Publication Cover
The Information Society
An International Journal
Volume 32, 2016 - Issue 4
1,510
Views
26
CrossRef citations to date
0
Altmetric
Articles

Built to lie: Investigating technologies of deception, surveillance, and control

Pages 229-240 | Received 19 Oct 2015, Accepted 11 Feb 2016, Published online: 31 May 2016
 

ABSTRACT

This article explores technological systems that dissimulate by design. Examples include untrustworthy hotel and workplace thermostats, digital applications to spy on workers and family members, and commercial and law-enforcement systems that surreptitiously collect mobile phone data. Rather than view such cases as exceptional, I argue that deceptive communication systems are hidden articulations of normal technological orders. If deception in itself is not the primary problem with such systems, then transparency alone cannot be the solution. As troubling as institutional opacity might be, an analysis of deceptive systems reveals more fundamental problems: imbalances in power and widespread acquiescence to corporate and state efforts to control individuals, groups, and their data. By moving beyond a quest for (or belief in) technological veracity, scholars could redirect attention to power inequalities and the pressing question of how to live together ethically.

Acknowledgments

The author would like to thank Bill Staples and the participants of the 2015 “States of Surveillance” symposium at the University of Kansas for their insightful suggestions on an earlier draft of this article.

Notes

1. It should also be noted that transparency is a value-laden concept that in practice often privileges the relatively white and affluent while designating others as opaque and therefore dangerous (Hall Citation2015).

2. As banal as thermostats and climate control systems might appear, those without access to them face greater health risks, especially in extreme weather situations (Rogot et al. Citation1992; Poulter Citation2012), and reliance on them could contribute greatly to costly energy expenditures and destructive climate change (Oatman Citation2015; Rosenthal and Lehren Citation2012).

3. As evidence that not everyone is as compliant, a number of websites offer suggestions for hacking standard thermostats to afford a wider range of user discretion over temperature settings (e.g., Henry Citation2013).

4. In 2015, the U.S. Department of Justice changed its policy to require federal agents to obtain a warrant before deploying Stingray devices, but this policy change does not apply to local or state police forces (Fandos Citation2015).

5. This trend can be witnessed with related applications like Apple's iBeacon, which allows businesses to identify, track, and advertise to potential customers through their mobile phones (Ranger Citation2014).

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 229.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.