You are on page 1of 67

Surveillance Studies: A Reader Torin

Monahan
Visit to download the full and correct content document:
https://ebookmass.com/product/surveillance-studies-a-reader-torin-monahan/
OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

SURVEILL ANCE S TUDIES

9780190297817_Book.indb 1 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

ii

9780190297817_Book.indb 2 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

iii

SURVEILL ANCE
S TUDIES
A READER

Edited by
Torin Monahan
David Murakami Wood

9780190297817_Book.indb 3 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

iv

1
Oxford University Press is a department of the University of Oxford. It furthers
the University’s objective of excellence in research, scholarship, and education
by publishing worldwide. Oxford is a registered trade mark of Oxford University
Press in the UK and certain other countries.

Published in the United States of America by Oxford University Press


198 Madison Avenue, New York, NY 10016, United States of America.

© Oxford University Press 2018

All rights reserved. No part of this publication may be reproduced, stored in


a retrieval system, or transmitted, in any form or by any means, without the
prior permission in writing of Oxford University Press, or as expressly permitted
by law, by license, or under terms agreed with the appropriate reproduction
rights organization. Inquiries concerning reproduction outside the scope of the
above should be sent to the Rights Department, Oxford University Press, at the
address above.

You must not circulate this work in any other form


and you must impose this same condition on any acquirer.

Library of Congress Cataloging-​in-​Publication Data


(ToCome)
ISBN 978–0–19–029782–4 (pbk.)
ISBN 978–​0 –​19–​029781–​7 (hbk.)

9 8 7 6 5 4 3 2 1
Paperback printed by WebCom, Inc., Canada
Hardback printed by Bridgeport National Bindery, Inc., United States of America

9780190297817_Book.indb 4 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

CONTENTS

List of Figures and Tables xi


Acknowledgmentsxiii
Rights and Permissions xv
Introduction: Surveillance Studies as a Transdisciplinary Endeavor xix

1 OPENINGS AND DEFINITIONS 1

1 James B. Rule, Private Lives and Public Surveillance: Social Control


in the Computer Age 5
2 Oscar H. Gandy, jr., The Panoptic Sort: A Political Economy of
Personal Information 9
3 William G. Staples, Everyday Surveillance: Vigilance and Visibility
in Postmodern Life 14
4 David Lyon, Surveillance Studies: An Overview 18
5 Gary T. Marx, What’s New about the “New Surveillance?” Classifying
for Change and Continuity 22

2 SOCIET Y AND SUBJECTIVIT Y 27

6 Jeremy Bentham, The Panopticon 31


7 Michel Foucault, Discipline and Punish: The Birth of the Prison 36
8 Gilles Deleuze, Postscript on the Societies of Control 42
9 Kevin D. Haggert y and Richard V. Ericson,
The Surveillant Assemblage 47

9780190297817_Book.indb 5 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

vi

vi  Contents

10 Thomas Mathiesen, The Viewer Society: Michel Foucault’s


“Panopticon” Revisited 51
11 David Armstrong, The Rise of Surveillance Medicine 55
12 Irus Braverman, Zooland: The Institution of Captivity 59

3 STATE AND AUTHORIT Y 63

13 Johann Got tlieb Fichte, Foundations of Natural Right 67


14 Anthony Giddens, The Nation-​State and Violence 70
15 Geoffrey C. Bowker and Susan Leigh Star, Sorting Things Out:
Classification and Its Consequences 75
16 Maria Los, The Technologies of Total Domination 79
17 Anna Funder, Stasiland: Stories from behind the Berlin Wall 83
18 Cindi Katz, The State Goes Home: Local Hyper-​Vigilance
of Children and the Global Retreat from Social Reproduction 88

4 IDENTIT Y AND IDENTIFICATION 93

19 Valentin Groebner, Who Are You? Identification, Deception,


and Surveillance in Early Modern Europe 97
20 John C. Torpey, The Invention of the Passport: Surveillance,
Citizenship, and the State 101
21 Allan Sekula, The Body and the Archive 105
22 Dorothy Nelkin and Lori Andrews, DNA Identification
and Surveillance Creep 111
23 Shoshana Amielle Magnet, When Biometrics Fail: Gender, Race,
and the Technology of Identity 116

5 BORDERS AND MOBILITIES 121

24 Louise Amoore, Biometric Borders: Governing Mobilities in


the War on Terror 125
25 Mark B. Salter, Passports, Mobility, and Security: How Smart Can
the Border Be? 129
26 Stephen Graham and David Murakami Wood, Digitizing
Surveillance: Categorization, Space, Inequality 133
27 Katja Franko Aas, “Crimmigrant” Bodies and Bona Fide
Travelers: Surveillance, Citizenship, and Global Governance 138
28 Didier Bigo, Security, Exception, Ban, and Surveillance 143

9780190297817_Book.indb 6 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

vi

Contents   vii

6 INTELLIGENCE AND SECURIT Y 147

29 James Bamford, The Puzzle Palace: Inside the National Security


Agency, America’s Most Secret Intelligence Organization 152
30 Alfred W. McCoy, Policing America’s Empire: The United States,
the Philippines, and the Rise of the Surveillance State 157
31 Ahmad H. Sa’di, Thorough Surveillance: The Genesis of Israeli
Policies of Population Management, Surveillance, and Political Control
towards the Palestinian Minority 161
32 Glenn Greenwald, No Place to Hide: Edward Snowden, the NSA, and
the US Surveillance State 166

7 CRIME AND POLICING 173

33 Clive Norris and Gary Armstrong, CCTV and the Social


Structuring of Surveillance 179
34 Mike McCahill, The Surveillance Web: The Rise
of Visual Surveillance in an English City 183
35 Philip Boyle and Kevin D. Haggert y, Spectacular Security: Mega-​
Events and the Security Complex 187
36 Pete Fussey, Jon Coaffee, Gary Armstrong, and Dick Hobbs,
The Regeneration Games: Purity and Security in the Olympic City 191
37 Hille KOSKELA, “The Gaze without Eyes”: Video-​Surveillance and
the Changing Nature of Urban Space 195
38 Andrew John Goldsmith, Policing’s New Visibility 199
39 Torin Monahan and Rodolfo D. Torres, Schools under
Surveillance: Cultures of Control in Public Education 204

8 PRIVACY AND AUTONOMY 209

40 Priscilla M. Regan, Legislating Privacy: Technology, Social Values,


and Public Policy 213
41 Jean-​F rançois Blanchet te and Deborah G. Johnson, Data
Retention and the Panoptic Society: The Social Benefits of
Forgetfulness 217
42 Helen Fay Nissenbaum, Privacy in Context: Technology, Policy, and
the Integrity of Social Life 222
43 Julie E. Cohen, Configuring the Networked Self: Law, Code, and
the Play of Everyday Practice 226

9780190297817_Book.indb 7 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

vi

viii  Contents

44 John Gilliom, Overseers of the Poor: Surveillance, Resistance, and


the Limits of Privacy 230
45 Colin J. Bennet t, In Defense of Privacy: The Concept and
the Regime 234

9 UBIQUITOUS SURVEILL ANCE 239

46 Roger Clarke, Information Technology and Dataveillance 243


47 Dana Cuff, Immanent Domain: Pervasive Computing and
the Public Realm 248
48 Mike Crang and Stephen Graham, Sentient Cities:
Ambient Intelligence and the Politics of Urban Space 253
49 Mark Andrejevic, Surveillance in the Big Data Era 257

10 WORK AND ORGANIZATION 261

50 Graham Sewell and Barry Wilkinson, “Someone to Watch over


Me”: Surveillance, Discipline, and the Just-​in-​Time Labour Process 265
51 Kirstie Ball, Workplace Surveillance: An Overview 269
52 Gavin J. D. Smith, Behind the Screens: Examining Constructions
of Deviance and Informal Practices among CCTV Control Room
Operators in the UK 273
53 Christian Fuchs, Web 2.0, Prosumption, and Surveillance 276

11 POLITICAL ECONOMY 281

54 Adam Arvidsson, On the “Pre-​History of the Panoptic Sort”: Mobility


in Market Research 285
55 David Murakami Wood and Kirstie Ball, Brandscapes of Control?
Surveillance, Marketing and the Co-​Construction of Subjectivity and
Space in Neo-​Liberal Capitalism 289
56 Anthony Amicelle, Towards a “New” Political Anatomy of Financial
Surveillance 294
57 Nicole S. Cohen, The Valorization of Surveillance: Towards a Political
Economy of Facebook 298
58 Shoshana Zuboff, Big Other: Surveillance Capitalism and
the Prospects of an Information Civilization 302

9780190297817_Book.indb 8 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xi

Contents   ix

12 PARTICIPATION AND SOCIAL MEDIA 307

59 Mark Andrejevic, The Work of Being Watched: Interactive Media


and the Exploitation of Self-​Disclosure 309
60 Hille Koskela, Webcams, TV Shows, and Mobile Phones:
Empowering Exhibitionism 313
61 Anders Albrechtslund, Online Social Networking as Participatory
Surveillance 317
62 Priscilla Regan and Valerie Steeves, Kids R Us: Online Social
Networking and the Potential for Empowerment 321
63 Alice E. Marwick, The Public Domain: Social Surveillance in
Everyday Life 326

13 RESISTANCE AND OPPOSITION 331

64 Colin J. Bennet t, The Privacy Advocates: Resisting the Spread of


Surveillance 335
65 Laura Huey, Kevin Walby, and A aron Doyle, Cop Watching in the
Downtown Eastside: Exploring the Use of (Counter)Surveillance as a
Tool of Resistance 339
66 Finn Brunton and Helen Nissenbaum, Vernacular Resistance to
Data Collection and Analysis: A Political Theory of Obfuscation 343
67 Steve Mann, Jason Nolan, and Barry Wellman,
Sousveillance: Inventing and Using Wearable Computing Devices for
Data Collection in Surveillance Environments 347
68 Torin Monahan, The Right to Hide? Anti-​Surveillance Camouflage
and the Aestheticization of Resistance 351

14 MARGINALIT Y AND DIFFERENCE 357

69 Oscar H. Gandy, jr., Coming to Terms with Chance: Engaging


Rational Discrimination and Cumulative Disadvantage 361
70 Jasbir K. Puar, Terrorist Assemblages: Homonationalism
in Queer Times 365
71 Corinne Mason and Shoshana Magnet, Surveillance Studies and
Violence against Women 369
72 Simone Browne, Dark Matters: On the Surveillance of Blackness 373

9780190297817_Book.indb 9 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

x  Contents

15 ART AND CULTURE 377

73 John E. McGrath, Loving Big Brother: Performance, Privacy,


and Surveillance Space 381
74 David Rosen and A aron Santesso, The Watchman in
Pieces: Surveillance, Literature, and Liberal Personhood 385
75 Andrea Mubi Brighenti, Artveillance: At the Crossroads of Art and
Surveillance 389
76 Mike Nellis, Since Nineteen Eighty Four: Representations of
Surveillance in Literary Fiction 394
77 Catherine Zimmer, Surveillance Cinema 398
78 Jennifer R. Whitson, Gaming the Quantified Self 403

Index 407

9780190297817_Book.indb 10 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xi

L I S T O F F I G U R E S A N D TA B L E S

Figures

1 Jeremy Bentham’s Panopticon prison design, 1791, Willey Reveley. 32


2 Stasi smell samples for dog tracking, undated, John Steer, courtesy of
the Stasi-​Museum, Berlin, ASTAK. 65
3 Plate 41 from Identification anthropométrique, 1893, Alphonse Bertillon. 109
4 AeroVironment Nano-​Hummingbird, 2011, sponsored by US Defense
Advanced Research Projects Agency (DARPA). 148
5 IXmaps Project tracing Internet routes through NSA servers, 2016,
Andrew Clement. 167
6 Recording the police, 2015, unknown. 201
7 Eavesdropping, 1880, Théodore Jacques Ralli. 211
8 Hyper-​Reality [Augmented reality city of the near future], 2016,
Keiichi Matsuda. 241
9 Modern Times, 1936, Charlie Chaplin. 262
10 One Nation under CCTV, 2008, Banksy. 332
11 Faceless, 2007, Manu Luksch. 392

Table

1 Surveillance Dimensions 25

9780190297817_Book.indb 11 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xi

9780190297817_Book.indb 12 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xi

ACKNOWLEDGMENTS

This book was made possible through generous financial assistance from our universities.
The Department of Communic­ation at the University of North Carolina at Chapel Hill pro-
vided support through a Kenneth and Mary Lowe Challenge Fund/​Faculty Excellence Grant.
The Department of Sociology and the Surveillance Studies Centre at Queen’s University
provided support with the aid of the Canada Research Chairs Program.

9780190297817_Book.indb 13 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

vxi

9780190297817_Book.indb 14 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

v
x

RIGHTS AND PERMISSIONS

David Armstrong. “The Rise of Surveillance


Section 1: Openings and Definitions Medicine.” Sociology of Health & Illness 17
James B. Rule. Private Lives and Public (3): 393–​404. 1995 [393–​97, 399–​401, 403].
Surveillance: Social Control in the Computer Age. Reprinted with permission.
London: Allen Lane, 1973 [19, 22–​23, 37–​40, 350–​ Irus Braverman. Zooland: The Institution of Captivity.
52, 354–​55, 357]. Reprinted with permission. Stanford: Stanford University Press, 2013 [75–​79,
Oscar H. Gandy, Jr. The Panoptic Sort: A Political 82–​83, 86–​90]. Reprinted with the permission.
Economy of Personal Information. Boulder,
CO: Westview, 1993 [1–​2, 15–​18]. Reprinted with
permission. Section 3: State and Authority
William G. Staples. Everyday Surveillance: Vigilance
and Visibility in Postmodern Life. Lanham, Johann Gottlieb Fichte. Foundations of Natural Right.
MD: Rowan & Littlefield Publishers, 2000 [3–​7]. Cambridge, UK: Cambridge University Press.
Reprinted with permission. Edited by Frederick Neuhouser, translated by
David Lyon. Surveillance Studies: An Overview. Michael Baur, (1796/​97) 2000 [254, 257–​58, 261–​
Cambridge, UK: Polity, 2007 [13–​16, 25–​27]. 63]. Reprinted with permission.
Reprinted with permission. Anthony Giddens. The Nation-​State and Violence
Gary T. Marx. “What’s New about the ‘New (Critique of Historical Materialism Vol. II).
Surveillance?’: Classifying for Change and Cambridge, UK: Polity, 1985 [1, 146, 159, 184–​
Continuity.” Surveillance and Society 1 (1):9–​29. 85, 189, 192, 311–​13, 327, 345]. Reprinted with
2002. Reprinted with permission. permission.
Geoffrey C. Bowker and Susan Leigh Star.
Sorting Things Out: Classif ication and Its
Consequences. Cambridge, MA: MIT Press,
Section 2: Society and Subjectivity 1999 [196–​9 7, 199–​2 01, 212, 225]. Reprinted
Jeremy Bentham. The Works of Jeremy Bentham, vol 4. with permission.
Edited by J. Bowring. Ann Arbor: University of Maria Los. “The Technologies of Total Domination.”
Michigan Library, (1843) 2009 [40–​41, 44–​46]. Surveillance & Society 2 (1):15–​38. 2004. Reprinted
Reprinted with permission. with permission.
Michel Foucault. Discipline and Punish: The Birth of the Anna Funder. Stasiland: Stories from behind the Berlin
Prison, translated by Alan Sheridan, translation Wall. Melbourne: Text Publishing, 2002 [106–​
copyright © 1977 by Alan Sheridan [200–​209]. 110]. Reprinted with permission.
Used by permission of Pantheon Books, an Cindi Katz. “The State Goes Home: Local
imprint of the Knopf Doubleday Publishing Hypervigilance of Children and the Global
Group, a division of Penguin Random House Retreat from Social Reproduction.” Social Justice
LLC. All rights reserved. 28 (3):47–​56. 2001 [47–​49, 50–​51, 55]. Reprinted
Gilles Deleuze. “Postscript on the Societies of with permission.
Control.” October 59:3–​7. 1992 [3–​7]. Reprinted
with permission.
Kevin D. Haggerty and Richard V. Ericson. “The Section 4: Identity and Identification
Surveillant Assemblage.” British Journal of
Sociology 51 (4):605–​22. 2000 [606, 608–​1 4, Valentin Groebner. Who Are You? Identification,
617–​19]. Reprinted with permission. Deception, and Surveillance in Early Modern
Thomas Mathiesen. “The Viewer Society: Michel Europe. Translated by M. Kyburz and J. Peck.
Foucault’s ‘Panopticon’ Revisited.” Theoretical Cambrige, MA: Zone Books, 2007 [25–​27,
Criminology 1 (2):215–​35. 1997 [216–​23, 225–​26, 200–​202, 218–​19, 257–​58]. Reprinted with
228–​31]. Reprinted with permission. permission.

9780190297817_Book.indb 15 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xvi

xvi  Rights and Permissions


John C. Torpey. The Invention of the Glenn Greenwald. No Place to Hide: Edward Snowden,
Passport: Surveillance, Citizenship, and the State. the NSA, and the US Surveillance State.
Cambridge, UK: Cambridge University Press, New York: Metropolitan Books, 2014 [91–​96, 98–​
2000 [1, 4, 6–​13, 17]. Reprinted with permission. 101, 118–​19, 151, 153]. Reprinted with permission.
Allan Sekula. “The Body and the Archive.” October
39:3–​64. 1986 [5–​7, 10, 16–​19, 62]. Cambridge,
MA: MIT Press. Reprinted with permission. Section 7: Crime and Policing
Dorothy Nelkin and Lori Andrews. “DNA
Identification and Surveillance Creep.” Clive Norris and Gary Armstrong. “CCTV and
Sociology of Health & Illness 21 (5):689–​706. the Social Structuring of Surveillance.” In
1999 [689–​99, 701, 703]. Reprinted with Surveillance of Public Space: CCTV, Street
permission. Lighting, and Crime Prevention, edited by Kate
Shoshana Amielle Magnet. When Biometrics Painter and Nick Tilley, 157–​78. Copyright
Fail: Gender, Race, and the Technology of Identity. © 1999 by Lynne Rienner Publishers, Inc.
Durham, NC: Duke University Press, 2011 [2–​3, Reprinted with permission.
5–​7, 47–​50]. Reprinted with permission. Mike McCahill. The Surveillance Web: The Rise
of Visual Surveillance in an English City.
Collumpton, Devon, UK: Willan Publishing,
Section 5: Borders and Mobilities 2002 [95–​98]. Reprinted with permission.
Philip Boyle and Kevin D. Haggerty. “Spectacular
Louise Amoore. “Biometric Borders: Governing Security: Mega-​Events and the Security Complex.”
Mobilities in the War on Terror.” Political International Political Sociology 3 (3):257–​74. 2009
Geography 25 (3):336–​51. 2006 [337–​38, 341–​43]. [267–​70]. Reprinted with permission.
Reprinted with permission. Pete Fussey, Jon Coaffee, Gary Armstrong, and Dick
Mark B. Salter. “Passports, Mobility, and Hobbs. “The Regeneration Games: Purity and
Security: How Smart Can the Border Be?” Security in the Olympic City.” British Journal of
International Studies Perspectives 5 (1):71–​91. 2004 Sociology 63 (2):260–​84. 2012 [261–​62, 264, 268,
[78–​80, 85]. Reprinted with permission. 273–​74, 276]. Reprinted with permission.
Stephen Graham and David Wood. “Digitizing Hille Koskela. “The Gaze without Eyes: Video
Surveillance: Categorization, Space, Inequality.” Surveillance and the Changing Nature of
Critical Social Policy 23 (2):227–​48. 2003 [228–​ Urban Space.” Progress in Human Geography 24
35, 242]. Reprinted with permission. (2):243–​65. 2000 [246, 248–​50, 255, 258–​59].
Katja Franko Aas. “Crimmigrant Bodies and Bona Reprinted with permission.
Fide Travelers: Surveillance, Citizenship and Andrew John Goldsmith. “Policing’s New Visibility.”
Global Governance.” Theoretical Criminology British Journal of Criminology 50 (5):914–​34. 2010
15 (3):331–​46. 2011 [337–​42]. Reprinted with [917–​22, 931]. Reprinted with permission.
permission. Torin Monahan and Rodolfo D. Torres. “Introduction.”
Didier Bigo. “Security, Exception, Ban and In Schools under Surveillance: Cultures of Control
Surveillance.” Theorizing Surveillance: The in Public Education, 1–​18. New Brunswick,
Panopticon and Beyond, edited by D. Lyon, 46–​ NJ: Rutgers University Press, 2010 [1–​4 , 6, 13–​1 4].
68. Devon: Willan Publishing, 2006 [47–​49, Reprinted with permission.
55, 63]. Reprinted with permission.

Section 8: Privacy and Autonomy


Section 6: Intelligence and Security
Priscilla M. Regan. Legislating Privacy: Technology,
James Bamford. The Puzzle Palace: Inside the National Social Values, and Public Policy. Chapel
Security Agency, America’s Most Secret Intelligence Hill: University of North Carolina Press, 1995
Organization. Copyright © 1982, 1983 [15–​16, 19, [212–​21]. Reprinted with permission.
317–​20, 461–​63, 468–​69, 475–​76]. Reprinted Jean-​François Blachette and Deborah G. Johnson.
by permission of Houghton Mifflin Harcourt “Data Retention and the Panoptic Society: The
Publishing Company and Penguin Books. All Social Benefits of Foregetfulness.” The
rights reserved. Information Society 18 (1):33–​45. 2002 [33–​39, 43].
Alfred W. McCoy. Policing America’s Empire: The Reprinted with permission.
United States, the Philippines, and the Rise of Helen Fay Nissenbaum. Privacy in Context: Technology,
the Surveillance State. Madison: University of Policy, and the Integrity of Social Life. Stanford,
Wisconsin Press, 2009 [15–​19]. Reprinted with CA: Stanford Law Books, 2010 [1–​3, 231–​36].
permission. Reprinted with permission.
Ahmad H. Sa’di. Thorough Surveillance: The Genesis Julie E. Cohen. Configuring the Networked Self: Law,
of Israeli Policies of Population Management, Code, and the Play of Everyday Practice. New
Surveillance, and Political Control towards Haven, CT: Yale University Press, 2012 [148–​52].
the Palestinian Minority. Manchester, Reprinted with permission.
UK: Manchester University Press, 2013 [52–​55, John Gilliom. Overseers of the Poor: Surveillance,
58–​61, 63, 67]. Reprinted with permission. Resistance, and the Limits of Privacy.

9780190297817_Book.indb 16 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xvi

Rights and Permissions   xvii

Chicago: University of Chicago Press, 2001 (2):161–​78. 2011 [161–​64, 167–​69]. Reprinted with
[2–​7, 9–​10, 43–​4 4, 67–​68]. Reprinted with permission.
permission. Nicole S. Cohen. “The Valorization of
Colin J. Bennett. “In Defense of Privacy: The Concept Surveillance: Towards a Political Economy of
and the Regime.” Surveillance and Society 8 Facebook.” Democratic Communiqué 22 (1):5–​22.
(4):485–​96. 2011. Reprinted with permission. 2008 [7–​15, 18]. Reprinted with permission.
Shoshana Zuboff. “Big Other: Surveillance
Capitalism and the Prospects of an Information
Section 9: Ubiquitous Surveillance Civilization.” Journal of Information Technology
30 (1):75–​89. 2015 [77, 80–​85]. Reprinted with
Roger Clarke. “Information Technology and permission.
Dataveillance.” Communications of the ACM 31
(5):498–​512. 1988 [499, 502–​508]. Reprinted with
permission. Section 12: Participation and
Dana Cuff. “Immanent Domain: Pervasive Computing
and the Public Realm.” Journal of Architectural Social Media
Education 57 (1):43–​49. 2003 [43–​48]. Reprinted Mark Andrejevic. “The Work of Being Watched:
with permission. Interactive Media and the Exploitation of
Mike Crang and Stephen Graham. “Sentient
Self-​Disclosure.” Critical Studies in Media
Cities: Ambient Intelligence and the Politics of
Communication 19 (2):230–​48. 2002 [231–​32,
Urban Space.” Information, Communication &
238–​39, 243–​45]. Reprinted with permission.
Society 10 (6):789–​817. 2007 [791–​97, 811–​1 4].
Hille Koskela. “Webcams, TV Shows, and Mobile
Reprinted with permission. Phones: Empowering Exhibitionism.”
Mark Andrejevic. “Surveillance in the Big Data Surveillance & Society 2 (2/​3):199–​215. 2004.
Era.” In Emerging Pervasive Information and Reprinted with permission.
Communication Technologies (PICT), edited by Anders Albrechtslund. “Online Social Networking as
K. D. Pimple, 55–​69. New York: Springer, 2014 Participatory Surveillance.” First Monday 13 (3).
[58–​64]. Reprinted with permission. 2008. Reprinted with permission.
Priscilla Regan and Valerie Steeves. “Kids R
Us: Online Social Networking and the Potential
Section 10: Work and Organization for Empowerment.” Surveillance & Society 8
(2):151–​65. 2010. Reprinted with permission.
Graham Sewell and Barry Wilkinson. “Someone to Alice E. Marwick. “The Public Domain: Social
Watch over Me: Surveillance, Discipline, and Surveillance in Everyday Life.” Surveillance
the Just-​in-​Time Labour Process.” Sociology 26 & Society 9 (4):378–​93. 2012. Reprinted with
(2):271–​89. 1992 [271–​81, 283–​84]. Reprinted with permission.
permission.
Kirstie Ball. “Workplace Surveillance: An Overview.”
Labor History 51 (1):87–​106. 2010 [89, 91–​94, 98–​
101]. Reprinted with permission. Section 13: Resistance and Opposition
Gavin J. D. Smith. “Behind the Screens: Examining
Constructions of Deviance and Informal Colin J. Bennett. The Privacy Advocates: Resisting the
Practices among CCTV Control Room Operators Spread of Surveillance. Cambridge, MA: MIT
in the UK.” Surveillance & Society 2 (2/​3):376–​95. Press, 2008 [ix, 199, 210–​1 1, 217, 220–​22, 225].
2004. Reprinted with permission. Reprinted with permission.
Christian Fuchs. “Web 2.0, Prosumption, and Laura Huey, Kevin Walby, and Aaron Doyle.
Surveillance.” Surveillance & Society 8 (3):288–​ “Cop Watching in the Downtown
309. 2011. Reprinted with permission. Eastside: Exploring the Use of (Counter)
Surveillance as a Tool of Resistance.” In
Surveillance and Society: Technological Power in
Section 11: Political Economy Everyday Life, edited by T. Monahan, 149–​65.
New York: Routledge, 2006 [149–​50, 152–​54,
Adam Arvidsson. “On the Pre-​History of the Panoptic 156–​57, 161–​65]. Reprinted with permission.
Sort: Mobility in Market Research.” Surveillance Finn Brunton and Helen Nissenbaum. “Vernacular
& Society 1 (4):456–​74. 2004. Reprinted with Resistance to Data Collection and Analysis: A
permission. Political Theory of Obfuscation.” First Monday 16
David Murakami Wood and Kirstie Ball. “Brandscapes (5). 2011. Reprinted with permission.
of Control? Surveillance, Marketing and the Steve Mann, Jason Nolan, and Barry Wellman.
Co-​construction of Subjectivity and Space in “Sousveillance: Inventing and Using Wearable
Neo-​L iberal Capitalism.” Marketing Theory 13 Computing Devices for Data Collection in
(1):47–​67. 2013 [47, 49–​52, 54–​55, 57, 60–​62]. Surveillance Environments.” Surveillance & Society 1
Reprinted with permission. (3):331–​55. 2003. Reprinted with permission.
Anthony Amicelle. “Towards a ‘New’ Political Anatomy Torin Monahan. “The Right to Hide? Anti-​
of Financial Surveillance.” Security Dialogue 42 Surveillance Camouflage and the

9780190297817_Book.indb 17 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xvii

xviii  Rights and Permissions


Aestheticization of Resistance.” Communication Section 15: Art and Culture
and Critical/​Cultural Studies 12 (2):159–​78. 2015
[159–​65, 169–​7 1]. Reprinted with permission. John E. McGrath. Loving Big Brother: Performance,
Privacy, and Surveillance Space. New York:
Routledge, 2004 [2–​3, 5–​7, 10–​1 1, 14, 166–​68].
Section 14: Marginality and Reprinted with permission.
David Rosen and Aaron Santesso. The Watchman
Difference in Pieces: Surveillance, Literature, and Liberal
Personhood. New Haven, CT: Yale University Press,
Oscar H. Gandy, Jr. Coming to Terms with
2013 [56–​59, 100–​104]. Reprinted with permission.
Chance: Engaging Rational Discrimination
Andrea Mubi Brighenti. “Artveillance: At the
and Cumulative Disadvantage. Burlington,
Crossroads of Art and Surveillance.” Surveillance
VT: Ashgate, 2009 [1–​3, 5, 10–​15]. Reprinted with
& Society 7 (2):137–​48. 2010. Reprinted with
permission.
permission.
Jasbir K. Puar. Terrorist Assemblages: Homonationalism
Mike Nellis. “Since Nineteen Eighty
in Queer Times. Durham, NC: Duke University
Four: Representations of Surveillance in Literary
Press, 2007 [152, 154–​56, 160–​62, 164–​65].
Fiction.” In New Directions in Surveillance and
Reprinted with permission.
Privacy, edited by B. J. Goold and D. Neyland,
Corrine Mason and Shoshana Magnet. “Surveillance
178–​204. Portland, OR: Willan Publishing, 2009
Studies and Violence against Women.”
[178, 197–​200]. Reprinted with permission.
Surveillance & Society 10 (2):105–​18. 2012.
Catherine Zimmer. Surveillance Cinema.
Reprinted with permission.
New York: New York University Press, 2015 [18–​
Simone Browne. Dark Matters: On the Surveillance
24]. Reprinted with permission.
of Blackness. Durham, NC: Duke University
Jennifer R. Whitson. “Gaming the Quantified Self.”
Press, 2015 [7–​9, 16–​17, 21–​22, 24, 77–​79, 128].
Surveillance & Society 11 (1/​2):163–​76. 2013.
Reprinted with permission.
Reprinted with permission.

9780190297817_Book.indb 18 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xi

TORIN MONAHAN AND


DAVID MURAKAMI WOOD
I NT R O D U C T I O N
Surveillance Studies as a Transdisciplinary Endeavor

Surveillance studies is a dynamic field of mediation at all. Face-​to-​face surveillance,


scholarly inquiry. It emerges, in large part, of people watching and controlling others,
from recognition of the ways in which perva- is certainly not rendered obsolete by new
sive information systems increasingly regu- technologies.
late all aspects of social life. Whether with Although definitions of surveillance
workplaces monitoring the performance vary, most scholars stress that surveillance
of employees, social media sites tracking is about more than just watching; it depends
clicks and uploads, financial institutions also on some capacity to control, regulate,
logging transactions, advertisers amassing or modulate behavior. This reading draws
fine-​
grained data on customers, or secu- upon the French origins of the word surveil-
rity agencies siphoning up everyone’s tel- lance, which means “watching from above.”
ecommunications activities, surveillance It implies a power relationship. It is not
practices—​although often hidden—​have just passive looking but is instead a form
come to define the way modern institutions of oversight that judges and intervenes to
operate. This development indicates more shape behavior. Importantly, one does not
than just the adoption of information-​based need to be aware of such control dynamics
technological systems by organizations; for them to be effective; these dynamics
rather, it represents a larger transformation can perhaps have greater force if they are
in how people and organizations perceive felt as natural and their politics are hidden.
and engage with the world. It now seems The excerpts in this book sketch a number
completely reasonable and responsible to of definitions with different accents and
collect data by default and base decisions on nuances, but as a starting point, surveil-
those data. It seems rational to use data to lance can be understood as “monitoring
sort people into categories according to their people in order to regulate or govern their
anticipated risk or value and to treat people behavior” (Gilliom and Monahan 2013: 2).
differently based on their categorization. While academics may agree, more or less,
These are surveillance logics that transcend with general definitions, the term “surveil-
any particular technological system, and lance” invites a range of interpretations. For
indeed they do not require technological some it is restricted to specific technologies

9780190297817_Book.indb 19 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xx  Introduction

or legal designations, whereas for others it process. There are always value judgments
signals any form of systematic monitoring and power imbalances, and they usually
that exerts an influence or has a tangible reproduce social inequalities. Because of
outcome. Additionally, because of its neg- growing awareness of the central role of
ative connotations, practitioners on the surveillance in shaping power relations
ground often disagree about whether sur- and knowledge across social and cultural
veillance is taking place. For instance, so- contexts, scholars from many different ac-
cial scientists who conduct empirical work ademic disciplines have gravitated to sur-
with policing agencies have found that veillance studies and contributed to its
most law-​enforcement personnel do not see solidification as a field.
their work in that way, even as they describe But academic fields do not develop en-
their professional functions in terms that tirely on their own, just from a set of shared
researchers would label as surveillance. ideas or concerns. Rather, they depend on
Surveillance may be ubiquitous, but it the concerted efforts of individuals to pull
acquires different forms, functions, and and hold people together, to initiate and
meanings across social settings. Broadly, sustain conversations over time, and, ulti-
one could say that all formations of capital, mately, to institutionalize the field in a set
nation, and state—​three aspects that consti- of organizational practices and artifacts
tute the structure of contemporary societies (Mullins 1972). For surveillance studies,
(Karatani 2014)—​depend on mechanisms those practices entailed workshops begin-
of surveillance to control markets, regulate ning in the early 1990s and continuing
bodies, and protect institutions. Recently, with greater frequency in the 2000s; the
these processes were illuminated in the formation of the international Surveillance
arena of national security and state intelli- Studies Network (SSN)1 in 2006; and the
gence, where the public gained newfound hosting of international conferences every
awareness of the extent of state surveillance two years, starting in 2004. The artifacts
operations with the trove of US National include numerous edited volumes, many
Security Agency (NSA) documents released of them outgrowths of the aforementioned
by Edward Snowden in 2013. Clearly, sur- workshops, and, crucially, the founding of
veillance flourishes in other spheres too, the open-​access online journal Surveillance
beyond explicit state operations or formal & Society2 in 2002. Many of the people in-
governance structures. For instance, public volved in these activities, including the
interest in surveillance has likewise been editors of this Reader, are represented
piqued by revelations about peer and corpo- in this book, but special mention must
rate monitoring on social media sites like be made of sociologist David Lyon, who
Facebook, which are platforms that also en- was instrumental early on in organizing
gage in the robust collection, analysis, and workshops and conference panels and
sharing of data, sometimes even running producing edited volumes that drew
undisclosed “experiments” on users to scholars into dialogue, thus helping to con-
see how they respond to different types of stitute the field.
content. Clearly this is an “origin story,” and
Across domains, from state security such stories are always political: they set
agencies to social media sites, surveil- the parameters for who and what counts
lance regulates boundaries and relations. or should be counted. As a collection of
It reinforces separation and different curated materials, Readers, such as this
treatment along lines of class, race, gender, one, are similarly political and necessarily
sexuality, age, and so on. Regardless of exclusionary, if only because there simply
the context, surveillance is never a neutral is not sufficient room to include everything

9780190297817_Book.indb 20 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xxi

Introduction   xxi

that one would like to—​ or should—​ This should not be read as a romanticiza-
include. Although such politics and tion of the field. Certainly not every sur-
exclusions are unavoidable, we choose to veillance studies scholar welcomes being
be self-​reflexive about our standpoints and challenged from a disciplinary perspective
the choices we are making. We are interdis- other than her or his own. That said, as the
ciplinary scholars with backgrounds and field as a whole has been forced to grapple
direct experience in surveillance studies, with such challenges, and continues to do
science and technology studies (STS), ge- so, the general tone has not been one of de-
ography, sociology, communication, and fensiveness but rather appreciation. Not of
history. Indirectly, through conferences, exclusion and ostracism, but of inclusion
publications, and collaborations, we partici- and acceptance. These are the norms that
pate in many other fields: anthropology, po- characterize the field for many participants,
litical science, law and society, criminology, and they are ones we try to reproduce with
American studies, gender studies, cultural our selection, grouping, and framing of
studies, and others. excerpts in this book.
This interdisciplinary orientation inflects
the explicit and implicit arguments of this
Reader. Instead of overemphasizing the
contributions of one discipline, for instance, Histories of Surveillance and
we seek to illustrate how different discipli- Surveillance Studies
nary perspectives bring different concerns,
methods, and theoretical positions to the There may be an allure to seeing surveil-
study of surveillance in society. We feel that lance as novel, but there are important his-
this is an empirically accurate representa- torical contexts and lineages that inform
tion of the field, as well, in that there are and shape the present. Some of the earliest
many voices and disciplines represented influential work in the field, by pioneers like
in the conversations of the field, as any pe- James B. Rule and Michel Foucault, came
rusal of conference programs will bear out. out of a 1960s and 1970s context of state
More than being a static “snapshot,” how- surveillance that included the monitoring,
ever, there is a deeper and ongoing story disruption, and repression of progressive
here about a correspondence between the groups by both totalitarian and democratic
field’s institutionalization and its increasing states (Murakami Wood 2009b). At this
interdisciplinarity. The two have occurred, time, as is still the case today, state actors
and continue to occur, together. Perhaps were emboldened by new technologies that
the field’s defining feature is its search for afforded the collection and analysis of infor-
commonalities among tensions in disci- mation on an unprecedented scale. Rule’s
plinary approaches to surveillance. This book Private Lives and Public Surveillance
is the reason we prefer to call surveillance (1973) delved into these trends with a focus
studies a “transdisciplinary field.” It draws on the implications of government agencies
its strength and forms its identity from and corporations adopting new computer
shared general concerns and productive databases as central tools of governance
frictions among disciplines, all the while and customer management. Rule saw these
fostering departures and innovations. It has changes as introducing the threat of a “total
achieved cohesion as a bona fide new field surveillance society” that could lead to di-
with shared concepts, “citation classics,” minished autonomy, curtailed rights, and
and forms of institutionalization (e.g., a political repression.
journal and conferences), but it also invites, Foucault (1977), on the other hand,
and often seems to embrace, critiques. cast his eye backward to illustrate how

9780190297817_Book.indb 21 12-Jul-18 3:28:25 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xx
ii

xxii  Introduction

surveillance became a central method for The biggest historical transformations


governance and the construction of modern were associated not so much with the de-
subjects. Foucault’s observations about the velopment of new technologies as they were
emergence of distributed methods of rule with the social functions and goals of sur-
and self-​disciplining forms of subjectivity veillance. In early modern Europe, states
were incredibly generative and explain sought to discover commonalities in groups
his substantial and sustained influence in and codify descriptions of them in bureau-
the field, however much scholars might cratic archives, thus creating identities
question the specifics of his historical anal- against which individuals were measured
ysis or particular aspects of his theory. (Groebner 2007). By the end of the eight-
Ironically, as Gilles Deleuze (1992) later eenth century, however, rulers became in-
pointed out, the combined technological creasingly interested in identifying specific
transformations and sociopolitical crises of people, both in nation-​states and their col-
the 1960s and 1970s presaged the end of the onies, to effectively create “police states”
modern surveillance regime described by of well-​governed and transparent societies
Foucault in Discipline and Punish, leading (Fichte 2000 [1796/​97]). By the late nine-
to today’s more machinic, automated, and teenth century, this identification impera-
inhuman late-​capitalist regime. tive reached crisis levels, fueled by concerns
The history of surveillance, of course, about anonymous individuals—​ perhaps
goes back much further. As David Lyon’s The with criminal inclinations—​circulating in
Electronic Eye (1994) described, surveillance newly industrialized cities and challenging
can be detected in population documents established social hierarchies (Cole 2001;
from ancient Egypt and also in records of Torpey 2000). Identification regimes were
English landholding with the Domesday combined with generalized surveillance
Book from 1086. Interestingly, the word and mass enforcement, which were often
“eavesdrop,” which had its first printed use in supplemented by spectacular and exem-
1606, originally referred to someone who lit- plary punishments to deter criminal beha-
erally stood within the space next to a house vior by others.
where rainwater dripped from the eaves, Modern surveillance also concerned it-
where one could secretly listen to what was self increasingly with individual subjec-
said inside (OED Online 2016). These his- tivity and the management of populations
torical references reveal a mixture of hier- in ways that generated compliance, pro-
archical politics, technological affordances ductivity, and even health and happiness
(writing itself and the vernacular architec- (Foucault 1978). In this, surveillance was
ture of wooden houses, respectively), and always associated with scientific advances,
local social practices, which come together particularly with the new science of num-
to produce particular forms of surveillance. bers, statistics (Hacking 1990; Porter 1995;
It is not accurate in most cases to make an Scott 1998). As Ian Hacking shows in The
arbitrary distinction between “technolog- Taming of Chance (1990), throughout the
ical” and “non-​ technological” surveillance. nineteenth century, a general belief in de-
However, it is certainly true that the earlier terminism gradually gave way to regimes
the form of surveillance, the greater and of probability. The quantification of every-
more obvious the role that people played in thing (grain, forests, people, suicides, and
the process. The actual or suspected presence so on) gave rise to statistical bureaus and
of spies, informers, watchmen, and guards allowed states to invoke scientific rationality
looms larger in social imaginaries about sur- in governance decisions.
veillance in the premodern and early modern At the same time, the science of
periods than it does today. the body—​ in terms of both the broad

9780190297817_Book.indb 22 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xx
ii

Introduction   xxiii

picture of biology and evolution and the In the late nineteenth century, biological
development of physiology and kinetics theories of racial inferiority fused with new
(movement)—​ was inspired by and pro- identification techniques like physiognomy,
vided the basis for a new kind of efficient photography, and fingerprinting—​the early
and compliant workforce. Typically, these systems of biometric measurement (Cole
efforts mobilized surveillance to extract 2001; Sekula 1986). These were policing
as much labor from bodies as was phys- technologies deployed in an effort to cata-
ically possible. Frederick Winslow Taylor logue offenders and make criminality leg-
(1911) is well known in this regard, due to ible, and perhaps even predictable, through
his efforts to implement a system of “sci- scientific means. In tandem with the rise of
entific management” of factory workers. the eugenics movement of the Progressive
This early form of workplace surveillance Era in the United States, these scientific
relied on close observation, segmentation schemes drew upon narratives of biolog-
of tasks, and division of labor, all overseen ical difference to justify unequal treatment
by a new class of managerial elites whose of supposedly inferior groups: immigrants,
technocratic functions would, in Taylor’s racial minorities, the poor, the illiterate,
view, advance the social and economic or the cognitively impaired (Kevles 1995).
prosperity of the nation. Behind the facade of objective science, dis-
Whereas Taylor believed in a voluntary criminatory practices were institutional-
system where incentives and effective man- ized through such identification systems,
agement would compel heightened pro- and social hierarchies were reinforced in
ductivity, brutal forms of involuntary labor a time of heightened migration and social
extraction—​as with slavery in the United mobility.
States, Brazil, Haiti, and elsewhere—​also The period at the end of the nineteenth
depended on surveillance innovations. As century saw the creation of new rights and
Nicholas Mirzoeff (2011) explains, state freedoms. The modern legal concept of
visuality regimes, including those used in privacy arose in the context of polite New
the institutional management of slaves, England society and the frustrations of
rely on techniques of classification, sep- the American bourgeoisie with an increas-
aration, and aestheticization, such that ingly intrusive media, in particular popular
people are reduced to governable units and newspapers in their reporting of society
represented in bureaucratic systems that functions. Louis Brandeis and Samuel
obscure the symbolic and real violence of Warren’s (1890) famous line about the
dehumanizing complexes. In the case of “right to be let alone” comes from this con-
slavery in the United States, especially as text, where privacy was mobilized as a right
the institution started to unravel, surveil- of the privileged. Perhaps awareness of un-
lance took the form of hot-​iron branding, equal access to privacy rights, even during
slave passes and “lantern laws” to regulate its emergence as a legal construct over
movement, and wanted posters encour- a century ago, helps explain the general
aging the apprehension of runaway slaves reservations that many surveillance studies
(Browne 2015). In her important work scholars have about privacy discourses
on the surveillance of blackness, Simone today. As we develop in Section 8, there
Browne reveals how forms of agency and are clearly disciplinary reasons as well for
resistance were always a part of the slave one’s commitment to—​ or suspicion of—​
experience and that exercises of resistance privacy protections as responses to surveil-
continue today in people’s confrontations lance. However, for better or worse, within
with discriminatory and racist surveillance policy arenas and liberal academia, privacy
apparatuses (see Section 14). and the “private life” remain both tactically

9780190297817_Book.indb 23 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

x
vxi

xxiv  Introduction

and ideologically the dominant forms of re- technological innovations in conjunction


sponse to surveillance. This is true even as with popular theorizations about postmod-
scholars search for more comprehensive, ernism. In addition to the aforementioned
powerful, and flexible ways of responding Gilles Deleuze (1992) and Oscar Gandy
to surveillance encroachments and abuses. (1993), Mark Poster (1990) described surveil-
Before the field of surveillance studies lance operations in new media technologies
started to coalesce in the late 1990s, scholars and human-​machine interfaces, which si-
largely followed the thread of the early 1970s multaneously deterritorialized subjectivity
critiques of centralized computer databases, and dispersed control mechanisms. David
state surveillance, and policing. For ex- Lyon (2001, 1994) synthesized many of
ample, Gary Marx’s classic book Undercover these themes by explicating the ways in
(1988) connected the use of older forms of which “information societies” are neces-
human surveillance with police informants sarily “surveillance societies” because the
and undercover operations to the emer- automatic collection of data by informa-
gence of new technologies, such as infrared tion systems affords the classification of
cameras, that could circumvent privacy ex- individuals and groups, behaviors and risks,
pectations without concomitant increases leading to differential treatment of people.
in legal protections. Likewise, Roger Clarke Kevin Haggerty and Richard Ericson
(1988) described dangers brought about by (2000) developed these foundations fur-
forms of “dataveillance” that allowed for the ther, describing the role of the individual’s
large-​scale combination of data points and “data double” in a larger “surveillant assem-
the construction of profiles that could be blage,” an amorphous network of public
used to discriminate against people even and private systems where individuals have
in advance of any wrongdoing. David Lyon little recourse to alter or contest the surveil-
(1988) echoed these anxieties as well in his lance that is taking place. More than that,
first major work to deal with surveillance, almost all organizations engage in such acts
where he concluded by developing the om- of data collection, analysis, and intervention
inous figure of the “carceral computer.” (Staples 2000), meaning—​ among other
With greater attention to racial inequalities things—​that surveillance has become one
and corporate profiling of customers, Oscar of the dominant modes of ordering in the
Gandy (1993) similarly noted how informa- postmodern era.
tion systems were acting politically to sort
people in unequal ways while obscuring the
inherent biases of the systems in question. Conceptual Challenges
As a culminating point, of sorts, in 1987
a number of significant players in the As scholars from a variety of disciplines
emergent field (e.g., Priscilla Regan, Gary engaged with surveillance studies, they
Marx, Andrew Clement, and James Rule) relied upon a common set of concepts to
contributed to an influential report by the advance collective knowledge. In partic-
US Office of Technology Assessment (1987) ular, Foucault’s interpretation of Jeremy
on workplace surveillance; this report Bentham’s Panopticon, the legal and moral
rearticulated some of the above critiques concept of privacy, and George Orwell’s
but also, perhaps more important for this figure of Big Brother were quite produc-
discussion of field formation, served as tive in sparking analysis. Over time, how-
an early and explicit articulation of shared ever, these concepts became strained and
concerns. seemed dissonant with the empirical
In the early 1990s, a conceptual conditions described by researchers or the
change began with consideration of new field’s growing theoretical interests.

9780190297817_Book.indb 24 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

v
x

Introduction   xxv

To start with, the allure of Foucault’s or critical of such discourses. We have al-
(1977) writings on Bentham’s Panopticon ready observed, for example, that although
prison design was that he transformed it into perceived threats to privacy may be a
a powerful metaphor for the ways in which clarion call to arms for civil-​society groups
institutions could provide scripts for people and progressives more generally (Bennett
to internalize the surveillant gaze and po- 2008; Regan 1995), whether in its origins
lice themselves into social conformity (see or today, privacy has never truly been a
Section 2). There has been increasing dissat- universal human right. Some other limita-
isfaction with the concept, though, perhaps tions of the concept might be its difficulty
because of the way people feel compelled to in overcoming the individualistic frame to
modify it and devise clunky spin-​off terms assist with understanding encroachments
(e.g., “superpanopticon,” “synopticon,” on social groups or public spaces (Patton
“ban-​ opticon”) to match new phenomena 2000); tensions between its presentation as
rather than invent something altogether an easily identifiable universal value and its
new. Foucault intended the Panopticon to remarkable messiness in practice (Nippert-​
serve as an illustration of a particular histor- Eng 2010); or the empirical reality that
ical moment in the development of modern some of the targets of the most intrusive
thinking about subjectivity and social con- forms of surveillance are more concerned
trol (Murakami Wood 2009), but it has be- with issues of domination and power, not
come an almost hegemonic construct in the abstract notions like privacy (Gilliom 2001).
field. It is often applied or intoned as if it has Finally, George Orwell’s (1949) exceed-
some kind of universal explanatory value but, ingly disturbing fictional portrayal of a to-
if used this way, it lacks empirical validity. talitarian society (in Nineteen Eighty-​Four),
Rather than being rational, centralized, and with the human face forever crushed
totalizing, surveillance is more often par- under the boot of Big Brother, has simi-
ticularistic, multi-​sited, and highly special- larly made it difficult to escape motifs of
ized, leading Bruno Latour (2005) to refer to all-​powerful, centralized state surveillance.
contemporary surveillance—​using another Notwithstanding the resilience of the Big
derivative neologism—​as oligoptic, that is, Brother figure in the media or common
narrow and focused rather than broad and parlance, the field continues to stress the
distributed. Of course, the focus and inten- heterogeneous mix of surveillance flows,
sity is not random. It varies according to even with state surveillance (e.g., Guzik
one’s social address (Monahan 2010) and is 2016; Hayes 2009; Monahan and Regan
more likely to sort, exclude, and marginalize 2012; Walby and Monaghan 2011). Edward
populations, not homogenize people and Snowden’s revelations about NSA surveil-
shape them into uniform docile bodies (see lance programs, for instance, reveal that
Section 14). private companies are the source of much
The concept of privacy remains salient data analyzed by state agencies and that
in the field, as well as in legal, policy, and private contractors, just as Snowden was,
popular discourses. Along with data pro- are essential to the state surveillance ap-
tection concerns, privacy resonates deeply paratus. In other words, state surveillance
with many people and provides something is only part of the picture. Across many
to organize around. That said, whereas the arenas, the blend of state, corporate, and
concept’s universalizing and individualizing social surveillance shapes life chances
tendencies undoubtedly lend it force in in concrete ways: whether someone gets
legal and policymaking arenas, these have health insurance or a bank loan, gets
been seen as deficiencies as well, espe- fired because of a Facebook posting or
cially by academics trained to be suspicious discriminated against because of their

9780190297817_Book.indb 25 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xvi

xxvi  Introduction

credit score, gets targeted for police scru- into sections based on historical periods, ge-
tiny because she lives in a crime “hot spot,” ographical focus, conceptual frameworks,
or spied upon as a potential “terrorist” be- topical areas, or disciplinary perspectives,
cause he protests environmental polluters. among other options. Following from our
Thus, even within surveillant assemblages, earlier observation that surveillance studies
as Sean Hier and Josh Greenberg (2009) is a transdisciplinary field defined by its
note, hierarchies of visibility persist, such search for commonalities among tensions
that descriptions of exposure alone are in- in disciplinary approaches to surveillance,
sufficient to account for the uneven politics we have chosen a hybrid organizational
of surveillance. approach that seeks to triangulate, some-
On the other end of the spectrum, what loosely, topical areas, disciplinary
many people would find Orwell’s dysto- perspectives, and the field’s chronological de-
pian vision bizarre today because they see velopment. Thus, each section concentrates
surveillance—​ especially social networking primarily on a topical area, but this often
and media-​based surveillance—​as fun, con- reflects disciplinary preferences, and those
venient, or inconsequential (Albrechtslund preferences have changed over time as
2008; Ellerbrok 2011; McGrath 2004). It is scholars from different disciplines have
worth mentioning here that scholars doing joined the conversation. So, by reading the
literary analyses of surveillance have long sections in order, one can also get a sense of
observed that Orwell’s vision was highly how the field has mutated over time.
derivative of earlier writing by the Russian Emphatically, the order of sections
author Yevgeny Zamyatin (1972 [1921]). It does not represent a neat evolutionary
also seems that Aldous Huxley’s Brave New development but instead a fascinating it-
World (1932)—​in which control is exercised erative process, where scholars studying
through a combination of eugenics, in one area are oftentimes influenced by
pleasure, drugs, and peer ​ pressure—​ the contributions of those in an entirely
provides a far more convincing set of different area, leading to recombinant
metaphors for the contemporary situation knowledge for the collective advancement
(Marks 2005; Murakami Wood 2009a). of the field. For instance, while crimino-
With the exception of the concept of logical studies of police video surveillance
privacy, which remains central for many were some of the earliest and most for-
scholars in surveillance studies, the field mative empirical projects in surveillance
has largely departed from these genera- studies, researchers did not cease to inves-
tive concepts. Nonetheless, they have pro- tigate police video surveillance once others
foundly shaped the field’s discourses and drew the field toward explorations of resist-
remain useful as symbols of the extremes ance, ubiquitous surveillance, or the polit-
of universal or totalizing forms of surveil- ical economy; instead, scholars folded these
lance. As the next section will show, the lines of inquiry into their projects, making
field’s topical and conceptual apparatuses their findings both unpredictable and re-
have exploded as the field has grown, freshing, all the while furthering the dia-
adding complexity, nuance, and renewed logue with others (e.g., Coaffee and Fussey
vigor to what came before. 2015; McCahill and Finn 2014; Smith 2015).
Likewise, world events can suddenly re-
kindle interest in older areas of investi-
gation, as can be observed with terrorist
Book Overview attacks drawing attention back to national
security, Snowden’s leaks foregrounding
There are many possible ways to organize a state intelligence operations, or police
Reader such as this one. It could be divided killing of unarmed black men raising

9780190297817_Book.indb 26 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xxivi

Introduction   xxvii

interest in the documentary evidence that larger systems of power and influence. This
video surveillance might provide, albeit makes sense given that with the exception
with an emphasis on police accountability, of Oscar Gandy, who is a communication
not citizen wrongdoing. This iterative scholar, each of the other authors in this
process is represented within most of the section would identify as a sociologist.
sections too, where we include excerpts Section 2, “Society and Subjectivity,”
from older and newer explorations of the provides excerpts from some of the key
area and note the influences in our section theoretical texts that shaped the field.
introductions so that these iterations and These include Bentham’s and Foucault’s
cross-​fertilizations can be appreciated. writings on the Panopticon prison design,
It should be mentioned that some of the Deleuze’s delineations of the emergence
excerpts are by scholars who would not nec- of control dynamics replacing the disci-
essarily identify with the field of surveil- plinary ones outlined by Foucault, and
lance studies. This is to be expected with others exploring how such control might
foundational theoretical works that pre- manifest in decentralized networks or ar-
date the formation of the field, but there ticulate with powerful media institutions
are other instances of more contemporary that are characterized more by the many
selections by people working in aligned watching the few. Because the emphasis
fields. We chose to include such pieces if is on how subjectivity is produced through
they were exemplary works in new areas or exposure to surveillance, especially in or by
they challenged the status quo in ways we institutions, we also include selections that
found productive. Given that we valorize illustrate how public health campaigns in-
the relative porousness and inclusiveness form medical imaginaries and surveillance-​
of the field, it seemed appropriate that we based zoo designs cultivate conservationist
would not exclude significant publications values in zoogoers.
simply because of how an author positioned The next two sections, “State and
themself. Authority” (Section 3) and “Identity and
The Reader’s first content section, Identification” (Section 4), explore the ways
“Openings and Definitions,” offers a pre- in which surveillance was a critical part
sentation of originary works that helped of the rise of the modern nation-​state, es-
constitute surveillance studies. The authors pecially pertaining to the identification
wrestle with different definitions of surveil- and governance of people at borders and
lance, illustrating a lack of consensus at the within state territories. The authors an-
incipient stages of the field. Some position alyze incarnations of state surveillance
the target of surveillance as an individual in the service of totalitarian and postcolo-
person whose freedoms are infringed upon, nial regimes, such as Cold War–​era East
while others question the larger effects on Germany and apartheid-​era South Africa,
subject populations or society as a whole. respectively, and question the extent to
There is general agreement, however, that which totalitarian tendencies are present in
surveillance is widespread, facilitated by in- all modern nation-​states. When states de-
formation systems used by most organiza- fine themselves by territorial demarcations,
tions, and permeating down to the capillary then the regulation of movement, through
level of society—​that is, on the level of eve- passports or other identity documents, ef-
ryday interactions in most arenas of public fectively conjures “citizens” into being as
and private life. This movement between identifiable representatives of the state.
the macro and the micro is indicative of Unfortunately, identification efforts cannot
authors working to develop what C. Wright be divorced from the prejudices of their cul-
Mills (1959) called “the sociological imagi- tural contexts, so they usually reproduce
nation,” situating everyday practices within those prejudices in technological form.

9780190297817_Book.indb 27 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xx
iivi

xxviii  Introduction

The section on “Borders and Mobilities” conducted the first empirical research on
(Section 5) picks up these themes and police video surveillance, largely found
places them within more of a contemporary that it was not effective at preventing most
national-​security context. The identifica- crimes, just for displacing criminal activity
tion and sorting of populations is increas- to areas under less overt observation or, at
ingly embedded in computer algorithms, best, assisting with the identification of
facilitating social exclusion through au- suspects after the fact. While not entirely
tomated means. This is perhaps most absent from these criminological accounts,
apparent with border control systems that other excerpts advance an explicit gender
are effectively distributed across geographic critique of surveillance, seeing technolog-
territories and temporalities, as anywhere ical systems as potentially adding layers
or anytime that someone is identified and of harassment while not mitigating vio-
assessed against software-​ encoded risk lence against women. Additional pieces
profiles. As a few of the excerpts in this investigate the ways in which police and
section reveal, these functions are delegated security schemes connect to the political
not only to computer systems, but also to in- economy—​ securing places of commerce,
dividual travelers and the general public, advancing the security industry, and
who are responsibilized to submit volun- enforcing an actuarial form of risk man-
tarily to security demands and inform on agement that invariably punishes poor and
others who seem suspicious in some way, racialized populations. Of course, with the
usually due to their racial or ethnic iden- spread of camera-​equipped mobile phones,
tity markers. Given this focus on terri- the power dynamics between the police
tory, mobility, and risk management, it is and the public may be open, at least par-
not surprising that the main disciplines tially, to renegotiation.
represented in this section are geography, We turn next to “Privacy and Autonomy”
political science, and criminology. (Section 8), with a number of treatments
National security and policing are two that address the field’s apprehensions with
of the most prevalent areas of concern in the privacy concept. These selections add
non-​academic discussions of surveillance. complexity to the concept, showing both
The sections on “Intelligence and Security” how it is a dynamic social norm and how
(Section 6) and “Crime and Policing” theorizations of it have advanced well be-
(Section 7) offer a sampling of critical aca- yond many of the depictions of its critics.
demic and journalistic works in these areas. Technological developments seem to pro-
Some of it details the mind-​boggling extent duce the greatest threats to privacy, at
of the NSA’s telecommunications surveil- least from the perspective of surveillance
lance systems, while other pieces allow us studies, especially as information gath-
to situate these intelligence practices in a ering and sharing become routine. Privacy
longer history of state overreach, with illegal scholars—​ who tend to come from the
targeted spying on activists, journalists, in- disciplines of political science, philosophy,
ternational allies, and others. Importantly, and legal studies—​point out that as long as
as other excerpts show, internal state sur- privacy is presented solely as an individual
veillance is almost always coupled with and good, it is destined to be compromised
informed by similar applications in distant and eroded in policy realms that, fairly or
war zones and occupied territories. not, tend to view any other concerns as
When it comes to domestic policing advancing public interests. Thus, persua-
(Section 7), video surveillance—​or closed-​ sive arguments are needed about the social
circuit television (CCTV)—​ is the most good provided by privacy protections. A few
obvious focal point. Criminologists, who of the excerpts offer just such arguments,

9780190297817_Book.indb 28 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xxi

Introduction   xxix

while others concentrate on the impor- self-​discipline on the part of workers, for
tance of respecting the context of infor- instance through team-​ based projects
mation generation or of safeguarding where peers depend on one’s reliability.
opportunities for boundary negotiation Information technologies facilitate the
between individuals and information sys- reach of workplace surveillance too. On
tems. Finally, to flesh out the surveillance-​ one hand, mobile technologies lead to a
studies debate a bit further, we offer both a condition that Melissa Gregg (2011) refers
critique of privacy and a more general re- to as “presence bleed,” where one is ex-
sponse in defense of the concept. pected to be always available to work and to
Privacy concerns are so pressing, in part, be monitored, even at home. On the other
because surveillance is becoming routine, hand, the very systems of commerce or
pervasive, and increasingly hidden. The communication (e.g., cashier checkout sys-
next section, “Ubiquitous Surveillance” tems or social media sites) are fundamen-
(Section 9), brings together insights from tally ones of surveillance: either of employee
scholars with backgrounds in informa- performance or of user activity, where, in
tion studies, communication, geography, the case of social media, users effectively
and architecture to document this move engage in “free labor” to generate value
toward invisible, automated control in for companies. Then again, it is impor-
built environments and data practices. tant to remember that those charged with
The excerpts show how information-​ surveilling others are themselves engaged
rich environments—​ characterized by in mostly tedious and unrewarding work.
embedded sensors, mobile computing, and This brings us to closer scrutiny of the
algorithmic processes—​ are fundamen- relationship between surveillance and the
tally surveillant. Their logic is that all data political economy (Section 11). In the service
elements (objects, people, conditions) must of company profits, customer surveillance
be “addressable” and subject to remote or takes many forms, ranging from the devel-
automated management. This can be seen opment of customer categories to facilitate
with what has been called the “Internet of effective advertising throughout the twen-
things,” with networked appliances like tieth century to the hidden screening of
refrigerators or with “smart cities” that use customers by financial industries charged
embedded sensors and other technologies with implementing risk-​ management
to regulate transportation systems, elec- techniques to block potential money
tricity usage, and sewage treatment in “real launderers or terrorists. The emphasis on
time.” Whether integrated with urban in- company brands also compels technolog-
frastructure or occurring in abstract “big ical innovations in surreptitiously “reading”
data” practices, ubiquitous surveillance customers’ physiological responses to
depends on decisions about data priorities products and shaping their affective
and values that are clearly political in their attachment to brands. Finally, several
effects. excerpts enumerate the ways that Internet
The next two sections, “Work and giants such as Facebook and Google have
Organization” (Section 10) and “Political made value extraction through information
Economy” (Section 11), are closely related, systems a science, creating new information
as two sides of the same coin. From a ecologies that threaten to become totalizing
largely sociological perspective, analyses systems of control. In these selections, one
of workplace surveillance show how early can see the convergence of historical, soci-
techniques of scientific management and ological, criminological, and communica-
performance monitoring have mutated tion approaches to the political economy of
into managerial strategies to cultivate surveillance.

9780190297817_Book.indb 29 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xxx  Introduction

Operating in more of a communication systems. With perhaps the exception of


and media studies register, the next section, Steve Mann’s work on sousveillance, or sur-
“Participation and Social Media” (Section veillance from “below,” the work in this
12), problematizes the dominant surveil- area is generally measured and pragmatic.
lance-​studies paradigm of top-​ down con- On one hand, it is eager to find solutions
trol by institutions or institutional actors. to power asymmetries, but, on the other, it
On the whole, the excerpts recognize that recognizes the limitations and sometimes
such institutional surveillance persists in even the dangers (or risks to others) of
online environments, but rather than jump trying to do so.
to quick conclusions about the totalizing The next section, “Marginality and
capacities of Internet platforms, they pose Difference” (Section 14), turns further to-
questions about the cultural meanings or ward humanities-​ inflected critiques of
practices that exceed those systems of con- surveillance. The selections highlight
trol. Perhaps forms of peer​or lateral ​sur- how surveillance imbricates with inter-
veillance (e.g., social media users following sectional forms of oppression, exposing
each other’s posts or profiles) introduce the marginalized populations to differential
possibility for empowerment by fostering and often augmented forms of violence
experimentation with self-​ presentation or and control. This can manifest in abstract
developing relationships of trust and inti- ways, such as with discriminatory actu-
macy. Then again, these exchanges could arial assessments by financial institutions,
trap individuals in what Mark Andrejevic contributing to tangible “cumulative dis-
(2007) has called “digital enclosures,” advantage” (Gandy Jr. 2009) for poor and
where people derive social value but can racialized groups. It could also take the
never achieve robust forms of democratic form of violent encounters with armed
empowerment. These two conclusions are police, stalkers and domestic partners, or
not mutually exclusive, of course. Vitally, racist citizens concerned about terrorist
the questions posed by the excerpts in this threats. In order to confront surveillance
section invite the field to reconsider funda- that materializes or reinforces unequal
mentally its understandings of and value conditions of marginality, one must come
judgments about surveillance. to terms with the fact that “threatening”
Section 13, “Resistance and Opposition,” racialized bodies are always constructed in
presents excerpts from scholars intrigued opposition to normative “white” bodies that
by the potentials for contesting surveil- are seen as symbolically stable, compliant,
lance, for “fighting back” in some way. and transparent (Hall 2015). If the history
These selections offer a diverse array of of surveillance is inseparable from the his-
disciplinary perspectives, informed by po- tory of racism, as Simone Browne (2015)
litical science, criminology, information contends, then exposure to surveillance can
studies, engineering, philosophy, and cul- never be neutral and scholarship on sur-
tural studies. Some countersurveillance veillance should reject, once and for all, any
techniques covered here include attempts universalist claims about it.
to turn surveillance against institutional The final section in the Reader, “Art
agents, such as the police, by filming their and Culture” (Section 15), emphasizes per-
activities; organizing through coalitions formance theory, literary analysis, visual
of civil society groups, policymakers, and studies, and game studies in its consid-
activists to implement or maintain pri- eration of surveillance-​ themed cultural
vacy protections; or using technological products and practices. Representations of
tools or masking techniques to obfus- surveillance in literature and film, for in-
cate and temporarily evade surveillance stance, are hugely influential in shaping

9780190297817_Book.indb 30 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xxi

Introduction   xxxi

popular perceptions and understandings the problems of surveillance reflects classic


of surveillance, yet until recently there has sociological concerns about the place of
been surprisingly little sustained academic individuals in society and the relationship of
discussion of them in the field. This is rap- structure to agency. As others sought to flesh
idly changing with a flurry of new books out these concerns, they did so with empir-
on these and related subjects (e.g., Lefait ical research on people in context, classically
2013; Rosen and Santesso 2013; Wise 2016; of workplaces or police departments, where
Zimmer 2015). The excerpts in this section the latest surveillance systems, such as com-
offer sophisticated critical interpretations of puter keystroke tracking or CCTV, were used
various cultural works, thereby correcting to monitor others from a distance. Such so-
deficiencies in the field and suggesting ciological and criminological framings were
directions for future investigation. formative for the field, establishing the ini-
tial parameters for the study of surveillance,
and because these framings resonate with
Conclusion conventional understandings of surveillance
(e.g., Big Brother), they continue to exert a
The thing that holds most of surveillance force on new scholarship. This can be seen,
studies’ areas together is a general agree- for instance, with the impulse of scholars to
ment that surveillance is central to the study the next big organizational incarna-
functioning of contemporary societies, from tion of surveillance (e.g., Google, Uber, the
the level of state practices all the way down Department of Homeland Security), what-
to interpersonal exchanges among family ever it might be.
members and friends. While some may As the field expanded, this interest in
not agree that surveillance is the most im- institutions and technological systems
portant social process or cultural logic, it is persisted, but it shifted to reflect a wider range
difficult to contest its pervasiveness and in- of disciplinary concerns and approaches.
fluence. It is how organizations and people Privacy scholars, for instance, framed the
make sense of and manage the world. It is issues in terms of rights, values, and legis-
also how power relations are established lative processes. The focus remained on in-
and reproduced. For scholars, surveillance stitutional abuses facilitated by technology,
offers a rich approach to investigating social but privacy scholars also outlined pragmatic
and cultural phenomena and detecting the solutions that might be achieved through
power relations inherent in them. legislative changes or technological designs
As represented in the organization of this (e.g., with encryption). Geographers stressed
Reader’s sections, the field started out with how the integration of surveillance systems
more of an institutional focus, questioning into urban infrastructure was actualizing
the increasing influence of state and corpo- new regimes of governance and fueling
rate actors over others. Technology was cen- neoliberal capitalism, which benefited
tral in facilitating this influence, whether corporations and the military but aggravated
with architectural embodiments of control social inequalities. Communication scholars
with panoptic designs or with databases and similarly situated surveillant media sys-
video-​camera systems. The early institu- tems in the context of the political economy,
tional focus makes sense in that hierarchical describing how large media and technology
relationships and power differentials—​ the companies shape ideologies while profiting
roots of surveillance—​ are more apparent from the labor of viewers or users.
when there are extreme disparities between The latest “cultural turn” in surveillance
parties, such as between institutions and studies is significant in that it largely breaks
individuals. Moreover, this initial framing of from the institutional framework, at least as

9780190297817_Book.indb 31 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xxixi

xxxii  Introduction

a necessary element, in order to trace power 3. Obviously, these are broad brushstrokes that
relations in the production and circulation occlude much of the nuance and do not represent
of cultural meanings, many of which rely all contributions to the field. The aim of this
on representations of people and narratives summary is to offer a general sense of the arc of
about their identities (Monahan 2011). Thus, the field’s development.
feminist studies, queer studies, and critical
race studies scholars might draw attention to references
depictions of threats or worthiness, showing Albrechtslund, Anders. 2008. Online Social
how those markers are encoded in surveil- Networking as Participatory Surveillance. First
lance systems and practices, propagating vi- Monday 13 (3). Available from http://​fi rstmonday.
org/​htbin/​cgiwrap/​bin/​ojs/​index.php/​fm/​article/​
olence against marginalized groups. Those viewArticle/​2142/​1949 [accessed December
studying cinema, literature, media, or art 26, 2010].
Andrejevic, Mark. 2007. iSpy: Surveillance and Power
often highlight the ways in which cultural in the Interactive Era. Lawrence: University Press
products form perception and a sense of per- of Kansas.
sonhood, normalizing the idea of being a Bennett, Colin J. 2008. The Privacy Advocates:
Resisting the Spread of Surveillance. Cambridge,
surveillance subject, while also presenting MA: MIT Press.
avenues for resistance and critique. Brandeis, Louis D., and Samuel D. Warren. 1890. The
Performance studies scholars interrogate and Right to Privacy. Harvard Law Review 4 (5):193,
195–​97.
contest, sometimes through performance, Browne, Simone. 2015. Dark Matters: On the Surveillance
the meaning and politics of the many sur- of Blackness. Durham, NC: Duke University Press.
veillance routines that characterize daily life. Clarke, Roger. 1988. Information Technology and
Dataveillance. Communications of the ACM 31
Finally, communication scholars and others (5):498–​512.
seek to understand the participatory trend in Coaffee, Jon, and Pete Fussey. 2015. Constructing
Resilience through Security and
self-​and peer-​surveillance (e.g., through the Surveillance: The Politics, Practices, and
“Quantified Self” movement or social media Tensions of Security-​Driven Resilience. Security
use), often by starting from the perspective of Dialogue 46 (1):86–​105.
Cole, Simon A. 2001. Suspect Identities: A History
users themselves.3 of Fingerprinting and Criminal Identification.
This Reader provides one possible Cambridge, MA: Harvard University Press.
mapping of the field of surveillance studies. Deleuze, Gilles. 1992. Postscript on the Societies of
Control. October 59:3–​7.
We take our inspiration from the field’s Ellerbrok, Ariane. 2011. Playful Biometrics: Controversial
many generous participants—​our mentors, Technology through the Lens of Play. The
colleagues, and students—​ who have Sociological Quarterly 52 (4):528–​47.
Fichte, Johann Gottlieb. 2000 [1796/​97]. Foundations
brought, and continue to bring, this vibrant of Natural Right. Translated by M. Baur.
field into being. Importantly, this book does Cambridge, UK: Cambridge University Press.
not aspire to be a final representation of Foucault, Michel. 1977. Discipline and Punish: The
Birth of the Prison. New York: Vintage.
what the field is or what counts in it, but in- —​—​—​. 1978. The History of Sexuality: An Introduction.
stead a provisional sketch of a dynamic and Vol. 1. New York: Vintage.
Gandy, Oscar H. 1993. The Panoptic Sort: A Political
exciting process of mutation. Foremost, it Economy of Personal Information. Boulder,
is an invitation for others to explore, delve CO: Westview.
deeper into full texts that are only partially Gandy Jr., Oscar H. 2009. Coming to Terms with
Chance: Engaging Rational Discrimination
reproduced here, and participate in the on- and Cumulative Disadvantage. Burlington,
going conversations and debates. VT: Ashgate.
Gilliom, John. 2001. Overseers of the Poor: Surveillance,
Resistance, and the Limits of Privacy.
Chicago: University of Chicago Press.
notes Gilliom, John, and Torin Monahan. 2013.
SuperVision: An Introduction to the Surveillance
Society. Chicago: University of Chicago Press.
1. http://​w ww.surveillance-​studies.net/​. Gregg, Melissa. 2011. Work’s Intimacy. Malden,
2. http://​w ww.surveillance-​and-​society.org/​. MA: Polity.

9780190297817_Book.indb 32 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

xxix
ii

Introduction   xxxiii

Groebner, Valentin. 2007. Who Are You? Identification, Mirzoeff, Nicholas. 2011. The Right to Look: A
Deception, and Surveillance in Early Modern Counterhistory of Visuality. Durham, NC: Duke
Europe. Translated by M. Kyburz and J. Peck. University Press.
Cambridge, MA: Zone Books. Monahan, Torin. 2010. Surveillance in the Time
Guzik, Keith. 2016. Making Things Stick: Surveillance of Insecurity. New Brunswick, NJ: Rutgers
Technologies and Mexico’s War on Crime. University Press.
Oakland: University of California Press. —​—​—​. 2011. Surveillance as Cultural Practice. The
Hacking, Ian. 1990. T he Taming of Sociological Quarterly 52 (4):495–​508.
Chance. Cambridge, UK: Cambridge Monahan, Torin, and Priscilla M. Regan. 2012. Zones
University Press. of Opacity: Data Fusion in Post-​9/​1 1 Security
Haggerty, Kevin D., and Richard V. Ericson. 2000. Organizations. Canadian Journal of Law and
The Surveillant Assemblage. British Journal of Society 27 (3):301–​17.
Sociology 51 (4):605–​22. Mullins, Nicholas C. 1972. The Development of a
Hall, Rachel. 2015. The Transparent Traveler: The Scientific Specialty: The Phage Group and the
Performance and Culture of Airport Security. Origins of Molecular Biology. Minerva 10:52–​82.
Durham, NC: Duke University Press. Murakami Wood, David. 2009a. Can a Scanner See
Hayes, Ben. 2009. Neoconopticon: The EU the Soul? Philip K. Dick against the Surveillance
Security-​Industrial Complex: Statewatch and Society. Review of International American Studies
the Transnational Institute. Available from 3 (3)–​4 (1):46–​59.
http://​w ww.tni.org/​sites/​w ww.tni.org/​fi les/​ —​—​—​. 2009b. The ‘Surveillance Society’: Questions
download/​neoconopticon_ ​0.pdf [accessed May of History, Place and Culture. European Journal of
17, 2013]. Criminology 6 (2):179–​94.
Hier, Sean P., and Josh Greenberg. 2009. The Politics Nippert-​Eng, Christena E. 2010. Islands of Privacy.
of Surveillance: Power, Paradigms, and the Field Chicago: University of Chicago Press.
of Visibility. In Surveillance: Power, Problems, and OED Online. 2016. “eavesdrop, v.” Available from
Politics, edited by S. P. Hier and J. Greenberg, 14–​ http://​w ww.oed.com/​v iew/​Entry/​59159?rskey=elS
29. Vancouver: UBC Press. 7Jf&result=2&isAdvanced=false [accessed August
Huxley, Aldous. 2006 [1932]. Brave New World. 19, 2016].
Reprint ed. New York: Harper Perennial. Orwell, George. 1949. Nineteen Eighty-​Four.
Karatani, Kojin. 2014. The Structure of World Centennial ed. New York: Harcourt Brace.
History: From Modes of Production to Modes Patton, Jason W. 2000. Protecting Privacy in
of Exchange. Translated by M. K. Bourdaghs. Public?: Surveillance Technologies and the
Durham, NC: Duke University Press. Value of Public Places. Ethics and Information
Kevles, Daniel J. 1995. In the Name of Technology 2:181–​87.
Eugenics: Genetics and the Uses of Human Porter, Theodore M. 1995. Trust in Numbers: The
Heredity. Cambridge, MA: Harvard Pursuit of Objectivity in Science and Public Life.
University Press. Princeton, NJ: Princeton University Press.
Latour, Bruno. 2005. Reassembling the Social: An Poster, Mark. 1990. The Mode of
Introduction to Actor-​Network-​T heory. Information: Poststructuralism and Social Context.
Oxford: Oxford University Press. Chicago: University of Chicago Press.
Lefait, Sébastien. 2013. Surveillance on Regan, Priscilla M. 1995. Legislating Privacy:
Screen: Monitoring Contemporary Films and Technology, Social Values, and Public Policy.
Television Programs. Lanham, MD: Scarecrow Chapel Hill: University of North Carolina
Press, Inc. Press.
Lyon, David. 1988. The Information Society: Issues and Rosen, David, and Aaron Santesso. 2013. The
Illusions. Cambridge, UK: Polity. Watchman in Pieces: Surveillance, Literature,
—​—​—​. 1994. The Electronic Eye: The Rise of and Liberal Personhood. New Haven, CT: Yale
Surveillance Society. Minneapolis: University of University Press.
Minnesota Press. Rule, James B. 1973. Private Lives and Public
—​—​—​. 2001. Surveillance Society: Monitoring Everyday Surveillance: Social Control in the Computer Age.
Life. Buckingham, UK: Open University. London: Allen Lane.
Marks, Peter. 2005. Imagining Surveillance: Utopian Scott, James C. 1998. Seeing Like a State: How Certain
Visions and Surveillance Studies. Surveillance & Schemes to Improve the Human Condition Have
Society 3 (2/​3):222–​39. Failed. New Haven, CT: Yale University Press.
Marx, Gary T. 1988. Undercover: Police Surveillance Sekula, Allan. 1986. The Body and the Archive.
in America. Berkeley: University of October 39:3–​64.
California Press. Smith, Gavin J. D. 2015. Opening the Black Box: The
McCahill, Michael, and Rachel L. Finn. 2014. Work of Watching. New York: Routledge.
Surveillance, Capital, and Resistance: Theorizing Staples, William G. 2000. Everyday
the Surveillance Subject. New York: Routledge. Surveillance: Vigilance and Visibility in
McGrath, John E. 2004. Loving Big Postmodern Life. Lanham, MD: Rowman &
Brother: Performance, Privacy, and Surveillance Littlefield Publishers.
Space. New York: Routledge. Taylor, Frederick Winslow. 1911. The Principles of
Mills, C. Wright. 1959. The Sociological Imagination. Scientific Management. New York: Harper &
New York: Oxford University Press. Brothers.

9780190297817_Book.indb 33 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

vxxi

xxxiv  Introduction
Torpey, John C. 2000. The Invention of the in the Suppression of Animal Rights Activists in
Passport: Surveillance, Citizenship, and the State. Canada. Social Movement Studies 10 (1):21–​37.
Cambridge, UK: Cambridge University Press. Wise, J. Macgregor. 2016. Surveillance and Film.
U.S. Office of Technology Assessment. 1987. The New York: Bloomsbury.
Electronic Supervisor: New Technology, New Zamyatin, Yevgeny. 1972 [1921]. We. Translated by
Tensions, OTA-​CIT-​333. Washington, DC: U.S. M. Ginsburg. New York: Viking.
Office of Technology Assessment. Zimmer, Catherine. 2015. Surveillance Cinema.
Walby, Kevin, and Jeffrey Monaghan. 2011. Private New York: New York University Press.
Eyes and Public Order: Policing and Surveillance

9780190297817_Book.indb 34 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

Section 1

OPENINGS AND DEFINITIONS

H ow one defines surveillance is vital.


Definitions inform the types of research
one does and claims one can make. Although
under attack, this framing logically leads to
appeals to the law to mitigate such harms.
The modifications that have been made
it may be true that the specific interests to this type of definition have been predomi-
of scholars, which are disciplinarily condi- nately influenced by a Foucauldian concep-
tioned, lead them to prefer some definitions tion of power that decenters the individual
over others, the early years of the field saw and emphasizes the ways in which all people
greater variation in definitions than is typi- are caught in webs of power relations. So, in-
cally the case today. This is probably because stead of placing the individual human subject
scholars were dispersed and mostly working at the center, the focus of analysis could be on
in separate areas with few opportunities to groups, societies, or even nonhumans. The in-
form a consensus about key definitions or troduction of the possibility of the nonhuman
concepts. With a few exceptions, though, subject of surveillance has several implications.
participants in the field quickly agreed that The first is that nonhuman creatures might be
surveillance signified more than passive under surveillance, which has been considered
observation; it was instead, or additionally, at greater length by both Irus Braverman (see
about the production of power relations. Section 2) and Kevin Haggerty and Daniel
One of the first scholars to consider sur- Trottier (2015). The second implication is that
veillance as a singular phenomenon was it might not be human beings directly who
James B. Rule (excerpted in Chapter 1). He are under surveillance, but rather situations,
and his colleagues defined surveillance as events, or a person’s indirect traces in data,
“any systematic attention to a person’s life which are the details of one’s “life” in Rule’s
aimed at exerting influence over it” (Rule sense. This attention to information and
et al. 1983: 223). This sociologically inflected personal data is at the heart of Rule’s book
definition depends on a liberal conception Private Lives and Public Surveillance, which
of personhood that sees individuals as sov- was published in 1973—​ a few years before
ereign agents shaped by external influences Foucault’s Discipline and Punish—​at the begin-
and interactions. Concerns emerge when ning of what was then being called the “data-
these external forces might be destructive, base society,” so clearly Rule was negotiating
unwanted, or unaccountable—​as with the a few different approaches to power. Scholars
bureaucratic surveillance analyzed by Rule. such as Roger Clarke (see Section 9) and
Because this definition derives its potency Oscar Gandy (excerpted in Chapter 2) would
from a view of individuals’ essential rights later pick up this focus on surveillance through

9780190297817_Book.indb 1 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

2   Surveillance Studies: A Reader

data (or “dataveillance”) and develop it further. field like surveillance studies is the “imperial
Even today, information and data remain cen- urge” to redefine everything as surveillance,
tral to most contemporary definitions of sur- and while some, like Gary Marx (2016), do
veillance and to the field more broadly, as the indeed argue for a maximalist definition that
selections in this reader testify. recasts casual observation or just “looking” as
By crafting definitions to emphasize somewhere on a continuum of surveillance, a
populations or groups as the targets, one primary purpose of definitions is to clarify the
can focus analytic attention on issues of gov- object of study, as well as its social context.
ernance. For instance, in his influential book Lyon’s highlighting of the “focused, systematic
Surveillance, Power, and Modernity (1990), and routine” nature of surveillance separates
Christopher Dandeker defines surveillance as out surveillance from other, more casual, oc-
“the gathering of information about and the casional, and disorganized forms of attention.
supervision of subject populations in organi- It does not, of course, say anything about the
zations” (Dandeker 1990: vii). This definition social significance or morality of either, merely
seems to offer a rather wider sense of who or that they are not the same. Gary Marx’s own
what is under surveillance—​the term “subject modus operandi, as demonstrated by his ex-
populations” both strips out the requirement cerpt in this section, is to produce compre-
for the subject of surveillance to be an indi- hensive lists of features and characteristics of
vidual or even to be human at all. Through its surveillance, against which any particular thing
explicit reference to subjection, it also draws can be assessed. He stresses key differences
attention to power, and with the last phrase between earlier modes of surveillance and
of the definition, “in organizations,” provides “new” digital surveillance.
an institutional framework for that power. In These definitions offer different prisms
some ways, one could argue that surveillance for thinking about the various sites, forms,
is about making and remaking both subject targets, and functions of surveillance. Some
populations and organizations, often at the mechanism of control or regulation may
same time. William Staples (excerpted in be seen as necessary for surveillance to
Chapter 3) emphasizes this co-​ constitutive be taking place, but the theoretical frames
relationship in his investigation and theoriza- adopted by scholars color their views of
tion of “everyday surveillance.” what else matters most (e.g., individuals,
Likewise, David Lyon’s oft-​quoted definition groups, contexts). While the goals of those
of surveillance—​as “the focused, systematic implementing surveillance systems may
and routine attention to personal details for seem like an obvious focal point, for some
purposes of influence, management, protec- time the field has been concentrating in-
tion or direction” (excerpted in Chapter 4)—​ stead on conditions, contexts, experiences,
retains a focus on the person, but his analysis and negotiations of surveillance (e.g., Ball
is further concerned with “sites” of surveil- 2009; McCahill and Finn 2014; Saulnier
lance (both actual and metaphorical) and with 2016). Perhaps with the advent of big data
processes. Beyond simply “watching,” Lyon’s and automated analytics, definitions will
definition explicitly considers the purposes have to shift to emphasize the construction
and qualities of attention that are needed for of emergent purposes in a society in which
something to be “surveillance.” One of the surveillance is ubiquitous and all data are
dangers inherent in a new transdisciplinary collected as a matter of course.

9780190297817_Book.indb 2 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

Introduction to Section 1: Openings and Definitions   3

References McCahill, Michael, and Rachel L. Finn. 2014.


Surveillance, Capital, and Resistance: Theorizing
Ball, Kirstie S. 2009. Exposure: Exploring the Subject the Surveillance Subject. New York: Routledge.
of Surveillance. Information, Communication & Rule, James B., Douglas McAdam, Linda Stearns, and
Society 12 (5):639–​57. David Uglow. 1983. Documentary identification
Dandeker, Christopher. 1990. Surveillance, Power, and mass surveillance in the United States.
and Modernity: Bureaucracy and Discipline from Social Problems 31 (2):222–​34.
1700 to the Present Day. Cambridge, UK: Polity. Saulnier, Alana. 2016. Surveillance Studies and
Haggerty, Kevin D., and Daniel Trottier. 2015. the Surveilled Subject. Doctoral dissertation,
Surveillance and/​of Nature: Monitoring beyond Department of Sociology, Queen’s University,
the Human. Society & Animals 23 (4):400–​20. Kingston, ON.
Marx, Gary T. 2016. Windows into the Soul: Surveillance
and Society in an Age of High Technology.
Chicago: University of Chicago Press.

9780190297817_Book.indb 3 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

9780190297817_Book.indb 4 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

JAMES B. RULE
P R I V AT E L I V E S A N D
PUBLIC SURVEILL ANCE
Social Control in the Computer Age

In a work that predates Foucault’s recasting of Bentham’s Panopticon, James Rule


anticipates a comprehensive system of surveillance that amasses data on all individuals,
stores those data indefinitely, has predictive capabilities for advance intervention, and
fosters social control by eliminating possibilities for disobedience. He calls this system
a “total surveillance society.” While Rule is explicit in mobilizing the concept of a total
surveillance society as a heuristic for analysis—​against which to compare existing sur-
veillance systems—​and as a cautionary figure, today’s emerging capabilities in predictive
analytics and data fusion show just how prescient he was.
***
Why do we find the world of 1984 so Those who seek to maintain social con-
harrowing? Certainly one reason is its trol must accomplish two sorts of things.
vision of life totally robbed of personal pri- First, they must maintain what one might
vacy, but there is more to it than that. For call powers of control. This means, for one
the ugliest and most frightening thing thing, that they need to be able to apply
about that world was its vision of total con- sanctions, or inducements sufficient to
trol of men’s lives by a monolithic, author- discourage the sanctioned person from re-
itarian state. Indeed, the destruction of peating his disobedient acts. . . . Second, if
privacy was a means to this end, a tool for the system is not to rely only on reward or
enforcing instant obedience to the dictates punishment after the fact, it must possess
of the authorities. means of excluding would-​be rule-​breakers
And yet, such thoroughgoing, relentless from the opportunity to disobey, for ex-
social control represents nothing other than ample, by refusing in some way to deal with
an extreme manifestation of one of the ubiq- them. . . .
uitous processes of social life. Ubiquitous, Neither of these two powers does any
and actually vital. . . . good, however, without . . . a system of

9780190297817_Book.indb 5 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

6   Surveillance Studies: A Reader

surveillance. In the first place, surveillance of earlier behaviour. Nor would the single
entails a means of knowing when rules are master agency compartmentalize informa-
being obeyed, when they are broken, and, tion which it collected, keeping certain data
most importantly, who is responsible for for use only in certain kinds of decisions.
which. In some instances these things may Instead, it would bring the whole fund
be easy to accomplish, e.g., a flagrant armed of its information to bear on every deci-
robbery by notorious criminals. In the case sion it made about everyone. Any sign of
of other forms of disobedience, such as in- disobedience—​ present or anticipated—​
come tax evasion, it may be extremely diffi- would result in corrective action. The fact
cult. A second element of surveillance, also that the system kept everyone under con-
indispensable, is the ability to locate and stant monitoring would mean that, in the
identify those responsible for misdeeds of event of misbehaviour, apprehension and
some kind. Again, this may be simple in sanctioning would occur immediately. By
many cases . . . however, it may be the most making detection and retaliation inevitable,
difficult condition of all to fulfil. such a system would make disobedience al-
In practice, it is often very difficult to most unthinkable.
draw boundaries between processes of sur- One should never expect to encounter a
veillance and the application of what has real system like the one just described. That
been termed the powers of control . . . the is just the point. The only usefulness of this
same people and the same bodies are paradigm is as a foil for comparison to real
often engaged in the collection of infor- systems, as a case guaranteed to be more ex-
mation and in the application of sanctions. treme than the real world could ever produce.
Nevertheless, when I want to emphasize True, some agencies may develop something
those activities having to do with collecting like systems of total surveillance over very
and maintaining information, I speak of limited numbers of people, for short periods
systems of surveillance. Where the concern of time. Police may keep constant watch over
lies more with the actual management of a small group of conspirators, or the staff
behaviour, through sanctioning or exclu- of a hospital may exercise something like
sion, I refer to systems of control. . . . total surveillance over those in the intensive
[L]‌et me sketch a model of the most ex- care ward. But difficulties of staging, and
treme possible development of mass sur- especially prohibitive costs, rule out such
veillance, an ideal type of a social order techniques for larger clienteles over longer
resembling the one portrayed by Orwell, periods of time. No, the usefulness of the
though perhaps even more extreme. This paradigm lies in its making it possible to
I call a total surveillance society. compare systems of surveillance and control
In such a world, first of all, there would now in existence to this theoretical extreme
be but a single system of surveillance and and to one another in terms of their prox-
control, and its clientele would consist of imity to this extreme. . . .
everyone. This system would work to en- [A]‌ny real surveillance system is limited
force compliance with a uniform set of in size. This means, for one thing, limita-
norms governing every aspect of everyone’s tion to the numbers of persons whom it can
behaviour. Every action of every client would depict in its files. Second, there is always
be scrutinized, recorded and evaluated, a limitation in the amount of information
both at the moment of occurrence and for with which a system can cope, the amount
ever afterwards. The system would collate which it can meaningfully use in its deci-
all information at a single point, making sion-​making on each person. Indeed, . . . the
it impossible for anyone to evade responsi- amount of usable information is often less
bility for his past by fleeing from the scene than that which is theoretically available on

9780190297817_Book.indb 6 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

Rule: Private Lives and Public Surveillance   7

file. And such limitations on the amount data to bear on a client quickly enough to
of usable data kept per person correspond act against him.
in turn to limitations in the amount of the Fourth, and finally, real systems of
subject’s life depicted in the files. Third, mass surveillance and control are limited
surveillance systems also face limitations to varying degrees in what I term their
in what one might term the subtlety of their points of contact with their clienteles. This
decision-​making based on filed data. In the again involves several things. First, ex-
world of 1984 the authorities seemed to use isting systems are limited in the numbers
information cunningly enough to know of points at which they can incorporate in-
what their people were going to do even be- formation on the people with whom they
fore they themselves did. . . . must deal. Whereas in 1984 the authorities
Second, real surveillance systems could ‘tune in’ on virtually every moment
are limited in the centralization of their of every person’s life, real surveillance sys-
files . . . some are more centralized than tems restrict themselves to limited points
others. Centralization of data is extremely of intake—​for example, through the courts
important in the staging of social control, and a few other junctures in the case of
in that it prevents clients from escaping the police surveillance, and through credit-​
effects of their past by moving from one granting institutions, in the instance of
place to another. If the single central record consumer credit reporting. Similarly, ex-
can be applied wherever the fugitive goes, isting systems are limited in terms of their
such movement does no good. Thus, to be ability to ‘get back at’—​ to locate, accost
fully effective, any system of surveillance and apprehend—​ those who have broken
should be able to collect information on a the rules. Unlike Orwell’s world, modern
person’s behaviour from any point in a so- societies provide many opportunities for
ciety, and use it to enact measures of control those who wish to avoid the attention of the
on the same person at any other point. authorities simply to drop out of sight. To
Third, real systems fall short of the be sure, systems of mass control have their
total surveillance extreme, and vary con- own ways of countervailing against these
siderably among themselves, in terms of opportunities. . . .
the speed of information-​flow and decision-​ A final and equally important element of
making which they exhibit. In Orwell’s contact between system and clientele is the
world, all misbehaviour presumably was ability of the former to identify individual
registered with the authorities immedi- clients. . . . [T]‌he position of the agency of
ately, and resulted in immediate retribution control suffers unless it can quickly and un-
when necessary. The systems studied here, erringly link any single client to his record.
by contrast, are not nearly so sophisticated. Since clients themselves often wish to avoid
They are slow, for one thing, in their in- such linkage, the strength of identification
take of information: relevant facts may be systems represents one of the important
available for some time before the system elements of the hold of the system on those
can bestir itself to incorporate them in us- with whom it deals. . . .
able form. Moreover, these systems vary in There are several distinct reasons for
the speed of movement of data once it is in- mistrusting the continuing growth of mass
corporated in their files, and in the applica- surveillance. One is simply the repres-
tion of such data to decision-​making about sive potential which they confer upon the
people. Limitations like these make it easier corporate agencies maintaining the sur-
for the individual to escape the effects of his veillance, or upon whoever controls those
past, for example, in cases where the agency agencies . . . any over-​all response to these
of surveillance and control cannot bring its systems must take into account not only

9780190297817_Book.indb 7 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

8   Surveillance Studies: A Reader

their present impact, but also their future another heuristic, hypothetical case. But
prospects. And this means accepting the there is no guarantee that this will always
possibility that, in the course of other po- be true. The growing sophistication of pre-
litical changes, the intent and political dis- dictive techniques promises to make the
position of those who control these systems choices implicit in these situations increas-
may change. . . . ingly dramatic and difficult. . . .
Another objection to the extension even There is a final reservation about the
of ‘just’ discrimination based on mass growth of mass surveillance, more subtle
surveillance has to do with their effects on than the preceding ones, but no less com-
those discriminated against. The object of pelling. It has to do with the inherent
discriminations like those discussed here, value of choice in responding to the
after all, is to achieve the cheapest possible strictures of control imposed by the social
identification of those who have not or will world. . . . Total surveillance could theoret-
not obey the rules. Often the idea is to ex- ically provide limitless benefits in the way
clude these people in advance. . . . [W]‌ith of compliance, but only at the expense of
sophisticated manipulations of aggre- watching and controlling people so closely
gate data, even tiny and seemingly ir- and constantly as to render misbehaviour
relevant facts can represent significant out of the question. . . . Corporate participa-
predictors. The use of such discrimina- tion in every moment of every individual’s
tion procedures thus raises the question life, no matter how fair or how discreet or
of what sorts of data should legitimately how benign, is simply too great a price to
be usable in decision-​making which may, pay for obedience. Life in a highly imper-
after all, weigh very heavily upon the fect social world is still infinitely preferable
clients concerned. . . . to life in a world offering no opportunities
What if, by collecting data on some ex- for imperfection. . . .
tremely private area of people’s behaviour, Because of the beguiling appeal of
one could predict with virtual certainty the fine-​grained decision-​making, it is hard
likelihood of their causing a fatal traffic ac- to hope for any sweeping curtailment of
cident in the near future? The predictive mass surveillance and control. Certainly
behaviour, presumably, would involve no di- it is reasonable to expect public opinion
rect and obvious connection with motoring, to oppose measures seen as repressive
and obviously would not itself represent an or coercive towards the public at large.
infraction against motoring laws. To this Certainly, too, one can realistically hope
extent, one would be inclined to resist com- for the acceptance of reform measures
pulsory surveillance over the behaviour in like those already proposed, to make mass
question. On the other hand, if prediction surveillance more open, accountable and
were really virtually perfect, the cost of just. Whether one can expect people to re-
forgoing it, in terms of lives, would be ex- nounce altogether the benefit of practices
cruciatingly obvious. At present such dis- felt to provide essential personal services
crimination represents nothing more than is another matter.

9780190297817_Book.indb 8 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

OSCAR H. GANDY, JR.


THE PANOP TIC SOR T
A Political Economy of Personal Information

Oscar Gandy’s lifework has been in understanding systems of sorting and classification,
particularly in regard to racial and other inequalities. He is one of the few scholars from
whom we have two excerpts in this Reader because his work is both foundational and of
direct ongoing contemporary relevance. This excerpt is from The Panoptic Sort, one of the
books that defined what surveillance studies was to become both in its objects of study
(the social and political consequences of contemporary systems of data gathering and anal-
ysis) and its theoretical influences, combining political economy (Marx), sociology (Weber,
Giddens), the history of ideas (Foucault), and critical approaches to technology (Ellul).
***
In 1934, the Spiegel corporation was an evidence is clear that a similar discrimina-
industry leader in the development of a tory process that sorts individuals on the
pointing system, which it used to evaluate basis of their estimated value or worth has
applications for credit. Spiegel developed become even more important today and
what it called the “vital question system,” reaches into every aspect of individuals
which gathered data in four critical areas lives in their roles as citizens, employees,
that were then used as the primary factors and consumers.
in the decision to grant credit. The four I refer to this process as the “panoptic
questions were (1) amount of the order, sort,” the all-​seeing eye of the difference
(2) occupation of the applicant, (3) marital machine that guides the global capitalist
status, and (4) race of the applicant. Other system. Kevin Robins and Frank Webster
data gathered in the rating process included have coined the phrase “cybernetic cap-
an assessment of the importance of the ge- italism” to underscore the nature of the
ographic territory to the overall marketing totalizing system of social control that
plan. Although race and marital status are depends on the ability of state and corporate
no longer legally permissible components bureaucracies to collect, process, and share
of the credit authorization process, the massive amounts of personal information

9780190297817_Book.indb 9 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

01

10   Surveillance Studies: A Reader

to track, command, coordinate, and control of an efficient market. These inequalities


each and every one of us to an extent we have to do with differential access to infor-
would not have considered possible. Other mation that is necessary for informed deci-
descriptive terms appeared over the years sion making.
as I have gathered examples and insights The operation of the panoptic sort
about the nature of this process. One that increases the ability of organized interests,
still holds an attraction is the notion of whether they are selling shoes, toothpaste,
triage. The popular understanding of the or political platforms, to identify, iso-
term is that associated with medical de- late, and communicate differentially with
cision making: “the sorting and alloca- individuals in order to increase their influ-
tion of treatment to patients, especially ence over how consumers make selections
battle and disaster victims, according to a among these options. At the same time
system of priorities designed to maximize that the panoptic sort operates to increase
the number of survivors.” The original the precision with which individuals are
meaning of the term, however, is derived classified according to their perceived value
from the French trier, meaning to pick or to in the marketplace and their susceptibility
cull, but the word emerged into the English to particular appeals, the commoditization
language as having to do with the “grading of information increases the dependence of
of marketable produce,” and more specifi- these interests on subsidized information.
cally, referring to “the lowest grade of coffee To the extent that the panoptic sort, as an
berries, consisting of broken material.” extension of technical rationalization into
Although some metaphors speak for them- the social realm of consumer and political
selves, let me be clear. I see the panoptic behavior, depends on a reduction of the
sort as a kind of high-​tech, cybernetic triage skills of individuals in the same way that
through which individuals and groups of automation reduces the skills of laborers in
people are being sorted according to their the factory or the modern office, the market
presumed economic or political value. The and the political or public sphere as we un-
poor, especially poor people of color, are derstand them are transformed and are
increasingly being treated as broken mate- placed at risk.
rial or damaged goods to be discarded or As the panoptic sort matures and
sold at bargain prices to scavengers in the increases in scale and scope, a number of
marketplace. . . . contradictory developments seem likely.
In my view, this sorting mechanism First, because the sorting mechanism
cannot help but exacerbate the massive and utilizes data about past behaviors, it tends
destructive inequalities that characterize to limit the options that are presented for
the U.S. political economy as it moves for- individuals to choose. When the options
ward into the information age. It is a pro- concern choices about information, this
cess that feeds on itself. Although there are tendency has the potential to increase the
already some signs of resistance that have knowledge and information gap between
emerged in some quarters, the response of the haves and the have nots. Also, to the
the panoptic system is very much like that extent that these conservative models
of a child’s straw finger puzzle: Once you aim at the lowest common denominator,
have placed your fingers in either end of the panoptic sort will contribute to a
the tube, the more you struggle to escape, generalized lowering of the average level
the more it tightens its grip. I would like to of public understanding. Second, because
suggest that these inequalities are emerging the sorting mechanism is based on theo-
in an area that is critical to the maintenance retical models that reflect quite transitory
of a democratic polity and to the operation fads or trends in social, economic, and

9780190297817_Book.indb 10 12-Jul-18 3:28:26 PM


OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN

Gandy: The Panoptic Sort   11

political thought, increasing instability solely in response to an action by the object


in markets and political action will be- of its control. The panoptic sort is a system
come the rule rather than the exception. of actions that governs other actions. The
Third, as people’s awareness of the pan- panoptic sort is a system of power.
optic machine grows, some will find ways
to resist, and others will attempt to with-
draw. Both responses will invite further
attempts at inclusion and containment Identification
within the panoptic sphere. The same
technology that threatens the autonomy of The panoptic sort can be understood
the individual seems destined to frustrate to involve three integrated functions or
attempts to reestablish community and processes: identification, classification,
shared responsibility because it destroys and assessment. Although its operation
the essential components of trust and is by no means limited to identifiable
accountability. . . . individuals, it depends to a large part on
The panoptic sort is the name I have the ability of its users to reliably identify
assigned to the complex technology that the objects to be controlled. The identifi-
involves the collection, processing, and cation will never move to the level of per-
sharing of information about individuals sonhood as we may understand the person
and groups that is generated through their as the subject of religion, philosophy, and
daily lives as citizens, employees, and idealized systems of justice. The attention
consumers and is used to coordinate and of the panoptic sort moves only to levels of
control their access to the goods and serv- identification that have administrative and
ices that define life in the modern capitalist instrumental relevance. Here we refer to
economy. the identification of persons with histories,
The panoptic sort is a system of disci- records, and resources when those persons
plinary surveillance that is widespread or agents of those persons present a card,
but continues to expand its reach. The op- form, signature, claim, or response, or
eration of the panoptic system is guided when they present themselves at a partic-
by a generalized concern with ration- ular place or time. Identification is associ-
alization of social, economic, and po- ated with authorization and authentication
litical systems. The panoptic sort is a of claims. Identification is associated with
difference machine that sorts individuals the assumption of responsibility for actions,
into categories and classes on the basis of transactions, interactions, and reactions,
routine measurements. It is a discrimina- which may be recorded by the panoptic
tory technology that allocates options and system. The level of identification required
opportunities on the basis of those meas- by the panoptic system is indicated by the
ures and the administrative models that importance of the transaction that is about
they inform. The panoptic sort has been to take place. As the level of risk increases,
institutionalized. It is standard operating more sophisticated technologies are called
procedure. It is expected. It has its place. into play. The signature gives way to the
Its operation is even required by law. And physical description, which gives way to the
where it is not, people call out for its in- photograph, which gives way to the finger-
stallation. Its work is never done. Each print, or the voice print, or the retinal scan.
use generates new uses. Each application But that is not enough.
justifies another. It is efficient, having The panoptic sort frequently requires
largely been automated. Like a voice-​ third-​party validation. You may be who you
activated recorder, it moves into action say you are, but we need verification that you

9780190297817_Book.indb 11 12-Jul-18 3:28:27 PM


Another random document with
no related content on Scribd:
afraid? Hear my crying, O Lord; incline thine ear to my calling, my
King and my God, for unto Thee do I make my prayer.’ With these
and other verses of the Psalms the enemy was at length put to flight;
Albinus completed his prayer and went to rest.[64] At that time only
one of his disciples, Waltdramn by name, who is still alive, was
watching with him; he saw all this from a place of concealment, a
witness of this thing that took place.”
St. Martin himself once had a meeting with the devil[65]. There
came into his cell a purple light, and one stood in the midst thereof
clad in a royal robe, having on his head a diadem of gold and
precious stones, his shoes overlaid with gold, his countenance
serene, his face full of joy, looking like anything but the devil. The
devil spoke first. “Know, Martin, whom you behold. I am Christ. I am
about to descend from heaven to the world. I willed first to manifest
myself to thee.” Martin held his tongue. “Why dost thou doubt,
Martin, whom thou seest? I am Christ.” Then the Spirit revealed that
this was the devil, not God, and he answered, “The Lord Jesus did
not predict that He would come again resplendent with purple and
diadem. I will not believe that Christ has come, except in the form in
which He suffered, bearing the stigmata of the Cross.” Thereupon
the apparition vanished like smoke, leaving so very bad a smell that
there was no doubt it was the devil. “This account I had from the
mouth of Martin himself,” Sulpicius adds.
“The father used a little wine, in accordance with the apostle’s
precept, not for the pleasure of the palate, but by reason of his bodily
weakness.[66] In every kind of way he avoided idleness; either he
read, or he wrote, or he taught his disciples, or he gave himself to
prayer and the chanting of Psalms, yielding only to unavoidable
necessities of the body. He was a father to the poor, more humble
than the humble, an inviter to piety of the rich, lofty to the proud, a
discerner of all, and a marvellous comforter. He celebrated every day
many solemnities of masses[67] with honourable diligence, having
proper masses deputed for each day of the week. Moreover, on the
Lord’s day, never at any time after the light of dawn began to appear
did he allow himself to slumber, but swiftly preparing himself as
deacon with his own priest Sigulf he performed the solemnities of
special masses till the third hour, and then with very great reverence
he went to the public mass. His disciples, when they were in other
places, especially when they assisted ad opus Dei, carefully studied
that no cause of blame be seen in them by him.
“The time had come when Albinus had a desire to depart and be
with Christ. He prayed with all his will that if it might be, he should
pass from the world on the day on which the Holy Spirit was seen to
come upon the apostles in tongues of fire, and filled their hearts.
Saying for himself the vesper office, in the place which he had
chosen as his resting-place after death, namely, near the Church of
St. Martin, he sang through the evangelic hymn of the holy Mary with
this antiphon[68], ‘O Key of David, and sceptre of the house of Israel,
who openest and none shutteth, shuttest and none openeth, come
and lead forth from the house of his prison this fettered one, sitting in
darkness and the shadow of death.’ Then he said the Lord’s Prayer.
Then several Psalms—Like as the hart desireth the water-brooks. O
how amiable are Thy dwellings, Thou Lord of hosts. Blessed are
they that dwell in Thy house. Unto Thee lift I up mine eyes. One
thing I have desired of the Lord. Unto Thee, O Lord, will I lift up my
soul.
“He spent the season of Lent, according to his custom, in the most
worthy manner, with all contrition of flesh and spirit and purifying of
habit. Every night he visited the basilicas of the saints which are
within the monastery of St. Martin,[69] washing himself clean of his
sins with heavy groans. When the solemnity of the Resurrection of
the Lord was accomplished, on the night of the Ascension he fell on
his bed, oppressed with languor even unto death, and could not
speak. On the third day before his departure he sang with exultant
voice his favourite antiphon, ‘O key of David,’ and recited the verses
mentioned above. On the day of Pentecost, the matin office having
been performed, at the very hour at which he had been accustomed
to attend masses, at opening dawn, the holy soul of Albinus is[70]
released from the body, and by the ministry of the celestial deacons,
having with them the first martyr Stephen and the archdeacon
Laurence, with an army of angels, he is led to Christ, whom he
loved, whom he sought; and in the bliss of heaven he has for ever
the fruition of the glory of Him whom in this world he so faithfully
served.”
The Annals of Pettau enable us to fill in some details of Alcuin’s
death. Pettau was not far from Salzburg, and therefore the
monastery was likely to be well informed. Arno of Salzburg, Alcuin’s
great admiration and his devoted personal friend, would see to it that
in his neighbourhood all ecclesiastics knew the details. The seizure
on the occasion of his falling on his bed was a paralytic stroke. It
occurred, according to the Annals from which we are quoting, on the
fifth day of the week on the eighth of the Ides of May, that is, on May
8; but in that year, 804, Ascension Day fell on May 9, so that for the
eighth of the Ides we must read the seventh of the Ides. The seizure
took place at vesper tide, after sunset. He lived on till May 19,
Whitsunday, on which day he died, just as the day broke.
“On that night,” to return to the Life, “above the church of the holy
Martin there was seen an inestimable clearness of splendour, so that
to persons at a distance it seemed that the whole was on fire. By
some, that splendour was seen through the whole night, to others it
appeared three times in the night. Joseph the Archbishop of Tours
testified that he and his companions saw this throughout the night.
Many that are still sound in body testify the same. To more persons,
however, this brightness appeared in the same manner, not on that
but on a former night, namely, on the night of the first Sunday after
the Ascension.
“At that same hour there was displayed to a certain hermit in Italy
the army of the heavenly deacons, sounding forth the ineffable
praises of Christ in the air; in the midst of whom Alchuin[71] stood,
clothed with a most splendid dalmatic, entering with them into
heaven to minister with perennial joy to the Eternal Pontiff. This
hermit on that same day of Pentecost told what he had seen to one
of the brethren of Tours, who was making his accustomed way to
visit the thresholds of the Apostles.[72] The hermit asked him these
questions,—‘Who is that Abbat that lives at Tours, in the monastery
of the holy Martin? By what name is he called? And was he well in
body when you left?’ The brother replied, ‘He is called Alchuin, and
he is the best teacher in all France. When I started on my way hither,
I left him well.’ The solitary made rejoinder, with tears, that he was
indeed enjoying the very happiest health; and he told him what he
had seen at day-break that day. When the brother got back to Tours,
he related what he had heard.
“Father Sigulf, with certain others, washed the body of the father
with all honour, and placed it on a bier. Now Sigulf had at the time a
great pain in the head, but being by faith sound in mind, he found a
ready cure for his head. Raising his eyes above the couch of the
master, he saw the comb[73] with which he was wont to comb his
head. Taking it in his hands he said, ‘I believe, Lord Jesus, that if I
combed my head with this my master’s comb, my head would at
once be cured by his merits.’ The moment he drew the comb across
his head, that part of the head which it touched was immediately
cured, and thus by combing his head all round he lost the pain
completely. Another of his disciples, Eangist by name, was
grievously afflicted with immense pain in his teeth. By Sigulf’s advice
he touched his teeth with the comb, and forthwith, because he did it
in faith, he received a cure by the merits of Alchuin.
“When Joseph, the bishop of the city of Tours, a man good and
beloved of God, heard that the blessed Alchuin was dead, he came
to the spot immediately with his clerks, and washing Alchuin’s eyes
with his tears, he kissed him frequently. He advised, moreover, using
wise counsel, that he should not be buried outside, in the place
where the father himself had willed, but with all possible honour
within the basilica of the holy Martin, that the bodies of those whose
souls are united in heaven should on earth lie in one home. And thus
it was done. Above his tomb was placed, as he had directed, a title
which he had dictated in his lifetime, engraved on a plate of bronze
let into the wall.”[74]
The simple epitaph, apart from the title, ran thus:—
“Here doth rest the lord Alchuuin the Abbat, who died in peace on
the fourteenth of the Kalends of June. When you read, O all ye who
pass by, pray for him and say, The Lord grant unto him eternal rest.”
CHAPTER III
The large bulk of Alcuin’s letters and other writings.—The main dates of his life.
—Bede’s advice to Ecgbert.—Careless lives of bishops.—No parochial system.—
Inadequacy of the bishops’ oversight.—Great monasteries to be used as sees for
new bishoprics, and evil monasteries to be suppressed.—Election of abbats and
hereditary descent.—Evils of pilgrimages.—Daily Eucharists.

We in the diocese of Bristol have a special right to study and to


make much of the letters of Alcuin. Our own great historian, William
of Malmesbury, had in the library of Malmesbury from the year 1100
and onwards an important collection of these letters, from which he
quotes frequently in support of the historical statements which he
makes. More than that, we know of some of the letters of Alcuin only
from the quotations from them thus made by William in this diocese
some 800 years ago. This is specially stated by Abbat Froben, of
Ratisbon, who edited the letters of Alcuin 140 years ago.
The letters of Alcuin are addressed to an emperor, to kings,
queens, popes, patriarchs, archbishops, dukes, and others; so that
of Alcuin’s political importance there can be no question. As to his
learning, William of Malmesbury pays him the great compliment of
naming him along with our own Aldhelm and with Bede. “Of all the
Angles,” he says,[75] “of whom I have read, Alcuin was, next to the
holy Aldhelm and Bede, certainly the most learned.”
Alcuin was born in Northumbria in or about the year 735. He left
England to live in France in 782, returned for a time in 792, and left
finally in 793. He died in 804. We can thus see how he stands in
regard of date to those with whom we have dealt in former lectures.
Aldhelm and Wilfrith died in 709, only about a quarter of a century
before Alcuin’s birth. Bede died, according to the usual statement[76],
in 735, the year of Alcuin’s birth. Boniface was martyred in Holland in
755, when Alcuin was twenty years old.
As in the case of Gregory and of Boniface, who have been the
subjects of the last two courses of lectures, the letters of Alcuin are
the most important—or among the most important—sources of
information for the history of the times. The letters are 236 in
number, and they fill 373 columns of close small print in the large
volumes of Migne’s series. The letters of Boniface are not half so
numerous, and they occupy considerably less than one-third of the
space in the same print.
The letters of Alcuin, great as is their number and reach, form but
a small part of his writings. His collected works are six times as large
as his letters. His commentaries and treatises on the Holy Scriptures
are much more lengthy than his collected letters, more than two-
thirds as long again. His dogmatic writings are not far from half as
long again as his letters. His book on Sacraments and kindred
subjects is about two-thirds as long as his letters. His biographies of
saints, his poems, his treatises on teaching and learning, are all
together nearly as long as the letters; and there is almost the same
bulk of works which are attributed to him on evidence of a less
conclusive character.
Put briefly, this was his life. He was a boy at my own school, the
Cathedral School of York, a school which had the credit of educating,
800 years later, another boy who made a mark on history, Guy
Fawkes. The head master in Alcuin’s time was Ecgbert, Archbishop
of York and brother of the reigning king of Northumbria; and the
second master was Albert, Ecgbert’s cousin, and eventually his
successor in the chief mastership and in the archbishopric. Alcuin
succeeded to the practical part of the mastership on Ecgbert’s death
in 766, the new archbishop, Albert, retaining the government of the
school and the chief part of the religious teaching. In 778 Alcuin
became in all respects the head master of the school, and in the end
of 780 Albert died, leaving to Alcuin the great collection of books
which formed the famous library of York.
Alcuin had for some years travelled much on the continent of
Europe, and he was well acquainted with its principal scholars. They
were relatively few in number, learning having sunk very low on the
continent, while in Northumbria it had been and still was at a very
high level. Alcuin had also made acquaintance with Karl, not yet
known as Karl der Grosse, Carolus Magnus, Charlemagne, the son
of Pepin, king as yet of the Franks, emperor in the year 800, a man
about seven years younger than Alcuin. On a visit to the continent in
781 he again met Karl, who proposed to him that he should enter his
service as master of the school of his palace, and practically minister
of education for all parts of the vast empire over which Karl ruled. In
782 he joined Karl, having obtained leave of absence from the
Northumbrian king Alfweald, Archbishop Ecgbert’s great-nephew,
and from the new archbishop, Eanbald I. From that time onwards he
was Karl’s right-hand man, in matters theological as well as
educational; and in some matters of supreme political importance
too. The leave of absence lasted some nine or ten years; at the end
of that time Alcuin came back for a short time, but he soon after
terminated his official connexion with York, and spent the rest of his
life in the dominions of Karl.
Archbishop Ecgbert, Alcuin’s master, had been a friend of the
venerable Bede. The only occasion on which we know that Bede left
his cloister was that of a visit to Ecgbert at York, shortly before
Bede’s death, if he died in 735. We have it from Bede himself that he
had promised another visit to York in the following year, but was too
ill to carry out his promise. Failing the opportunity of long
conversations on the state of the Province of York, which
corresponded to the bishoprics of York, Lindisfarne, Hexham, and
Whithern, Bede set down his thoughts on parchment or tablets, and
sent them to his friend. This Letter of Bede to Ecgbert is by very far
the most important document of those times which has come down
to us; both because of the remarkable mass of information contained
in it, which we get from no other source, and because of the large
and broad views of ecclesiastical policy which it sets forth. It was no
doubt the advice and warnings of Bede that led Ecgbert to create the
educational conditions which developed the intellect of the most
intellectual man of his times, the subject of these lectures. Inasmuch
as it seems probable—indeed, is practically certain—that the
distressful state of Northumbria was the final cause of Alcuin’s
abandonment of his native land, it will be well to summarize the main
points of Bede’s dirge. We should bear in mind the fact that we are
reading a description by an ecclesiastic, a man keenly devoted to the
monastic life; and that the date is that of the year of Alcuin’s birth. It
tells us, therefore, something of the setting in which Alcuin found
himself in early boyhood.
Ecgbert had only become Bishop of York in the year of Bede’s visit
to him, 734. York was not as yet an Archbishopric; it was raised to
that dignity in Ecgbert’s time. Some writers call Paulinus Archbishop,
because a pall was sent to him by Gregory; but the pall did not reach
England till after Paulinus had run away from York.
Bede thinks it necessary to urge Ecgbert very earnestly to be
careful in his talk. He does not suppose that Ecgbert sins in this
respect, but it is matter of common report that some bishops do; that
they have no men of religion or continence with them, but rather
such as indulge in laughter and jests, in revellings, drunkenness, and
other pleasures of loose life; men who feast daily in rich banquets,
and neglect to feed their minds on the heavenly sacrifice.
There were in 735 sixteen bishops’ sees in England, held in the
south by Tatuin of Canterbury, Ingwald of London, Daniel of
Winchester, Aldwin of Lichfield, Alwig of Lindsey, Forthere of
Sherborn, Ethelfrith of Elmham[77], Wilfrid of Worcester, Wahlstod of
Hereford, Sigga of Selsey, Eadulf of Rochester; and in the north by
Ecgbert of York, Ethelwold of Lindisfarne, Frithobert of Hexham, and
Frithwald of Whithern. We may, probably, narrow Bede’s censure to
Lindisfarne and Hexham, if he really did, as some assume, refer to
his own parts. As a Northumbrian myself, I think that a long-headed
man like Bede, a Northumbrian by birth, more probably referred to
bishops of the parts which we now know as the Southern Province.
Alcuin’s letters, however, show that in his time there was much that
needed improvement in the case of northern bishops as well as
southern.
A bishop in those days had to do the main part of the teaching,
and preaching, and ministering the Sacraments, throughout the
diocese. Bede points out that Ecgbert’s diocese was much too large
for one man to cover it properly with ministrations. He must,
therefore, ordain priests, and appoint teachers to preach the Word of
God in each of the villages; to celebrate the heavenly mysteries; and
especially to attend to sacred baptism[78]. The persons so appointed
must make it their essential business to root deep in the memory of
the people that Catholic Faith which is contained in the Apostles’
Creed, and in like manner the Lord’s Prayer. Those of the people
who do not know Latin are to say the Creed and the Lord’s Prayer
over and over again in their native tongue; and this rule is not for the
laity only, but also for clergy and monks who do not know Latin. For
this purpose, Bede says he has often given translations of these two
into English to uneducated priests; for St. Ambrose declared that all
the faithful should say the Creed every morning, and the English
practice was to chant the Lord’s Prayer very often. How much we of
to-day would give for just one copy of Bede’s Creed and Lord’s
Prayer in English![79]
Ecgbert’s position in the sight of God, Bede says, will be very
serious if he neglects to do as he advises, especially if he takes
temporal gifts or payments from those to whom he does not give
heavenly gifts. This last point Bede presses home with affectionate
earnestness upon the “most beloved Prelate”. “We have heard it
reported,” he says, “that there are many villages and dwellings, on
inaccessible hills and in deep forests, where for many years no
bishop has been seen, no bishop has ministered; and yet no single
person has been free from the payment of tribute to the bishop; and
that although not only has he never come to confirm those who have
been baptized, but there has been no teacher to instruct them in the
faith or show them the difference between good and evil. And if we
believe and confess,” he continues, “that in the laying on of hands
the Holy Spirit is received, it is clear that that gift is absent from
those who have not been confirmed. When a bishop has, from love
of money, taken nominally under his government a larger part of the
population than he can by any means visit with his ministrations in
one whole year, the peril is great for himself, and great for those to
whom he claims to be overseer while he is unable to oversee them.”
Ecgbert has, Bede tells him, a most ready coadjutor in the King of
Northumbria, Ceolwulf, Ecgbert’s near relative, his first cousin, whom
Ecgbert’s brother succeeded. The [arch]bishop should advise the
King to place the ecclesiastical arrangements of the Northumbrian
nation on a better footing. This would best be done by the
appointment of more bishops. Pope Gregory had bidden Augustine
to arrange for twelve bishops in the Northern Province, the Bishop of
York to receive the pall as Metropolitan. Ecgbert should aim at that
number. It may here be noted that in this year of grace 1908 there
are still only nine diocesan bishops in the Northern Province, besides
the archbishop, and five of these nine have been created in the
lifetime of some of us. Bristol knows to its heavy cost that Ripon was
the first of the five.
But Bede points out, and here we come to very interesting matter,
that the negligence of some former kings, and the foolish gifts of
others, had left it very difficult to find a suitable see for a new bishop.
The monasteries were in possession everywhere. It may be
remarked in passing that all over the Christian parts of the world
monasteries existed, even in those early times, in very large
numbers. We know the names, and the dates or periods of
foundation, of no less than 1481 founded before the year 814, in
various parts of the world; and the actual number was very much
larger than that, from what we know of the facts, especially in the
East. In the time of Henry VIII, besides the monasteries which had
been suppressed by Wolsey, Fisher, and others, as also the large
number of alien priories suppressed at an earlier date, and besides
all the ecclesiastical foundations called hospitals and colleges, more
than 600 monasteries remained in this land to be suppressed.
There being, then, no lands left to endow bishoprics, there was, in
Bede’s opinion, only one remedy; that was, the summoning of a
Greater Council, at which an edict should be issued, by pontifical
and royal consent, fixing upon some great monastery for a new
episcopal seat. To conciliate the abbat and monks, the election of the
bishop-abbat should be left to them. If it should prove necessary to
provide more property still for the bishop, Bede pointed out that there
were many establishments calling themselves monasteries which
were not worthy of the name. He would like to see some of these
transferred by synodical authority for the further maintenance of the
newly-created see, so that money which now went in luxury, vanity,
and intemperance in meat and drink, might be used to further the
cause of chastity, temperance, and piety. Here in Bristol, with
Gloucester close at hand, we need no reminder of the closeness of
the parallel between Bede’s advice in 735 to King Ceolwulf and the
actual course taken in 1535 by King Henry, and carried to completion
by him in 1540-2, in the foundation of six new bishoprics on the
spoils of as many great monasteries. Nor need it be pointed out that
Bede’s proposal to suppress small and ill-conditioned monasteries
was a forecast of the original proposal of Henry VIII.
Bede then proceeds to speak with extreme severity of false
monasteries. It appears that men bribed kings to make them grants
of lands—professedly for monasteries—in hereditary possession,
and paid moneys to bishops, abbats, and secular authorities, to ratify
the grants by their signatures; and then they made them the
dwellings of licentiousness and excess of all kinds. The men’s wives
set up corresponding establishments. Bede urged the annulment of
all grants thus misused: again we seem to hear a note prophetic of
eight hundred years later. To so great a pitch had this gone, that
there were no lands left for grants to discharged soldiers, sons of
nobles, and others. Thus it came to pass that such men either went
beyond sea and abandoned their own country, for which they ought
to fight, or else they lived as they could at home, not able to marry,
and living unseemly lives. If this was allowed to go on, the land
would be unable to defend itself against the inroads of the
barbarians. Bede’s prophecy to that effect came crushingly true in
Alcuin’s time, not fifty years after it was written. And here again we
have a remarkable forecast of Henry VIII’s avowed purpose in the
suppression of monasteries, that he must have means to defend his
land against invasion. Thus the three arguments of Henry VIII,
namely, that lands and money were needed for more soldiers and
sailors, that lands and money were needed for more bishoprics, and
that many of the religious houses did not deserve that name, were
carefully set out by one whom we may call a High-Church
ecclesiastic, eight hundred years before Henry.
On two of the points mentioned by Bede in connexion with
monasteries, it may be well to say a little more by way of illustration.
The two points are, the hereditary descent of monasteries, and the
principle on which the election of the abbat should proceed. To take
the second first,—Bede is very precise on this point. He says that
when a monastery is to be taken as the seat of a bishop, licence
should be given to the monks to elect one of themselves to fill the
double office of abbat and bishop, and to rule the monastery in the
one character and the adjacent diocese in the other. We should have
thought it would have been better to leave them free to elect some
prominent churchman from the outside, than to limit their choice to
one of themselves. And the exception for which arrangement was
made points in the same direction of limitation. If they have not the
right man in their own monastery, at least they must choose one
from their own family, or order, to preside over them, in accordance
with the decrees of the Canons. This strictness was traditional in
Northumbria. The great founder of monastic institutions in the
Northern Church, Benedict Biscop, who founded Monk Wearmouth
in 674 and Jarrow in 685, was very decided about it. He would not
have an abbat brought in from another monastery. The duty of the
brethren, he said, when speaking to his monks on his own imminent
decease, was, in accordance with the rule of Abbat Benedict the
Great, and in accordance with the statutes of their own monastery of
Wearmouth—which he had himself drawn up after consideration of
the various rules on the Continent from the statutes of the seventeen
monasteries which he liked best of all that he had seen—to inquire
carefully who of themselves was best fitted for the post, and, after
due election, have him confirmed as abbat by the benediction of the
bishop. There is a great deal to be said in favour of this course, and
there is a great deal to be said for more freedom of election. The
case which comes nearest to it in our English life of to-day is that of
the election of the Master of a College in one of the two Universities.
In Cambridge the election—in two cases the appointment—is in
every case open, in the sense that it is not confined to the Fellows of
the College, and in very recent times there have been several cases
of the election of a prominent man from another College, to the great
advantage of the College thus electing.
The other point is of much wider importance, namely, the
hereditary descent of monasteries and of their headship. Our
Northumbrian abbat Benedict was very decided here also. The
brethren must not elect his successor on account of his birth. There
must be no claim of next of kin. He was specially anxious that his
own brother after the flesh should not be elected to succeed him. He
would rather his monastery became a wilderness than have this man
as his successor, for they all knew that he did not walk in the way of
truth. Benedict evidently feared that a practice of hereditary
succession to ecclesiastical office might spring up. No doubt he had
seen at least the beginning of this in foreign parts. It was no
visionary fear, for in times rather later we have examples of
ecclesiastical benefices, and even bishoprics, going from father to
son, and that in days of supposed celibacy. We have plenty of
examples of monasteries descending from mother to daughter later
on in England; and in Bede’s own time he mentions without adverse
remark that the Abbess of Wetadun (Watton, in East Yorkshire)
persuaded Bishop John of Hexham to cure of an illness her
daughter, whom she proposed to make abbess in her stead. Alcuin
himself, as we have seen,[80] tells us quite as a matter of ordinary
occurrence, not calling for any remark, that he himself succeeded
hereditarily to the first monastery which he ruled, situated on Spurn
Point, the southern promontory of Yorkshire. We cannot doubt that
the evils naturally arising, in some cases at least, from hereditary
succession to spiritual positions, had much to do with the
intemperate suppression of the secular clergy and the enforcement
of clerical celibacy. In considering the question as it concerned the
times of Alcuin, we must bear in mind that we are dealing with times
very long before the development of the idea of feudal succession.
It is interesting to note that the earliest manuscripts of the Rule of
St. Benedict which are known to exist do not definitely lay down the
precise rule that the person elected to an abbacy must be a member
of the abbey or at least of the same order. The Rule was first printed
in 1659 by a monk of Monte Cassino; and this print was carefully
collated throughout with a manuscript of the thirteenth century at Fort
Augustus for the edition published by Burns and Oates in 1886.
Chapter 64 is as follows, taking the translation annexed to the Latin
in that edition, though it does not in all cases give quite the force of
the original.
“In the appointing[81] of an abbot, let this principle always be
observed, that he be made abbot whom all the brethren with one
consent in the fear of God, or even a small part of the community
with more wholesome counsel, shall elect. Let him who is to be
appointed be chosen for the merit of his life and the wisdom of his
doctrine, even though he should be the last of the community. But if
all the brethren with one accord (which God forbid) should elect a
man willing to acquiesce in their evil habits, and these in some way
come to the knowledge of the bishop to whose diocese that place
belongs, or of the abbots or neighbouring Christians, let them not
suffer the consent of these wicked men to prevail, but appoint[82] a
worthy steward over the house of God, knowing that for this they
shall receive a good reward, if they do it with a pure intention and for
the love of God, as, on the other hand, they will sin if they neglect it.”
We hear a good deal in our early history of kings and great men
renouncing the world and entering the cloister. Bede shows us the
darker side of this practice. Ever since king Aldfrith died, he says,
some thirty years before, there has not been one chief minister of
state who has not provided himself while in office with a so-called
monastery of this false kind, and his wife with another. The layman
then is tonsured, and becomes not a monk but an abbat, knowing
nothing of the monastic rule. And the bishops, who ought to restrain
them by regular discipline, or else expel them from Holy Church, are
eager to confirm the unrighteous decrees for the sake of the fees
they receive for their signatures. Against this poison of covetousness
Bede inveighs bitterly; and then he declares that if he were to treat in
like manner of drunkenness, gluttony, sensuality, and like evils, his
letter would extend to an immense length.
It may be well to mention here another religious practice which
had two sides to it, the practice of going on pilgrimage. Anglo-Saxon
men and women had a passion for visiting the tombs of the two
princes of the Apostles, Peter, whose connexion with Rome is so
shadowy up to the time of his death there, and Paul, their own
Apostle, the teacher of the Gentiles, whose connexion with Rome is
so solid a fact in the New Testament and in Church history. Bede
tells us that in his times many of the English, noble and ignoble,
laymen and clerics, men and women, did this. As a result of the
relaxed discipline of mixed travel, a complaint came to England,
soon after, that the promiscuous journeyings on pilgrimage led to
much immorality, so that there was scarcely a town on the route in
which there were not English women leading immoral lives.
There is one striking passage in Bede’s unique letter which shows
us how great were the demands of the early Church upon the
religious observances of the lay people; while it shows with equal
clearness the inadequacy of the response made by the English of
the time. The passage will complete our knowledge of the state of
religion among our Anglian forefathers towards the end of Bede’s
life. It refers to the bishop’s work among the people of the world,
outside the monastic institutions. The bishop must furnish them with
competent teachers, who shall show them how to fortify themselves
and all they have against the continual plots of unclean spirits, by the
frequent use of the sign of the Cross, and by frequent joining in Holy
Communion. “It is salutary,” he says to Ecgbert, “for all classes of
Christians to participate daily in the Body and Blood of the Lord, as
you well know is done by the Church of Christ throughout Italy, Gaul,
Africa, Greece, and the whole of the East. This religious exercise,
this devoted sanctification, has, through the neglect of the teachers,
been so long abandoned by almost all the lay persons of the
province of Northumbria, that even the more religious among them
only communicate at Christmas, Epiphany, and Easter. And yet,” he
continues, “there are innumerable persons, innocent and of most
chaste conversation, boys and girls, young men and virgins, old men
and old women, who without any controversy could communicate on
every Lord’s Day, and indeed on the birthdays of the holy apostles
and martyrs, as you have seen done in the holy Roman and
Apostolic Church.” The Church History of early times has a great
deal of practical teaching for the church people of to-day.
If the life of religious people in the monasteries and in the world
was thus tainted and slack, we can imagine what the ordinary
secular life was likely to be. There was terrible force in Bede’s
suggestion that a nation so rotten could never withstand a hostile
attack of any importance. Archbishop Ecgbert certainly did all that he
could to bring things into order; and he wisely determined that the
very best thing he could do to pull things round was to get hold of the
youth of the nation, and train them with the utmost care in the way
that they should go. This leads us on to the rise or revival of the
Cathedral School of York.
CHAPTER IV
The school of York.—Alcuin’s poem on the Bishops and Saints of the Church of
York.—The destruction of the Britons by the Saxons.—Description of Wilfrith II,
Ecgbert, Albert, of York.—Balther and Eata.—Church building in York.—The
Library of York.

It is usual to reckon the year 735 as the beginning of the great


School of York, and Archbishop—or rather, as he then was, Bishop
—Ecgbert as its originator. But it seems clear that we must carry its
beginnings further back, and count as its originator a man who filled
a much larger place in the world than even Ecgbert, archbishop as
he became, and brother of the king as he was. When Wilfrith, the
first Englishman to appeal to Rome, was put into the see of York by
Theodore of Canterbury in 669, his chaplain and biographer,
Stephen Eddi, tells of four principal works which, between that year
and 678, his chief accomplished. The first was the restoration of the
Cathedral Church of York, which had fallen into decay during the
time when Lindisfarne was the seat of the Bishop of Northumbria.
The second was the building of a noble church at Ripon for the
people of the kingdom of Elmete, which Edwin, the first Christian
king of Northumbria, had conquered from the Romano-Britons;
corresponding to the West Riding of Yorkshire and parts of
Lancashire, a portion of the great British kingdom of Rheged, at the
court of which the bard Taliessin had sung. The fourth was the
building of a still more noble church at Hexham, to be the
ecclesiastical centre of the northern part of Northumbria, replacing
Lindisfarne in that character. And the third in order was the
establishment of a School, no doubt at York, as that was his
episcopal seat, and he himself was the chief teacher. The world
credits William of Wickham with the invention of the idea of a public
school in the modern sense of the word; but seven hundred[83] years
before him Wilfrith had grasped the idea and put it into practice at
York. This is what his chaplain tells us. The secular chiefs, the
noblemen, sent their sons to him to be so taught that when the time
of choice came they would be found fit to serve God in the ministry, if
that was their choice, or to serve the king in arms if they preferred
that career. We must certainly reckon the year 676, or thereabouts,
as the date of foundation of the school at York, Wilfrith as its founder,
and its principle that of the modern public school, which is supposed
to give an education so liberal that whatever career its alumnus
prefers he will be found fitted for it. The first scholars of the school of
York entered, some of them, the ministry, as learned clerks; others,
the army, as fit to be soldiers. It was still so when I went to that
school sixty-four years ago. The school is older than Winchester by
seven hundred years, and older than Eton by seven hundred and
sixty-five.[84] Bede’s strong appeal to Ecgbert led to the revival of the
school after the natural decay from which good institutions suffer in
times of ecclesiastical and civil disorder, and we date the continuous
life of the school from him. It was an interesting coincidence, that
men saw in the year 735 the revival of the school and the birth of its
most famous pupil, assistant master, and head master. We may now
turn to that man, whose early lot was cast in a state of society, lay
and clerical, such as that described in scathing terms by Bede; and
who was the first-fruits of the remedy which Bede had suggested. As
a link between Bede and Alcuin we may have in mind a pretty little
story about Bede which we find in a letter of Alcuin’s some fifty or
sixty years after Bede’s death.
Alcuin is writing to the monks of Wearmouth. He Ep. 274. Before
tells them how well he remembers what he saw at a.d. 793.
Wearmouth long years ago, and how much he was
pleased with everything he saw. He encourages them to continue in
the right way by reminding them of the virtues of their founders. “It is
certain,” he writes, “that your founders very often visit the place of
your dwelling. They rejoice with all whom they find keeping their
statutes and living right lives; and they cease not to intercede for
such with the pious judge. Nor is it doubtful that visitations of angels
frequent holy places; for it is reported that our master and your
patron the blessed Bede said, ‘I know that angels visit the canonical
hours and the congregations of the brethren. What if they should not
find me among the brethren? Would they not have to say, Where is
Bede? Why does he not come with the brethren to the appointed
prayers?’”
To us in England, and especially to those of us who are North-
countrymen, nothing that Alcuin wrote has a higher interest than his
poem in Latin hexameters on the Bishops and Saints of the Church
of York. By the Church of York Alcuin evidently meant the Church of
Northumbria, although his account of the prelates dwells chiefly on
the archbishops of his time. Considering his long sojourn in France,
it was fitting that the manuscript of this famous poem should be
discovered at a monastery near Reims, the monastery of St.
Theodoric, or Thierry according to the later spelling. A great part of
the poem is in the main a versification of Bede’s prose history of the
conversion of the North to Christianity, and an adaptation of Bede’s
metrical life of St. Cuthbert. On this account the French transcriber
from the original omitted about 1100 of the 1657 lines of which the
poem consists, and only about 550 lines were originally printed by
Mabillon in the Acta Sanctorum. When our own Gale was preparing
to publish it, he got the missing verses both from the St. Theodoric
MS. and also from a MS. at Reims itself. Both manuscripts
disappeared long ago, probably in the devastations of the French
Revolution[85].
The poem describes the importance of York in the time of the
Roman occupation of Britain, the residence, as Alcuin tells us, of the
dukes of Britain, and of sovereigns of Rome. York was, in fact, the
imperial city; it shared with Trèves the honour of being the only
imperial cities north of the Alps. He speaks eloquently of its beautiful
surroundings, its flowery fields, its noble edifices, its fertility, its
charm as a home. This part of the poem inclines the reader to settle
in favour of York the uncertainty as to the place of Alcuin’s birth. One
graphic touch, and the use of a special Latin name for the river Ouse
which flows through the middle of the city, goes to the heart of those
who in their youth have fished in that river—

Hanc piscosa suis undis interluit Usa.


He goes on to speak of the persistent inroads of the Picts after the
withdrawal of the Roman troops. Inasmuch as the sixth legion was
quartered at York, and all of the other three legions in Britain were
withdrawn before the sixth, it may be claimed that York was the last
place effectively occupied by the Roman troops. This indeed is in
itself probable, since York was in the best position for checking the
attempts of the Picts to reach the central and southern parts of
Britain. He describes how the leaders of the Britons sent large bribes
to a warlike race, to bring them over to protect the land, a race, he
says, called from their hardness Saxi, as though Saxons meant
stones.[86] The eventual conquest of the Britons by the Saxons
evidently had Alcuin’s full sympathy. The Britons were lazy; worse
than that, they were wicked; for their sins they were rightly driven
out, and a better race entered into possession of their cities. We
would give a great deal to have had from Alcuin a few words of
tradition about some details of the occupation of York by the Angles,
and of the fate of the British inhabitants. Alcuin’s words would
suggest that their fate was a cruel one, but we do not know anything
of it from any source whatsoever. One of his remarks strikes us as
curious, considering that the Britons were Christians and their
conquerors were pagan: the expulsion, he says, was the work of
God, that a race might enter into possession who should keep the
precepts of the Lord. Clearly Alcuin held a brief for his ancestors of
some five generations before his birth. He writes also in a rather
lordly way of the kingdom of Kent, as though Northumbria was the
really important province in the time of King Edwin, as indeed it
unquestionably was. Edwin was the most prominent personage in
England, the Bretwalda, at the time of the conversion of
Northumbria. All that Alcuin says of Edwin’s young wife Ethelburga,
and of the kingdom of Kent whence she came, is this: “He took from
the southern parts a faithful wife, of excellent disposition, of
illustrious origin, endowed with all the virtues of the holy faith.” We
shall have, at a later stage, to remark upon the silence with which
Wessex also was treated by Alcuin.
It is quite true that the facts of the greater part of the poem are
taken from Bede. But it is of much interest to note the selection

You might also like