568
Views
13
CrossRef citations to date
0
Altmetric
Methods, Models, and GIS

Mechanism Matters: Data Production for Geosurveillance

&
Pages 1063-1078 | Received 01 Sep 2015, Accepted 01 Mar 2016, Published online: 20 Jun 2016
 

Abstract

Recent revelations of dragnet surveillance by governments around the world have brought attention to privacy and surveillance in their many forms. In this article, we outline the technical mechanisms of geosurveillance to synthesize and inform on a constantly moving target. Despite their interconnections and overlap, to simplify and elucidate these geosurveillance mechanisms, we classify them into three parts: geolocation, unique identification, and the surveillance medium. We show that together they constitute a language that we, as subjects, did not choose yet are increasingly forced to negotiate. Moreover, these mechanisms are both numerous and highly complex and are only one component within large ecosystems of geosurveillance, making privacy ever more evasive. Understanding the mechanisms of our own subjection is integral to any prospects for intervention, however. As such, we highlight the Tor network as an example of resistance to geosurveillance that is enabled by acutely understanding the hypertechnical language that otherwise binds us. Indeed, as we emphasize throughout, mechanism matters.

晚近所揭示的世界各地政府的搜索网监控,引发了对于各种形式的隐私与监控之关注。我们于本文中,概述地理监控的技术机制,以综合并告知一个经常变动的目标。尽管这些地理监控机制相互连结并交叠,但为了简化并阐明这些机制,我们将其分类为三大部份:地理区位,特殊的指认,以及监控媒介。我们将显示,它们共同构成了作为主体的我们并未进行选择、但却逐渐被迫进行协商的一种语言。此外,这些机制为数众多且高度复杂,并且仅是大型地理监控生态系统中的一个组成,因而使得隐私更加难以捉摸。但理解我们自身从属的机制,却是任何介入的可能性中不可或缺的部分。我们因而强调匿名浏览的洋葱路由器网络作为抵抗地理监控的案例,该抵抗是透过确切理解在不同情况下将我们捆绑在一起的超技术语言而成为可能。如同我们自始至终强调的一般,机制的确至关重要。

Las recientes revelaciones gubernamentales alrededor del mundo en relación con las redes de vigilancia policial han llamado la atención sobre cuestiones de privacidad y vigilancia en sus diferentes modalidades. En este artículo hacemos un esquema de los mecanismos técnicos de la geovigilancia para sintetizar e informar sobre un objetivo que se mueve constantemente. A pesar de sus interconexiones y solapamiento, para simplificar y dilucidar estos mecanismos de geovigilancia los clasificamos en tres partes: geolocalización, identificación única y medio de vigilancia. Mostramos que en conjunto estas partes constituyen un idioma que nosotros, como sujetos, no escogimos pero que crecientemente nos vemos obligados a negociar. Más todavía, estos mecanismos son a la vez numerosos y altamente complejos y son tan solo un componente dentro de los grandes ecosistemas de la geovigilancia, lo que convierte a la privacidad en algo mucho más evasivo. Sin embargo, entender los mecanismos de nuestro propio sometimiento es esencial para cualquier prospecto de intervención. Por lo que representa, destacamos la red de Tor como ejemplo de resistencia a la geovigilancia, la cual es habilitada entendiendo a profundidad el idioma hipertécnico que de otro modo nos constriñe. En verdad, como en todo momento lo enfatizamos, el mecanismo si importa.

Additional information

Notes on contributors

David Swanlund

DAVID SWANLUND is an undergraduate student in the Department of Geography at Simon Fraser University, Burnaby, BC, V5A 1S6, Canada. E-mail: [email protected]. His research interests are in privacy and surveillance, with particular attention on the surrounding technologies that make each possible, as well as critical GIScience more broadly.

Nadine Schuurman

NADINE SCHUURMAN is a Professor in the Department of Geography at Simon Fraser University, Burnaby, BC, V5A 1S6, Canada. E-mail: [email protected]. Her research interests are at the intersection of health geography and GIS, as well as critical GIScience.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.