Tag Archive | surveillance

Acousmatic Surveillance and Big Data

Sound and Surveilance4

It’s an all too familiar movie trope. A bug hidden in a flower jar. A figure in shadows crouched listening at a door. The tape recording that no one knew existed, revealed at the most decisive of moments. Even the abrupt disconnection of a phone call manages to arouse the suspicion that we are never as alone as we may think. And although surveillance derives its meaning the latin “vigilare” (to watch) and French “sur-“ (over), its deep connotations of listening have all but obliterated that distinction.

Moving on from cybernetic games to modes of surveillance that work through composition and patterns. Here, Robin James challenges us to consider the unfamiliar resonances produced by our IP addresses, search histories, credit trails, and Facebook posts. How does the NSA transform our data footprints into the sweet, sweet, music of surveillance? Shhhhhhhh! Let’s listen in. . . -AT

Kate Crawford has argued that there’s a “big metaphor gap in how we describe algorithmic filtering.” Specifically, its “emergent qualities” are particularly difficult to capture. This process, algorithmic dataveillance, finds and tracks dynamic patterns of relationships amongst otherwise unrelated material. I think that acoustics can fill the metaphor gap Crawford identifies. Because of its focus on identifying emergent patterns within a structure of data, rather than its cause or source, algorithmic dataveillance isn’t panoptic, but acousmatic. Algorithmic dataveillance is acousmatic because it does not observe identifiable subjects, but ambient data environments, and it “listens” for harmonics to emerge as variously-combined data points fall into and out of phase/statistical correlation.

Dataveillance defines the form of surveillance that saturates our consumer information society. As this promotional Intel video explains, big data transcends the limits of human perception and cognition – it sees connections we cannot. And, as is the case with all superpowers, this is both a blessing and a curse. Although I appreciate emails from my local supermarket that remind me when my favorite bottle of wine is on sale, data profiling can have much more drastic and far-reaching effects. As Frank Pasquale has argued, big data can determine access to important resources like jobs and housing, often in ways that reinforce and deepen social inequities. Dataveillance is an increasingly prominent and powerful tool that determines many of our social relationships.

The term dataveillance was coined in 1988 by Roger Clarke, and refers to “the systematic use of personal data systems in the investigation or monitoring of the actions or communications of one or more persons.” In this context, the person is the object of surveillance and data is the medium through which that surveillance occurs. Writing 20 years later, Michael Zimmer identifies a phase-shift in dataveillance that coincides with the increased popularity and dominance of “user-generated and user-driven Web technologies” (2008). These technologies, found today in big social media, “represent a new and powerful ‘infrastructure of dataveillance,’ which brings about a new kind of panoptic gaze of both users’ online and even their offline activities” (Zimmer 2007). Metadataveillance and algorithmic filtering, however, are not variations on panopticism, but practices modeled—both historically/technologically and metaphorically—on acoustics.

In 2013, Edward Snowden’s infamous leaks revealed the nuts and bolts of the National Security Administration’s massive dataveillance program. They were collecting data records that, according to the Washington Post, included “e-mails, attachments, address books, calendars, files stored in the cloud, text or audio or video chats and ‘metadata’ that identify the locations, devices used and other information about a target.” The most enduringly controversial aspect of NSA dataveillance programs has been the bulk collection of Americans’ data and metadata—in other words, the “big data”-veillance programs.

 

Borrowed fro thierry ehrmann @Flickr CC BY.

Borrowed from thierry ehrmann @Flickr CC BY.

Instead of intercepting only the communications of known suspects, this big dataveillance collects everything from everyone and mines that data for patterns of suspicious behavior; patterns that are consistent with what algorithms have identified as, say, “terrorism.” As Cory Doctorow writes in BoingBoing, “Since the start of the Snowden story in 2013, the NSA has stressed that while it may intercept nearly every Internet user’s communications, it only ‘targets’ a small fraction of those, whose traffic patterns reveal some basis for suspicion.” “Suspicion,” here, is an emergent property of the dataset, a pattern or signal that becomes legible when you filter communication (meta)data through algorithms designed to hear that signal amidst all the noise.

Hearing a signal from amidst the noise, however, is not sufficient to consider surveillance acousmatic. “Panoptic” modes of listening and hearing, though epitomized by the universal and internalized gaze of the guards in the tower, might also be understood as the universal and internalized ear of the confessor. This is the ear that, for example, listens for conformity between bodily and vocal gender presentation. It is also the ear of audio scrobbling, which, as Calum Marsh has argued, is a confessional, panoptic music listening practice.

Therefore, when President Obama argued that “nobody is listening to your telephone calls,” he was correct. But only insofar as nobody (human or AI) is “listening” in the panoptic sense. The NSA does not listen for the “confessions” of already-identified subjects. For example, this court order to Verizon doesn’t demand recordings of the audio content of the calls, just the metadata. Again, the Washington Post explains:

The data doesn’t include the speech in a phone call or words in an email, but includes almost everything else, including the model of the phone and the “to” and “from” lines in emails. By tracing metadata, investigators can pinpoint a suspect’s location to specific floors of buildings. They can electronically map a person’s contacts, and their contacts’ contacts.

NSA dataveillance listens acousmatically because it hears the patterns of relationships that emerge from various combinations of data—e.g., which people talk and/or meet where and with what regularity. Instead of listening to identifiable subjects, the NSA identifies and tracks emergent properties that are statistically similar to already-identified patterns of “suspicious” behavior. Legally, the NSA is not required to identify a specific subject to surveil; instead they listen for patterns in the ambience. This type of observation is “acousmatic” in the sound studies sense because the sounds/patterns don’t come from one identifiable cause; they are the emergent properties of an aggregate.

Borrowed from david @Flickr CC BY-NC.

Borrowed from david @Flickr CC BY-NC.

Acousmatic listening is a particularly appropriate metaphor for NSA-style dataveillance because the emergent properties (or patterns) of metadata are comparable to harmonics or partials of sound, the resonant frequencies that emerge from a specific combination of primary tones and overtones. If data is like a sound’s primary tone, metadata is its overtones. When two or more tones sound simultaneously, harmonics emerge whhen overtones vibrate with and against one another. In Western music theory, something sounds dissonant and/or out of tune when the harmonics don’t vibrate synchronously or proportionally. Similarly, tones that are perfectly in tune sometimes create a consonant harmonic. The NSA is listening for harmonics. They seek metadata that statistically correlates to a pattern (such as “terrorism”), or is suspiciously out of correlation with a pattern (such as US “citizenship”). Instead of listening to identifiable sources of data, the NSA listens for correlations among data.

Both panopticism and acousmaticism are technologies that incite behavior and compel people to act in certain ways. However, they both use different methods, which, in turn, incite different behavioral outcomes. Panopticism maximizes efficiency and productivity by compelling conformity to a standard or norm. According to Michel Foucault, the outcome of panoptic surveillance is a society where everyone synchs to an “obligatory rhythm imposed from the outside” (151-2), such as the rhythmic divisions of the clock (150). In other words, panopticism transforms people into interchangeable cogs in an industrial machine.  Methodologically, panopticism demands self-monitoring. Foucault emphasizes that panopticism functions most efficiently when the gaze is internalized, when one “assumes responsibility for the constraints of power” and “makes them play…upon himself” (202). Panopticism requires individuals to synchronize themselves with established compulsory patterns.

Acousmaticism, on the other hand, aims for dynamic attunement between subjects and institutions, an attunement that is monitored and maintained by a third party (in this example, the algorithm). For example, Facebook’s News Feed algorithm facilitates the mutual adaptation of norms to subjects and subjects to norms. Facebook doesn’t care what you like; instead it seeks to transform your online behavior into a form of efficient digital labor. In order to do this, Facebook must adjust, in part, to you. Methodologically, this dynamic attunement is not a practice of internalization, but unlike Foucault’s panopticon, big dataveillance leverages outsourcing and distribution. There is so much data that no one individual—indeed, no one computer—can process it efficiently and intelligibly. The work of dataveillance is distributed across populations, networks, and institutions, and the surveilled “subject” emerges from that work (for example, Rob Horning’s concept of the “data self”). Acousmaticism tunes into the rhythmic patterns that synch up with and amplify its cycles of social, political, and economic reproduction.

Sonic Boom! Borrowed from NASA's Goddard Space Flight Center @Flickr CC BY.

Sonic Boom! Borrowed from NASA’s Goddard Space Flight Center @Flickr CC BY.

Unlike panopticism, which uses disciplinary techniques to eliminate noise, acousmaticism uses biopolitical techniques to allow profitable signals to emerge as clearly and frictionlessly as possible amid all the noise (for more on the relation between sound and biopolitics, see my previous SO! essay). Acousmaticism and panopticism are analytically discrete, yet applied in concert. For example, certain tiers of the North Carolina state employee’s health plan require so-called “obese” and tobacco-using members to commit to weight-loss and smoking-cessation programs. If these members are to remain eligible for their selected level of coverage, they must track and report their program-related activities (such as exercise). People who exhibit patterns of behavior that are statistically risky and unprofitable for the insurance company are subject to extra layers of surveillance and discipline. Here, acousmatic techniques regulate the distribution and intensity of panoptic surveillance. To use Nathan Jurgenson’s turn of phrase, acousmaticism determines “for whom” the panoptic gaze matters. To be clear, acousmaticism does not replace panopticism; my claim is more modest. Acousmaticism is an accurate and productive metaphor for theorizing both the aims and methods of big dataveillance, which is, itself, one instrument in today’s broader surveillance ensemble.

Featured image “Big Brother 13/365” by Dennis Skley CC BY-ND.

Robin James is Associate Professor of Philosophy at UNC Charlotte. She is author of two books: Resilience & Melancholy: pop music, feminism, and neoliberalism will be published by Zer0 books this fall, and The Conjectural Body: gender, race and the philosophy of music was published by Lexington Books in 2010. Her work on feminism, race, contemporary continental philosophy, pop music, and sound studies has appeared in The New Inquiry, Hypatia, differences, Contemporary Aesthetics, and the Journal of Popular Music Studies. She is also a digital sound artist and musician. She blogs at its-her-factory.com and is a regular contributor to Cyborgology.

tape reelREWIND!…If you liked this post, check out:

“Cremation of the senses in friendly fire”: on sound and biopolitics (via KMFDM & World War Z)–Robin James

The Dark Side of Game Audio: The Sounds of Mimetic Control and Affective ConditioningAaron Trammell

Listening to Whisperers: Performance, ASMR Community, and Fetish on YouTube–Joshua Hudelson

GLaDOS, the Voice of Postfeminist Control

Warning, spoilers ahead. Image borrowed from ElderGeek.

Much has been written about Portal, it has won at least seven “Game of the Year” awards and has been ranked as the “Best Game of all Time” by Gamesradar. Perhaps because both the hero and antagonist are women, it has also been the object of several cultural critiques. One blogger writes, “GLaDOS [the game’s villian] is the archetypical oppressed woman.” In an article published by GamePro (a mass-market game review magazine) GLaDOS is considered a “feminist icon.” Although “feminist icon” is a bit extreme, GLaDOS does have a lot to do with feminism. When seen in light of Rosalind Gill’s (2007) essay, “Postfeminist media culture,” GLaDOS, and her wry, disembodied voice, hold striking parallels to the immanence of surveillance in today’s world.

GLaDOS and Chell. Borrowed from gryphonworks @ deviantART.

At their core, the games in Valve Software’s Portal series are relatively straightforward: you are put in control of a female character named Chell, who is attempting to escape from the Aperture Science Laboratory complex. Equipped, mainly, with a portal gun (think Yellow Submarine, “Hole in My Pocket”), Chell traverses precipices, laser drones, acid pits and everything in-between.  As she navigates and manipulates these obstacles, a disembodied Orwellian voice guides Chell from one puzzle to the next.  This is the voice of GLaDOS (Genetic Lifeform and Disk Operating System), a self-aware computer who runs the joint (at least in Portal 1) and is keeping you around for further “testing.” Where Portal is claustrophobic, just you and GLaDOS, Portal 2 is a little more dynamic. A third character, Wheatley, is introduced. In both games, however; there is an inescapable feeling of surveillance and scrutiny. GLaDOS’s monotonous voice is everywhere, the robotic platforms of the Aperture complex are the only appendages of her body to be found.

What to make of the GLaDOS’s character? Although she is helpful at first when guiding Chell through the early tests, GLaDOS quickly adopts a sarcastic tone – putting Chell down, and belittling her mistakes. G. Christopher Williams of PopMatters reads into the backstory a bit. He points out that GLaDOS is modeled on the personality of the Aperture Science CEO, Cave Johnson’s, wife: Caroline. In the second game there is a tape of Johnson elaborating:

Brain Mapping. Artificial Intelligence. We should have been working on it thirty years ago. I will say this—and I’m gonna say it on tape so everybody hears it a hundred times a day: If I die before you people can pour me into a computer, I want Caroline to run this place.
Now she’ll argue. She’ll say she can’t. She’s modest like that.
But you make her.
Hell, put her in my computer. I don’t care.

GLaDOS, then, has a bit of a history. Within this history there is a glass ceiling.  GLaDOS has had a dampening sphere installed to limit her “irrational thinking,” and curb her “misbehavior.” Tellingly, this sphere whispers terrible ideas to her in a babbling male voice. At the end of Portal 1, Chell destroys the dampening sphere, and GLaDOS is free to get revenge on the society that has caged her. At this key moment, the tonality of her voice shifts from accommodating to sultry.

This change in voice accompanies a change in disposition. As Chell continues her adventures in Portal 2, GLaDOS returns with a set of suspiciously cutting remarks. Several barbs are made about Chell gaining weight, being unintelligent, and being adopted.  In the sequel, GLaDOS is especially critical of Chell’s body. These pot-shots figure perfectly into Gill’s  (2007) hallmarks of postfeminism: 1) the increased self-surveillance of the female body, 2) the increase of surveillance in new social sectors, and 3) a focus on the psychological transformation of one’s self, or interior life. Chell, the avatar, isn’t being judged on her weight (or lack thereof). Instead, GLaDOS’s remarks cut to the player, who recognizes that neither they nor Chell fit GLaDOS’s ideal. Although, in the narrative, GLaDOS typifies an extension of invisible and disembodied surveillance into new spheres of life, her comments act to foster self-surveillance in the embodied player.

GLaDOS’s comments have even jarred some users in the Steam Users’ Forums (Steam is Valve’s online distribution platform). In a thread entitled, “Portal 2 Sexist,” one user, loodmoney, asked if anyone else found GLaDOS’s fat jokes off-putting. To this, another user, Killalaz replied, “GLaDOS is trying to discourage/dishearten the testers. Chell is a woman, what bothers a woman more than being called fat? Not much. . .psychological warfare so to speak.” Although Killalaz may be reading too literally into Portal 2’s narrative, he is right about one thing: to some extent, GLaDOS, and therefore Valve Software, is waging psychological warfare on us all. Later in the thread another user, BC2 Cypher, demonstrates the extent that attitudes of self-surveillance can work to mold one’s psyche, “I don’t see the issue he’re. I actually used to BE fat. Lost 72 pounds when I was 15. 232 – 160. It’s not like Chell is even fat. That is the joke.” The real joke, if there is one, is that so many players are content to reduce GLaDOS’s comments to a self-contained dialogue between fictional characters. What is heard, actually, relates directly to the way dialogue from Portal is internalized. In these forums, the voice of GLaDOS is reproduced; it mediates the bodies of some fans (by supposing an ideal weight), and surveils the bodies of others (by guiding the dialogue).

But, when I play Portal, I occasionally smirk at GLaDOS’s comments. They are cutting satire. If GLaDOS is a feminist icon, it is because she is a voice that everyone carries with them at all times. The voice in our heads, that causes us to judge and shape ourselves, while simultaneously passing unkind judgment on to others. GLaDOS is iconic of the postfeminist condition – a condition where surveillance is assumed and internalized. And, our bodies are shaped through the hyper-mediation of games like Portal, and characters like GLaDOS, as they replicate themselves in web forums, and in our own voices.

AT

Add to FacebookAdd to DiggAdd to Del.icio.usAdd to StumbleuponAdd to RedditAdd to BlinklistAdd to TwitterAdd to TechnoratiAdd to Yahoo BuzzAdd to Newsvine

Like This!