturally transformed by the acts of resistance to which it gives
rise. A site makes an act possible and an act is the means by which we become aware of a sites
transformative potential. Therefore, a site must facilitate an ideological orientation , i.e. a critique of
existing power and its alternatives.
AlternativeParrhesiatic Sousveillance
The alternative is sousveillance. Technologies of surveillance can be used to reveal
hidden aspects of the surveillance state and foster resistance. Activists can reverse
the conduits of state power.
Verde Garrido 15 [Miguelangel, Berlin Forum on Global Politics, Germany. Contesting a Biopolitics of Information and
Communications: The Importance of Truth and Sousveillance After Snowden, Surveillance and Society Vol. 13 No. 2]
The previous section explained that global mass surveillance is a state and/or corporate deployment of a biopolitical technology of
power that regulates the biosociological processes of information and communication. It also explained that the contestation of state
and corporate control over the regime of truth is even more important when we consider that their policies and practices extend not
only to ICT infrastructure, networks, and content, but also to entire citizenries and global consumer markets. The notion of
parrhesia, Foucault clarifies, involves courageously speaking the whole truth without reserves, despite
the fact that it may place the speaker at risk of violence at the hands of the authority that is
contested (Foucault 2011: 6; 9; 11). The biopolitics of information and communications of states and corporations employ cuttingedge scientific and technological developments. These mechanisms of control are deployed so ICT data traces can be thoroughly
monitored and examined in order to govern populations more efficiently in accordance to electoral calculations, market imperatives,
and security concerns. In contemporary surveillance societies, parrhesiastic
trailblazing in the development of wearable computing, especially those devices that involve computational photography. From the
standpoint of this technico-conceptual crossroad, Mann posits an understanding of surveillance that, although commonly used to refer
literally to visual signals, also covers other sensory signals and observational data in general (Mann and Ali 2013: 243).
Surveillance, for Mann, frequently exhibits the following traits: it is usually deployed from a fixed viewpoint, commonly architecturecentered, and attached to property; it establishes an oversight perspective, which watches from above; and, it is commonly initiated
by property owners and/or its custodians, such as governments (Mann 2004: 626-627). Contemporary developments in wearable
computing and ICT, such as social networking, distributed cloud-based computing, self-sensing, body-worn vision systems, wearable
cameras, and ego-centric vision (Mann 2014: 605), lead Mann to propose an alternative or counterpart to surveillance, which he
terms sousveillance. Sousveillance, for Mann, exhibits the following traits: it is usually deployed from a mobile viewpoint,
commonly human-centered, and worn by a person; it establishes
doing so [can and will] potentially drive social and political change (Mann and Ferenbok 2013: 24). The notion of
veillance that Murakami Wood considers could be helpful for certain Surveillance Studies research is the result of Manns
considerations on surveillance and sousveillance as counterparts. For Mann, these similar, but different, alternatives indicate that there
is a politically neutral watching or sensing that does not necessarily involve social hierarchy (Mann 2014: 605). For this reason, this
article shares the opinion that both of these conceptual understandings about the manners in which we monitor and store sensory
signals and observational data are vital to the study of privacy, security, and trust. They serve to illustrate that in contemporary society,
we seek to measure, sense, display, and visualize veillance, regardless of whether it is surveillance or sousveillance (ibid.). Mann
and Adnan Ali posit that veillance is a purposeful action that produces an artifact. Such
Technology can actually increase privacy, but not if we sleepwalk into new applications of it
without considering the implications of these new technologies . (Snowden 17th July 2014)
the success of any social justice movement, mobilizing a critical mass is key. New digital
tools facilitate solidarity by transcending previous boundaries and eliminating the need for
geographic proximity. Social movements have evolved according to the speed with which
information can be now communicated and converted into action. Education is an indispensable component
of activism. The more fully the two converge, the more advantageous for each. The integration of information, training, and action
enables engaged, transformative learning.
Moving forward with caution is imperative, and questions remain. Who are the educators and who is the audience? Informal HRE
often eliminates traditional differentiation between the role of instructor and learner. As definitions of the respective participants, and
other elements of the process, become more difficult to establish, so do evaluation processes. This raises the question: How should
successful education for human rights, and human rights activism, be defined? The breadth of work in this field necessitates flexible
evaluation standards. Clearly, human rights violations abound and the world is far from being free of abuse. Digital tools can play a
vital role in changing this prognosis. While working within formal education structures is important, achieving the objectives of the
WPHRE will require a much broader approach that extends the use of informal education methods. Education for human rights is, at
its core, all about human agency, and the belief that enough
agency that could converge to produce long-term subversive impacts. The tensions in the industrial system
can be grasped on a local basis from within, by individuals immediately engaged in technically mediated activities and able to
actualize ambivalent potentialities suppressed by the prevailing technological rationality (p. 105). This
promises the
possibility of rationalizing technology, and hence society, in ways that enhance democracy rather
than social control. Democratic rationalization proposes a new sort of agency, wherein members
of social groups engage reflexively and dialectically with the technical framework that helps
define and organize them (Heidegger, 1977), recognizing themselvesthe passive objects of
technologyas active subjects capable of redefining the technical order. In starting at the end
with the consequences of technologyit is possible to envision a new beginning.
Activists in the global justice movement (GJM) have embraced digital communication technologies
in their struggle against the ramifications of global capitalism . Indeed, the Internet has played an unprecedented
role in the way this movement has organized, mobilized, and disseminated information, enabling it to emerge as a globally networked
force for progressive social change1 Distinct
Similar benefits may also inspire tech activists in their design and development of the global justice movements digital infrastructure.
But there is no question as to their overarching motivation: technical
belong to a movement which strives for equal rights (not the written but the real ones) and conditions for all humans (and partially
other beings, too) on this planet.5 In turn, this
Alternative SolvencyPublics
Counter Surveillance changes the nature of political interventions and allows the
public to redefine social realities.
Feenberg 2012 [Andrew, Chair/Prof in Phil. Of Tech. @ Simon Fraser Univ. in Vancouver, Toward a Critical Theory of the
Internet, (Re)Inventing the Internet: Critical Case Studies, Feenberg & Frieson, Sense Publishers ISBN 978-94-6091-734-9]
In her chapter, Milberry discusses this problem as it has been addressed by the new tech activism. The
emergence of a
cohort of self-taught radical experts on the technology of the Internet opens up new possibilities .
Milberry examines how and why these tech activists appropriated wiki technology, using it as a space and
tool for democratic communication in cyberspace. In turn, this has enabled the realization of new
communicative practices offline, establishing a dialectical relation between technological experts
and the social world they serve. Democratic practice online prefigures a more just society in
which democratic interventions into the development and use of technology are consciously
organized. The chapters of this book show how online communities have begun to use the Internet to coordinate their demands for
a fuller representation of participant interests. Despite discouraging developments in other domains, agency in the technical sphere is
on the rise. New
Counter Surveillance tools promote public debate about the ethical dimensions of
surveillance and allow individuals to avoid monitoring.
Monahan 2006 [Torin, Prof. @ UNC Chapel Hill, Counter Surveillance as Political Intervention? Social Semiotics 16:4]
Such iSee applications are now available for the cities of New York in the USA, Amsterdam in The Netherlands, and Ljubljana in
Slovenia. The
aim of these websites is neither to directly interfere with the surveillance apparatus in these
cities, nor is it to allow individuals to effectively circumvent monitoring, although that is the
immediate and practical outcome. Instead, the goal is to raise public awareness and foster public
debate over the prevalence of surveillance cameras and their effects on public life. Because
technological infrastructures become invisible when they are functional (Bowker and Star 1999), and the
political effects of technologies, more generally, are off the radar screen of most people (Winner
1986), the intervention of iSee renders visible the larger pattern of surveillance proliferation and calls
into question its purpose, agenda, and effects. The iSee intervention jolts viewers and users into
awareness; it invites inquiry into surveillance devices distributed throughout our lives; it opens up
a space for discussion about what kinds of surveillance are acceptable and what kinds are not.
Sate Power may be inevitable, but counter surveillance provides tactics for
resistance against larger institutions of power to create new meanings and
possibilities.
Monahan 2006 [Torin, Prof. @ UNC Chapel Hill, Counter Surveillance as Political Intervention? Social Semiotics 16:4]
When viewed from a distance, surveillance
has no
essence; it is simply operational. It is not an attribute but a relation: the power-relation is the set
of possible relations between forces, which passes through the dominated forces no less than
through the dominating . . . (Deleuze 1988, 27). Therefore, the metaphor of the panopticon (or all-seeing prison)
is not a static or transcendent statement of disciplinary power, but is instead a contingent and
situated articulation of modernity in a fluid field of production regimes (Foucault 1980; Deleuze 1992). In
explicit response to Foucaults work, Michel de Certeaus book The Practice of Everyday Life provides a point of departure for
thinking about the agency of individuals and groups within disciplinary power structures. For de Certeau (1984), the
practices of
the dominant dancer clearly would be strategic ones of building control structures to regulate the
activities of those in the field of power, whereas the practices of the defter dancer would be much
more tactical, poaching-off the existing structures to create new meanings and possibilities. The
two dancers may be in opposition, but that does not change the fact that they are engaged in a
reciprocal relationship and collective activity but*/importantly*/without comparable degrees of
power. It is this tense connection that is worth probing, even if there is never an embrace or a union, because after all the exchanges
of strategic structuring and tactical appropria- tion the dance has moved somewhere across the floor and created a pattern, or a logic,
or a world that was not there before.
Even if counter surveillance cant solve state power it creates a new democratic
discourse about privacy which leads to successful resistance movements.
Monahan 2006 [Torin, Prof. @ UNC Chapel Hill, Counter Surveillance as Political Intervention? Social Semiotics 16:4]
Even if this second conclusion is persuasive, however, it
Public access to information gathered through surveillance diffuses the power of the
state and eliminates bureaucratic control. The Zapatistas prove that digital counter
measures can shift power relations.
Samuel 2001 (Alexandra, PhD Cand. @ Harvard, Digital Disobedience: Hacktivism in Political Context, Paper for delivery
on the panel Internet as Agent of Change: Bridging Barriers to Cultural, Political and Activist Discourse, Annual Meeting of the
America Political Science Assn, SF, CA)
For some hackers, hacking has always had a political subtext . Steven Levy identified elements of a hacker ethic
among those early computer users who believed that essential lessons can be learned about [computer] systems about the world
from taking things apart, seeing how they work, and using this knowledge to create new and even more interesting things. (Levy
1984, p. 40) The
correlates of this world view were that all information should be free and that
the best way to promote this free exchange of information is to have an open system....the last
thing you want is bureaucracy. (Levy 1984, p. 41) The hacker slogan information wants to be free ,
coined by Steward Brand (Sirius 2000), expresses a philosophical position that can justify invading any
secure web site in order to liberate information. But it was not until 1998 that hacking emerged
as a full-blown form of political action. Following the 1987 massacre of indigenous Mexicans in
Chiapas, a US-based group calling itself the Electronic Disturbance Theater (EDT) decided to take
action in support of the Zapatistas. The EDT developed a software program it called FloodNet, whose technical purpose
was to flood Mexican government web sites until the overload crashed the servers. Its larger purpose was to effect a
simulated threat, (Wray 1999, p. 5) drawing attention to the Zapatista cause. The FloodNet incident has since
been enshrined as the first instance of what is now known as hacktivism.
Alternative SolvencyPolicing
Discourses of counter surveillance break down distinctions regarding authority and
power while the technology itself provides a framework for resistance and
empowerment.
Wilson & Serisier 2010 (Dean and Tanya, Prof. @ Monash Univ. Australia & Prof. @ U. of Sydney, Video Activism and
the Ambiguities of Counter Surveillance, Surveillance and Society 8:2)
Clear distinctions between the watcher and watched are therefore increasingly undermined by the
rhizomatic intertwining and intersecting of networks of observation . As Koskela (2009) notes,
unambiguous distinctions between good and bad are breaking down making divisions between
the authorities and public, outsiders and insiders and the controlled and controlling less apparent .
Additionally, as Marx observes, there is greater equality in access to and use of surveillance technologies
today than in much of recorded history (2003, 384) and this access opens up possibilities not only
for resistance but also for more active empowerment. Moreover, with the widespread availability of mobilephone cameras and internet distribution platforms policing, traditionally a low-visibility activity, has never
been more transparent (Manning 2008, 227; Goldsmith 2010). The democratization and diffusion of imaging
technologies, and the scrutiny of official conduct they enable, has been enough in Koskelas view to
make the old story about the good police officers chasing evil criminals sound like a nave
fairy tale (2009, 151). The potential of counter-surveillance to create a transparent utopia of official accountability does however
need to be tempered against empirical study of particular contexts. Scholars need to be wary of merely mirroring the technophilia of
more powerful agents of surveillance in their assessments of utilizations of imaging technology from below, no matter how laudable
their aims. Any
surveillance activity enters a dynamic environment and will inevitably impact upon
that environment (Marx 2007a), sometimes in ways considered positive but also in other ways that are unforseen, ambiguous or
negative. In this study we utilize data drawn from seventeen semi-structured interviews, most with individuals involved in video
activism, but some also with citizen journalists and community lawyers with experience in using visual images of official
misconduct. Interview participants were recruited via a combination of direct contact through public websites, advertisements placed
on independent media electronic lists and snowball sampling. Semi-structured interviews were chosen as they permitted participants
considerable opportunity to elaborate and expand on issues they considered of importance within the context of thematic questions
devised by the researchers (cf. May 2001, 123-124). All participants were offered the option of anonymity, however all chose to be
indentified and consequently have been named throughout this paper.2 While the views and observations of participants have been
faithfully recorded, the final conclusions drawn are solely those of the authors.
Surveyors, too, through their power to disrupt the system and their knowledge of its practice and use, are uniquely
equipped to resist in cases where the combined effects of their relationship with the surveillance
authority and the target population motivate them. They can bypass systems and educate the public to bypass
systems. Again, the desire to resist and the means available are not simply a function of their
subordinate station. Certain roles connote certain resistance pathways. These pathways are many
and thus the cast in any given production of resisting surveillance is broad and dynamic. These roles
are also level- dependent. Actors exist on a bounded level of analysis that allows them to mediate relations between other actors at
surrounding levels. For example, surveyors, who operate between individual and state levels, acquire likely resistance directions from
the level of analysis on which they reside. Surveillance
Emanating from the position that roles condition means , we find instead that different actors are more
likely to resist at certain stages than others, using their unique role based means to do so. The
surveilled population, since their resistance options are limited by that role, do not and cannot resist surveillance in its earliest stages.
Corporate actors, who work with government to build and implement technologies, for example, can resist earlier. At this point,
technologies, too, can begin to resist. They do so primarily by being ill-equipped to fulfil a desired function or by being too expensive
for mass implementation. Non-compliance and sabotage by surveilled peoples, Balls methods of resisting or confusing encoding
technologies, these can only happen at a certain stage of the surveillance development because these actors are either uninvolved or
are unequipped to resist at other stages.
Alternative SolvencyCapitalism
Counter surveillance operates in opposition to global capital
Monahan 6 [Torin, Professor of Communication Studies at The University of North Carolina at Chapel Hill, SOCIAL
SEMIOTICS No. 4 Vol. 16]
tend to individualize both surveillance problems and methods of resistance, leaving the
institutions, policies, and cultural assumptions that support public surveillance relatively insulated
from attack. Furthermore, while the oppositional framing presented by activists (i.e. countersurveillance versus surveillance) may challenge the status quo and raise public awareness, it also
introduces the danger of unintentionally reinforcing the systems of social control that activists
seek to undermine.
role of critical theory and of its cousin, cyber criticalism, is therefore twofold. Firstly, to carve out theoretical
spaces that, for too long, have been occupied by post-ideological schools of thought . This article
demonstrated how this can be, and has been, done with respect to information society debates. Secondly, to identify actions
and practices that offer resistance to the new economic, social, political and technological
orthodoxies, refusing to characterize them in pathological terms as in any way related to crime.
This can imply any number of things, as we saw earlier when discussing acts of resistance: encour- aging the non-use
or misuse of surveillance technologies, rejecting the gee whiz determinism of technophiles,
questioning the integration of databases, assisting those protest movements who imagine social
alternatives, decriminalizing the body through non-compliance with biometric innovation and
legislation. It means doing what we are not supposed to do. It means becoming information
vandals, rioters, subversives and rebels, albeit ones who seek the sites of resistance which , I have
argued, lie always around us.
Capitalist values only make it seem like technology is a tool of the rich and
powerful. In reality, user interventions in technical code can change the meaning of
surveillance technology to resist and destroy capitalist ideology.
Milberry 2012 (Kate, Faculty of Info @ Univ. of Toronto, Hacking for Social Justice: The Politics of Prefigurative
Technology, (Re)Inventing the Internet: Critical Case Studies, Feenberg & Frieson, Sense Publishers ISBN 978-94-6091-734-9)
In western neoliberalism, the dominant norms and values are those of capitalism : exclusivity, profit,
competition, scarcity, individualism and inequality comprise an array of unexamined cultural assumptions that directly reflect
the dominant social order. Because such values - products of the prevailing economic and social interests - are
literally designed into the technology itself (p. 87), they appear as a technical requirement. This,
however, is nothing but ideological sleight of hand; when the technological design process is
historicized, the social origins of the technical code are made apparent. Technology, on this account, can
never be neutral; rather it tends to reinforce and reproduce prevailing socio-economic power structures. The concept of the
technical code is important as an alternative to the notion of technological imperatives . This latter
holds that technological development is evolutionary and inevitable, and that it must, in teleological fashion, be accepted as a desirable
social advance, albeit one out of human control. In sharp contrast, conceiving
of technological development in
terms of the technical code brings to light both technologys contingent nature and the
concomitant potential for human agency. This contingency reveals an opening in the design
process for what Feenberg (2002) calls democratic rationalization of technology. Democratic
rationalizations challenge harmful consequences, undemocratic power structures, and barriers to
communication rooted in technological design (p. 16). In other words, democratic rationalization is the
means by those most affected by technology usersgain some agency in its creation. User
interventions at the levels of use and design can alter technical codes, and reinterpret the social
meaning of technologies. Since a variety of technical solutions could potentially fulfill various social objectives, a
progressive process of technical change that is responsive to a broad range of human concerns is a possible outcome.
AT: FrameworkEducation
Resistance is key to education, which in turn strengthens resistance
Martin et al 9 [Aaron, London School of Economics and Political Science, UK. Rosamunde E. van Brakel,
University of Sheffield, UK. Daniel J. Bernhard, London School of Economics and Political Science, UK.
Understanding resistance to digital surveillance, Surveillance & Society]
From the 1960s onwards, education studies, led by Paolo Freire, has produced an abundance of resistance literature, known as the
pedagogy of freedom. In addition to a discussion of Freires pedagogy of freedom, we look at some more recent publications on
resistance pedagogy, where Foucaults influence can be discerned. Freires Pedagogy of the Oppressed (1970) has heavily influenced
the conception of resistance in education studies. Reproductive accounts of schooling underlined that schools could not derail the
reproduction of the oppressive social class relations inherent to capitalism (McFadden 1995, 295). For Freire, no
form of
education is neutral. He proposes that student-centred pedagogy can create a critical
consciousness capable of facilitating action in pursuit of equality and democracy. Resistance is
therefore integral to the educational process, as all pedagogy is a call to action. Educational
theorists depict resistance through nuanced theoretical tools for intervening within structures of power in diverse contexts across a
range of institutional and ideological conditions. Beyond describing models of oppression, they point to the possibility of
intervening productively in educational settings that are continually subject to manipulation by
external authorities (Giroux 2003, 9). Education has the power to progressively transform the
environment by attempting to undermine the reproduction of oppressive social structures and
social relations" (Walker 1985, 65). Freires proposition and contributions by Walker and Giroux raise some very interesting
levels of analysis questions. How is it that a tightly-controlled relationship can cultivate a critical consciousness with regards to
macro-societal levels of organisation that do not apply at the smaller unit level? That the referent object of resistance can change
across levels of analysis authority at one level is acceptable while control at higher levels of organisation is not requires further
attention. Resistance can be understood as a multi-layered phenomenon that not only takes diverse and complex forms among
students and teachers within schools but registers differently across contexts and levels of political struggle (Giroux 2003, 9). The
contexts include resistance to authority/oppression and resistance to change, but also Foucauldian self-(re)constitution, which provides
an effective form of resistance to normalization processes (Hyde 2007). That this resistance consciousness and the pedagogy of
freedom are themselves developed in a controlled environment speaks volumes about the validity of Freires claim. Though the
classroom provides a clear authority structure, if the authority is legitimate and just, it is resisted less.
AT: Permutation
Counter Surveillance must be accompanied by tactics and narratives to avoid
commodification the permutation fails because it supports counter surveillance as
a tactic but not an ideology of democratic deliberation and resistance.
Wilson & Serisier 2010 (Dean and Tanya, Prof. @ Monash Univ. Australia & Prof. @ U. of Sydney, Video Activism and
the Ambiguities of Counter Surveillance, Surveillance and Society 8:2)
Our assessment of video activism may appear bleak, but this has not been the intention. Rather, as Michael Crang cautioned over a
decade ago, simply cheering over empowerment and self-representation through video seems a little nave (1996, 2102). As a
practice, video activism is shot through at every juncture with ambiguities, contradictions and ironies. There
can be no doubt
that video counter- surveillance in protest situations can be empowering. It can secure safety,
modify the behaviour of control agents, generate broader discussion through the dissemination of
footage and provide a powerful bargaining tool in a variety of contexts. Nevertheless it is important to acknowledge
the multiple ambiguities. Counter-surveillance might also risk incriminating the less powerful. Moreover it might stimulate ever more
extreme counter-moves from those seeking to disarm counter-surveillance. Significantly counter-surveillance
exists in an
increasingly dispersed media landscape. Instead of the synopticon advanced by Mathiesen (1997) in which the many
watch the few, surveillance and counter- surveillance indicate a proliferation of watching in which the many watch the many, or
perhaps, more accurately, in which the few watch the few. While
initiatives such as
those of video activists are still positioned within substantial asymmetries of power, even if such
initiatives contain the capacity to destabilize the status-quo within certain contexts (Monahan 2010,
143). The production of images from video counter-surveillance is also increasingly absorbed within the rapid information flows of
new information technologies integral to the perpetuation of what Dean terms communicative capitalism (Dean 2008). There is the
possibility that the proliferation of outlets and of visual images erodes the very power counter-surveillance intends to have, nullifying
itself through the sheer volume of content. The problem is acute in relation to YouTube footage of police brutality, which rather than
contextualized images within broader debates about police power, reduces instances to micro- spectacles of individualized violence.
As Dean noted of anti-war messages circulating widely before the Iraq War, messages potentially morph into so much circulating
content, just like all the other cultural effluvia wafting through cyberia (2008, 102). The
Digital activism and counter surveillance are defined by their position outside
institutional politics. The perm allows institutional ideology into the alternative,
which destroys its revolutionary potential.
Samuel 2001 (Alexandra, PhD Cand. @ Harvard, Digital Disobedience: Hacktivism in Political Context, Paper for delivery
on the panel Internet as Agent of Change: Bridging Barriers to Cultural, Political and Activist Discourse, Annual Meeting of the
America Political Science Assn, SF, CA)
Second, hacktivists
are outside the world of institutionalized politics. This is crucial to the definition
of hacktivism as a social movement, since social movement theory has emerged out of studies of
revolutions, protests, and other non- institutionalized events...in contrast to more routine political
activities (Lo 1992, p. 225). Hacktivism conforms to the definition of social movements as unconventional collective behavior,
(Lo 1992, p. 225) i.e. behavior outside the routine political channels of voting, lobbying, campaigning,
and so on. Hacktivists are themselves very committed to the idea that hacktivism is outside of conventional politics, and is in fact a
challenge to conventional political practice. Hacktivists make a point of describing themselves as outside the system: there are
almost always proper outlets for any school of thought you may have, but chances are, no one who doesn't all ready agree with you
will ever see it[...] hence, politically motivated hacking (Me Uh K. 16 November 1999) Indeed, hacktivists
actively avoid
getting too close to the world of conventional politics: I'm also worried that when if we rub
shoulders too much with these government/industry ""infowarriors"", we start to
incorporate their ideology and agenda into our lives. If we focus our energies on creating
our alternative vision, eventually the folks at RAND and the Pentagon will become
irrelevant. The decentralized DIY nature of the Internet has already demonstrated for many people
that an alternative can exist. (Chuck0 1 October 1999) Since most hacktivism is not only outside the political system, but
also outside the legal system, hacktivism certainly shares the key social movement characteristic of being
an unconventional, uninstitutionalized form of political behavior.
Are counter-surveillance activities political interventions? Yes, they are clearly political. The central
question remains, however, as to which counter-surveillance configurations provide productive critiques
and interventions. Because counter-surveillance movements, in my definition of them, seek to correct unequal
distributions of power, they do destabilize status quo politics on a case- by-case basis*/on the ground, at
specific, temporally bounded sites of contestation. If our vantage point is once removed , however, then
individualized counter-surveillance efforts appear to provide the necessary provocations for those
with institutional power to diagnose and correct inefficiencies in their mechanisms of control . Even
if this second conclusion is persuasive, however, it should not imply that activists and counter-surveillance
practitioners should dispense with their interventionist projects, but instead that they should
diligently avoid reproducing the exclusionary logics and reactionary stances of those whom they
critique. For instance, high-tech interventions may attract public attention because of their innovative
use of technologies, but they can defy replication by others without comparable technical
capabilities or resources. Furthermore, focusing on individual agents of surveillance (such as store
clerks, security guards, camera operators, or police) artificially reduces the complexity of the
problem: many of these individuals are underpaid yet completely dependent upon their jobs, so
they might be easy targets, but not necessarily the best ones. The strength of social movements
lies in their inclusiveness and in their participatory structures (Breyman 2001; Juris 2004). So while these
attributes might signify areas of vulnerability for activists, they remain the magnets that draw
people into movements and mobilize them behind causes*/they are the qualities that need to be nourished for less
individualistic and more effective activism to take root.
AT: Backlash
Even if counter surveillance can be used by the state in some instances, the value of
covert observation and research outweighs because it makes it harder to lie to
corrupt tribunals.
Kemple & Huey 2005(Thomas and Laura, Dept. of Sociology @ UBC Vancouver & Dept. of Criminology @ Kwantlen
Univ. College, Observing the Observers: Researching Surveillance and Counter Surveillance on Skid Row, Surveillance and Society
3:2)
One answer to this question is that in
One of the biggest challenges national governments must face in the 21st Century is how to deal with the ever growing number of
cyber attacks. Cyber attacks started out as merely an occasional nuisance in the early days of the internet, but have increased
dramatically over the last decade in both number and severity of harm caused and will continue this trend for some time to come.
Many of these attacks are caused by cyber criminals and cyber terrorists who are out to cause harm for personal gain. However,
hacktivists have emerged as a distinct subset of all hackers and are likely to become a permanent
fixture of cyberspace. Policymakers must recognize hacktivists as a distinct subgroup with
different goals and tactics than other hackers if they are to effectively craft rules that address the
harms caused by cyber attacks while still preserving the internets democratizing influence . A recent
report has concluded that hacking activities cost the U.S. economy $100 billion dollars in economic damages and 500,000 lost jobs
every year.1 U.S. policymakers often use these big figures to scare the public into supporting comprehensive cybersecurity legislation.
However as many hacktivist activities are currently criminalized the smaller number of political
protest oriented cyber attacks are not distinguished in any way from the larger and more serious
cyber espionage and terrorism threats in these reports and are instead all lumped together as if they
all represent the same level of threat to cyber infrastructure. National policymakers need to understand that not all
cyber attacks are the same and need to be treated differently by the law. There are potentially as many
motivations for cyber attacks as attackers. Some attacks are classified as cyber crimes and are generally motivated by greed and the
profit motive. These attackers are primarily looking to make easy money and are not generally interested in causing damage to the
targeted site or making political statements. Another motivation for cyber attacks is espionage. For these attackers the primary purpose
is stealing information, whether it is national security secrets or corporate intellectual property. These attackers are not interested in
causing damage or making a public statement either. Their primary goal is to sneak into protected systems and conceal their
unauthorized access as much as possible in order to avoid detection and maximize the theft. And another category of cyber attackers
are those commonly known as hacktivists.. Hackers are unlike any of the other categories of cyber actors. Their motivations
are almost exclusively political and social change. They are not motivated by financial gain and
are not generally interested in wanton cyber destruction for its own sake. Their primary goal is to send as
public and symbolic message as possible in order to further their primary policy goals of free and open access to information and
opposition to Internet censorship. Therefore the law should treat them differently than the other types of cyber attackers. The
right
of a citizen to protest public policies that he disagrees with and advocate for political and social
change is part of the freedom of speech guaranteed to the American people as a fundamental
component of ordered liberty. American law has had to find space for traditional free speech protests that are
uncomfortable and socially disruptive. The United States, as a country dedicated to the concept of personal liberty, needs to expand its
free speech protections once again to encompass cyber actors.
AT: Distancing/Interpassivity
Information systems does not eliminate our subjectivity. We can use distancing to
interact with others at critical sites of resistance.
Fitzpatrick 2010 (Tony, Univ. of Nottingham UK, Critical Theory , Information Society and Surveillance Technologies,
Information, Communication and Society 5:3)
Yet, the body and the office are not merely sites of domination but sites, pace Foucault, of creative becoming. Workplace surveillance
reminds us that capital not only wants our labour it wants our souls, our ever-demonstrable commitment to the corporate ethic; bodily
surveillance at the level of consumption, or in what formally remain public spaces, reminds us that there are consequences (of social
exclusion and stigma) for those who do not conform to the persona of the law- abiding shopper. These reminders are also ways of
retrieving the desire for social alternatives: even
AT: Sousveillance
PermutationInstitutions Necessary
Combining legal reform and critical surveillance studies is necessary to make
meaningful political change.
Cohen 15 [Julie, professor at Georgetown University. Studying Law Studying Surveillance, Surveillance and Society. Vol. 13
Is. 1]
Relative to legal scholarship, work in Surveillance Studies is more likely to build from a solid foundation in
contemporary social theory. Even so, such work often reflects both an insufficient grasp of the complexity of the
legal system in action and lack of interest in the ways that legal and regulatory actors understand,
conduct, and contest surveillance. By this I dont mean to suggest that Surveillance Studies scholars need
law degrees, but only to point out what ought to be obvious but often isnt: legal processes are
social processes, too, and in overlooking these processes, Surveillance Studies scholars also engage in a
form of black-boxing that treats law as monolithic and surveillance and government as
interchangeable. Legal actors engage in a variety of discursive and normative strategies by which
institutions and resources are mobilized around surveillance, and understanding those strategies is
essential to the development of an archaeology of surveillance practices. Work in Surveillance
Studies also favors a type of theoretical jargon that can seem impenetrable and, more importantly,
unrewarding to those in law and policy communities. As Ive written elsewhere (Cohen 2012a: 29), [t]oo
many such works find power everywhere and hope nowhere, and seem to offer well-meaning
policy makers little more than a prescription for despair. Returning to the topics already discussed, let us
consider some ways in which Surveillance Studies might benefit from dialogue with law. Let us return first to the problem of digitallyenhanced surveillance by law enforcementthe problem of the high-resolution mosaic. As discussed in the section above, works by
Surveillance Studies scholars exploring issues of mobility and control offer profound insights into
the ways in which continual observation shapes spaces and subjectivitiesthe precise questions
about which, as we have already seen, judges and legal scholars alike are skeptical. Such works
reveal the extent to which pervasive surveillance of public spaces is emerging as a new and
powerful mode of ordering the public and social life of civil society. They offer rich food for thoughtbut
not for action. Networked surveillance is increasingly a fact of contemporary public life, and totalizing theories about its power dont
take us very far toward gaining regulatory traction on it. That enterprise is, moreover, essential even if it entails an inevitable quantum
of self-delusion. Acknowledgment of pervasive social shaping by networked surveillance need not preclude legal protection for
socially-shaped subjects, but that project requires attention to detail. To put the point a different way, the networked democratic society
and the totalitarian state may be points on a continuum rather than binary opposites, but the fact that the continuum exists is still worth
something. If so, one needs tools for assessment and differentiation that Surveillance Studies does not seem to provide. As an example
of this sort of approach within legal scholarship, consider a recent article by legal scholars Danielle Citron and David Gray (2013),
which proposes that courts and legislators undertake what they term a technology-centered approach to regulating surveillance. They
would have courts and legislators ask whether particular technologies facilitate total surveillance and, if so, act to put in place
comprehensive procedures for approving and overseeing their use. From a Surveillance Studies perspective, this approach lacks
theoretical purity because its technology-specific focus appears to ignore the fact that total surveillance also can emerge via the fusion
of data streams originating from various sources. But the proposal is pragmatic; it does not so much ignore that risk as bracket it while
pursuing the narrower goal of gaining a regulatory foothold within the data streams. And because it focuses on the data streams
themselves, it is administrable in a way that schemes based on linear timelines and artificial distinctions between different types of
surveillance are not. One can envision both courts and legislatures implementing the Citron and Gray proposal in a way that enables
far better oversight of what law enforcement is doing.
PermutationIntersectionality
For counter surveillance to be effective, it must include a flexible pedagogy that
evaluates contextual, relational and ethical dimensions of power.
Fernandez & Huey 2009 (Luis and Laura, Northern Arizona Univ. & Univ. of Western Ontario, Is Resistance Futile?
Thoughts on Resisting Surveillance, Surveillance and Society 6:3)
It is also important to understand the different types of actors who may engage in surveillance,
since the social and power location of the actor will inevitably impact the type of dynamic that
unfolds. We know from numerous studies that surveillance, as defined above, can originate from different locations. Rather
than categorize the different types of surveillance techniques , then, it is more useful to enumerate
the different types of actors who may engage in surveilling a subject . Surveillance can originate at several
different levels, as has been pointed out before. Some of the possible actors include the state, employers in various institutions (private
and public), corporations (collecting data on clients), or individual and interpersonal actors (such as spouses, lovers, neighbours, and
so on). Key to this crude typology is the implicit understanding that power
PermutationMiddle Ground
Understanding transparency and secrecy as antipodes is to reductive, rather we
should have a blending of the two.
Birchall 11 [Clare, professor of cultural studies at the University of Kent. Introduction to Secrecy and Transparency: The
Politics of Opacity and Openness, Theory, Culture & Socieity. Is. 7-8 Vol. 28]
To take this last area, Jacques Derridas work on the secret can help us think through the problems of a democracy committed to an
idea of total transparency. Transparency
cannot easily accommodate those who want to be exempt from its project,
those who want to remain not merely private, but singular (which Derrida equates with the secret when discussing the
limits of democracy [Derrida with Ferraris, 2001]). Because of this intolerance for singularity, transparency risks looking less like an
regime doesnt go far enough, if it shrinks back from applying transparency to its own actions, the regime meets the charge of
totalitarianism coming the other way (for acting covertly, autono- mously and without an explicit mandate).4 Hence an infinite
hesitation, a radical undecidability, within any democracy that counts transparency among its operating principles. Hence too the
prospect of a
debate between transparency and secrecy that will never be concluded, because far from
being inimical to each other, they are symbiotic.
This is why the stakes of that debate are so routinely misunderstood. Its not a question of reframing the supposed opposition between
transparency and secrecy in ever wider perspectives, because such reframing assumes that the terms can be made to yield to
interpretive mastery. (This introduction and the context it provides might not be immune to this charge.) Nor should we give in to the
fantasy that there is a beyond of transparency, a beyond of secrecy, or a beyond of their mutual dependence. The undecidability
might be unbearable, might tempt us to come down on the side of secrecy or on the side of transparency, yet the
more
intelligent response is not to seek to resolve the tension so much as to inhabit it strategically. Just as
Derrida has analysed the Nietzschean and Freudian Jenseits, and the intractable logic of the pas au-dela' , so we need to find different ways of staying with the aporia of transparency-as-secrecy.
The same goes for secrecy-as-transparency. The aporia becomes clear if we restate the condition of the democratic subject outlined
above. Without
a right to secrecy, the subject in a democracy ^ a liberal democracy commit- ted to transparency ^
will find herself deprived of that which confers her singularity upon her, where the singularity of the subject
constitutes democ- racys primary unit. And yet the subject who, in her singularity, regards her right to secrecy as absolute ^ as she
should, as she must ^ will thereby jeopardize her right to belong to the social bond construed now as the democracy of individual
subjects rather than the democracy of individual subjects. The right to be counted among democracys subjects involves a minimal
coming into the transparent light of that social bond, even as every step towards it marks a step away from the singularity, the singular
possession of the singular secret, that licensed that very movement. The
No Alternative Solvency
Counter Surveillance does not remove individuals from the gaze of the state and
ultimately expands state power.
Monahan 2006 (Torin, Prof. @ UNC Chapel Hill, Counter Surveillance as Political Intervention? Social Semiotics 16:4)
While each of the four counter-surveillance interventions covered so far seeks to raise public awareness and to
mobilize for social change, none of them are completely successful at moving their critique from
the individual to the institutional plane. The SCP come closest to doing this, but so far their plays remain too isolated
and discrete to effect long-term change. This deficiency may be in part because activists construct
surveillance problems in individualized and abstracted terms in order to make them somewhat
tractable and receptive to intervention. The challenge lies in ratcheting-up the unit of analysis to
the institutional level so that lasting change can be effected. The desired outcomes might take the form of better
regulation and oversight of surveillance and/or meaningful democratic participation in the process of setting surveillance policies, for
instance. In
the long run, as the next section will argue, the oppositional framing of surveillance versus
counter-surveillance may be counter- productive for achieving these goals.
We can never be sure that counter surveillance will actually stop larger structures of
power or global capitalism.
Monahan 2006 (Torin, Prof. @ UNC Chapel Hill, Counter Surveillance as Political Intervention? Social Semiotics 16:4)
I would build upon these observations to say that the conflicts
serve as asymmetrical refractions of each other in emerging global regimes. Surveillance and
counter-surveillance are two sets of overlapping practices selectively mobilized by many parties
in this conflict, but the overall effect is unknown.
Counter measures can spiral into a surveillance arms race which overwhelms action
or discussion on any issue neutralizing political effectiveness.
Wilson & Serisier 2010 (Dean and Tanya, Prof. @ Monash Univ. Australia & Prof. @ U. of Sydney, Video Activism and
the Ambiguities of Counter Surveillance, Surveillance and Society 8:2)
The
constant interplay of move and counter-move between police and video activists activates
ascending spirals of surveillance and counter-surveillance , what Marx has termed a surveillance arms
race (2007b, 299). Thus while the safety of protestors and the witnessing and documenting of misconduct remain powerful drivers
of video activism, an increasingly frequent rationale of video activism is to counter the escalating visual surveillance of protest events
undertaken by police. One video activist remarked: I think it is [video] important as well to counter the incredible levels of
surveillance that police put on protests. They have really sophisticated surveillance on protests, like camera positioned in key strategic
areas and telephoto lenses with small digital cameras right on hot spots. So we need to have our cameras there as well because you see
in cases which have happened in the past evidence the police collect, somehow all of the footage of events which incriminate the
police go missing while all the evidence that might incriminate protestors of certain things comes to light (McEwan interview). This
transformation also appears to accompany a diminishing of the power of the image in relation to protests. As one video activist with
fifteen years experience videoing protests remarked at one point it was very powerful to have even just a portable camera there, that
was the new thing...eventually they realised it was better to just have their own cameras there, so I gradually saw the collaboration of
more and more police cameras (Jacobs interview). Situations
Counter-surveillance will fail to hold the state accountable within the current social
order legislative instruments only restrict dissent and images are recontextualized
in favor of the state
Wilson and Serisier, 10 [Dean, Monash University. Tanya, University of Sydney. Video Activism and the Ambiguities
of Counter-Surveillance, Surveillance & Society 8(2). P 171-172]
In protest situations the law becomes an instrument mobilized by all parties to execute moves and countermoves. Peter Manning has
suggested that the law serves as a mystification device or canopy to cover selectively, legitimate, and rationalize police conduct
(1997, 94). In protest situations police regularly invoke the power of legal statute to rationalize blocking moves aimed at video activists.
Video activists have been threatened with several pieces of legislation that have been mobilized to curtail filming and threaten video
activists with the prospect of criminal proceedings. Dale Mills gives the following example: In New South Wales at least its an offence under
some circumstances to audio record a conversation without the other persons permission, and of course most video has audio on it, and so that has raised
the question as to whether for example if were recording a conversation between a protestor and a police officer, and neither of them know that theyre
being recorded has raised the question as to whether thats legal. On more than one occasion weve had police officers come up to us and say you need to
turn the video off now, because youre breaching the Surveillance Devices Act, thats a recording deviceand weve said but were not recording
anyone, and the police officer said well Im speaking to you and youre recording me (Mills interview). Another videographer was threatened with
prosecution under recent counterterrorism laws, and was informed that the facility he was videoing (a large power station) was categorized as key
infrastructure (McEwan interview). Such inventive redeployments of law equate with the soft-line social control outlined by Fernandez,
where a wide range of legislative instruments often diverted a significant distance from their intended purpose - are marshalled to
restrict dissent (2009, 90-91). Video activists also strategically engage the law, and the surveillance of police has significant evidentiary validation,
particularly as it may be utilized to file complaints against police misconduct. For Dale Mills, founder of Sydney Copwatch, the purpose of monitoring
police at protest actions is: essentially to do the job that the superior officers should be doing, and that is to make a complaint about police misbehaviour,
to highlight the question with police misbehaviour, and to offer the video as solid evidence. People can easily challenge oral evidence, a bit more difficult
to challenge photographic evidence but video is very good (Mills interview). However, there was a consensus amongst all participants that, at
least in the current regulatory system, complaints against police behaviour at protests were highly unlikely to succeed irrespective of
the presence of video footage. It was suggested that there is a lack of accountability because the police investigate themselves, and
the Ombudsmans Office endorse whatever the police do (Mills interview). The possibility of seeking official redress is limited in a
number of ways. Masking moves (Marx 2003) may foreclose the usefulness of footage for official exposure of police misconduct. Complaints to the
New South Wales Ombudsman, for example, have been returned on the basis that without a name or number it is impossible to ascertain the police
involved. As police frequently refuse to give their name on request and just as frequently fail to wear identifying badges in protest situations they are
capable of neutralizing the official visibility of the activists camera.4 Moreover, such images are inserted and recontextualized in official
contexts within which police interpretations occupy a privileged, though not unassailable, position. Surveillance images are always
subject to interpretation, and in the domain of official inquiry and legal proceedings police are positioned to supply the official
definition of the situation (Doyle 2006, 211). The structural space of those undertaking surveillance is therefore of considerable
consequence, as it is not inevitably coupled with the power of interpretation. This perhaps explains the pervasive cynicism based on
experience expressed by all participants regarding the capacity of counter-surveillance to render police officially accountable.
Sousveillances dependence on accessing mainstream media empties countersurveillance of its radical political content
Wilson and Serisier, 10 [Dean, Monash University. Tanya, University of Sydney. Video Activism and the Ambiguities
of Counter-Surveillance, Surveillance & Society 8(2). P 174]
Nevertheless if accessing the mainstream media remains a holy grail of video activism, those interviewed were acutely aware that there was
always the potential for it to become a poisoned chalice. Attitudes towards the mainstream media thus remain deeply ambivalent. One
videographer, for example, questioned the continued salience of the Rodney King video as a foundational motif of video activism, suggesting it was a
mistake totake the Rodney King example, of like this spectacular video equals this social outcome. I think those really spectacular videos are definitely
the exception (Lowenthal interview). Such comments indicate the limitations of feeding footage into mainstream media . As Lawrence (2000)
suggests such media penetration requires a particular constellation of dynamics. Moreover while witness video may be of interest to mainstream media,
particularly where it is seen to coalesce with newsworthy priorities of policing organizational deviance (Ericson, Baranek and Chan 1987), the images
are constrained within mainstream media framing. The demands of newsworthiness can decontextualize footage or lead to it being
freighted with meanings that distort the original intentions of those filming. Videographer Andrew Lowenthal suggested footage of police
violence could accumulate diverse meanings, dependent upon media framing and audience positions. He noted that obviously some people would be like
Oh give that hippie a good whacking, thats what they need and then other people might be thats beyond the bounds of what police powers should be,
and it should be limited(Lowenthal interview). Additionally, the broadcast of police violence can also stimulate internal disorganization in
protest movements. Lowenthal also recollected one incident where footage was broadcast of police brutality that far from solidifying the organization
of protest, had a chilling effect leading some within the protest movement to conclude oh my god these people [police] are really, really violent and Im
afraid of them. I dont want to go out and protest, and in some ways thats actually what the police were saying as well (Lowenthal interview). The
intense interest of the mainstream media in conflict and violence in covering protest events has been well documented (Waddington
1992). Earlier studies of media coverage of protest emphasized ideological framing in which the police are assumed to be in the right, capable only of
restrained reaction to provocation (Waddington 1992, 178). While contemporary media ecology renders coverage considerably more
multifaceted and conditional (Cottle 2008), our interview participants nevertheless felt substantial pressure to offer up visual images of
violence if they wanted to access major media outlets. As a videographer involved in an environmental protest action reported they [the media]
were only really interested in the footage which involved conflicts and specifically conflict with the police thats all they were asking for. And that
wasnt something we really wanted to highlight (McEwan interview). Such pressure can create internal contradictions for videographers,
where they find themselves concurrently trying to prevent violence through observation while also aspiring to capture it. As one video
activist remarked so youre there as a camera person to try and prevent biffo but you really want biffo to get it on telly (Davi interview). The hazard of
the mainstream medias preoccupation with violence was clearly articulated: there are two issues. Theres the issue around which the
protest and the activism is happening and then theres the issue of police accountability and often we capture stuff which shows police
behaving badly and the issue were trying to get attention for gets ignored for the police stuff (McEwan interview). Protest movements
have on occasion successfully articulated wider political issues through media strategies such as theatrical spectacle (Craig 2002;
Scalmer 2002), but such strategies are potentially undermined by a visual archive of violence that activates the time-worn media frame
of violent protest a media frame in which the substantive issue of protest is, in Murdocks phrase, emptied of its radical political
content (1981, 210).
up to actions and you realize that 50 percent of the people are actually there to film it, and then youve got this massively reducing
pool of people who are actually on the doing side of things. As Morriss comments make clear, the increasing access to portable video
technology such as mobile phones and digital cameras must be understood in relation to the corresponding increase in internet-related technology. In
particular the rise of YouTube has significantly impacted upon the practice of video activism. Launched in June 2005, YouTube offered a simple platform
for the uploading of video using standard browser software and providing URLs and HTML code that facilitated the embedding of links into other
websites (Burgess and Green 2009). For some activists the proliferation of user generated content has diminished the power of the image,
as one proposed the proliferation of media cheapens it, it means images are not so powerful or they have to be more full-on to grab
anyone (Davi interview). Such observations indeed recall Baudrillards argument that the explosion of information in a media-immersed
society presaged the erasure of meaning as he suggested information devours its own contentsinstead of causing communication,
it exhausts itself in the act of staging communication (1983, 97-98). The availability of open publishing has led some activists to question the
ongoing relevance of dedicated alternative media sites. For some the very idea of activist media seemed somewhat remote and even anachronistic in the
new media environment. Cameras are everywhere and everyone can post a video onlineI dont really see the need like I used to (Davi interview).
Also, because of the availability of technology and the capacity of anyone who has got a home computer (Davi interview) to do editing there is little
necessity for the kind of distinct organization that was present at G20 protests. Others who had been involved in video activism since the 1990s revealed
similar sentiments: I think that technology has changed a bit and I think that back then Indymedia was probably the only website that would allow for
open publishing, so open publishing was quite rare ten years ago, and Indymedia was actually a pioneer in that. Now with open publishing being
everywhere, I dont know that that model really works anymoreI think it feels a bit more disjointed and maybe theres something about power in
numbers. I dont know I feel that that video activist movement has waned a little bit (Prickett interview). As in the case of Morris, the inclination to
generate endless content without context was sharply criticized by some. For those wishing to move beyond witness video in order to
produce compelling narrative documentaries that contextualize events, the consequence has been an overwhelming cascade of low
quality soundbite footage that says little about the overall objectives and issues with which social movements aspire to engage. The
generation of profligate images is evident not only on YouTube but seeps into dedicated alternative media sites. As Marian Prickett, an independent
filmmaker and video activist, suggested and its not actually about telling a narrative or theres not a lot of thought given to artistry, its just Ive got to
capture this event now, but just an observation really, and its a shame because I think that those narratives can be really powerful (Prickett interview).
Robbie McEwan, a veteran videographer of numerous protests since the late 1990s, remarked the tendency, not just in the activists world but across
society now, is to produce video, publish it on the web and expect people to watch it and its a complete fantasy. So we actually need to make video that
presents our ideas and is good and engaging and satisfying to watchrather than just generating tons and tons and tons of stuff and having people
constantly reinventing the wheel and working in isolation (McEwan interview).
countermeasures are a function of the momentum of the surveillance system , as momentum dictates the
available resources a system has towards its interests. It is for this reason that any individual act of resistance is likely
to be easily countered by global surveillance systems individuals simply lack the ability to
confront and neutralise this momentum. Now consider Marxs typology in this light. His first method of resistance,
discovering and raising awareness, is irrelevant as the details of such surveillance systems are
already available, and public awareness is at an all time high. These programs still continue.
Methods such as refusing surveillance, explaining and con- testing surveillance, and co-operating with surveillance do not actively
seek to change the circumstances or vulnerabilities of the individual to data collection and are not of interest here. This leaves a set of
neutralisation techniques that focus on making changes to the indi- vidual's circumstances, including avoiding or breaking surveillance
devices, blocking access to personal data, distorting data capture, switching the captured data, and piggy backing onto ac - cepted or
unwatched objects or measures. These behaviours represent confrontational forms of resistance in that they directly challenge the
socio-material forms of order that allow surveil- lance to occur. All of these methods are possible for individuals. Personal data may be
encrypted to prevent access, and the Internet may be accessed through secure private net- works, or routed through services such as
TOR that disrupt monitoring (See TOR 2014). This achieves forms of blocking or masking. An individual may choose to enter false
data volun- tarily, acting as a means of distorting. A user might access the Internet on someone else's computer or use a friends phone,
switching the data collected. Individuals
But these options are easily countered by global surveillance systems . The technological momentum, and
therefore prior investment and development in global surveillance, means that many of the measures suggested have already been
countered by those conducting surveil- lance. For example, many
services like TOR have been penetrated by state security services and their encryption
protocols broken (Goodin, 2013). Distortion and switching as a form of resistance are also misleading,
as they ignore how services like PRISM rely on databases of previously entered information in
addition to real time data collection. Entire datasets of personal information are already in the possession of governments
and private corporations already (Lyon, 2001). A sudden change in behaviour or shift in the data collected in real time doesn't change
prior knowledge, and the analytical and comparative potential of these datasets persists. Data collected and circulated within these
databases is notoriously difficult to remove, and is often outside the awareness and means of individuals themselves (Lyon, 2002).
Finally in many cases those conducting surveillance have enormous ranges of extra techniques for collecting personal information.
Security organisa- tions in the service of nation states and private companies have a range of covert and exotic measures for data
collection (Der Spiegel, 2013), and consumer level surveillance is often built into the many digital infrastructure, networks, and
standards that consumers use (Prid- more, 2012). Companies and authorities have also been extraordinarily successful in "seducing"
users away from resistance to complicity (Lyon, 2007, p. 102). What this suggests is that for individuals confrontational measures of
resistance are limited, and that any mean- ingful shift in the material realities of data collection is difficult.
The Rodney King beatings show that police and other state actors become even
more violent when counter surveillance is used against them.
Monahan 2006 (Torin, Prof. @ UNC Chapel Hill, Counter Surveillance as Political Intervention? Social Semiotics 16:4)
Examples of this problematic, if not dialectical, relationship between surveillance and counter-surveillance practitioners abound.
After the beating of Rodney King in Los Angeles was captured on videotape in 1991, this did not
necessarily catalyze correctives to actions of police brutality, nor did it motivate greater police
engagement with urban communities. Instead, police have seemingly used this event to distance
themselves further from and maintain antagonistic relationships with communities (Klein 1997;
Monahan 2002) while learning from the blow-up that they must exert greater control over the
conditions where brutality occurs. This enhanced and learned control can be seen in the torture
case of Haitian worker Abner Louima by the New York City Police in 1997 . Louima was beaten in a
vehicle on the way to the 70th Precinct station house and was then sodomized with the stick from a toilet plunger in the police
restrooms (Mazelis 1997; Jeffries 2002). Regardless of the fact that the story did finally emerge, the police officers obviously
exercised extreme caution in regulating the places of abuse (i.e. in a police vehicle and in a police restroom), and one
can
speculate that this level of control was a response to their fear of being under surveillance, and
thus held accountable, for their actions.
Counter Surveillance only makes the police more violent and capitalism more
secretive.
Monahan 2006 (Torin, Prof. @ UNC Chapel Hill, Counter Surveillance as Political Intervention? Social Semiotics 16:4)
Another example of the dance of surveillance and counter-surveillance can be witnessed in the confrontations occurring at
globalization protests throughout the world. Activists
Counter Surveillance subjects activists to more intense violence from the state.
Wilson & Serisier 2010 (Dean and Tanya, Prof. @ Monash Univ. Australia & Prof. @ U. of Sydney, Video Activism and
the Ambiguities of Counter Surveillance, Surveillance and Society 8:2)
Hardt and Negri (2004) have suggested that innovative
(Morris interview). Yes we saw this during APEC in particular, it wasnt again just not Copwatchers but members of the commercial
media, there was that infamous video Paula Bronstein for example who was thrown to the ground during APEC, but again other
members of the commercial media who either had police officers block their filming, or told to turn around and not to film, several of
us were threatened with arrest, there was one undercover police officer who tried to snatch a camera from my hand, and so it definitely
brings attention to yourself yeah (Mills interview). Spatial
technologies codify discriminatory practices of looking. Through his analysis of the production of photographic
typesincluding the bour- geois subject, the criminal object, the primitive other, and the ideal workerLalvani documents the
importance of photography to the growth of surveillance infrastructure. In particular, Lalvanis examination of the role of photography
in the production of the laboring body demonstrates that the technology was essential to the development of Taylorism and the
scientific management of workers. Photography
new
communications technology is again used to police bodies deemed out of place, even as those
bodies are held static by income disparities and the difficulty of finding afford- able housing . As the
Faircliff case suggests, more research needs to be done on how surveillance practices encode and help
reproduce existing forms of structural inequality.
teenage girl who refused to move fast enough when ordered was told Get [her] fat ass off the corner (Jamieson, 2006). This
level of the individual and by educating people about their complicity with the systems.
Unfortunately, the fact that people have very real dependencies upon their jobs or that vast
asymmetrical power differentials separate workers from the systems they work within (and
perhaps from the activists as well) become unimportant issues once the critique of surveillance is
abstracted and individualized in this way.
Opacity
other transitions or crossings in progress. It corresponds to the need for the fugitive, the immigrant and the new (and newly
constrained) citizen to hold something in reserve, to keep a secret. The history of Afro-diasporic art, especially music, is, it seems to me, the
history of the keeping of this secret even in the midst of its intensely public and highly commodified dissemination. These
secrets are relayed and miscommunicated, misheard, and overheard, often all at once, in words and in the bending of words, in
whispers and screams, in broken sentences, in the names of people youll never know . (p. 105). The issues that we presently face
ourselves with, surveillance in the age of the internet of things, NSA spying and the secret holders that believe only they have a
right to secrets, are not fundamentally new issues, but rather new manifestations of very old issues. The right to opacity is, without a
doubt, a right to see a stranger as a stranger, and the right to have secrets (the right to all be Geheimnistrger). Thus, Hartman quotes Paul Gilroy, from his
The Black Atlantic, there exists "politics ... on a lower frequency." This politics exists because words will never be enough to
"communicate its unsayable claims to truth" (p. 37). Therefore, as James C. Scott and Robin D. G. Kelley have shown, there exists an
infra-politics of hidden transcripts. As Maria Lugones has argued, these infra-politics should be understood in opposition to the
Habermasian notion of the counter-public. The politics and ethics of these unsayable claims to truth cannot be understood
through more transparency, publicity, and comprehension. Rather, we have to conceive of a networked world of relations that
take seriously the right of opacity.
The affirmation of visibility and public dialogue submits radical politics to the
power of the oppressoronly subterranean political strategies can achieve
liberation
Lugones 00 Maria Lugones. Professor of Womens Studies at Binghamton University. 2000. Multiculturalism and Publicity.
Hypatia 15.3. http://muse.jhu.edu.ezproxy.lib.utexas.edu/journals/hypatia/v015/15.3lugones.html.
Ellison's Invisible Man (1995), Lorde's Sister Outsider (1984), and Gloria Anzalda's Borderlands/La Frontera: The New Mestiza
(1987) are interesting and influential texts from the point of view of the infrapolitical and help us look at Lara's project critically.
Though each one of these texts is conceptually complex, more complex than my present discussion of them can begin to countenance,
each author contributes concepts, central to their narratives of self, that are important to the issues raised by Lara's proposal. Ellison
focuses on invisibility, Anzalda on border-dwelling, Lorde on the interdependence of mutual non-dominant differences. Each of them
uses a
discourse that is not just outside "the master's tools," but also outside the master's perceptual
field and the master's perceptual possibilities if the perceiver maintains a loyalty to an oppressive
sociality. Each of them invokes a sociality to be fashioned out of what is valuable in the hidden
transcript and in the intersection between the hidden and the public transcripts --that space that is Scott's,
Kelley's, and my own focus. Before answering my questions, I want to attempt to bring out briefly my understanding of what in Lara
is relevant to the answers. In Moral Textures, Lara replaces the abstract Kantian sense of autonomy with a concrete one by [End Page
178] linking self-determination and self-realization. Self-realization requires expansion of subjectivity. Differentiation among subjects,
far from being understood as a barrier to this expansion, is seen as its foundation. This expansion
is performed through
the introduction of life narratives in the public sphere. Life narratives make it possible for
subalterns to envision the need for political discourses (1999, 59). The literary public thus becomes the arena for
the "performative illocutionary forces" displayed in those new texts and for creating new ways of living. That is for Lara how the
historical transformation of women's self-conception first entered the public sphere (1999, 59). Dialogue between author and public is
necessary for recognition. Engaging the other in an understanding of the ego is crucial here; disclosure is crucial to identity formation.
Self-realization, then, involves both responsibility and self-reflexive consciousness. Here lies the
link with self-determination, with autonomy, in Lara's concrete understanding of autonomy: "One cannot be selfdetermining unless one is capable of envisioning a self-realizing project" (86). Autonomy, thus, requires public recognition (87).
Recognition is complete only when "acceptance of the public has taken place " (82). If differences are
necessary for subjective expansion, their value must be "asserted in front of others" and the dialogue must not only show what makes
one different but also that those differences are "part of what should be considered worthy" (156, 157). Groups
needing to be
heard must "conquer channels of communication to call attention to the way they have been
treated"; recognition is thus a struggle (151, 157). It is their descriptions of what is missing in their lives that make their
claims meaningful and understandable to others (151). But the achievement of solidarity must "form a bridge to the other's
understanding of what are considered to be worthy features and needs of human beings." (157) As she fashions an
understanding of recognition, Lara proposes a universalist model. She attempts to theorize what she
understands as women's achievements in the public sphere. She sees the immediate goal of
achieving systematic and free communication in public spaces, but she interprets the aim not only
as "denouncing the exclusion of women from public spaces, but as recovering those spaces in
light of the revolution required to transform concepts and practices in social, political, and
democratic life" (1999, 149). That is, it isn't just about inclusion but about an extension of subjectivities that constitutes a
transformed "we." Lara's universalism lies precisely in this expansion of the "we" produced
intersubjectively, a "we" which is thus, necessarily, not homogenous. This is a normative "we"
understood by Lara as in permanent tension with the declarative "we," a tension that allows us to
"thematize what is heterogenous, other, different, incongruent, unfamiliar" (154). Universalism is thus an
open-ended ideal. It is this complex sense of universality through recognition that creates "moral textures." [End Page 179] Let me say
that one of Lara's important contributions, from where I stand, is her careful dialogical, performative construction of autonomous and
self-determining subjectivities. Though she does employ a normative ideal, her emphasis is on process. She
don't think that Lara's project can appreciate the complexities and importance of the
hidden transcript as a dissident political culture in resistance to oppression . It does not really have
conceptual room for the varieties of hidden transcripts. The project needs to elude the public transcript/hidden
transcript distinction. Obviously, it cannot side with the public transcript. But it cannot side with the hidden
transcript either, because as hidden in any of its senses, it cannot be addressed to the oppressor : either it is purposefully
outside the oppressor's perceptual field, or it is "on stage" but disguised, or it is hidden by the public transcript. The key terms:
"address the other," "dialogue between author and public," "claim recognition," "subject one's
point of view to the analysis and consideration of others in the public arena," or even "form a
bridge to the other's understanding of what are considered to be worthy features and needs of
human beings" are all inconsistent with the infrapolitical since they require a publicist direction,
an addressing the public, including one's oppressors. One could think of a restricted "public," but I don't see Lara
recommending this as a political direction. She thinks that "enclaves" and monads are bad because they dichotomize the relation
between oppressor and oppressed. Yet, though
It is no accident that the body of the suspected terrorist is the object against which this violent will to knowledge is directed; in
Discipline and Punish , Michel Foucault suggests that state-sanctioned brutality and the commitment to calculative reason codified by
the Enlightenment intersect here, in the systematization of torture. The codification of torture as a disciplinary technique exhibits a
"whole quantitative art of pain" which is "calculated according to detailed rules" designed to inflict a punishment proportionate to the
crime and to exhibit the authority of the state through the scarred body of the prisoner.43 Of course, Foucault's analysis concerns the
spectacle of public torture, which obviously differs from the secretive politics of extraordinary rendition. However, this difference
primarily concerns torture's punitive function in the 17th century, as opposed to its biopolitical function today, in the context of
globalized security. The science of torture has only grown far more sophisticated; the calculated application of cruelty to the suspect's
body is, after all, a matter of national security. The role of the terrorist suspect is no longer simply to express the painful reality of
sovereign vengeance to a paralyzed citizenry, but rather to speak, to proffer a knowledge that promises to maintain the integrity of the
innocent, vulnerable population. Foucault thus reveals that the technologies of control exercised, on the one hand, against individual
bodies and, on the other, against whole populations are not isolated phenomena. They are the products of a historically contingent
system of thought.44 They are founded upon the obsessive rationality of Enlightened liberal humanism, and their intersection in the
shadows of the dark chamber give expression to the aggressive anxiety of that rationality's confrontation with the other night.
The Bush Administration cannot, therefore, be understood as acting somehow irrationally, or against the philosophical and
political tradition of the Enlightenment ideals through which it insists upon the war on terror's moral legitimacy. The
President's stated mission of infinitely expanding "civilized" democratic idealism operates from the very ideological foundation of
Europe's earlier Civilizing Mission; colonialism and the war on terror both find moral justification in the supposedly universal
necessity of human rights, fixed within the presupposition of a rational, autonomous, sovereign subject. Extraordinary
rendition and interrogation through torture must remain secretive, then, because to expose humanism's own hideous
underside is to rob it of its moral and intellectual legitimacy, even if its legal legitimacy might remain open to normative
debate. This is particularly true in the case of rendition because the rhetoric of internationalized democratic reform is here secretly
doubled by its opposite; the world's beacon of liberty encourages torture and brutality.