A CRITICAL CONTRIBUTION TO (INTERNET) SURVEILLANCE STUDIES THOMAS ALLMER A Critical Contribution to (Internet) Surveillance Studies Abstract Although there are a lot of other features in contemporary society such as information, neoliberalism, globalization, capital, etc., surveillance in general and Internet surveillance in particular are crucial phenomena. The overall aim of A Critical Contribution to (Internet) Surveillance Studies is to clarify how we can theorize and systemize economic surveillance (on the Internet). Surveillance studies scholars like David Lyon (1994, 119-158; 2001, 40-44) stress that economic surveillance such as monitoring consumers or the workplace are central aspects of surveillance societies. The approach that is advanced in this work recognizes the importance of the role of the economy in contemporary surveillance societies. This work constructs theoretically founded typologies in order to systemize the existing literature of surveillance studies and to analyze examples of surveillance. Therefore, it mainly is a theoretical approach combined with illustrative examples. This thesis contains a systematic discussion of the state of the art of surveillance and clarifies how different notions treat economic aspects of surveillance. In this work it is argued that the existing literature is insufficient for studying economic surveillance (on the Internet). In contrast, a typology of surveillance in the modern economy, which is based on foundations of a political economy approach, allows to systemize economic surveillance and to analyze surveillance in the spheres of production, circulation, and consumption. Constructing a theoretically founded typology of economic surveillance is important in order to undertake a systematic analysis of surveillance in the modern economy. Finally, some political recommendations are drawn in order to overcome economic (online) surveillance. The thesis can be fruitful for scholars who want to undertake a systematic analysis of surveillance in general and Internet surveillance in particular in the modern economy and who want to study the field of surveillance critically. Keywords: surveillance studies, Panopticon, information society research, Internet, political economy, economic surveillance, workplace surveillance, pre-employment screening, intellectual property surveillance, consumer surveillance A Critical Contribution to (Internet) Surveillance Studies Contents 1. Introduction .................................................................................................................. - 1 - 2. Foundations of surveillance theory............................................................................. - 6 2.1. Foucault’s notion of surveillance and the Panopticon ............................................ - 7 2.2. Non-panoptic notions of surveillance ................................................................... - 13 2.3. Panoptic notions of surveillance ........................................................................... - 21 2.4. Conclusion ............................................................................................................. - 28 - 3. A critical contribution to surveillance studies ......................................................... - 35 3.1. The spheres of the economy .................................................................................. - 36 3.2. Surveillance in the spheres of the economy .......................................................... - 38 3.2.1. Surveillance in the sphere of production ........................................................ - 38 3.2.2. Surveillance in the sphere of circulation ......................................................... - 47 3.2.3. Surveillance in the sphere of consumption ..................................................... - 51 3.3. Conclusion ............................................................................................................. - 56 - 4. Foundations of Internet surveillance theory............................................................ - 61 4.1. Non-panoptic notions of Internet surveillance ...................................................... - 62 4.2. Panoptic notions of Internet surveillance .............................................................. - 70 4.3. Conclusion ............................................................................................................. - 79 - 5. A critical contribution to Internet surveillance studies .......................................... - 85 5.1. Internet surveillance in the sphere of production .................................................. - 86 5.2. Internet surveillance in the sphere of circulation .................................................. - 90 5.3. Internet surveillance in the sphere of consumption ............................................... - 96 5.4. Conclusion ........................................................................................................... - 102 - 6. Conclusion................................................................................................................. - 104 - Bibliography ...................................................................................................................... - 115 - A Critical Contribution to (Internet) Surveillance Studies List of Figures Figure 1: Panopticon of the penitentiary at Stateville, United States, twentieth century (Foucault 1995, 169) ............................................................................................. - 11 Figure 2: Production, circulation, and consumption as dialectically mediated spheres of the modern economy......................................................................................... - 36 Figure 3: Watch book for time study (Taylor 2003, 84) ..................................................... - 42 Figure 4: The television audience (Jhally and Livant 1986, 125) ....................................... - 55 Figure 5: Kroll’s advertising for background screening services (Kroll 2010) .................. - 91 Figure 6: Carratu International brochure of employee screening services (Carratu International) .............................................................................................................. 92 Figure 7: Traffic rank for Porn Hub (Alexa) ....................................................................... - 98 Figure 8: Illustration of Google’s acquisition of DoubleClick in 2008 (Microreviews 2009) ................................................................................................................... - 100 Figure 9: A critical contribution to (Internet) surveillance studies ................................... - 104 - A Critical Contribution to (Internet) Surveillance Studies List of Tables Table 1: Foundations of surveillance theory ....................................................................... - 29 Table 2: Economic aspects in panoptic notions of surveillance.......................................... - 34 Table 3: The mill-owner’s benefit (MEW 23, 255) ............................................................ - 39 Table 4: Time study note sheet (for excavation of earth with wheelbarrows) (Taylor 2003, 83) .................................................................................................. - 44 Table 5: Groups of personal information in the application process (Gandy 1993, 63) ..... - 50 Table 6: Surveillance in the economy ................................................................................. - 56 Table 7: Differences between traditional and new surveillance (Gary Marx 2002, 28f.) ... - 58 Table 8: Employees’ experiences with new types of surveillance (cf. Stanton and Weiss 2000, 429) ............................................................................................................. - 65 Table 9: Motivational factors for using the Web (Kaye and Johnson 2002, 61) ................ - 67 Table 10: Foundations of Internet surveillance theory........................................................ - 80 Table 11: Economic aspects in panoptic notions of Internet surveillance .......................... - 83 Table 12: Top sites on the web (Alexa) .............................................................................. - 97 Table 13: Google services (updated by the author, based on Stalder and Mayer 2009, 101-105) ................................................................................................................ - 99 Table 14: Internet surveillance in the economy ................................................................ - 102 - A Critical Contribution to (Internet) Surveillance Studies 1. Introduction Surveillance has notably increased in the last decades of modern society. Surveillance studies scholars like David Lyon (1994) or Clive Norris and Gary Armstrong (1999) stress that we live in a surveillance society. Although there are a lot of other features in contemporary society such as information, neoliberalism, globalization, capital, etc., surveillance in general and Internet surveillance in particular are crucial phenomena. In order to get a first impression of (Internet) surveillance, some illustrative examples can be given: According to the American Management Association and the ePolicy Institute (2008) that undertake an annual quantitative survey about electronic monitoring and surveillance with approximately 300 U.S. companies, “more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet“. More than 40% of the companies monitor e-mail traffic of their workers, and 66% of corporations monitor Internet connections. In addition, most companies use software to block nonwork related websites such as sexual or pornographic sites, game sites, social networking sites, entertainment sites, shopping sites, and sport sites. The American Management Association and the ePolicy Institute (2008) also stress that companies “tracking content, keystrokes, and time spent at the keyboard ... store and review computer files ... monitor the blogosphere to see what is being written about the company, and ... monitor social networking sites.“ In addition, the New Yorker risk consulting company Kroll undertakes off- and online preemployment screening on a large-scale level. Kroll is an operating unit of the insurance and professional services firm Marsh & McLennan, which is the 832nd biggest company worldwide (cf. Forbes 2009). Kroll offers background screening services of new job applicants for companies and government agencies in order to check information such as address histories, education and employment histories, media coverage, credit reports, civil and bankruptcy records, criminal records, driving histories, liens and judgment histories, and professional licenses and certifications (cf. Kroll 2010). If Kroll realizes a company’s application procedure, the job candidates have to fill out a detailed questionnaire on the Internet as part of their application, which is sent invisibly to Kroll (cf. Searle 2006, 343). “Kroll has pioneered a secure Internet-based system that collects information from job candidates and provides clients with project updates and final reports. Kroll’s Applicant Submission System allows job can-1- A Critical Contribution to (Internet) Surveillance Studies didates to fill out a detailed questionnaire online and submit it securely to Kroll.” (Kroll 2010) In order to investigate job candidates, Kroll “searches primary sources (including electronic resources), visits courthouses throughout the country to retrieve and review public documents, and conducts telephone interviews with a job candidate’s professional and personal references” (Kroll 2010). Since 1996, the web information company Alexa Internet (a subsidiary company of Amazon) has been publishing web traffic reports, global rankings, and top sites lists by country and category of those users who have downloaded (over 10 million) and installed the Alexa toolbar into their browser. Alexa Internet gathers detailed data and offers site info in order to analyze a particular website or to compare different websites. These instruments are essential for advertisers in order to know how popular certain sites are and to make online advertising more effective and efficient. For instance, the popular pornographic video sharing website Porn Hub has been monitored by Alexa Internet since 2008 and is currently the 54th most visited website on the Internet. The Alexa traffic rank indicates how popular the site is including reach, pageviews, pageviews/user, bounce (percentage of visits to the website that consist of a single page turn), time on site, and search. The audience data show what kind of users are on the website and lists visitors by country: 29.6% of Porn Hub visitors are located in the United States, 5.3% in the United Kingdom, 4.6% in France and Germany, and 4.1% in India. Also interesting is that the clickstream sub-section shows which sites users visited immediately before and after pornhub.com: 6.56% of the users visited google.com, 5.27% partypoker.com, 5.24% livejasmin.com, 3.58% pornhublive.com, and 3.55% facebook.com before the Porn Hub website. 7.58% of the users visited partypoker.com, 6.53% livejasmin.com, 5.18% pornhublive.com, 4.86% streamate.com, and 4.19% google.com after the Porn Hub website. The overall aim of A Critical Contribution to (Internet) Surveillance Studies is to clarify how we can theorize and systemize such phenomena. Surveillance studies scholars like Lyon (1994, 119-158; 2001, 40-44) accentuate that economic surveillance such as monitoring consumers or the workplace are central aspects of surveillance societies. The approach that is advanced in this work recognizes the importance of the role of the economy in contemporary surveillance societies. For doing so, the following thematically grouped research questions are subject to this work: -2- A Critical Contribution to (Internet) Surveillance Studies Foundations of surveillance theory How is surveillance defined in the existing literature? What are commonalties and differences of various notions of surveillance? What are advantages and disadvantages of such definitions? A critical contribution to surveillance studies Which theory provides a typology in order to systemize surveillance in the modern economy? What are characteristics of surveillance in the spheres of production, circulation, and consumption? What are differences between surveillance and Internet surveillance? Foundations of Internet surveillance theory How is Internet surveillance defined in the existing literature? What are commonalties and differences of various notions of Internet surveillance? What are advantages and disadvantages of such definitions? A critical contribution to Internet surveillance studies Which theory provides a typology in order to systemize Internet surveillance in the modern economy? What are characteristics of Internet surveillance in the spheres of production, circulation, and consumption? This thesis can be fruitful for scholars who want to undertake a systematic analysis of surveillance in general and Internet surveillance in particular in the modern economy and who want to study the field of surveillance critically. A Critical Contribution to (Internet) Surveillance Studies deals with surveillance in modern societies. This work is understood as a critical contribution to surveillance studies insofar as it is based on the foundations of a critical political economy approach. The term Internet refers to the global system of computer networks that -3- A Critical Contribution to (Internet) Surveillance Studies use the Internet Protocol Suite (TCP/IP). Emerged in the 1970s, the Internet is a network of networks which includes systems such as the World Wide Web (WWW) and the infrastructure of electronic mail. According to The Oxford Dictionary of English, the term surveillance originated from the French sur- “over” + veiller “watch” and from the Latin vigilare “keep watch” in the early 19th century (cf. Soanes and Stevenson 2005). The concept of the modern economy means the capitalistic economy of modern societies. The modern society refers to a historical period, which has begun with the Enlightenment and lasts up to today. This thesis constructs theoretically founded typologies in order to systemize the existing literature of surveillance studies and to analyze examples of surveillance. Therefore, it mainly is a theoretical approach combined with illustrative examples, advancing from the abstract to the concrete level. Based on the research questions and the described methodology, the following general and detailed structure can be outlined: Foundations of surveillance theory are analyzed in the second chapter, a critical contribution to the analysis of surveillance in the modern economy is treated in the third chapter, foundations of Internet surveillance theory are studied in the fourth chapter, a critical contribution to the analysis of Internet surveillance in the modern economy is drawn in the fifth chapter, and a conclusion is given in the sixth chapter. Chapter two analyzes how surveillance is defined in the existing literature, what the different notions of surveillance have in common and what distinguishes them from one another, and what advantages and disadvantages such definitions have. In addition, chapter two elucidates how different notions treat economic aspects of surveillance and clarifies if there is a gap in the existing literature in order to study surveillance in the modern economy. The specific economic mode of surveillance is studied in chapter three. Based on the foundations of a political economy approach, the distinction of production, circulation, and consumption within the economy is introduced in order to establish a typology of surveillance in the economy and to study surveillance in the spheres of production, circulation, and consumption. Constructing a theoretically founded typology of economic surveillance is important in order to undertake a systematic analysis of surveillance in the modern economy. That chapter concludes with a discussion of the emergence of the Internet as new surveillance technology. -4- A Critical Contribution to (Internet) Surveillance Studies Chapter four analyzes how Internet surveillance is defined in the existing literature, what commonalties and differences of various notions of online surveillance exist, and what advantages and disadvantages such definitions have. Furthermore, chapter four describes how different notions deal with economic surveillance on the Internet and makes clear if there is a gap in the existing literature in order to study Internet surveillance in the modern economy. The specific economic mode of Internet surveillance is studied in chapter five. Based on the distinction of surveillance in the economy into the spheres of production, circulation, and consumption from chapter three, a typology of online surveillance in the economy can be constructed. Economic surveillance on the Internet in the spheres of production, circulation, and consumption will be outlined. Chapter six concludes with a summary and makes some political recommendations in order to overcome (Internet) surveillance in the modern economy. -5- A Critical Contribution to (Internet) Surveillance Studies 2. Foundations of surveillance theory Since Michel Foucault has published his book Surveiller et punir in French in 1975 and in English in 1977, the amount of literature on surveillance has increased enormously and represents a diffuse and complex field of research. Lyon (1994, 6-7) stresses: “Michel Foucault’s celebrated, and contentious, historical studies of surveillance and discipline had appeared that mainstream social theorists began to take surveillance seriously in its own right”. David Murakami Wood (2003, 235) emphasizes that ”for Surveillance Studies, Foucault is a foundational thinker and his work on the development of the modern subject, in particular Surveillir et Punir (translated as Discipline and Punish), remains a touchstone for this nascent transdisciplinary field.” Corresponding to Google Scholar, Foucault’s book Discipline and Punish (1977) is almost cited 15 thousand times. According to the Encyclopedia of Philosophy (Pryor 2006, 898) and to the Routledge Encyclopedia of Philosophy (Gutting 1998, 708-713), Foucault is one of the most important historians and philosophers of the 20th century with wide influence in different disciplines. The overall aim of this chapter is to elucidate how surveillance is defined in the existing literature, what the different notions of surveillance have in common and what distinguishes them from one another, and what advantages and disadvantages such definitions have. For doing so, Foucault’s understanding of surveillance and the idea of the Panopticon are introduced (section one). Based on these findings, section two and three contain a systematic discussion of the state of the art of surveillance by establishing a typology of the existing literature and discussing commonalties and differences. For analyzing the existing literature on a more abstract level and identifying advantages and disadvantages, it is essential to discuss commonalties and differences and to find certain typologies. Finally, section four gives a summary, describes how different notions treat economic aspects of surveillance and clarifies if there is a gap in the existing literature. -6- A Critical Contribution to (Internet) Surveillance Studies 2.1. Foucault’s notion of surveillance and the Panopticon Foucault (1995; 2002; 2003; 2007) analyzes surveillance in the context of the emergence of disciplinary societies in Discipline and Punish. He stresses an evolution from feudal societies of torture, to reformed societies of punishment, and on to modern disciplinary societies. In the age of torture, arbitrary penalties and public spectacles of the scaffold took place in order to exterminate bodies. Afterwards in the age of punishment, defendants were punished and exterminated. In the age of disciplines, direct violence has been replaced with softer forms of power in order to discipline, control, and normalize people in order to drill docile bodies and “political puppets” (Foucault 1995, 136). “These methods, which made possible the meticulous control of the operations of the body, which assured the constant subjection of its forces and imposed upon them a relation of docility-utility, might be called ‘disciplines’.” (Foucault 1995, 137) The meticulous techniques, methods, knowledge, and descriptions of details are called microphysics of power. Foucault understands disciplines as forms of operational power relations and technologies of domination. In contemporary society, disciplined power is exercised in order to control both behavior and bodies. “’Discipline’ may be identified neither with an institution nor with an apparatus; it is a type of power, a modality for its exercise, comprising a whole set of instruments, techniques, procedures, levels of application, targets; it is a ’physics’ or an ’anatomy’ of power, a technology.“ (Foucault 1995, 215) Disciplinary control is for Foucault a modern form of power. Modern power is neither in the hands of one particular person, nor does everyone occupy the same position. Foucault is opposed to the idea of power as superstructure – he understands power in the context of the development of forces of production. He describes power as a mutual hold, where the summit and the lower elements of hierarchy are in a relationship of supporting and conditioning. Also aspects of class are emphasized: “The bourgeoisie is perfectly well aware that a new constitution or legislature will not suffice to assure its hegemony; it realizes that it has to invent a new technology ensuring the irrigation by effects of power of the whole social body down to its smallest particles.” (Foucault 2002, 98-99) Foucault (1995; see also 2002; 2003; 2007) interprets the Enlightenment as a dual process of liberty and disciplines. Although the French Revolution brought liberal elements, modern society developed new disciplinary institutions. Foucault understands disciplines and control -7- A Critical Contribution to (Internet) Surveillance Studies as crucial implications for the functioning of modern industrial society in order to codify time, space and movement, to obtain individual mechanisms like movements, gestures, attitudes and rapidity, and to increase the efficiency of movements. There is a relationship between docility and utility in the sense that the more docile bodies there are, the more efficient they act. Disciplinary institutions establish “an increased aptitude and an increased domination” (Foucault 1995, 138). Foucault points out disciplinary apparatuses as “one of bourgeois society’s great inventions” and “basic tools for the establishment of industrial capitalism and the corresponding type of society” (Foucault 2003, 36) and stresses the relationship between technology, economy, and disciplinary societies: “At a less general level, the technological mutations of the apparatus of production, the division of labour and the elaboration of the disciplinary techniques sustained an ensemble of very close relations. Each makes the other possible and necessary; each provides a model for the other. ... The growth of a capitalist economy gave rise to the specific modality of disciplinary power” (Foucault 1995, 221). Hierarchized individuals became necessary to assure political order within disciplinary institutions. Furthermore, empirical sciences like psychology, pedagogy, and criminology developed a methodology of disciplines and investigations in the form of tests, interviews, and consultations. According to Foucault, the sciences help to organize and develop disciplined apparatuses and mark the causal relationship between power and knowledge. Sciences “reproduce, in a concentrated or formalized form, the schema of power-knowledge proper to each discipline“ (Foucault 1995, 226f.). Foucault (1995, 141-169) describes four types of disciplines, namely cellular, organic, genetic, and combinatory forms. As an example he analyzes the military, medical, educational and industrial institutions and at certain points the police and family in it. Disciplines are cellular in the way of spatial distributions, location, partitioning, and coding of individuals. ”Each individual has his own place; and each place its individual. ... Disciplinary space tends to be divided into as many sections as there are bodies or elements to be distributed. ... Its aim was to establish presences and absences, to know where and how to locate individuals, to set up useful communications, to interrupt others, to be able at each moment to supervise the conduct of each individual, to assess it, to judge it, to calculate its qualities or merits. ... Discipline organizes an analytical space.“ (Foucault 1995, 143) Discipline transforms confused, diffused, and unplanned circulations of places into ordered and structured spaces and ranks positions of individuals in order to create functional and hierarchical complex cells to make individuals amenable and rationalize time and gesture. Foucault illustrates that phenomenon -8- A Critical Contribution to (Internet) Surveillance Studies in the context of the workplace and concludes: “to observe the worker’s presence and application, and the quality of his work; to compare workers with one another, to classify them according to skill and speed; to follow the successive stages of the production process.” (Foucault 1995, 145) Disciplines are organic and they control activities. In disciplinary societies, time penetrates body as form of power. The main intention is to rationalize and to perfect the exercises of body and gesture in order to maximize speed and efficiency and exhaust the body Disciplinary time causes a well-disciplined body and an ideal correlation of body and gesture. Foucault demonstrates disciplinary time with the help of the example of education institutions: “8.45 entrance of the monitor, 8.52 the monitor’s summons, 8.56 entrance of the children and prayer, 9.00 the children go to their benches, 9.04 first slate, 9.08 end of dictation, 9.12 second slate, etc.“ (Foucault 1995, 150) For Foucault, disciplines are genetic and regulate the relations of time, bodies, and forces. They divide duration into certain segments and develop an analytical plan. The trained and disciplined body makes it possible to use each moment of time. It is “the new techniques of power, and more specifically, with a new way of administering time and making it useful, by segmentation, seriation, synthesis and totalization” (Foucault 1995, 160). Power allows “the integration of a temporal, unitary, continuous, cumulative dimension in the exercise of controls and the practice of dominations“ (Foucault 1995, 160). Disciplines are combinatory and a composition of forces. Disciplinary societies combine different individuals working together to create improved results. An efficient and productive machine of combined forces is produced, where a system of command is required. Foucault (1995, 163f.) cites in this context Marx’ Capital, where cooperation as productive force is analyzed because of diminishing necessary labour-time and increasing surplus labourtime. Characteristics and technologies of a disciplinary society are summarized in a very pointed way in Foucault’s (2007, 84f.) Lectures at the Collège De France, 1977-1978: First, “discipline, of course, analyzes and breaks down; it breaks down individuals, places, time, movements, actions, and operations. ... Second, discipline classifies the components thus identified according to definite objectives. ... Third, discipline establishes optimal sequences or coordinations ... Fourth, discipline fixes the processes of progressive training (dressage) and permanent control, and finally, on the basis of this, it establishes the division between those considered unsuitable or incapable and the others.” Foucault (1995, 170-194) emphasizes the importance of correct training for disciplinary pow-9- A Critical Contribution to (Internet) Surveillance Studies er: “Train vigorous bodies, the imperative of health; obtain competent officers, the imperative of qualification; create obedient soldiers, the imperative of politics; prevent debauchery and homosexuality, the imperative of morality.“ (Foucault 1995, 172) In addition, he analyzes technical instruments like hierarchical observation, normalizing judgement, and examination. Hierarchical observation is a crucial part of disciplinary societies and a form of power that makes individuals visible, transparent, and to control their conduct. “The disciplinary institutions secreted a machinery of control that functioned like a microscope of conduct; the fine, analytical divisions that they created formed around men an apparatus of observation, recording and training.” (Foucault 1995, 173) Disciplinary apparatuses intensify surveillance and extend surveillance in space. Beside, hierarchized observation works as a machinery and corresponding architecture. For instance, surveillance at the workplace also takes ”into account the activity of the men, their skill, the way they set about their tasks, their promptness, their zeal, their behaviour.” (Foucault 1995, 174) Normalizing judgement is an instrument of power and corrects deviant behaviour and performance. Disciplinary institutions have certain rules to be followed as well as developing repressive standards and norms. “The workshop, the school, the army were subject to a whole micro-penality of time (latenesses, absences, interruptions of tasks), of activity (inattention, negligence, lack of zeal), of behavior (impoliteness, disobedience), of speech (idle chatter, insolence), of the body (‘incorrect’ attitudes, irregular gestures, lack of cleanliness), of sexuality (impurity, indecency).” (Foucault 1995, 178) Categories of normal and abnormal and marks of good and bad classify individuals into determined levels and make corrective training possible. Disciplined ranking and grading mark the gap and hiercharchize different qualities, skills, and abilities. It includes and excludes, creates homogeneity, measures gaps, and fixes specialities. Disciplining is an organizing process of self and mutual obsession to fulfil normalized standards. In disciplined societies, these rankings are visible through certain sings and symbols like uniforms in the army, streams in schools, and specific clothes at the workplace. An examination combines the instruments of hierarchical observation and normalizing judgement and is a technique to situate the level of individuals and to indicate possible use of it. An examination constitutes the body as analyzable object and describable individual. Disciplinary institutions measure, document, and describe data of examinations in a meticulous way and make out a possible case of each individual. The disciplinary methods ”lowered the threshold of describable individuality and made of this description a means of control and a method of domination. It is no longer a monument for future memory, but a document for possible use. And this new describability is all the more marked in that the disciplinary framework is a strict one: the child, the patient, - 10 - A Critical Contribution to (Internet) Surveillance Studies the madman, the prisoner“. (Foucault 1995, 191f.) For Foucault (1995, 195-210), Jeremy Bentham’s Panopticon is a symbol for modern disciplinary society. “On the whole, therefore, one can speak of the formation of a disciplinary society in this movement that stretches from the enclosed disciplines, a sort of social ‘quarantine’, to an indefinitely generalizable mechanism of ‘panopticism’.“ (Foucault 1995, 216) The Panopticon is an ideal architectural figure of modern disciplinary power. It exists of an annular building divided in different cells and a huge tower with windows in the middle (see figure 1). Prisoners, workers, pupils, as well as patients stay in the cells and a supervisor occupies the middle tower. The architecture allows the supervisor to observe all individuals in the cells without being seen. Not every inmate is observed at every moment, but no one knows if she or he is monitored. Observation is possible anytime. As a result, everyone acts as if kept under surveillance all the time – individuals discipline themselves out of fear of surveillance. The Panopticon creates a consciousness of permanent visibility as a form of power, where no bars, chains, and heavy locks are necessary for domination any more. Foucault (1995, 228) finally asks: “Is it surprising that prisons resemble factories, schools, barracks, hospitals, which all resemble prisons?” Figure 1: Panopticon of the penitentiary at Stateville, United States, 20th century (Foucault 1995, 169) - 11 - A Critical Contribution to (Internet) Surveillance Studies In summary, Foucault analyzes surveillance in the context of the emergence of modern disciplinary societies. He understands disciplines as forms of operational power relations and technologies of domination in order to discipline, control, and normalize people in respect of drilling docile bodies. For Foucault, the Panopticon is an ideal symbol of modern surveillance societies. Foucault’s understanding of surveillance and the Panopticon allows to distinguish panoptic (affirmation of Foucault’s notion) and non-panoptic (rejection of Foucault’s notion) approaches of defining surveillance that can be used for constructing a typology of existing surveillance literature and for discussing commonalties and differences of definitions of surveillance: The task of this chapter is to give a representative, but still eclectic overview about different definitions of surveillance. - 12 - A Critical Contribution to (Internet) Surveillance Studies 2.2. Non-panoptic notions of surveillance Anthony Giddens (1985, 172-197; 1995, 169-181) defines surveillance as “symbolic material that can be stored by an agency or collectivity” and as “the supervision of the activities of subordinates” (Giddens 1995, 169). He primarily sees surveillance as a phenomenon of the nation-state: “Surveillance as the mobilizing of administrative power – through the storage and control of information – is the primary means of the concentration of authoritative resources involved in the formation of the nation-state.” (Giddens 1985, 181) While Foucault’s negative and powerful understanding of surveillance is criticized, a neutral notion of surveillance is discussed. Surveillance is seen as documentary activities of the state, as information gathering and processing, as collection, collation and coding of information, and as records, reports and routine data collection for administrative and bureaucratic purposes of organizations. The nation-state began to keep these official statistics from its beginning and to “include the centralized collation of materials registering births, marriages and deaths; statistics pertaining to residence ethnic background and occupation; and … ‘moral statistics’, relating to suicide, delinquency, divorce and so on.” (Giddens 1985, 180) Similar to Giddens, Christopher Dandeker (1990) describes surveillance as form of information gathering and administrative organization of modernity. “The term surveillance is not used in the narrow sense of ‘spying’ on people but, more broadly, to refer to the gathering of information about and the supervision of subject populations in organizations.” (Dandeker 1990, vii) James Rule (1973, 36ff.), Foucault’s voice of dissent “in the best tradition of mainstream Anglo-American sociology” (Murakami Wood 2009, 54), stresses in his empirical case study the idea of a total surveillance society. Although he describes the political and economic context, he uses a non-judgmental term and a broad definition of surveillance. On the one hand, obsession is crucial and required for social processes and programs and it constitutes “an ideal type of a social order” (1973, 37). On the other hand, collected personal data could be used in the wrong sense and has a repressive potential, too. Rule (2007, 13-17) still accentuates a broad term of surveillance with advantages and disadvantages in his continuing book about surveillance Privacy in Peril: Surveillance “systems share a distinctive and sociologically crucial quality: they not only collect and record details of personal information; they also are orga- 13 - A Critical Contribution to (Internet) Surveillance Studies nized to provide bases for action toward the people concerned” (Rule 2007, 14). In Rule’s broad understanding, surveillance as process of data collecting surveillance is not necessarily problematic and negatively connoted, because it is crucial for civic life. He combines problematic and crucial issues of data collection in one term. Although Foucault is listed in the book’s bibliography, he is not mentioned once and in contrast to Foucault power relations in contemporary surveillance society are not analyzed. The importance of new information and communication technologies for undercover work and the differentiation between traditional and new surveillance are mentioned by Gary Marx (1988, 221; 2002, 10ff.). In contemporary society, surveillance has increased and so “the line between the public and the private is obliterated; we are under constant observation, everything goes on permanent record by others we do not know. Data from widely separated geographical areas, organizations, and time periods can be merged and analyzed easily” (Gary Marx 1988, 221). Surveillance is for Marx primarily a technical process and defined as “the use of technical means to extract or create personal data” (Gary Marx 2002, 12). Marx sees parents monitoring their baby on CCTV as example of surveillance. In Visions of Social Control, Stanley Cohen (1987, 1-12) focuses on crime, punishment, and classification. Contemporary society has developed a whole system of classifications into good vs. bad and normal vs. abnormal, that makes control and surveillance necessary. Cohen’s understanding of social control and surveillance is not quit clear: “This purpose will be served less well by any essentialist definition than simply by mapping out those ‘social control matters’ which this book covers. My interest is in planned and programmed responses to expected and realized deviance rather than in the general institutions of society which produce conformity. I will use the term ‘social control’, then, to cover matters considerably narrower and more specific” (Cohen 1987, 2f.) Nevertheless, he stresses that it is not fruitful if social control is used as negative term and if powerful abstractions of ideological and repressive state apparatus are analyzed as Marxists did. In modern society power and domination are not centralized, but rather everyone can get a powerful position. For James Beniger (1986), control and surveillance are general concepts of “purposive influence toward a predetermined goal” (Beniger 1986, 7), where the “information storage, processing, and communication” (Beniger 1986, 62) are stressed. - 14 - A Critical Contribution to (Internet) Surveillance Studies Computer scientist Roger Clarke (1988, 498-499; 505f.) defines surveillance as “the systematic investigation or monitoring of the actions or communications of one or more persons. Its primary purpose is generally to collect information about them, their activities, or their associates. There may be a secondary intention to deter a whole population from undertaking some kinds of activity.” (Clarke 1988, 499) For Clarke, surveillance and dataveillance are neither negative nor positive as it depends on the situation. “I explicitly reject the notion that surveillance is, of itself, evil or undesirable; its nature must be understood, and society must decide the circumstances in which it should be used”. (Clarke, 1988, 498f.) Although many dangers and disadvantages of surveillance in general and dataveillance in particular are mentioned, benefits like physical security of people and financial opportunities in both public (social welfare and tax) and private (insurance and finance) sector are listed as well. David Lyon (1994, viii-x) grasps surveillance “as a shorthand term to cover the many, and expanding, range of contexts within which personal data is collected by employment, commercial and administrative agencies, as well as in policing and security“ (Lyon 1994, ix). He suggests a neutral understanding of surveillance with positive and negative effects of constraining and enabling. Surveillance is undemocratic, coercive, impersonal or even inhuman on the one hand, but it is as well ”innocuous or a channel of positive blessing“ (Lyon 1994, ix) on the other hand. Lyon (2001, 3) emphasizes watching over a child and taking care of it as positive aspects of surveillance. In addition, he understands CCTV as an instrument that us used for keeping modern society secure and safe, because “the camera is installed in the bar or at the intersection in order to reduce rowdiness or road accidents. No one wants trouble when relaxing at the bar and no one wants to end up in hospital because someone ran a red light.” (Lyon 2001, 39) In Forget Foucault, Jean Baudrillard (2007, 34) dismisses Foucault’s concept of the Panopticon: “The same goes for Discipline and Punish, with its theory of discipline, of the ‘panoptic’ and of ‘transparence.’ A magistral but obsolete theory. Such a theory of control by means of a gaze that objectifies, even when it is pulverized into micro-devices, is passe. With the simulation device we are no doubt as far from the strategy of transparence as the latter is from the immediate, symbolic operation of punishment which Foucault himself describes. Once again a spiral is missing here, the spiral in front of which Foucault, oddly enough, comes to a halt right at the threshold of a current revolution of the system which he has never wanted to cross” Baudrillard (2006, 28-32) stresses the end of the panoptic system and analyzes surveil- 15 - A Critical Contribution to (Internet) Surveillance Studies lance in the era of simulation and simulacra. In this context, he blurs the distinction between active and passive forms of surveillance. A mutation of the real into the hyperreal takes place and the essence of power disappears. “Something else in regard to the Louds. ‘You no longer watch TV, it is TV that watches you (live),’ or again: ‘You are no longer listening to Don’t Panic, it is Don’t Panic that is listening to you’ - a switch from the panoptic mechanism of surveillance (Discipline and Punish [Surveiller et punir]) to a system of deterrence, in which the distinction between the passive and the active is abolished. There is no longer any imperative of submission to the model, or to the gaze ‘YOU are the model!’ ‘YOU are the majority!’ Such is the watershed of a hyperreal sociality, in which the real is confused with the model, as in the statistical operation, or with the medium, as in the Louds’ operation. Such is the last stage of the social relation, ours, which is no longer one of persuasion (the classical age of propaganda, of ideology, of publicity, etc.) but one of deterrence: ‘YOU are information, you are the social, you are the event, you are involved, you have the word, etc.’ An about-face through which it becomes impossible to locate one instance of the model, of power, of the gaze, of the medium itself, because you are always already on the other side. No more subject, no more focal point, no more center or periphery: pure flexion or circular inflexion. No more violence or surveillance: only ‘information’, secret virulence, chain reaction, slow implosion, and simulacra of spaces in which the effect of the real again comes into play.” (Baudrillard 2006, 29f.) Based on Baudrillard, William Bogard (1996, 1ff.) focuses on the simulation of hypersurveillant control in telematic societies. He defines bureaucratic surveillance as “information gathering and storage systems (accounting, recording, and filing mechanisms) and the various devices for encoding and decoding that information (impersonal, standardized rules governing its access, use, and dissemination).” (Bogard 1996, 1f.) He argues that surveillance ranges between absolute control in disciplined societies and the absence of control in non-disciplined societies. Bogard (2006, 97-101) understands surveillance as decentralized networks, where monopolized power and control of information become more impossible. Surveillance is both a mode of oppressed capture and a mode of lines flight of “escape, deterritorialization, indetermination and resistance” (Bogard 2006, 101). In The Maximum Surveillance Society, Clive Norris and Gary Armstrong (1999, 3-12) consider surveillance as an ambivalent process with protective and enabling elements and totalitarian and powerful effects. Although the power of surveillance is mentioned, they do not want to - 16 - A Critical Contribution to (Internet) Surveillance Studies automatically apply the idea of a powerful Panopticon or of a totalitarian Big Brother state to the rise of CCTV (cf. also Norris and Armstrong 1998, 7). The deployment of CCTV is not equal to one single Big Brother and it does not enable some singular disciplinary norms. “We need to be cautious about merely equating the power to watch with the disciplinary power implied in Foucault’s concept of panoptic surveillance. Similarly, the spread of cameras should not automatically be assumed to herald the arrival of a totalitarian ‘Big Brother’ state.” (Norris and Armstrong 1999, 6) Accordingly, it is seen more useful to refer to the works of James Rule, whose ideas influence the book to a certain extent. People’s active role in the context of surveillance is emphasized by Hille Koskela (2004, 199; 2006, 175). For instance, reality shows are based on viewer participation, mobile phones with cameras create an active subject, and home webcams generate new subjectivities. She wants to analyze “the other side of surveillance”, which has resistant and liberating elements. “Webcams can also be argued to contribute to the ‘democratization’ of surveillance.” (Koskela 2006, 175) Kosekela argues that webcams have an empowering role and that the active role of individuals with surveillance equipment shows that the lines of control are blurred. Roy Boyne (2000, 285) uses the term post-Panopticism and argues against the basic panoptical paradigm: “The theoretical arguments in favour of abandoning the concept of the Panopticon (from Bauman, Bogard, Latour and others) are considered under five headings: displacement of the Panoptical ideal by mechanisms of seduction; redundancy of the Panoptical impulse brought about by the evident durability of the self-surveillance functions which partly constitute the normal, socialized, ‘Western’ subject; reduction in the number of occasions of any conceivable need for Panoptical surveillance on account of simulation, prediction and action before the fact; supplementation of the Panopticon by the Synopticon; failure of Panoptical control to produce reliably docile subjects.” (Boyne 2000, 285) Based on Deleuze’s and Guattari’s ideas, Kevin Haggerty and Richard Ericson (2000, 605620) combine surveillance with assemblages and come to develop the concept of surveillant assemblage. An assemblage is an entity that consists of different flowing objects or multiple phenomena and processes that work together. An assemblage contains multiple discrete assemblages and it is at the same time part of a greater assemblage. ”Lines and measurable speeds, constitutes an assemblage. … As an assemblage, a book has only itself, in connection with other assemblages and in relation to other bodies without organs. ... An assemblage is - 17 - A Critical Contribution to (Internet) Surveillance Studies precisely this increase in the dimensions of a multiplicity that necessarily changes in nature as it expands its connections. ... An assemblage establishes connections between certain multiplicities drawn from each of these orders, so that a book has no sequel nor the world as its object nor one or several authors as its subject.“ (Deleuze and Guattari 1987, 4; 8; 23) Haggerty and Ericson stress that surveillance has the potential to put different systems, practices, and technologies together into a larger whole and talk of surveillance as an assemblage. Additionally, rhizomatic surveillance as an interconnected system is analyzed. A rhizome is an interconnected root and represents a decentral network. Deleuze and Guattari list characteristics of a rhizome: “Principles of connection and heterogeneity” (1987, 7), “principle of multiplicity” (1987, 8), “principle of asignifying rupture” (1987, 9), and “principle of cartography and decalcomania” (1987, 12). As surveillance is organized like a networked rhizom, an enormous expansion took place in the last decades. According to Haggerty and Ericson, surveillance is understood as a decentralized, non-hierarchical phenomenon without a certain powerful group or institution. While Haggerty and Ericson (2000, 607) are neither interested in analyzing Foucault’s concept of surveillance because it “fails to directly engage contemporary developments in surveillance technology” (2000, 607) nor in incorporating new approaches that are based on Foucault because they are “providing little that is theoretically novel” (2000, 607), they introduce the term synopticism in contrast with Panopticism. The emergence of new media and inexpensive video cameras allows the general public to keep someone synoptically under surveillance. “Synopticism signifies that many individuals are able to observe and control a certain phenomenon or process. Synopticism essentially means that a large number of individuals are able to focus on something in common.” (Haggerty and Ericson 2000, 618) Haggerty and Ericson (2000, 617) mention the media circus surrounding Britain’s royal family as an example and conclude: “Surveillance has become rhizomatic, it has transformed hierarchies of observation, and allows for the scrutiny of the powerful by both institutions and the general population.” Roy Coleman and Joe Sim (2000, 623; 635) publicized an empirical case study about CCTV surveillance in Liverpool. They stress a shift of power from Foucault’s concept towards multiple centres of government, localized mechanisms of rule, and autonomous forms of knowledge. Surveillance and social control are understood as networked phenomena and partnerships acting at a distance. “Within this discourse CCTV cameras can be understood as helping to create public spaces for ‘free’, ‘responsible’, consumer-oriented individuals who independently choose their autonomous role in the life of the city. Thus CCTV is constructed - 18 - A Critical Contribution to (Internet) Surveillance Studies around the idea of ‘empowerment’ and ‘freedom’, particularly the ‘freedom and safety to shop’.” (Coleman and Sim 2000, 635) Katherine Williams and Craig Johnstone (2000, 183-193) make a re-reading of video surveillance and criticize the idea to see CCTV in the context of the Panopticon. The panoptical notion stresses an all-encompassing visibility and control, but CCTV is only available at selected streets and places. The authors emphasize the concept of a selective gaze because the Panopticon in their view leads to a misleading interpretation of CCTV: “By emphasising the selective gaze rather than the all-encompassing Panopticon, we are attempting to open the analysis up to a more complex, and perhaps more nuanced, encounter with a range of different issues associated with surveillance, policing and the use of public space.” (Williams and Johnstone 2000, 192) Sean Hier (2004, 542-546) explores emotional repertoires and cultural milieus of public video surveillance program and undertakes a selective reading of Foucault’s notion of the Panopticon. Hier criticizes approaches that understand surveillance predominantly as a mechanism of repression, because “the routine disciplinary mechanics of surveillance need not fundamentally be located with elite partnerships or some abstracted governmental body“ (Hier 2004, 546). Although Hier (2003, 403) rejects the idea of the non-hierarchical rhizomatic surveillant assemblage, he suggests understanding surveillance as a multifaceted structure of consent and coercion with inclusionary and exclusionary impulses that does not automatically involve punishment. (cf. Hier 2004, 546). Although Elia Zureik (2003, 42; 46-49) emphasizes the importance of the political economy of surveillance and theorizes surveillance in the case of the workplace, he gives a rather neutral understanding of surveillance with enabling and disabling functions: “Surveillance is (1) an ubiquitous feature of human societies, and is found in both the political (public) and civil (private) sphere of society; (2) associated with governance and management; (3) endemic to large-scale organizations; (4) constitutive of the subject and has a corporeal aspect to it; (5) disabling as well as enabling and is “productive” in Foucault’s sense; (6) understood in terms of distanciation, i.e., the control of space and time; (7) becoming increasingly implicated in a system of assemblage which brings together diverse control technologies; and (8) rhizomatic, as evident in the ability of convergent technologies to capture and assemble inordinate amounts of information about people from various sources.“ (Zureik 2003, 42) - 19 - A Critical Contribution to (Internet) Surveillance Studies Michalis Lianos (2003, 412-427) wants to analyze social control after Foucault and rejects the latter’s contribution, because “the Foucauldian model of control, and consequently its explanatory power, refers to the past and is not concerned with the emergence of the contemporary postindustrial subject.“ (Lianos 2003, 413) As a result, “we must stop projecting his [Foucault’s; TA] analyses onto objects of study that they were not made for, and take the risk of approaching these objects of study with the subtlety and originality that they demand.” (Lianos 2003, 427) Instead, Lianos pleads for a new theoretical paradigm considering control in the interaction between users and institutions, the emergence of neutral and unintended control, and the contribution of sociotechnical systems. For Anders Albrechtslund (2008), positive aspects of being under surveillance are worth mentioning and he argues that surveillance also empowers the users, constructs subjectivity, and is playful. Surveillance as social and participatory act involves mutuality and sharing. ”Surveillance in this context offers opportunities to take action, seek information and communicate.“ (Albrechtslund 2008) Although Albrechtslund and Dubbeld (2005, 216) do not want to ignore the controlling aspects of surveillance, they study its entertainment values and fun features. Surveillance is a play and art and “could be considered not just as positively protective, but even as a comical, playful, amusing, enjoyable practice” (Albrechtslund and Dubbeld 2005, 216). In summary, many scholars use a neutral and general notion and stress non-panoptic elements of surveillance, where everyone has the opportunity to surveil. This approach applies a broad definition of surveillance and stresses constraining and enabling effects of collecting data. Surveillance is primarily understood as a plural, neutral, and technical process. Nevertheless, there are theorists who analyze surveillance based on Foucault in the context of the Panopticon and stress powerful and disciplinary elements of contemporary surveillance societies. - 20 - A Critical Contribution to (Internet) Surveillance Studies 2.3. Panoptic notions of surveillance Gilles Deleuze (1992, 3-7; cf. also 1988, 23-46) underlines a mutation of capitalism in Postscript on the Societies of Control. Based on the ideas of Foucault, he describes the change from the disciplinary societies to the societies of control. He speaks of a change in the mode of institutions, production, culture, and technique that creates a new level of control in social subsystems. “The operation of markets is now the instrument of social control“ (Deleuze 1992, 6). The school system has been commercialized and is dominated by corporations, which presents a new form of control. The economic system has developed new forms of production and marketing. The hospital system substitutes for the body a controlling code to be controlled and the prison system developed the use of electronic collars for more efficient controllability. For Deleuze (1992, 7) technical changes in the societies of control are crucial and he mentions that “what counts is not the barrier but the computer that tracks each person’s position--licit or illicit--and effects a universal modulation”. Furthermore, society has become data, markets, and samples. Deleuze describes the neoliberal area of capitalism and emphasizes the emergence of control and surveillance as necessary part in it. The control societies are for him not just societies of data collecting, but rather societies full of power, struggles, domination, and control. “These are very small examples, but ones that will allow for better understanding of what is meant by the crisis of the institutions, which is to say, the progressive and dispersed installation of a new system of domination.“ (Deleuze 1992, 7) Also interesting in this context is the dystopian novel Nineteen Eighty-Four by George Orwell (2004), first published in 1949. Orwell describes a ruling system called Oceania, which exists of Big Brother, the party and the proles and stands for pervasive government surveillance, totalitarian regime and public mind control. “Every citizen, or at least every citizen important enough to be worth watching, could be kept for twenty-four hours a day under the eyes of the police and in the sound of official propaganda, with all other channels of communication closed. The possibility of enforcing not only complete obedience to the will of the State, but complete uniformity of opinion on all subjects, now existed for the first time.” (Orwell 2004, 255) Shoshana Zuboff (1988, 315ff.) studied the emergence of information technologies at the workplace in her book In the Age of the Smart Machine, where she defines authority as “the - 21 - A Critical Contribution to (Internet) Surveillance Studies spiritual dimension of power” (Zuboff 1988, 219) and technique as “the material dimension of power” (Zuboff 1988, 311). Based on Foucault’s disciplinary societies, she stresses the panoptic power of information technology in corporate institutions and presents empirical case studies. Furthermore, new technologies at the workplace have brought a universal transparency, increased hierarchy and control, and they provide the management with a full bird’s-eye view to counter the behaviour of their workers. In Foucault’s tradition, Mark Poster (1990, 69-98) understands surveillance as “a major form of power in the mode of information” (Poster 1990, 86). Poster emphasizes that technological change has caused new forms of surveillance and an electronic Superpanopticon in the postmodern and postindustrial mode of information. A Superpanopticon is a process of normalizing and controlling masses and a form of computational power. “Today`s ‘circuits of communication’ and the databases they generate constitute a Superpanopticon, a system of surveillance without walls, windows towers or guards. The quantitative advances in technologies of surveillance result in a qualitative change in the microphysics of power. … The Superpanopticon imposes a new language situation that has unique, disturbing features” (Poster 1990, 93f.) Poster stresses that new information and communication technologies have advanced new forms of surveillance and therefore new forms of power. For Oscar Gandy (1993, 1-13), panoptic surveillance is a “complex technology that involves the collection, processing, and sharing of information about individuals and groups that is generated through their daily lives as citizens, employees, and consumers and is used to coordinate and control their access to the goods and services that define life in the modern capitalist economy” (Gandy 1993, 15). Gandy notices surveillance as a complex high-tech system of power, where people are sorted into categories in order to identify, classify, and assess them. Furthermore, surveillance is used to normalize and homogenize behaviour with discriminatory elements in a structure of hierarchical observation. Frank Webster and Kevin Robins (1993, 244-246) analyze surveillance in the context of Taylorism. Frederick Winslow Taylor’s development of Scientific Management “provides management with a codification of purpose” (Webster and Robins 1993, 245) in order to accumulate knowledge and information in the production process. For realizing Taylor’s scientific management, a system of information gathering and surveillance is necessary. “The panopticon is the precursor of Scientific Management.” (Webster and Robins 1993, 245) Webster and - 22 - A Critical Contribution to (Internet) Surveillance Studies Robins point out the development of modern surveillance societies: “A line of descent is traceable from Bentham’s original conception of the panopticon, through Taylor’s development of Scientific Management, to the current notion of neo-Fordism or flexible accumulation … What is common throughout is the central concern with information/surveillance.” (Webster and Robins 1993, 245) Just-in-Time and Total Quality Control as new forms of postFordist production process “appear to bring decentralization while in fact increasingly centralising power” (Webster and Robins 1993, 243) Additionally, Robins and Webster (1999, 90) refer to Foucault’s ideas of the Panopticon and describe surveillance in the context of control, repression, discipline, and power: “To echo Foucault’s words, it is not possible for social planning and administration to be exercised without surveillance, it is impossible for surveillance not to reinforce administrative cohesion, efficiency, and power.” (Robins and Webster 1999, 90) Primarily political and economic forms of surveillance are analyzed and it is argued that corporations use monitoring of markets for propaganda and to control consumer groups. John Fiske (1999, 125ff.; 217ff.) focuses on surveillance as possibility to collect certain knowledge about other people. He gives examples of counter-hegemonic surveillance and refers to the Rodney King video (a privately video-taped happening, which shows an African American man, who was the victim of police brutality). Fiske argues that especially the easy access to home video cameras has made it possible to surveil the surveillers and to enable “those who are normally the object of surveillance to turn the lens of reverse its power” (Fiske 1999, 127). Nevertheless, he argues that there are social groups, which have preferred abilities to watch others; hence, there is an unequal access and power to surveil in contemporary society. In Foucault’s tradition, surveillance is stressed as oppressive and totalitarian method of power. “I believe that surveillance is rapidly becoming the most efficient form of power, the most totalitarian and the hardest to resist.” (Fiske 1999, 218) Furthermore, Fiske (1998, 67ff.) analyzes surveillance in the context of racism. Surveillance cameras are used as control mechanism especially against black people in public space. Fiske emphasizes that surveillance operates differently upon black and white people and works in a powerful and racialized context. “Surveillance is a technology of whiteness that racially zones city space by drawing lines that Blacks cannot cross and whites cannot see. Surveillance enables different races to be policed differently.” (Fiske 1998, 69) Thomas Mathiesen (1997) revisits Foucault’s Panopticon in The viewer society and argues that in modern society not only the few see the many as Foucault has articulated, but also the - 23 - A Critical Contribution to (Internet) Surveillance Studies many see the few and introduces in contrast to the Panopticon the term Synopticon – a combination of the Greek word “syn” = together, at the same time and “opticon” = visual (cf. Mathiesen 1997, 219). The scholar stresses that modern mass media especially television make possible to see the few and that both Panopticon as well as Synopticon are important elements of modern society, which create the viewer society. Mathiesen accentuates three parallels of panoptical and synoptical developments, namely “the acceleration which synopticism as well as panopticism has shown in modern times, that is, during the period 1800-2000” (Mathiesen 1997, 219), that “they are archaic, or ‘ancient’, as means of potential means of power in society” (Mathiesen 1997, 222) and that they “have developed in intimate interactions, even fusion, with each other” (Mathiesen 1997, 223). Most important in the Synopticon, news reporters, media personalities, and commentators “actively filter and shape information; as has been widely documented in media research, they produce news …; they place topics on the agenda and avoid placing topics on the agenda … Those who are allowed to enter [the media from the outside; TA] are systematically men – not women – from the higher social strata, with power in political life, private industry and public bureaucracy … The information professionals have become highly visible and valuable sources of information for the media; informational activity has become an occupation. The information professionals are trained to filter information, and to present images which are favourable to the institution or organization in question.” (Mathiesen 1997, 226f.) Therefore, not only the Panopticon but also the Synopticon makes individuals silent and directs, controls, and disciplines our consciousness (cf. Mathiesen 1997, 230). As a result, the author concludes: “Taken as a whole, things are much worse than Michel Foucault imagined.” (Mathiesen 1997, 231). Greg Elmer (2003, 231-245; see also 2004) draws upon the work of Foucault, Varela, Deleuze, and Guattari and outlines a diagram of panoptic surveillance: “With the help of Foucault and his ‘interlocutors’ Gilles Deleuze and collaborator Felix Guattari, this article conversely theorizes panoptic surveillance as a multiplicity of processes that work to increasingly quantify and qualify not only the specific behaviours of consumers (or other sales, inventory or distribution data), but also the efficiency of the panoptic process itself. It is argued that one cannot provide such an overarching theory of surveillance – or even appreciate the specific dynamics of panopticism (such as data accumulation or storage) – by privileging any one step in the process of panoptic surveillance. That is, by focusing exclusively on questions such as: how is personal information solicited? Or, how and where is personal information and other forms of consumer data stored (in databases or networked systems)? Consequently, in expli- 24 - A Critical Contribution to (Internet) Surveillance Studies cating the diagrammatic characteristics of panoptic surveillance, this article attempts to account for the way in which consumers and their data-selves become continuously integrated into the act of collecting, storing, and cross referencing a multitude of consumer market data (i.e. inventory – distribution – sales).” (Elmer 2003, 233) In regard to Foucault’s Panopticon, Didier Bigo (2006, 46ff.; 2008, 10-38) highlights banopticon dispositif in globalized spaces. The United States has propagated a global insecurity of crime and terrorism and has created a governmentality of unease, where global police networks are necessary. These ideas permit transnational regimes to close borders, to declare certain exceptions, to signify differences, to create an image of terrorists, and to profile and contain foreigners. “It allows us to analyse the collection of heterogeneous bodies of discourses (on threats, immigration, enemy within, immigrant fifth column, radical Muslims versus good Muslims, exclusion versus integration, etc.), of institutions (public agencies, governments, international organizations, NGOs, etc.), of architectural structures (detention centres, waiting zones and Schengen traffic lanes in airports, integrated video camera networks in some cities, electronic networks outfitted with security and video-surveillance capacities), of laws (on terrorism, organized crime, immigration, clandestine labour, asylum seekers, or to accelerate justice procedures and to restrict the defendants’ rights), and of administrative measures (regulation of the ‘sans papiers’, negotiated agreements between government agencies vis-à-vis policies of deportation/repatriation, ‘common’ aeroplanes specially hired for deportation with costs shared by different national polices, etc.).” (Bigo 2008, 32) While certain groups are excluded and under surveillance, the non-excluded majority is normalized and disciplined. Hence, there is a fragmented and heterogeneous contradiction of inclusion and exclusion in surveilled global spaces. Graham Sewell and Barry Wilkinson (1992, 271) scrutinize surveillance in the labour process and draw parallels between Foucault’s ideas of power, knowledge and surveillance and the phenomenon of post-Fordism. According to these authors, Just-in-Time (JIT) and Total Quality Control (TQC) regimes are improved surveillance techniques that aim at the optimization of disciplinary power and the control of the labour process. JIT and TQC are methods, which provide an organizational structure and over-arching controlling mechanism and elaborate the post-Fordist production process: “We demonstrate that the surveillance systems integral to JIT/TQM are deliberately designed such that discipline is established in a most efficient manner and the exercise of minute control is possible with a minimum of supervisors. The desired - 25 - A Critical Contribution to (Internet) Surveillance Studies effect of harnessing these dual forces is to minimise negative divergences from expected behaviour and management defined norms whilst identifying positive divergencies and maximising their creative potential.“ (Sewell and Wilkinson 1992, 271) Jean-François Blanchette and Deborah Johnson (2002, 33-35; 43) examine data retention as well as the rise of panoptic society and stress the disappearance of social forgetfulness. Surveillance and data retention have made social forgetfulness irrelevant. Data retention hinders the opportunity for a second chance and for a new and upstanding life, because it allows storing data about individual crimes from the past. Blanchette and Johnson (2002, 33) examine “three domains in which social policy has explicitly recognized the importance of such a principle: bankruptcy law, junvenile crime records, and credit reports”. For Blanchette and Johnson, the disappearance of social forgetfulness makes surveillance even more powerful and indicates that a panoptic society is being put into place: “Unless data retention issues are addressed explicitly as part of a comprehensive policy approach to personal privacy, we will gradually move to a panoptic society in which there is little social forgetfulness and little, if any, opportunity to move on beyond one’s past and start afresh.” (Blanchette and Johnson 2002, 43) It is argued that data have predictive power. Asymmetrical characteristics and unbalanced power relationships of panoptic surveillance are also emphasized by Steve Mann, Jason Nolan, and Barry Wellman (2003, 332-336). Based on Foucault’s panoptic notion, Mann, Nolan, and Wellman claim the rise of neo-Panopticons with new communication technologies. Subjects of neo-Panopticons do not have direct contact with the observers and ”are under the potential control of people in positions of authority who are organizational monitors of their behavior. They are like the subjects of a king, a dictator, authority figure, or organizational institution.“ (Mann, Nolan, and Wellman 2003, 335). Additionally, they introduce the term sousveillence, which was first developed by Mann. Sousveillence is a form of inverse surveillance using tools and technologies in order to observe the organizational observer and to surveil the surveiller: ”One way to challenge and problematize both surveillance and acquiescence to it is to resituate these technologies of control on individuals, offering panoptic technologies to help them observe those in authority. We call this inverse panopticon ’sousveillance’ from the French words for ’sous’ (below) and ’veiller’ to watch.“ (Mann, Nolan, and Wellman 2003, 332) A different reading of Foucault is undertaken by Paulo Vaz and Fernanda Bruno (2003, 272- 26 - A Critical Contribution to (Internet) Surveillance Studies 277). They want to open the concept in order to focus on subjectivity, care of the self, and practices of self-surveillance. Self-surveillance is based on (productive) power and normalizing judgement and it is analyzed in the context of disciplinary society. Because individuals are not able to realize if they are actually being observed or not, they discipline themselves, internalize power, and constitute as a normal citizen. If experiences of self-surveillance ”are to be seen as an extension and intensification of the panopticon principles, we would be running the risk of living in a totalitarian age today.“ (Vaz and Bruno 2003, 276) Stuart Elden (2003, 24ff.) undertakes a precise study of Foucault’s notion of surveillance and analyzes only partly translated lectures and seminars from this period. He criticizes traditional Foucauldian approaches of surveillance, because they tend to overemphasize the figure of Panopticon at the expense of other writings of Foucault; hence, they are eclectic. Although analyzing the Panopticon is important and crucial, it only covers a few pages and power cannot be reduced to this figure. Elden argues that control mechanisms and surveillance have more in common with the plague towns and the leper and suggests that ”the analysis of medicine may be a more profitable model for surveillance than the Panopticon“ (Elden 2003, 240). Bart Simon (2005, 1-5) highlights a return of the Panopticism and analyzes surveillance in the context of power, subjection, normalization, internalization, and social control. Simon finds it fruitful studying surveillance based on Foucault, because his “model both allows for these twin concerns within the context of the new surveillance while serving as a source of further insight into the empirical nuances of contemporary surveillance relations.” (Simon 2005, 1) Summing up, these approaches consider surveillance to be always negative and being connected to coercion, repression, discipline, power, and domination. For these authors, power is primarily centralized and society tends to be repressive and controlled. This view emphasizes panoptical elements and uses a narrow definition of surveillance. - 27 - A Critical Contribution to (Internet) Surveillance Studies 2.4. Conclusion The overall aim of this chapter was to clarify how surveillance is defined in the existing literature and what the different notions of surveillance have in common and what distinguishes them from one another. For doing so, Foucault’s understanding of surveillance and the idea of the Panopticon were introduced. Based on these findings, a systematic discussion of the state of the art of surveillance by establishing a typology of the existing literature and a discussion of commonalties and differences were introduced. The following table summarizes the results. Foundations of surveillance theory Non-panoptic Many scholars use a and general Non-panoptic notions Panoptic notions of of surveillance surveillance Anthony Giddens (1985; notions of neutral 1995), Christopher surveillance notion and stress non- Dandeker (1990), James panoptic elements of Rule (1973; 2007), Gary surveillance. This ap- Marx proach applies a broad Stanley Cohen (1987), definition of surveil- James Beniger (1986), lance and stresses con- Roger Clarke (1988), straining and enabling David effects of collecting 2001), Jean Baudrillard data. Surveillance is (2006; 2007), William primarily understood Bogard (1996), Clive as a plural, neutral, Norris and Gary Arm- and technical process. strong (1988; Lyon Hille 2006), 2002), (1994; (1998; 1999), Koskela (2004; Roy Boyne (2000), Kevin Haggerty and Richard Ericson (2000), Roy Coleman and Joe Sim (2000), Katherine Williams and - 28 - A Critical Contribution to (Internet) Surveillance Studies Craig Johnstone (2000), Sean Hier (2003; 2004), Elia Zureik (2003), Michalis Lianos (2003), Anders Albrechtslund (2008) Panoptic This approach consid- Gilles Deleuze (1988; notions of ers surveillance to be 1992), George Orwell surveillance always negative and (2004), Shoshana Zub- being connected to co- off (1988), Mark Poster ercion, repression, dis- (1990), Oscar Gandy cipline, (1993), Frank Webster power, and domination. For these and authors, power is pri- (1993; marily centralized and Fiske society tends to be re- Thomas pressive and controlled. (1997), This view emphasizes (2003; 2004), Didier panoptical Bigo elements Kevin Robins 1999), (1998; John 1999), Mathiesen Greg Elmer (2006; 2008), and uses a narrow defi- Graham Sewell and nition of surveillance. Barry Wilkinson (1992), Jean-François Blanchette and Deborah Johnson (2002), Steve Mann, and Jason Barry Nolan, Wellman (2003), Paulo Vaz and Fernanda Bruno (2003), Stuart Elden (2003), Bart Simon (2005) Table 1: Foundations of surveillance theory In conclusion, non-panoptic notions use a neutral and general notion of surveillance, where - 29 - A Critical Contribution to (Internet) Surveillance Studies everyone has the opportunity to surveil; they are represented by scholars such Anthony Giddens, James Rule, Gary Marx, and Jean Baudrillard. In contrast, panoptic notions consider surveillance to be negative and being connected to coercion, repression, discipline, power, and domination; they are represented by scholars such as Gilles Deleuze, Oscar Gandy, Frank Webster and Kevin Robins, and Mark Poster. Although private actors monitor and watch over other individuals in everyday life experiences (for example parents taking care of their children, providing personal information on Weblogs, and using social networking sites on the Internet), these acts are processes to which people agree and which involve no violence, coercion, or repression. In comparison, economical and political actors use surveillance and exercise violence in order to control a certain behaviour of people and in most cases people do not know that they are surveilled. Corporations control the economic behaviour of people and coerce individuals in order to produce or buy specific commodities for accumulating profit and for guaranteeing the production of surplus value. Corporations and state institutions are the most powerful actors in society and are able to undertake mass-surveillance extensively and intensively (such as for example the collection and gathering of information on Internet user profiles in order to implement targeted advertising), because available resources decide surveillance dimensions. In the modern production process, primarily electronic surveillance is used to document and control workers’ behaviour and communication for guaranteeing the production of surplus value. The commodification of privacy is important to target advertising for accumulating profit. State institutions have intensified and extended state surveillance of citizens in order to combat the threat of terrorism (see Gandy, 2003; Lyon 2003c) Therefore, one can assume that corporations and state institutions are the main actors in modern surveillance societies and surveillance is a crucial element for modern societies. Non-panoptical notions use a broad definition of surveillance and tend to mix up very heterogeneous phenomena on one level of analysis: If for example pretty harmless experiences like watching a baby on the one hand and for powerful economic and political surveillance on the other hand the same term is used, it becomes difficult to criticize contemporary surveillance phenomena such as for example CCTV, Internet surveillance, the EU data retention directive, biometrical iris scanners, facial recognition software, Computer Assisted Passenger Prescreening System (CAPPS), and the collection of DNA samples (cf. Fuchs 2008, 273ff.). Furthermore, non-panoptic notions understand surveillance in a non-hierarchical and decentral- 30 - A Critical Contribution to (Internet) Surveillance Studies ized way, where everyone has the opportunity to surveil. This argument overlooks the fact that corporations and state institutions are the most powerful actors in society and are able to undertake mass-surveillance, what private actors are not able to do. Neutral concepts of surveillance tend to overlook the power asymmetries of contemporary society and therefore tend to convey the image that private actors are equally powerful as corporations and state institutions. Hence, a general and neutral understanding of surveillance is not fruitful for studying surveillance as it does not take asymmetrical power relations and repressive aspects of society into consideration. Approaches that stress that everyone today has the opportunity to surveil, that surveillance techniques democratize surveillance societies to a certain degree, and that surveillance has comical, playful, amusing, and even enjoyable characteristics are typical for postmodern scholars and disguise the fact of power and domination in contemporary surveillance societies. Although panoptic notions of surveillance emphasize surveillance in the context of power and discipline, the analysis of class-structured society and the specific capitalist mode of production of surveillance (documenting and controlling workers’ behaviour and communication for guaranteeing the production of surplus value, commodification of privacy to target advertising for accumulating profit) are missing in most of these approaches. Panoptic approaches do not stress that for overcoming surveillance the sublation of domination and capitalist society as well as the creation of a cooperative and emancipated society are needed. Studying The Chomsky-Foucault Debate (Chomsky and Foucault 2006, 36-59) clarifies that Foucault rejects the idea that it is important to imagine alternatives to contemporary society and that normative ideals are important: Noam Chomsky argues that the main political aim is to change society in order to overcome coercion, repression, oppression, and destruction. In Chomsky’s view (Chomsky and Foucault 2006, 38f.), contemporary capitalist society “cannot be justified intrinsically. Rather it must be overcome and eliminated … and we must overcome it by a society of freedom and free association”. In addition, Chomsky stresses that this change is not only necessary, but also possible at least in the technologically progressed western societies. In contrast to Chomsky, Foucault does not show interests eliminating capitalist society, mentions risks and dangers of transforming society, refers to failed communist systems, and conclude: “When the proletariat takes power, it may be quite possible that the proletariat will exert towards the classes over which it has just triumphed, a violent, dictatorial, and even bloody power.” (Chomsky and Foucault 2006, 52). Based on ideas of Friedrich Nietzsche, he accentuates that power does not depend on the form of the system and that a society - 31 - A Critical Contribution to (Internet) Surveillance Studies without power and class is not feasible. Foucault says “that the proletariat doesn’t wage war against the ruling class because it considers such a war to be just. The proletariat makes war with the ruling class because, for the first time in history, it wants to take power. And because it will overthrow the power of the ruling class, it considers such a war to be just … One makes war to win, not because it is just.” Hence, Foucault is not interested in articulating alternative types of human life, does not consider forms of emancipation, and “is not in the hope that finally one day, in this or another society, people will be rewarded according to their merist” (Chomsky and Foucault 2006, 50). For Foucault, imagining alternative automatically means planning to install a new system of power and coercion, whereas Chomsky argues that it is possible today to imagine how an alternative society – participatory democracy – could look like and how it could be achieved. In conclusion, Chomsky in contrast to Foucault stresses the importance of economic institutions in contemporary society and of political visions. The approach that is advanced in this work, recognizes the importance of the role of the economy in contemporary society, and is therefore interested, just like Chomsky, in a political economy approach. Surveillance studies scholars like Lyon (1994, 119-158; 2001, 40-44) grasp that economic surveillance such as monitoring consumers or the workplace are central aspects of surveillance societies. The following treatment indicates that most of the panoptic notions of surveillance recognize the importance of economic aspects of surveillance: As mentioned at the beginning of this chapter, Foucault (1995, 141-169) analyzes surveillance in the context of the military, medical, educational and industrial institutions. When referring to the industrial institution, Foucault (1995, 145) illustrates surveillance in the context of the workplace and concludes: “By walking up and down the central aisle of the workshop, it was possible to carry out a supervision that was both general and individual: to observe the worker’s presence and application, and the quality of his work; to compare workers with one another, to classify them according to skill and speed; to follow the successive stages of the production process.” Deleuze (1992, 7) manifests control in the corporate system as “new ways of handling money, profits, and humans that no longer pass through the old factory form.” Zuboff (1988, 324-337) studies the panoptic power in two US American corporations namely Cedar Bluff and Metro Tel. She concludes that “techniques of control in the workplace became increasingly important as the body became the central problem of production ... Still struggling to establish their legitimate authority, they invented techniques designed to control the laboring body ... As an informating technology textualizes a wide range of workplace behaviors, new patterns - 32 - A Critical Contribution to (Internet) Surveillance Studies of conduct and sensibility emerge from the heart of the panoptic vision.” (Zuboff 1988, 319; 323) When Poster describes the emergence of the Superpanopticon in postmodern society, he solely analyzes consumerist aspects of surveillance in the economy: “Indiviudals themselves in many cases fill out the forms; the are at once the source of information and the recorder of the information. Home networking constitutes the streamlined culmination of this phenomenon: the consumer, by ordering products through a modem connected to the producer’s database, enters data about himself or herself directly into producer’s database in the very act of purchase ... Individuals are constituted as consumers and as participants in the disciplining and surveillance of themselves as consumers.” (Poster 1990, 93) Gandy (1993, 80-87) argues on the one hand that the aim of corporations is to get certain behaviours, preferences, usages, interests, and choices of customers in order to identify, classify, and assess certain groups and supply them with targeted advertisements. On the other hand, he stresses that surveillance also takes place in the process of circulation and that surveillance of applications is “required to classify the applicant in terms of eligibility or in relation to the assignment of the applicant to one or more classes of service” (Gandy 1993, 62). Webster and Robins (993, 95) argue that “the subsequent history of capitalist industry … has been a matter of the deepening and extension of information gathering and surveillance to the combined end of planning and controlling the production process”. They also mention that “one fundamental aspect of the ‘communications revolution’ has been to refine that planning and control of consumer behaviour that was already inherent in the early philosophy of Scientific Management” (Webster and Robins 1993, 100). Elmer (2003, 245) states in his panoptic diagram that “consumers are not exclusively disciplined – they are both rewarded, with a preset familiar world of images and commodities, and punished by having to work at finding different and unfamiliar commodities if they attempt to opt-out.“ Sewell and Wilkinson (1992, 272) scrutinize surveillance in the labour process and draw parallels between Foucault’s ideas of power, knowledge and surveillance and the phenomenon of post-Fordism: “It is our intention to examine this proposition in greater detail in order that we might be able to draw meaningful parallels between the nature of power, knowledge, and surveillance that Foucault unearthed in his archaeologies and the role of the information superstructure that surrounds the production process in general, and JIT/TQC manufacturing in particular.” In conclusion, panoptic notions of surveillance analyze economic aspects of surveillance in different spheres, namely surveillance in the spheres of production, circulation, and consumption. The following table can be outlined: - 33 - A Critical Contribution to (Internet) Surveillance Studies Economic aspects in panoptic notions of surveillance Surveillance in the sphere of Surveillance in the sphere of Surveillance in the sphere of production circulation consumption Michel Foucault (1995) Gilles Deleuze (1992) Mark Poster (1990) Shoshana Zuboff (1988) Oscar Gandy (1993) Oscar Gandy (1993) Frank Webster and Kevin Frank Webster and Kevin Robins (1993) Robins (1993) Greg Elmer (2003) Graham Sewell and Barry Wilkinson (1992) Table 2: Economic aspects in panoptic notions of surveillance Although panoptic notions of surveillance recognize the importance of the economy, they tend to focus only on one or two spheres of the economy. Furthermore, panoptic notions of surveillance claim that there are particular forms of economic surveillance without a theoretical criterion for a certain typology. In contrast, a typology of surveillance in the modern economy, which is based on Marx’ theory of the political economy, allows to systemize economic surveillance and to distinguish surveillance into the spheres of production, circulation, and consumption. A theoretically founded typology of economic surveillance is important in order to undertake a theoretical analysis of surveillance in the modern economy. Therefore, in the next chapter, foundations of a political economy approach on surveillance will be outlined. - 34 - A Critical Contribution to (Internet) Surveillance Studies 3. A critical contribution to surveillance studies The overall aim of this chapter is to analyze the specific economic mode of surveillance. Based on the foundations of a political economy approach, the distinction of production, circulation, and consumption within the economy is introduced (section one) in order to establish a typology of surveillance in the economy and to study surveillance in the spheres of production, circulation, and consumption (section two). The chapter concludes with a summary and discusses the emergence of new information and communication technologies as new surveillance technologies (section three). - 35 - A Critical Contribution to (Internet) Surveillance Studies 3.1. The spheres of the economy In the Introduction to a Contribution to the Critique of Political Economy, Karl Marx (MECW 28, 26-37) distinguishes between (a) production, (b) circulation (distribution and exchange), and (c) consumption as dialectically mediated spheres of the capitalistic economy. (a) The sphere of production appears as the point of departure. In the capitalist mode of production, entrepreneurs purchase means of production and labour power in order to produce commodities and surplus value. (b) Circulation is the “mediation between production and consumption” (MECW 28, 27). In the process of circulation, consumers purchase commodities for daily life and proprietors sell the produced commodities to realize profit. (c) In the sphere of consumption as the final point of the process, “the product drops out of this social movement, becomes the direct object and servant of an individual need, which its use satisfies” (MECW 28, 26). While in the production the person receives an objective aspect, in the consumption the object receives a subjective aspect. The “consumption, as the concluding act, … reacts on the point of departure thus once again initiating the whole process.” (MECW 28, 27) Although production, circulation, and consumption are separated spheres, they correlate in an interconnected relationship (see figure 2): Figure 2: Production, circulation, and consumption as dialectically mediated spheres of the modern economy - 36 - A Critical Contribution to (Internet) Surveillance Studies In the sphere of production, means of production are consumed and in the sphere of consumption, labour power is (re)produced. “Production is consumption; consumption is production. Consumptive production. Productive consumption.” (MECW 28, 30) Production is not possible without demand and consumption does not take place without material. “No consumption without production; no production without consumption.” (MECW 28, 30) Moreover, the process of production is determined by circulation of labour power as well as means of production whereas circulation itself is a product of production. Production, circulation, and consumption are not “identical, but that they are all elements of a totality, differences within a unity. … There is an interaction between the different moments.” (MECW 28, 36-37) Nevertheless, production, circulation, and consumption are not equal spheres in the economy; production is rather “the dominant moment, both with regard to itself in the contradictory determination of production and with regard to the other moments. The process always starts afresh with production. … A definite [mode of; TA] production thus determines a definite [mode of; TA] consumption, distribution, exchange and definite relations of these different moments to one another. Production in its one-sided form, however, is in its turn also determined by the other moments.” (MECW 28, 36) Based on the distinction of production, circulation, and consumption, a typology of surveillance in the economy can be constructed. Such a typology will be outlined in section 3.2. - 37 - A Critical Contribution to (Internet) Surveillance Studies 3.2. Surveillance in the spheres of the economy Economical surveillance in the spheres of production, circulation, and consumption will be outlined. The following three sub-sections are therefore structured according to this distinction. 3.2.1. Surveillance in the sphere of production Marx analyzes the process of producing capital in Capital, Volume I. The process starts with commodities and money, continues with labour-produced surplus value and methods for producing absolute and relative surplus value, and concludes with the accumulation of capital. For Marx (MEW 23 , 192-2131), production is a unity of the labour process (a) and the process of producing surplus value (b). (a) The labour process is a human activity where, with the help of the instruments of labour, an alteration of material is effected. Marx understands the labour process as a relationship of human activity with its physical and intellectual capabilities on the one hand and the means of production with its instruments and subjects of labour on the other hand. Whereas labour is defined as “a process in which both man and Nature participate, and in which man of his own accord starts, regulates, and controls the material reactions between himself and Nature.” (MEW 23, 192) Furthermore, “the soil … is the universal subject of human labour” (MEW 23, 193) and an instrument of labour “is a thing, or a complex of things, which the labourer interposes between himself and the subject of his labour, and which serves as the conductor of his activity. He makes use of the mechanical, physical, and chemical properties of some substances in order to make other substances subservient to his aims.” (MEW 23, 193) (b) In the capitalist mode of production, entrepreneurs consume purchased labour power as variable capital (v) and purchased means of production as constant capital (c) in order to produce commodities. Constant capital such as raw materials, operating supplies, buildings, equipments etc. does not change its value in the process of production, because the value of constant capital is transferred to the commodity; whereas, labour power as variable capital changes its value during the process of production and produces surplus value (cf. MEW 23, 223). The overall aim of capitalists is to produce as much surplus value as possible in order to accumulate profit. There are two different possibilities for 1 All translations from: http://www.marxists.org/archive/marx/works/cw/volume35/index.htm (March 15, 2010) - 38 - A Critical Contribution to (Internet) Surveillance Studies doing so: the production of absolute surplus value by extension of the working day and the production of relative surplus value by intensification of the working day and increasing productivity. “The surplus-value produced by prolongation of the working-day, I call absolute surplus-value. On the other hand, the surplus-value arising from the curtailment of the necessary labour-time, and from the corresponding alteration in the respective lengths of the two components of the working-day, I call relative surplus-value.” (MEW 23, 334) When Marx refers to meticulous data protocols of factory inspectors it gets clear that proprietors are interested in expanding the time of the working day for producing absolute surplus value: “The fraudulent mill-owner begins work a quarter of an hour (sometimes more, sometimes less) before 6 a.m., and leaves off a quarter of an hour (sometimes more, sometimes less) after 6 p.m. He takes 5 minutes from the beginning and from the end of the half hour nominally allowed for breakfast, and 10 minutes at the beginning and end of the hour nominally allowed for dinner. He works for a quarter of an hour (sometimes more, sometimes less) after 2 p.m. on Saturday.” Therefore, the mill-owner’s benefit is listed in table 3: Before 6 a.m., 15 minutes. After 6 p.m., 15 " At breakfast time, 10 " At dinner time, 20 " Five days — 300 minutes, 60 " On Saturday before 6 a.m., 15 minutes. At breakfast time, 10 " After 2 p.m., 15 " 40 minutes. Total weekly, 340 minutes. Table 3: The mill-owner’s benefit (MEW 23, 255) “Or 5 hours and 40 minutes weekly, which multiplied by 50 working weeks in the year (allowing two for holidays and occasional stoppages) is equal to 27 working-days. Five minutes a day’s increased work, multiplied by weeks, are equal to two and a half days of produce in the year. An additional hour a day gained by small instalments before 6 a.m., after 6 p.m., and at the beginning and end of the times nominally fixed for meals, is nearly equivalent to working 13 months in the year.” (MEW 23, 255) - 39 - A Critical Contribution to (Internet) Surveillance Studies Marx develops the concept of producing relative surplus value as instrument to intensify the working day and introduces co-operation as one possibility for doing so. For Marx, cooperation is an essential part of the capitalist process of production that is defined as a process of many workers collaborating with each other in one process or many related processes of production in order to work systematically side by side and together (cf. MEW 23, 344). He highlights the importance and necessity of control, supervision, and surveillance in order to guarantee co-operation, the production of relative surplus value, and therefore achieve accumulation of capital: “The work of directing, superintending, and adjusting, becomes one of the functions of capital, from the moment that the labour under the control of capital, becomes co-operative ... In proportion to the increasing mass of the means of production, now no longer the property of the labourer, but of the capitalist, the necessity increases for some effective control over the proper application of those means … Just as at first the capitalist is relieved from actual labour so soon as his capital has reached that minimum amount with which capitalist production, as such, begins, so now, he hands over the work of direct and constant supervision of the individual workmen, and groups of workmen, to a special kind of wagelabourer. An industrial army of workmen, under the command of a capitalist, requires, like a real army, officers (managers), and sergeants (foremen, overlookers), who, while the work is being done, command in the name of the capitalist. The work of supervision becomes their established and exclusive function.” (MEW 23, 350-351) Marx argues that collecting, analyzing, and assessing data of the working day as well as the superintendence, control, supervision, and surveillance of workers’ behaviour and performance are central parts of the capitalist process of production for generating absolute and relative surplus value in order to accumulate profit. As one can see, surveillance in the sphere of production in capitalist economy is as old as capitalist economy itself. But for explaining contemporary forms of surveillance in the process of production, the emergence of scientific management has to be analyzed first (cf. Robins and Webster 1999, 93ff.). The mechanical engineer Frederick Winslow Taylor developed the scientific management as a system of industrial production and concept of management, which was firstly applied in shops by Henry Ford and extended to a designated concept of mass production in the twentieth century (cf. Hirsch 1995, 75). Taylor’s concept of rationalising production and work, mechanisation of workers including the expansion of discipline and order in production, as well as the “militarisation of labour” (Gramsci 1992, 301) only characterize a new phase of a - 40 - A Critical Contribution to (Internet) Surveillance Studies process which had already begun with capitalist production itself, but works on a more brutal and powerful level (cf. Gramsci 1992, 301f.). “Taylor is in fact expressing with brutal cynicism the purpose of American society – developing in the worker to the highest degree automatic and mechanical attitudes … and reducing productive operations exclusively to the mechanical physical aspect.” (Gramsci 1993, 302) The overall aim of scientific management was to increase productivity and to make labour more efficient, what means in Marx’ terms: decreasing value of labour power, inducing production of relative surplus value, and maximizing profit. The basic idea is the separation of mental and physical tasks in order to rationalize and intensify the process of production. “All possible brain work should be removed from the shop and centered in the planning or laying-out department.“ (Taylor 2003, 50) In the area of scientific management, a precise distribution of labour and responsibility, mechanization and schematization, and better coordination, control, discipline, and standardization over labourer and labour process took place. Furthermore, with the help of Taylor, standards of tools and machinery, the fragmentation of labour processes in as many parts as possible, and new forms of performance-oriented wages and salaries were introduced (cf. Hirsch 1995, 75-83). The meaning of knowledge and information as productive force has permanently increased; therefore, surveillance and control of labour through knowledge became important (cf. Braverman 1998, 82; Robins and Webster 1999, 94ff.). In the area of scientific management, surveillance of workers is realized by humans such as overlookers, managers, and foremen and by technology such as assembly lines, where through speed control the labour process is disciplined. The management gathers knowledge of the labour process and uses this knowledge in order to control the labour process (cf. Zuboff 1988, 43). That includes “the gathering together of the workers in a workshop and the dictation of the length of the working day; the supervision of workers to ensure diligent, intense, or uninterrupted application; the enforcement of rules against distractions (talking, smoking, leaving the workplace, etc.) that were thought to interfere with application; the setting of production minimums; etc.” (Braverman 1998, 62) For Taylor (2003, 137f.), it is important to study worker’s time and motion of each element and every single act of work in order to maximize efficiency. For doing so, labour is planned out by the management and complete instructions such as instruction cards for labourers are given. For instance, managers suppose ”the burden of gathering together all of the traditional knowledge which in the past has been possessed by the workmen and then of classifying, tabulating, and reducing this knowledge to rules, laws, and formulae which are immensely helpful to the workmen in doing their daily work … This task specifies - 41 - A Critical Contribution to (Internet) Surveillance Studies not only what is to be done but how it is to be done and the exact time allowed for doing it.” (Taylor 2003, 136, 138) In Shop Management, Taylor (2003, 82ff.) introduces the principles of time studies with the help of watch books and time studies note sheets. Figure 3 shows a watch book, which consists of a sheet for describing course of movements and some stopwatches for stopping the duration of each working part. The observation is performed “without the knowledge of the workman who is being observed” (Taylor 2003, 82). Figure 3: Watch book for time study (Taylor 2003, 84) In addition, Taylor (2003, 82ff.) suggests how labourers should be observed and supervised: “The writer does not believe at all in the policy of spying upon the workman when taking time observations for the purpose of time study. If the men observed are to be ultimately affected by the results of these observations, it is generally best to come out openly, and let them know that they are being timed, and what the object of the timing is. There are many cases, however, in which telling the workman that he was being timed in a minute way would only result in a row, and in defeating the whole object of the timing; particularly when only a few time units are to be studied on one man’s work, and when this man will not be personally affected by the - 42 - A Critical Contribution to (Internet) Surveillance Studies results of the observations. In these cases, the watch book …, holding the watches in the cover, is especially useful. A good deal of judgment is required to know when to time openly, or the reverse.” Furthermore, Taylor introduces the time study note sheet (see table 4), which contains: (1) space for basic information on the operation and the description of the activity, such as the name of the worker, used material, and working conditions, (2) space for noting the total time of complete operations, (3) lines for listing detailed operations of the work including columns for recording the stopped averages of the activity, and (4) squares for logging the timing of the detailed operations according to the stopwatch. - 43 - A Critical Contribution to (Internet) Surveillance Studies Table 4: Time study note sheet (for excavation of earth with wheelbarrows) (Taylor 2003, 83) - 44 - A Critical Contribution to (Internet) Surveillance Studies For Taylor (2003, 84f.), the techniques of using the note sheets for timing labourers can be summarized as follows: “After entering the necessary descriptive matter at the top of the sheet, divide the operation to be timed into its elementary units, and write these units one after another under the heading ‘Detail Operations’. If the job is long and complicated, it may be analyzed while the timing is going on, and the elementary units entered then instead of beforehand. In wheelbarrow work as illustrated in the example shown on the note sheet, the elementary units consist of ‘filling barrow,’ ‘starting’ (which includes throwing down shovel and lifting handles of barrow), ‘wheeling full,’ etc. These units might have been further subdivided – the first one into time for loading one shovelful, or still further into the time for filling and the time for emptying each shovelful. The letters a, b, c, etc., which are printed, are simply for convenience in designating the elements.” The worker’s observer takes a stopwatch in order to stop each element of the activity and the “times are recorded in the columns headed ‘Time’ at the top of the right-hand half of the note sheet. These columns are the only place on the face of the sheet where stop watch readings are to be entered … The rest of the figures (except those on the left-hand side of the note sheet, which may be taken from an ordinary timepiece) are the results of calculation, and may be made in the office by any clerk.” (Taylor 2003, 85) The implementation of scientific management in an American steel company is also interesting in the context of surveillance in the sphere of production. Taylor’s and some other managers’ overall aim was to maximize efficiency and productivity in this factory. For doing so, they tried to find the fastest labourer of the company first of all: “Our first step was to find the proper workman to begin with. We therefore carefully watched and studied these 75 men for three or four days, at the end of which time we had picked out four men who appeared to be physically able to handle pig iron at the rate of 47 tons per day. A careful study was then made of each of these men. We looked up their history as far back as practicable and thorough inquiries were made as to the character, habits, and the ambition of each of them. Finally we selected one from among the four as the most likely man to start with.” (Taylor 2003, 141) As one can see, the realization of Taylor’s scientific management in the process of production includes the observation and supervision of every particular element of labour and the collection as well as the assessment of these data in order to undertake a careful selection of labour- 45 - A Critical Contribution to (Internet) Surveillance Studies ers. Afterwards, the most efficient labourers were trained and supported to work corresponding to the scientific management: “These men were given all kinds of tasks, which were carried out each day under the close observation of the young college man who was conducting the experiments, and who at the same time noted with a stop-watch the proper time for all of the motions that were made by the men. Every element in any way connected with the work which we believed could have a bearing on the result was carefully studied and recorded.” (Taylor 2003, 147) Finally, it was known how effective and efficient each element of the process could be performed and what a proper day’s work was. While continuing observation and surveillance of each labourer, the management was able to introduce different scales of wage and train all workers towards scientific management: “As each workman came into the works in the morning, he took out of his own special pigeonhole, with his number on the outside, two pieces of paper, one of which stated just what implements he was to get from the tool room and where he was to start to work, and the second of which gave the history of his previous day’s work; that is, a statement of the work which he had done, how much he had earned the day before, etc.“(Taylor 2003, 155) Taylor’s concept of scientific management indicates the importance of knowledge in the process of production and therefore for the production of surplus value and accumulation of profit. Similarly in Fragment on Machines in the Grundrisse, Marx (1973, 706) stresses that knowledge as general intellect “has become a direct force of production”. In conclusion, “the subsequent history of capitalist industry … has been a matter of the deepening and extension of information gathering and surveillance to the combined end of planning and control.” (Webster and Robins 1993, 245) In this sub-section, I have tried to delineate the history of capitalist industry as a history of surveillance in the sphere of production: Marx argues that collecting, analyzing, and assessing data of the working day as well as the superintendence, control, supervision, and surveillance of workers’ behaviour and performance are central parts of the capitalist process of production for generating absolute and relative surplus value in order to accumulate profit. Surveillance in the sphere of production in capitalist economy is as old as capitalist economy itself. But for explaining newer forms of - 46 - A Critical Contribution to (Internet) Surveillance Studies surveillance in the process of production, the analysis of the emergence of scientific management is important (cf. Robins and Webster 1999, 93ff.). Now, we move on to the sphere of circulation. 3.2.2. Surveillance in the sphere of circulation For understanding the sphere of circulation of the capitalistic economy and the surveillance in it, it is helpful to analyze how Marx described the circuit of capital in Capital, Volume II. For Marx, the circuit of capital contains three stages, namely the stage of money capital (sphere of circulation), the stage of productive capital (sphere of production), and the stage of commodity capital (sphere of circulation). The first stage of the circuit of capital starts with a certain amount of money (M), which at this stage is money capital. With this money, the capitalist purchases two different commodities (C), namely labour power (L) and means of production (mp). This act can be expressed as follows: L M - C {mp Money is transformed into commodities and the capitalist appears as a buyer. It is a transformation of money capital to commodity capital. With labour power and means of production, the capitalist is able to start the process of production. (cf. Marx 1992, 110-118) The second stage of the circuit of capital is a productive process. The capitalist consumes the purchased commodities in order to produce a new commodity (C’) with an increased value because of surplus labour. P indicates the process of production. The dots signify that the sphere of circulation is interrupted by the sphere of production. This act can be expressed as follows: L C {mp ...P...C' - 47 - A Critical Contribution to (Internet) Surveillance Studies With a commodity of greater value than its single elements of production, the capitalist is able to sell the commodity on the market. (cf. Marx 1992, 118-121) In the third stage of the circuit of capital, the capitalist sells the commodity on the market and transforms the commodity into money. The capitalist finishes with a greater amount of money (M’) than what he owned at the beginning. This act can be expressed as follows: C'-M' The capitalist turns back to the market as a seller. It is a transformation of commodity capital to money capital. (cf. Marx 1992, 121-131) “We have seen how the circulation process, after its first phase … has elapsed, is interrupted by P, in which the commodities bought on the market, L and mp, are consumed as material and value components of the productive capital; the product of this consumption is a new commodity, M’, altered both materially and in value. The interrupted circulation process, MC, must be supplemented by C-M.“ (Marx 1992, 131f.) Finally, the circuit as a whole can be expressed as follows: L M - C {mp ...P...C'-M ' The first and the last stage take place in the sphere of circulation, whereas the second stage takes place in the sphere of production. Only in the sphere of production surplus value is produced. The sphere of circulation represents a transformation of money capital to commodity capital and a transformation of commodity capital to money capital. (cf. Marx 1992, 131-143) “Here capital appears as a value that passes through a sequence of connected and mutually determined transformations, a series of metamorphoses that form so many phases or stages of a total process. Two of these phases belong to the circulation sphere, one to the sphere of production. In each of these phases the capital value is to be found in a different form, corresponding to a different and special function. Within this movement the value advanced not only maintains itself, but it grows, increases its magnitude. Finally, in the concluding stage, it - 48 - A Critical Contribution to (Internet) Surveillance Studies returns to the same form in which it appeared at the outset of the total process. This total process is therefore a circuit.” (Marx 1992, 132f.) By knowing the sphere of circulation in the circuit of capital, one is able to identify surveillance in the sphere of circulation: a.) Surveillance of purchasing labour power in the stage of money capital Surveillance of purchasing labour power in the stage of money capital means applicant surveillance. Applicant surveillance is useful for getting the most suitable labour power, which is able to produce the most surplus value and with means of production creates a new commodity of the greatest possible value in order to sell the commodity and to accumulate as much profit as possible. Lyon (2001, 41) stresses in this context that “before an employee is even hired, she or he is likely to be checked, using special databases (including data mining techniques) or genetic screening, to discover the likelihood of this or that person turning out to be a responsible and hard-working employee.” Gandy (1993, 62) argues that the corporate file “begins with the application” and that “applications are required to classify the applicant in terms of eligibility or in relation to the assignment of the applicant to one or more classes of service”. He lists groups of personal information, which may be useful for corporations in the process of applications (see table 5): - 49 - A Critical Contribution to (Internet) Surveillance Studies Table 5: Groups of personal information in the application process (Gandy 1993, 63) In conclusion, collecting, classifying, and assessing data such as personal information for identification and qualification (school records, marriage certificate), financial information (tax returns, traveler’s checks), insurance information (liabilities), social services information (health care, social security), utility services information (telephone, television), real estate information (sale, lease), entertainment and leisure information (entertainment tickets and reservations, newspaper and periodical subscriptions), consumer information (purchase inquiries, subscriber lists), employment information (applications, employment histories, employment agency applications), educational information (school records, rankings, sanctions), - 50 - A Critical Contribution to (Internet) Surveillance Studies and legal information (records of the court, attorney records) are part of applicant surveillance (cf. Gandy 1993, 63), which is undertaken by companies or by agencies (cf. Lyon 1994, 129). b.) Surveillance of purchasing means of production in the stage of money capital Surveillance of purchasing means of production in the stage of money capital includes screening of suppliers. c.) Surveillance of produced commodities in the stage of commodity capital Surveillance of produced commodities in the stage of commodity capital contains (material and immaterial) property surveillance as well as surveillance of vendors. In conclusion, the circuit of capital contains three stages, namely the stage of money capital, the stage of productive capital, and the stage of commodity capital. Based on these findings, surveillance in the sphere of circulation consists of applicant surveillance, screening of suppliers, property surveillance, and surveillance of vendors. Now, we move on to the sphere of consumption. 3.2.3. Surveillance in the sphere of consumption Although the emergence of mass consumption in modern societies promises individuality, free choice, sovereignty, and freedom of consumers, it synchronously requires knowledge of consuming activities in order to stimulate and steer consumption (cf. Lyon 1994, 137). Advertising as a product of modern society is an important instrument for realizing profit, because it induces people to consume more products or services through branding. The more data are available, the more precise and effective are the targeted advertisements. Consumer surveillance can be seen as a product of the capitalistic economy (cf. Lyon 1994, 138; Gill 2003, 25ff.; Ogura 2006, 293f.; Brown 2006, 18ff.; see also Hewson 1994). In order to target advertising, market research such as analyzing behaviour, preferences, and interests of consumers is important. The basic question for market research is who buys where, when, what and why. The overall aim is to get certain behaviours, preferences, usages, interests, and choices of customers in order to identify, classify, and assess (cf. Gandy 1993, 80-87) certain groups and supply them with targeted advertisements. As Theodor W. Adorno and Max Horkheimer - 51 - A Critical Contribution to (Internet) Surveillance Studies (2002, 96f.) put it: “Sharp distinctions like those between A and B films, or between short stories published in magazines in different price segments, do not so much reflect real differences as assist in the classification, organization, and identification of consumers.” So, “for the consumer there is nothing left to classify, since the classification has already be preempted by the schematism of production.” (Adorno and Horkheimer 2002, 98) Corporations are interested in collecting and generating as much data as possible (qualitative level) from as many people as possible (quantitative level). Surveillance in the sphere of consumption has emerged monitoring routines of everyday life (cf. Lyon 1994, 138). On an abstract level, Dallas Smythe (2006, 234) undertakes a subdivision of data gathering in the sphere of consumption: (a) surveillance of corporations while purchase producers’ goods to enter a new process of production (for example: control units, logic units, bus units, input-, and output). “The buyers of producers’ goods are typically institutions (government, in the case of the ‘military sales effort’, or private corporations)”. (Smythe 2006, 234) (b) surveillance of labourers while purchase consuming commodities to exit the process of production for consuming (for example: home computers). Consumer surveillance results in both, permitting consumers in further specific areas of offers and opportunities and limits the choices of those whose data point out that they are not able to conform to certain consumption norms or have unacceptable debts (cf. Lyon 1994, 137 and 154). For instance, knowledge of personal information may influence decision-making to whom an apartment is rented or to whom a credit is granted. Consumerist methods of surveillance are a contradictory form of social inclusion of qualified and desired consumers and social exclusion of disqualified and undesired consumers such as non-consumers as homeless people. Thus, consumer surveillance produces and re-produces social classes in modern society. “Surveillance-oriented society is a dialectic process between the excluded population and the dominant socio-economic political regime. Surveillance is a technique of redefinition and making clear the boundaries between exclusion and inclusion, separation and integration, absence and presence, disregard and consideration.” (Ogura 2006, 277) Market research in the sphere of consumption monitors both patterns of small and large consumption groups on a quantitative level and buying behaviour of individuals by combining geo-demographic with socio-economic data on a qualitative level (cf. Lyon 1994, 152). - 52 - A Critical Contribution to (Internet) Surveillance Studies Marx (MECW 28, 30) notes that “production produces consumption: (1) by creating the material for consumption; (2) by determining the mode of consumption; (3) by creating in the consumer a need for the products which it first posits as objects” and concludes that production “produces the object of consumption, the mode of consumption and the urge to consume.” Nevertheless, in order to know which mode of production generates which mode of consumption of different consumers, knowledge of consumption matters is required. Robins and Webster (1999, 96ff.) argue that for understanding the logic of surveillance in the sphere of consumption, the emergence of the Fordist system (based on Taylor’s concept of scientific management) has to be analyzed first. The American entrepreneur Henry Ford applied Taylor’s concept of scientific management in combination with assembly lines in his car factory (Ford Motor Company) in the early twentieth century. This form of production was enormously extended in the manufacturing industry in the industrialized countries up to the 1970s. The reason for this expansion can be seen in the context of the changed circumstances caused by the world depression in the 1930s as well as in the economical, political, and cultural dominating position of the USA. (cf. Hirsch 1995, 75ff.) Due to the systematic application of Taylorist management and assembly lines, a standard mass production with low product prices became common. Because of higher productivity and economical increase, higher real wages, reduction of working hours, and increased labour requirements were realized what caused mass consumption and a relative prosperity of labourers. This consuming era was characterized by a distribution of commodities such as automobiles, television sets, and electric household appliances on a large scale. Mass consumption, higher productivity, and new markets were important in order to accumulate capital. Furthermore, these methods of production raised centralistic organized corporations and the building of monopolies and capitalization of many areas of life. (cf. Becker and Sablowski 1997, 14f.; Fuchs 2001; Hirsch 1995, 75-83) Fordism produced commodities on a large scale, whereas mass production depends on mass consumption in order to avoid overproduction. Therefore, for guaranteeing mass consumption, market research on data such as demographic and socio-economic information and knowledge of buying behaviour patterns became important in order to target advertising and to stimulate needs and demands (cf. Robins and Webster 1999, 96f.). “The system of mass - 53 - A Critical Contribution to (Internet) Surveillance Studies consumption (and the consumer society) is dependent upon the collection, aggregation, and dissemination of information.” (Robins and Webster 1999, 96) Efficiency and effectiveness were extended from the sphere of production to the sphere of consumption (cf. Lyon 1994, 141; Andrejevic 2007, 88) and a translation of scientific management to scientific marketing took place: “Taylorist principles of calculation must extend into the marketing sphere.” (Robins and Webster 1999, 96) Similarly, Andrejevic (2007, 74ff.) stresses that for a system of mass production a system of mass consumption is necessary in order to avoid overproduction. For doing so, consumer desires and demands have to be studied and managed in order to professionalize advertising and to stimulate consumption. “What was needed was a way of getting messages to a mass audience on a mass scale, large enough to encompass markets at the regional and national level. It is no coincidence that the first national mass medium in the United States – the masscirculation magazine – emerged alongside the development of industrialized mass production in the nineteenth century, not least because its success was reliant on the same technologies that made the mass production and distribution of other manufactured goods possible.” (Andrejevic 2007, 77) The more commercialization and professionalization in the mass media has taken place, the more the dependence on advertising has grown, and the more systematic forms of consumer surveillance have been undertaken (cf. Andrejevic 2007, 80). Consumerist methods of monitoring and information gathering constitute the “economic lifeblood of the commercial mass media” (cf. Andrejevic 2007, 81). Also Beniger (1986, 352ff.) emphasizes the coherence of media advertisement and surveillance and argues that with the rise of modern advertising consumerist methods of control have permanently increased. He indicates an analogy of the development of advertising on the one hand and the rise of control of consumption on the other hand. The more sophisticated advertising was in modern society, the more advanced methods for gathering knowledge of consuming behaviour were necessary. In On the Audience Commodity and Its Work, Dallas Smythe (2006) argues that commercial mass media, for instance, newspapers, magazines, television, radio, etc. gather information about their audience and sell these data to advertisers in order to accumulate profit. Hence, the audience appears as a commodity. “Because audience power is produced, sold, purchased and consumed, it commands a price and is a commodity.” (Smythe 2006, 233) Mass media col- 54 - A Critical Contribution to (Internet) Surveillance Studies lect, analyze, and assess information in order to know which audience group consumes and receives what, when, and in which market area. Besides, with the help of market research, specific demographics such as age, sex, location, income level, social class, and hobbies, are analyzed and sold. Advertisers buy “the services of audiences with predictable specifications which will pay attention in predictable numbers and at particular times to particular means of communication (television, radio, newspapers, magazines, billboards, and third-class mail) in particular market areas” (Smythe 2006, 234). The audience produces the for modern economy crucial audience commodity for free in the “unpaid work time” (Smythe 2006, 238) and “the system gets it ‘dirt cheap’” (Smythe 2006, 239). Furthermore, “while people do their work as audience members they are simultaneously reproducing their own labor power” (Smythe 2006, 244). Audience commodity is the counterpart of the production of commodity (cf. Smythe 2006, 251). In addition, some scholars articulated comparable terms with similar meanings such as “watching as working” (Jhally and Livant 1986), “commodification of audiences” (Arvidsson 2004, 460), “the work of being watched” (Andrejevic 2004), “consumption as immaterial labour” (Arvidsson 2005, 239), “commercial exploitation of user data” (Röhle 2007), “manufacturing customers” (Zwick and Knott 2009, 221), “the database as new means of production” (Zwick and Knott 2009, 221), and “prosumer/produsage commodity” (Fuchs 2010a; 2010b). Figure 4: The television audience (Jhally and Livant 1986, 125) In conclusion, the emergence of mass consumption is crucial in order to understand surveillance in the sphere of consumption. Furthermore, scientific management was translated to scientific marketing, where the audience is treated as commodity. - 55 - A Critical Contribution to (Internet) Surveillance Studies 3.3. Conclusion The overall aim of this chapter was to analyze surveillance in the context of the economy. Based on the foundations of a political economy approach, the distinction of production, circulation, and consumption in the economy was introduced in order to establish a typology of surveillance in the economy and to study surveillance in the spheres of production, circulation, and consumption (see table 6). Surveillance in the economy Surveillance in the sphere of Surveillance in the sphere of Surveillance in the sphere of production circulation consumption Production of absolute and Purchasing labour power in Mass consumption relative surplus value the stage of money capital Scientific marketing Scientific management Purchasing means of production in the stage of money Audience commodity capital Produced commodities in the stage of commodity capital Table 6: Surveillance in the economy Marx argues that collecting, analyzing, and assessing data of the working day as well as the superintendence, control, supervision, and surveillance of workers’ behaviour and performance are central parts of the capitalist process of production for generating absolute and relative surplus value in order to accumulate profit. For explaining newer forms of surveillance in the process of production, the emergence of scientific management was analyzed. The mechanical engineer Frederick Winslow Taylor developed the concept of scientific management, where the meaning of knowledge and information as productive force has permanently increased and the management gathers knowledge of the labour process and uses this knowledge in order to control the labour process. - 56 - A Critical Contribution to (Internet) Surveillance Studies For understanding surveillance in the sphere of circulation, the circuit of capital was introduced. For Marx, the circuit of capital contains three stages, namely the stage of money capital, the stage of productive capital, and the stage of commodity capital. Based on these findings, surveillance in the sphere of circulation was identified and classified into surveillance of purchasing labour power in the stage of money capital, surveillance of purchasing means of production in the stage of money capital, and surveillance of produced commodities in the stage of commodity capital. For explaining surveillance in the sphere of consumption, the emergence of mass consumption was studied: For guaranteeing mass consumption, market research became important in order to target advertising and to stimulate needs and demands. Efficiency and effectiveness were extended from the sphere of production to the sphere of consumption and a translation of scientific management to scientific marketing took place. In scientific marketing, the audience appears as a commodity and produces crucial data for the economy for free. According to Lyon (1994, 40-56; also 2001, 107-122), for understanding modern forms of surveillance, the emergence of new technology, primarily information technology, has to be analyzed. Lyon accentuates a remarkable mutation from paper to electronic surveillance, which has caused changes in the economical, political, and cultural system on an intensive and extensive level, and emphasizes four consequences of electronic surveillance: (1) larger and more precise data files are available, (2) monitoring has become more dispersed and nearly every space is surveilled, (3) tempo of data-flows has been increased, and (4) citizens, workers, and consumers are more visible and transparent than before. Lyon (1994, 56) concludes that “new ways of understanding surveillance are required in an era of information technology, which take account of the historical development of surveillance systems and also accommodate the new configurations and combinations that constitute the challenge of surveillance today“. Gary Marx (2002, 9-29) asks in this context what new about new surveillance is and identifies 28 main differences between traditional and new surveillance (see table 7). He suggests dimensions such as senses, visibility, timing, context, and form and classifies traditional surveillance on the left side of the table and new surveillance on the right side of the table. - 57 - A Critical Contribution to (Internet) Surveillance Studies Table 7: Differences between traditional and new surveillance (Gary Marx 2002, 28f.) - 58 - A Critical Contribution to (Internet) Surveillance Studies Whereas in traditional surveillance the collection of data was more visible, monitoring has become more invisible. Furthermore, compared to old forms of surveillance, new surveillance is undertaken in a very inexpensive way and while former techniques of surveillance were realized by humans, modern forms of surveillance are mostly automated. In addition, new surveillance works on a more intensive and extensive level and data analyses are easier to organize, store, retrieve, and analyze, as well as easier to send and receive. (cf. Gary Marx 2002, 28f.) In order to describe surveillance in the context of the emergence of new information and communication technologies, further scholars accentuated terms such as “social control in the computer age” (Rule 1973), “information technology and dataveillance” (Clarke 1988), “in the age of the smart machine” (Zuboff 1988), “the superpanopticon” (Mark Poster 1990), “hypercontrol in telematic societies” (Bogard 1996), “social Taylorism of surveillance” (Robins and Webster 1999), “the maximum surveillance society” (Norris and Armstrong 1999), “the intensification of surveillance” (Ball and Webster 2003), “digitizing surveillance” (Graham and Murakami Wood 2003), “profiling machines” (Elmer 2004), “surveillance in the interactive area” (Andrejevic 2007), and “the rise of electronic surveillance” (Fuchs 2008). Surveillance technologies are developed by analogy with productive forces in modern societies. New information technologies have generated a “rapid quantitative expansion of surveillance, which simultaneously raises questions of a qualitative shift“ (Lyon 1994, 56). New surveillance is a dialectical sublation of traditional surveillance in the form of elimination, retention, and emergence of new qualities on a higher level. For example, the necessity of face-to-face surveillance is eliminated, but power relations and forms of domination are retained and work on a more intensive and extensive level. Surveillance in the context of new information and communication technologies is a dialectic of continuity and discontinuity. The Internet as an example of new information and communication technologies is a dynamic, global, decentralized, self-referential, and self-organizing techno-social system (cf. Fuchs 2008, 121), where in a top-down process “the technological infrastructure enables and constrains human cognition, communication, and cooperation“ (Fuchs 2008, 121) and in a bottom-up process “human actors permanently re-create ... global knowledge storage mechanism by producing new informational content, communicating, and consuming existing informational content in the system” (Fuchs 2008, 121). Fuchs (2008, 129) distinguishes between web - 59 - A Critical Contribution to (Internet) Surveillance Studies 1.0 as a medium of cognition with applications such as peer-to-peer networks for file sharing, web sites, e-portfolio, Internet radio/podcasting, and electronic calendar, web 2.0 as a medium of communication with applications such as chat, instant messaging, video conferencing systems, e-mail, (photo and video) blogs, social network services, and mobile telecommunication, and web 3.0 as a medium of co-operation with applications such as multiuser dungeons, wikis, and shared workspace systems and argues that “communication and cooperation have become more important features of the web” (Fuchs 2008, 125). For Fuchs (2008, 139), interactivity, hypertextuality, globalized communication, many-to-many communication, cooperative production, decontextualization, and derealisation are important characteristics of the World Wide Web and the Internet is a multimedium, because it allows the combination and convergence of “text, sound, images, animation, and video in one medium that integrates all senses” (Fuchs 2008, 139). In conclusion, the Internet is the most important phenomenon of new information and communication technologies, which involves all different forms of information, communication, and co-operation in one medium. These approaches show that many forms of contemporary surveillance are computer-based and Internet based and that as a reaction a multiplicity of new analytical approaches has emerged. Therefore in the next chapter, different notions of Internet surveillance will be outlined. - 60 - A Critical Contribution to (Internet) Surveillance Studies 4. Foundations of Internet surveillance theory The overall aim of this chapter is to elucidate how Internet surveillance is defined in the existing literature, what commonalties and differences of various notions of online surveillance exist, and what advantages and disadvantages such definitions have. For doing so, based on the distinction of panoptic and non-panoptic notions of surveillance from chapter two, sections one and two of this chapter contain a systematic discussion of the state of the art of Internet surveillance by establishing a typology of the existing literature and discussing commonalties and differences. For analyzing the existing literature on a more abstract level and identifying advantages and disadvantages, it is essential to discuss commonalties and differences and to find certain typologies. Finally, section three gives a summary, describes how different notions deal with Internet surveillance in the modern economy and makes clear if there is a gap in the existing literature. The task of this chapter is to give a representative, but still eclectic overview about different definitions of Internet surveillance. - 61 - A Critical Contribution to (Internet) Surveillance Studies 4.1. Non-panoptic notions of Internet surveillance As we have seen in chapter two, David Lyon understands surveillance as a neutral concept that assumes there are enabling and constraining effects. As a logical result, he also understands the “world wide web of surveillance” (Lyon 1998) as a neutral concept that identifies positive consequences such as protection and security as well as negative consequences such as control. Computerization of surveillance makes bureaucratic administration easier (cf. Lyon 2003b, 164) and surveillance in cyberspace permits “greater efficiency and speed, and may well result in increased benefits for citizens and consumers, who experience them as enhancing their comfort, convenience, and safety“ (Lyon 2003a, 69). Nevertheless, Lyon expresses the nation-state and the capitalist workplace as the main sites of surveillance on the Internet (cf. 1998, 95; 2003a, 69; 2003b, 163) and argues that surveillance technologies such as the Internet reinforce asymmetrical power relations on an extensive and intensive level (cf. Lyon 1998, 92). “So surveillance spreads, becoming constantly more routine, more intensive (profiles) and extensive (populations), driven by economic, bureaucratic and now technological forces.” (Lyon 1998, 99) The Internet has become a multi-billion dollar industry, because it is primarily corporations that are interested in collecting, analyzing and assessing a huge amount of personal consumer data in order to target personalized advertisement (cf. Lyon 2003b, 162). Similarly to Lyon’s notion of Internet surveillance that assumes there are enabling and constraining effects, Seumas Miller and John Weckert (2000) articulate advantages and disadvantages of being monitored. Their paper examines monitoring at the workplace in general and observing of email and the Internet usage in particular. Although the authors claim that privacy is a moral right (cf. Miller and Weckert 2000, 256) and criticize existing approaches that stress benefits of workplace monitoring for both employers and employees (cf. Miller and Weckert 2000, 258f.), they argue that ”surveillance and monitoring can be justified in some circumstances“ (Miller and Weckert 2000, 255) and reason: “The proposition must be rejected that the extent and nature of the enjoyment of rights to individual privacy is something to be determined by the most powerful forces of the day, be they market or bureaucratic forces.“ (Miller and Weckert 2000, 256) Stoney Alder et al. (2008) argue theoretically hypothetically and show empirical evidence that - 62 - A Critical Contribution to (Internet) Surveillance Studies prior beliefs and ethical orientation influence employee reactions to Internet monitoring. They mention both negative and positive aspects of surveillance. The authors stress that prior beliefs of invasiveness or usefulness of monitoring as well as formalist or utilitarian ethical orientation will influence workers’ acceptance of a newly implemented Internet monitoring system. In addition, prior beliefs and ethical orientation will affect whether labourers understand organizational online monitoring practices as useful and as an effective management tool or as privacy violation and invasion. Formalist ethics is defined as “a set of rules or principles for guiding behavior. Actions are viewed as ethical or not to the extent that they conform to these rules. For formalists, the acts themselves are moral or immoral, irrespective of their outcomes, to the extent that they conform to these rules or principles.” (Alder et al. 2008, 486) (factors for a formalist attitude: traits of principled, dependable, trustworthy, honest, noted for integrity, and law-abiding [cf. Alder et al. 2008, 489]). In contrast, utilitarian ethics ”evaluate outcomes or consequences of actions as ethical or not, rather than the actions themselves. With utilitarian ethics, actions are ethical if they produce the greatest good. (Alder et al. 2008, 486) (factors for a utilitarian attitude: traits of innovative, resourceful, effective, influential, resultsoriented, productive, and a winner [cf. Alder et al. 2008, 489]). The “fundamental struggle between an individual’s right to privacy and an organization’s legitimate business interests“ (Alder et al. 2008, 487) provided the foundation for the scholars’ hypotheses and are outlined as follows: Hypothesis 1: “Ethical formalism will moderate the relationship between employee beliefs that monitoring constitutes an invasion of privacy and negative outcomes regarding (a) perceived organizational support, (b) trust in the organization, (c) trust in their supervisor, and (d) perceptions of monitoring fairness, such that the relationships will be more pronounced for weak formalists than for strong formalists.” (Alder et al. 2008, 488) Hypothesis 2: “Ethical utilitarianism will moderate the relationship between employee beliefs that monitoring constitutes a useful tool and positive outcomes of (a) perceived organizational support, (b) trust in the organization, (c) trust in their supervisor, and (d) perceptions of monitoring fairness, such that the relationships will be more pronounced for strong utilitarians than for weak utilitarians.” (Alder et al. 2008, 488) The authors undertook a quantitative survey with 62 male and female employees from a sales and service centre, where a new Internet monitoring system was implemented. Alder et al. (2008, 489) asked questions relating to (1) background checks (“Internet monitoring is an invasion of an employee’s privacy”, “Monitoring employees’ use of the Internet is a good tool if used properly”), (2) drug testing (“Drug testing is an invasion of an employee’s privacy”, “I think drug testing is a good tool if used properly”), (3) Internet monitoring (“Background checks are an invasion of an employee’s privacy”, - 63 - A Critical Contribution to (Internet) Surveillance Studies “Background checks are a good tool if used properly”), and (4) fair usage (“Overall, the methods used to monitor employee use of the Internet are fair”, “The procedures used to monitor my use of the Internet are fair”, “I believe the way the company monitors employees’ use of the Internet is fair”) with a seven-point scale (1=strongly disagree, 7=strongly agree). In conclusion, the authors summarize that “ethical formalism interacted with employees’ beliefs about monitoring as an invasion of privacy to affect their perceptions of trust in the organization ... and the fairness of the monitoring” (Alder et al. 2008, 490) and that “ethical utilitarianism interacted with employees’ perceptions of the extent to which monitoring is an effective management tool to affect their trust in the organization ... and their perceptions of the fairness of the monitoring“ (Alder et al. 2008, 491). Also interesting in this context is the fact that labourers have a quite non-panoptic understanding of surveillance: Jeffrey Stanton and Elizabeth Weiss (2000) undertook an exploratory study of employees’ experiences with new types of surveillance such as email and website monitoring. For doing so, 53 male and female employees with different types of jobs from various organizations such as a university, manufacturing companies, service firms, and a governmental organization participated in an anonymous online survey (cf. Stanton and Weiss 2000, 427). By means of qualitative interviews, the authors studied what the workers said about electronic monitoring at the workplace in an open-ended questionnaire. The three sets of the web-based survey questions are as following: “1. In the box below, please briefly discuss information that your company collected from you when you were applying for a job, or after you accepted the job and were filling out forms for human resources. Some companies ask for social security number, emergency contact, work history, medical history, drug tests, medical tests, skill tests, background checks, and/or credit information. Your company may have asked other questions also. Did you care or worry about providing any of this information, or was it all pretty routine? 2. Next, please discuss any technology your company uses to track your work performance. Some companies use computer monitoring, email monitoring, phone monitoring, security cameras, and/or geographic tracking (for example, of company trucks used by employees). Your company may use technology to track your work in other ways as well. How are these technologies useful or helpful to you? How are they annoying, undignified, or disturbing? Or perhaps you don’t even notice these techniques in use? - 64 - A Critical Contribution to (Internet) Surveillance Studies 3. Finally, use the box below to describe something particularly good or bad that has happened to you at work because of the technology that your organization uses. Have you received a bonus or promotion because of technology? Have you been fired or discriminated against because of technology? Has your boss found out something about you (using technology) that you wish he or she hadn’t? Any problems with privacy with your web browsing, email, or other aspects of Internet use?” (Stanton and Weiss 2000, 436) The results are summarized in table 8: Table 8: Employees’ experiences with new types of surveillance (qualitative interviews, N=53) (cf. Stanton and Weiss 2000, 429) In conclusion, 26 respondents are monitored and 23 are not. From the 26 monitored workers, 17 answered that their computer usage is monitored, including monitoring computer usage, Internet usage as well as website visits. On the one hand, 10 labourers mentioned that monitoring is not annoying, undignified, or disturbing and nine respondents answered that monitoring provides security, on the other hand, only four workers articulated that surveillance technology and company policy is annoying, just three respondents wrote that technological monitoring is disturbing, and only two interviewees stated that electronic monitoring such as email and web site monitoring is intrusive. (cf. Stanton and Weiss 2000, 429) In addition, some examples are given in order to get an impression how the interviewees feel and what they think being electronically monitored at the workplace: - 65 - A Critical Contribution to (Internet) Surveillance Studies ”’My agency does track my use of computers and phones to make sure such use is job related (does allow for some personal use that is reasonable). I do not have a problem with this.’ (Respondent 54)” (Stanton and Weiss 2000, 430) “’Security cameras/key cards have also been used to verify who was entering the building after hours or to observe potential thefts after hours.’ (Respondent 43)” (Stanton and Weiss 2000, 430) “’However, I do know that if someone wanted to they could read my email, and monitor computer work. None of this bothers me, because these are work- related resources. If I have someone that personal, I would not associate with anything at work.’ (Respondent 19)” (Stanton and Weiss 2000, 430) “’If necessary, some work could be tracked by the computer system’s administrator or by someone (a supervisor) with administrator rights. I don’t worry about this because I’m always gainfully employed – even filling out this survey is a work process that is useful information in my occupation, human resources.’ (Respondent 46)” (Stanton and Weiss 2000, 430) “’I recently discovered that there is a report about how long each employee in the organization is using the Internet. However, I do not think anything is being done with that information. I feel it is appropriate for companies to know that. They pay the bills and it may point towards misuse.’ (Respondent 50)” (Stanton and Weiss 2000, 432) “’… [they use] computer monitoring, security cameras, security codes for access after hours … These technologies generally protect my security while I am working. I generally do not find them annoying, undignified or disturbing.’ (Respondent 18)” (Stanton and Weiss 2000, 432) As a result, Jeffrey Stanton and Elizabeth Weiss (2000) conclude that “only a minority of the respondents in our study who were subject to monitoring found the monitoring to be negative in some way … For some employees, technological monitoring may actually represent a benefit.” - 66 - A Critical Contribution to (Internet) Surveillance Studies Also based on a non-panoptic understanding of surveillance, Barbara Kaye and Thomas Johnson (2002) utilized the uses and gratifications approach in order to analyze the Internet in general and Internet usage for accessing online sources for political information in particular. The study suggests four key motivations for using the web for political information, namely guidance, information seeking/surveillance, entertainment, and social utility (see table 9). Table 9: Motivational factors for using the Web (Factor 1: Guidance, Factor 2: Information Seeking/Surveillance, Factor 3: Entertainment, Factor 4: Social Utility) (Kaye and Johnson 2002, 61) The authors use 18 statements from past uses and gratifications studies, where students indicated their level of motivation for using the web (1=strongly disagree to 5= strongly agree). “Respondents indicated their level of agreement with the reasons for accessing the Web … The items were then factored by principal components analysis with varimax rotation. Items were assigned to a particular factor if the primary loadings were greater than .60 … Summated indexes of each factor were created by summing the individual variables, and reliability - 67 - A Critical Contribution to (Internet) Surveillance Studies analysis was conducted. Reliability for the four factors ranged from .64 to .85 … The four factors that emerged were guidance, information/surveillance, entertainment, and social utility.” (Kaye and Johnson 2002, 59f.) The authors define information seeking/surveillance as “actively searching out specific political information and keeping an eye on the political landscape” (Kaye and Johnson 2002, 62) and conclude that “while the Web in general may satisfy entertainment, escape, and social interaction needs, it may also gratify users’ needs to find information about some feature of society or the world around them (surveillance)” (Kaye and Johnson 2002, 56). For Anders Albrechtslund (2008), positive aspects of being under surveillance are worth mentioning and he argues that online surveillance also empowers the users, constructs subjectivity, and is playful. Internet surveillance as social and participatory act involves mutuality and sharing. ”Online social networking can also be empowering for the user, as the monitoring and registration facilitates new ways of constructing identity, meeting friends and colleagues as well as socializing with strangers. This changes the role of the user from passive to active, since surveillance in this context offers opportunities to take action, seek information and communicate. Online social networking therefore illustrates that surveillance – as a mutual, empowering and subjectivity building practice – is fundamentally social.“ (Albrechtslund 2008) People’s active role in the context of surveillance in general and online surveillance in particular is emphasized by Hille Koskela (2004; 2006). For instance, reality shows are based on viewer participation, mobile phones with cameras create an active subject, and home webcams generate new subjectivities. Koskela wants to analyze “the other side of surveillance”, which has resistant and liberating elements. “Webcams can also be argued to contribute to the ‘democratization’ of surveillance.” (Koskela 2006, 175) In addition, Kosekela (2004, 204) argues that webcams have an empowering role and that the active role of individuals with surveillance equipment shows that the lines of control are blurred. In conclusion, non-panoptic notions of Internet surveillance either use a neutral concept that assumes there are enabling effects such as protection and security as well as constraining effects such as control or a positive concept that identifies comical, playful, amusing, and even enjoyable characteristics of surveillance and where everyone has the opportunity to surveil. In addition, these approaches tend to reject the proposition that surveillance mechanisms are - 68 - A Critical Contribution to (Internet) Surveillance Studies dominated by political and economic actors and see monitoring not necessarily as annoying and disturbing. In non-panoptic notions of the Internet, surveillance is understood as a useful and effective management tool and as fair methods and procedures of monitoring individuals online. Now, we move on to panoptic notions of Internet surveillance. - 69 - A Critical Contribution to (Internet) Surveillance Studies 4.2. Panoptic notions of Internet surveillance Based on a diagrammatic understanding of panoptic surveillance (see chapter two), Greg Elmer (1997) predominantly understands the Internet as a powerful space of economic surveillance. “The Internet is first mapped, through indexical search engines, and then diagnosed, via ‘spiders’ and ‘cookies’, to actively monitor, survey, solicit and subsequently profile users’ online behavior.” (Elmer 1997, 182) Corporations map consumer profiles including demographic and psychographic data in order to target advertising and to accumulate profit (cf. Elmer 1997 186; 189f.). Similarly, Dwayne Winseck (2003) argues that media conglomerates dominate the commercialized cyberspace in modern society and mentions the importance to study online surveillance in the context of ownership patterns. “Overall, these concepts highlight how the growing mediation and extension of surveillance are a result of media conglomerates’ attempts to regulate information flows and people’s use of the media so that they better conform to the communication industries’ preferred visions of cyberspace and the ‘new economy.’” (Winseck 2003, 176) Information such as website visits, personal profiles, hardware usage etc. is crucial data for corporations; therefore, surveillance is a source of revenue and nobody one should expect that corporations have an interests in maintaining users’ privacy (cf. Winseck 2003, 186). Winseck’s understanding of surveillance can be seen in the context of Foucault’s notion of panoptic surveillance. He considers, just like Foucault, surveillance to be negative and centralized and being connected to coercion, power, and domination (cf. Winseck 2003, 195). Similarly to Foucault, Winseck (2003, 176) stresses that surveillance is primarily undertaken by powerful institutions such as corporations and is installed in order to discipline, control, and normalize people in respect of drilling conformed individuals. Likewise, in The Internet Galaxy, Manuel Castells (2001, 168-187) describes the Internet not only as a space full of opportunities, but also as a technology of control, which has primarily emerged from the interests of economic and political actors such as corporations and state institutions. He argues that these institutions make use of such technologies in order to locate individual users. State institutions such as governments and corporations like Microsoft and Google use special surveillance technologies that allow the monitoring of online behaviour in one central database. “Surveillance technologies ... often rely on identification technologies to - 70 - A Critical Contribution to (Internet) Surveillance Studies be able to locate the individual user … These technologies operate their controls under two basic conditions. First, the controllers know the codes of the network, the controlled do not. Software is confidential, and proprietary, and cannot be modified except by its owner. Once on the network, the average user is the prisoner of an architecture he or she does not know. Secondly, controls are exercised on the basis of a space defined on the network, for instance, the network around an Internet service provider, or the intra-network in a company, a university, or a government agency.” (Castells 2001, 171ff.) Castells understands the rise of the Internet as an emergence of a powerful electronic surveillance system and concludes: “If this system of surveillance and control of the Internet develops fully, we will not be able to do as we please. We may have no liberty, and no place to hide.“ (Castells 2001, 181) Castells (2003, 171ff.) considers, just like Foucault, surveillance to be negative and centralized and being connected to control and power. Hence, although Castells does not referring to the Panopticon directly, his contribution to online surveillance fits into panoptic notions of Internet surveillance. Michael Levi and David Wall (2004, 201ff.) emphasize the new politics of surveillance in a post 9/11 European information society and the increase of the panoptic power of the EU member states mediated through surveillance techniques such as identity/entitlement cards, asylum seekers’ smartcards, data sharing schemes, and smart passports in order to create a suspect population. Wall (2003; 2006) analyzes the growth of surveillant Internet technologies in the information society. He draws on Foucault’s understanding of panoptic power relations (cf. Wall 2006, 344) and distinguishes between personal and mass surveillance (cf. Wall 2006, 342). For Wall, the Internet as a multidirectional information flow has brought new opportunities for individuals in the context of surveillance. Techniques such as spyware, spam spider bots, and cookies allow a synoptic effect where the surveilled can surveil the surveillers (cf. Wall 2006, 342f.). “The Internet is not simply a ‘super’ (Poster, 1995), ‘virtual’ (Engberg, 1996) or ‘electronic’ (Lyon, 1994, ch. 4) Panopticon: an extension of Foucault’s conceptualization of Bentham’s prison design – ‘seeing without being seen’ (Foucault, 1983, p. 223), as has become the conventional wisdom. It is important to emphasize that Internet information flows are simultaneously panoptic and synoptic – not only can the few watch the many, but the many can watch the few (Mathiesen, 1997, p. 215).” (Wall 2003, 112) Wall argues that the balance between personal surveillance on the one hand and mass surveillance on the other hand is “rarely even” (Wall 2006, 346) and lists powerful corporations such as DoubleClick and Engage that are able to undertake large-scale surveillance (cf. Wall 2006, 343). In addi- - 71 - A Critical Contribution to (Internet) Surveillance Studies tion, he emphasizes the growth of surveillance and privacy threats as tradeable commodities in information capitalism (cf. Wall 2003, 135) and presents an empirical case study of the spam industry such as e-mail list compilation and unsolicited bulk e-mails (cf. Wall 2006, 350ff.). Joseph Turow (2005; 2006) speaks about marketing and consumer surveillance in the digital age of media. He stresses that online media are interested in collecting data about their audience in order to sell these data to advertisers. In a next step, the advertisers use these data in order to increase the efficiency of marketing (cf. Turow 2005, 103f.; 2006, 280). Furthermore, the increasing customer relationship management constructs audiences and produces a surveillance-driven culture, where consumers understand surveillance as a cost-benefit calculation and willing to the data collection of media and advertisers: “In the early twenty-first century, marketers, media, and the commercial research firms that work with them are constructing contemporary U.S. audiences as frenetic, self-concerned, attention-challenged, and willing to allow advertisers to track them in response to being rewarded or treated as special. This perspective, a response to challenges and opportunities they perceive from new digital interactive technologies, both leads to and provides rationalizations for a surveillance- based customization approach to the production of culture. An emerging strategic logic encourages media firms and advertisers to cultivate consumers’ trust so that their audiences will not object when the companies want to track their activities. The goal of tracking is to store huge amounts of linked personal and lifestyle information in databases with the goal of more efficient ’relationship‘-oriented marketing that rewards ’best customers‘ with discounts and even story lines designed for them … The emerging strategic logic of mainstream marketing and media organizations is to present their activities not as privacy invasion but as two-way customer relationships, not as commercial Intrusion but as pinpoint selling help for frenetic consumers in a troubling world.” (Turow 2005, 105; 119f.) Turow’s understanding of surveillance can be seen in the context of Foucault’s notion of panoptic surveillance. He considers, just like Foucault, surveillance to be negative and centralized and being connected to discipline, control, and power (cf. Turow 2005, 115). Similarly to Foucault, Turow (2003, 116f.) stresses that surveillance is predominately undertaken by powerful institutions such as corporations. Also interesting in this context is the national survey of Internet privacy and institutional trust by Joseph Turow and Michael Hennessy (2007). In 2003, they undertook 1200 quantitative telephone interviews in the United States with adults (18 years and older) who go online at home (cf. Turow and Hennessy 2007, 304). The authors tried to analyze what US citizens think - 72 - A Critical Contribution to (Internet) Surveillance Studies about institutional surveillance and conclude “that a substantial percentage of internet users believes that major corporate or government institutions will both help them to protect information privacy and take that privacy away by disclosing information to other parties without permission.” (Turow and Hennessy 2007, 301) Andrejevic (2002; 2007b; cf. also 2007a 135-160) wants to offer an alternative approach of online privacy in the era of new media. He studies the economic surveillance of interactive media such as interactive TV (2002) and Google’s business model of free wireless Internet access (2007b) and analyzes interactive surveillance in the digital enclosure: “the model of enclosure traces the relationship between a material, spatial process – the construction of networked, interactive environments – and the private expropriation of information“ (Andrejevic 2007b, 297). The author argues that Foucault’s approach of the Panopticon is suitable in order to study surveillance and hierarchical power asymmetries in the online economy and speaks about a “digital form of disciplinary panopticism” (Andrejevic 2007b, 237). Andrejevic argues that just like workplace surveillance rationalized production in the era of scientific management, online surveillance rationalizes and stimulates consumption (cf. Andrejevic 2007b, 232; 244), produces customized commodities and the crucial capital of the economy (cf. Andrejevic 2007b, 234). “Viewers are monitored so advertisers can be ensured that this work is being done as efficiently as possible. Ratings, in this context, are informational commodities that generate value because they help to rationalize the viewing process.” (Andrejevic 2007b, 236) Also in the context of economic surveillance, John Edward Campbell and Matt Carlson (2002) revisit Foucault’s idea of the Panopticon as well as Gandy’s notion of the panoptic sort. They apply these notions to online surveillance and the commodification of privacy on the Internet: “The Panopticon was seen as a way of organizing social institutions to ensure a more orderly society by producing disciplined and ‘rational’ (read predictable) citizens. With Internet ad servers, the goal is to provide marketers with the personal information necessary to determine if an individual constitutes an economically viable consumer. The enhanced consumer profiling offered by these third-party ad servers increases the effectiveness and efficiency of advertisers’ efforts, reducing the uncertainty faced by producers introducing their goods and services into the marketplace.” (Campbell and Carlson 2002, 587) Giving illustrative examples and focusing on the modern economy, Ashlee Humphreys (2006) - 73 - A Critical Contribution to (Internet) Surveillance Studies wants to transform Foucault’s paradigm of prisoner surveillance to the consumer paradigm of marketing in general and online surveillance in particular. For doing so, she tries to explain with the help of Foucault’s understanding of the prisoner as “object of knowledge” how the consumer is constructed as “object of knowledge” through Internet surveillance and gives examples from observation and documentation practices of Amazon.com, namely using wish lists and cookies (cf. Humphreys 2006, 296). An Amazon wish list is an online tool to create an own catalogue of your preferred products. The user is able to add items from other websites, to add comments on each product as well as to share the wish list with other users online. A cookie is a short text stored on a user’s computer which is sent by a web server to a web browser and back each time a certain server is accessed in order to record individual actions online. For Humphreys (2006, 303), wish lists and cookies used by Amazon are ideal techniques in order to monitor users’ behaviour, to identify website-visits of users, to classify and group consumers, and to bombarding individuals with commodities that she or he might be interested in. In addition, the author stresses that these techniques maintain the asymmetrical relationship between the marketer as the creator of object knowledge on the one hand and the consumer as the object of knowledge on the other hand (cf. Humphreys 2006, 297) and concludes that “the statistical analysis of consumers on Amazon.com fits this model. Consumers are surveyed according to their preferences to establish them in a group, which can then be observed from the ‘central tower’. The wish list, most importantly, has no power of individuation if it cannot survey. It is through surveillance that Amazon.com has the power to individuate.” (Humphreys 2006, 302) In contrast, Ian Brown and Douwe Korff (2009) emphasize more political aspects of surveillance: While terrorist groups such as the Hezbollah use the Internet for communication, planning, research, propaganda, and community building, state institutions and policing agencies have generated in the name of the fight against terrorism “new legal powers to put Internet users under surveillance” (Brown and Korff 2009, 120) and “the extent of control by ‘data controllers’ over individuals – tellingly referred to as ‘data subjects’ – through possession of their data” (Brown and Korff 2009, 120). For Brown and Korff (2009, 119), the increased surveillance mechanisms stand in a disproportionate relationship to terrorist acts and are problematic for democratic societies. “Anti-terrorist and related policies have given an immense impetus to pre-existing developments in law enforcement surveillance of communications. These measures are often adopted on a temporary, emergency basis – but once introduced, become permanent and are extended into the general law.“ (Brown and Korff 2009, 131) - 74 - A Critical Contribution to (Internet) Surveillance Studies Nowadays, state institutions show interest in developing techniques for decoding cryptographic data. Providers underlie a statutory duty to store all connection data for a certain period. In many nations the police are allowed to obtain data from Internet Service Providers without judicial authority (cf. Brown and Korff 2009, 126f.). In conclusion, “in the context of the fight against terrorism, this means individuals are targeted for being suspected ‘extremists’ or for being suspected of being ‘opposed to our constitutional legal order’, even before committing any criminal (let alone terrorist) offence. ‘Targets’ of this kind are increasingly selected through computer ‘profiles.’ Selection is based upon algorithms that are effectively unchallengeable, but inevitably generate large numbers of ‘false positives’ – innocent people being wrongly treated as suspected terrorists. Members of minority groups are more likely to be thus selected, leading to discrimination-by-computer. Yet by being presented as ‘scientific’ such discrimination is more difficult to challenge than previous, coarser stereotyping. Even where ‘data mining’ and ‘profiling’ contributes to the apprehension of terrorists, there will always be a high proportion of ‘false negatives’ – real terrorists that are not identified as such.” (Brown and Korff 2009, 131) Therefore, the authors argue that “we are giving up freedom without gaining security. In the process, all of us are increasingly placed under general, precautionary mass surveillance, with comprehensive data being captured on our activities. The European surveillance society is developing in a profoundly undemocratic way. Massive data collection and trawling threaten the most fundamental values supposedly underpinning the European political settlement, at both national and international level.” (Brown and Korff 2009, 131f.) Although Brown and Korff do not referring to the Panopticon directly, their understanding of surveillance can be seen in the context of Foucault’s notion of panoptic surveillance. They consider, just like Foucault, surveillance to be negative and centralized and being connected to discrimination, control, and power (cf. Brown and Korff 2009, 120). Similarly to Foucault, Brown and Korff (2009, 131f.) emphasize that surveillance is primarily undertaken by powerful actors such as state institutions and is installed in order to discipline and normalize people. Based on Foucault’s notion of surveillance, Brian Krueger (2005) undertakes an empirical study that analyzes the relation of surveillance and political participation online. “This article seeks to integrate this compelling factor by using Michel Foucault’s well-developed insights on surveillance to generate empirical hypotheses involving Internet political participation. Using Foucault has distinct advantages. Not only does Foucault place surveillance at the center of his theory of disciplinary society but also his imagery offers a framework for understanding how the architectural characteristics of the Internet likely affect individuals’ reaction - 75 - A Critical Contribution to (Internet) Surveillance Studies to surveillance.” (Krueger 2004, 441) In an era, where the Internet has become a new medium for political participation (two thirds of the Internet users engage in political activity online), Krueger (2005, 440) tries to analyze whether the awareness of being monitored electronically influences political activity on the Internet. As part of a larger survey, telephone interviews with US Internet users were conducted in 2003 (N is undefined). As a result, Krueger (2005, 444) states that more than 50% of the Internet users believe that the government monitors citizens’ Internet activity. The results from the analysis also show that the awareness of being monitored influences online political participation depending on the political attitude: “Docility occurs most often when the surveillance system isolates individuals from each other and blinds individuals from surveillance and those conducting the surveillance. Political resistance occurs most often when individuals are aware of surveillance, can watch their watcher, and can communicate horizontally with others … For those who disagree with dominant political opinion, perceptions that the government monitors citizens’ Internet activity should result in higher levels of Internet political activity. In addition, because they are not the focus of government surveillance, the political activity levels of citizens who agree with dominant opinion should not be affected by perceived surveillance.” (Krueger 2005, 443) In their book Virtual Control and Disciplining on the Internet, Michael Mehta and Eric Darier (1998) argue that the Internet has intensified modern forms of power. In the era of the Internet, increased power, control, and surveillance “does not rely exclusively on technology, but also on the willingness of a population to participate in it and even to demand it” (Mehta and Darier 1998, 109). They stress a contradiction in the development of the Internet in so far as the Internet has a decentralized and uncontrolled nature, but has become more centralized, controlled, surveilled, and even censored by state institutions and corporations recently (cf. Mehta and Darier 1998, 109). The authors conclude: “As Foucault correctly remarked, in order to be efficient, modern power has to become invisible like the guard in the panopticon. In the case of the Internet there is no central control. In fact, the total unmateriality of the Internet creates a sense of absence of control. At the same time, this does not mean that power is withering away. On the contrary, one could argue that if the Internet renders power less obvious, then its disciplining and normalizing effects are much greater in several ways ... Current power relations are being transferred to the Internet. It is likely that the powerful will appropriate the Internet for their own instrumental advantage. The commercialization of the Internet - 76 - A Critical Contribution to (Internet) Surveillance Studies might be merely the result of the trend toward the globalization of capitalism, while state agencies may be able to survey the population better at a fraction of the cost ... In this case the Internet is truly a new social space where virtual communities are formed, maintained, and observed. Therefore, we might need to take Foucault, or at least some of his theoretical concepts, along on our adventures.” (Mehta and Darier 1998, 115) Andrew Hope (2005) presents case studies of the observation of student Internet use in UK schools. He argues that “the panopticon is an appropriate model for analysing the surveillance of school Internet use” (Hope 2005, 370). Since the UK government has introduced Internet access in over 30,000 schools, the powerful opportunities to observe both student and staff behaviour online have grown. Hope studied Internet usage in school in the context of surveillance in eight educational institutions in the UK (two primary schools, two 11-16 schools, three 11-18 schools, and one post-16 college) for three years. For doing so, he carried out semi-structured interviews with 30 staff members and 63 students, 180 hours non-participant observation of student Internet use, and content analyses of school documents relating to web usage. As a result, Hope (2005, 366f.) summarizes the virtual surveillance of Internet usage in schools in the UK: “In schools, staff can also examine student computer accounts to see whether they have stored any unsuitable material on the school computer hard drive … Furthermore, many schools use specialist software that record the online addresses of all the websites accessed in a central database or ‘log’. As students often have to sign onto the Internet using an individual password, it is possible for staff not only to identify the websites visited but also which student accessed the site … In addition to specialist software that records the addresses of websites visited, certain applications, such as Net Top Teacher, allow staff to view networked computer screens and control the activities of these machines. Net Top Teacher is software aimed at enhancing the teaching process. However, in so far as staff can use this software to observe students’ on-screen activity, it potentially serves as an effective surveillance tool. Indeed the ability of the software to control other networked computers means that staff can expose on-screen windows that students may have minimised or hidden behind other material.” Also interesting in this context is the fact that some students know that they are being monitored. “At Forestfields a year-eight student related that: ’If you go on the Internet all the time Mr S, the Head, he like checks it on the server. So he knows which one you’ve been on.’” (Hope 2005, 366) Emphasizing more cultural aspects of surveillance, Macgregor Wise (2004) recognizes the - 77 - A Critical Contribution to (Internet) Surveillance Studies emergence of the Internet as a converging medium, where different forms of information and communication are combined. He studies the expanding field of webcams in the context of panoptic control in everyday life. “The capture of images of people, places and things can be read through the disciplinary project of that same regime of truth; as Foucault (1977) has shown of the panopticon: reveal, document, discipline. The camera’s gaze not only reveals the world in a new way and reveals aspects of us that we are unaware of (habits, expressions), but contributes to new social formations.” (Wise 2004, 435) For Wise (2004, 425), webcams are digital cameras connected to the Internet in order to upload moving images to a webpage primarily for public viewing. Wise analyzes cyberspace in general and webcams in particular in the context of Deleuze’s concept of control societies. He says that webcams “can be viewed as a particular instance of a cultural form produced within a society of control“ (Wise 2004, 432). Summing up, panoptic notions of Internet surveillance argue that power, control, and surveillance have increased in the era of the Internet. Furthermore, the rise of the Internet has brought a space of electronic surveillance, where the powerful will appropriate the Internet as a technology of control for their own instrumental advantage. These approaches consider online surveillance to be negative and being connected to coercion, repression, discipline, power, and domination. For these authors, power is primarily centralized and society tends to be repressive and controlled. - 78 - A Critical Contribution to (Internet) Surveillance Studies 4.3. Conclusion The overall aim of this chapter was to clarify how Internet surveillance is defined in the existing literature and what the different notions of online surveillance have in common and what distinguishes them from one another. Based on the distinction of panoptic and non-panoptic notions of surveillance from chapter two, a systematic discussion of the state of the art of Internet surveillance by establishing a typology of the existing literature and a discussion of commonalties and differences were introduced. The following table summarizes the results. Foundations of Internet surveillance theory Panoptic notions of of Internet surveillance Internet surveillance Non- Non-panoptic panoptic of Internet surveillance 2003a; 2003b), Seumas notions of either use a neutral Miller and John Weck- Internet concept that assumes ert (2000), Stoney Alder surveillance there are enabling as et al. (2008), Jeffrey well constraining Stanton and Elizabeth effects or a positive Weiss (2000), Barbara concept that identifies Kaye and Thomas John- comical, playful, amus- son (2002), Anders Al- ing, and even enjoyable brechtslund characteristics of online Hille Koskela (2004; surveillance. 2006) as notions Non-panoptic notions David of Lyon (1998; (2008), Panoptic Panoptic notions Greg Elmer (1997), notions of Internet surveillance Internet consider online surveil- (2003), Manuel Cas- surveillance lance to be negative. tells (2001), David These approaches ar- Wall (2003; 2006), gue that power, domi- Joseph Turow (2005; nation, coercion, con- 2006), Dwayne - 79 - Winseck Mark An- A Critical Contribution to (Internet) Surveillance Studies trol, discipline, and drejevic (2002; 2007a; surveillance have in- 2007b), John Edward creased in the era of the Campbell and Matt Internet. Carlson (2002), Ashlee Humphreys (2006), Ian Brown and Douwe Korff (2009), Brian Krueger (2005), Michael Mehta and Eric Darier drew (1998), Hope Macgregor An- (2005), Wise (2004) Table 10: Foundations of Internet surveillance theory In conclusion, non-panoptic notions of Internet surveillance use either a neutral concept that assumes there are enabling as well as constraining effects or a positive concept that identifies comical, playful, amusing, and even enjoyable characteristics; they are represented by scholars such as David Lyon, Seumas Miller and John Weckert, Alder et al. Jeffrey Stanton and Elizabeth Weiss, and Barbara Kaye and Thomas Johnson. In contrast, panoptic notions of Internet surveillance consider online surveillance to be negative. These approaches argue that power, domination, coercion, control, discipline, and surveillance have increased in the era of the Internet; they are represented by scholars such as Greg Elmer, Manuel Castells, John Edward Campbell and Matt Carlson, and Ian Brown and Douwe Korff. As shown in chapter two, economical and political actors such as corporations and state institutions are the main actors in modern surveillance societies and surveillance in general and Internet surveillance in particular are crucial elements for modern societies. Like nonpanoptic notions of surveillance, non-panoptic notions of Internet surveillance understand surveillance in cyberspace in a non-hierarchical and decentralized way, where everyone has the opportunity to surveil. This argument overlooks the fact that corporations and state institutions are the most powerful actors in society and are able to undertake mass-surveillance online, what private actors are not able to do. Neutral concepts of surveillance on the Internet tend to overlook power asymmetries of contemporary society and therefore tend to convey the - 80 - A Critical Contribution to (Internet) Surveillance Studies image that private actors are equally powerful as corporations and state institutions. Hence, a general and neutral understanding of surveillance in cyberspace is not fruitful for studying online surveillance as it does not take asymmetrical power relations and repressive aspects of society into consideration. Approaches that stress that everyone today has the opportunity to surveil, that online surveillance is a useful and effective management tool, and that Internet surveillance has comical, playful, amusing, and even enjoyable characteristics are typical for postmodern scholars and disguise the fact of power and domination in contemporary surveillance societies. Surveillance studies scholars like Lyon (1998, 95; 2003b, 163) grasp that economic surveillance on the Internet such as monitoring consumers or the workplace are central aspects of modern surveillance societies. The following explanations indicate that most of the panoptic notions of Internet surveillance recognize the importance of economic aspects of surveillance in cyberspace: For example, Elmer (1997 186; 189f.) investigates economic Internet surveillance predominantly in the sphere of consumption and analyzes how corporations map consumer profiles in order to target advertising and to accumulate profit: “The Internet is subsequently being driven by a cynical and all-encompassing desire for consumer profiles, wherein advertising links, and commercial Web pages in general, incorporate strategies, tactics and, most importantly for this paper, techniques of demographic and psychographic ‘solicitation.’” (Elmer 1997, 186). He concludes that “it is this pervasive desire to know more and more about ‘what the customer wants’ – albeit so that profits can be maximized – which has of late driven the production of such techniques of mapping and solicitation on the Internet.” (Elmer 1997, 190) Winseck (2003) argues that online surveillance is a source of revenue for media conglomerates in the commercialized cyberspace and that new technologies such as the Internet allow for more detailed audience and clickstream analyses: “The shaky foundations of the so-called new economy are also propelling the surveillance imperative as companies search for new sources of revenue to justify their investments, such as transaction-generated personal information.” (Winseck 2003, 186) In contrast, Castells (2001, 173f.) mentions economic Internet surveillance in the sphere of production and in the sphere of consumption: “There has been so much enthusiasm about the freedom brought by the Internet that we have forgotten the persistence of authoritarian, surveillance practices in the environment that remains the most important in our lives: the workplace. With workers becoming increasingly dependent on computer networking in their activity, most companies have decided that they have the right to monitor the uses of their networks by their employees …The fundamental develop- 81 - A Critical Contribution to (Internet) Surveillance Studies ment has been the technologies of data-gathering associated with the economics of ecommerce. In many cases, the main revenue for e-commerce companies is advertising and marketing … On the one hand, they receive the proceeds from the advertising banners they can post for their users. On the other hand, the data from their users are sold to their clients for marketing purposes, or used by the company itself to better target its customers. In all cases, precious information must be collected from each click to the website.” When Wall (2006, 350ff.) presents an empirical case study of the spam industry such as e-mail list compilation and unsolicited bulk e-mails, he solely emphasizes surveillance in the sphere of consumption. Turow (2006, 114-118) analyzes consumer surveillance in the digital age and marks a development from customized media of one-to-one marketing to walled gardens as an online environment to interactive television such as video-on-demand and concludes that interactive television “already minutely tracks and categorizes the viewing habits of its users as part of its service contract. The company sells the data in aggregate to potential advertisers.” (Turow 2006, 118) Citing the example of interactive media clarifies that Andrejevic (2007b, 242f.) is primarily interested in analyzing consumer surveillance: “The general outlines of a commercial model for interactive media can thus be gleaned from the example of TiVo. Its main components are: customization (the disaggregation of demand curves, the direct linkage between a specific act of production and a targeted act of consumption), interactivity (the ability to monitor consumers in the act of consumption), off-loading labor to consumers (who perform the work of generating their own demographic information), and the development of an on-going relationship with consumers (that allows for the exploitation of demographic information gathered over time).” In addition, Campbell and Carlson (2002, 587) understand online surveillance in the context of the commodification of privacy, consumer profiling, and advertising. Similarly, Humphreys (2006, 302) considers Internet surveillance in the consumer paradigm and how corporations such as Amazon monitor users’ behaviour, identify website visits of users, and classify and group consumers. Likewise, Mehta and Darier (1998) emphasize economic aspects of surveillance in cyberspace in the sphere of consumption and give an example: “A service on the Internet known as DejaNews facilitates this marketing goal. The millions of messages posted in Usenet can be searched with DejaNews to target specific groups, and relevant expertise, and monitor markets trends.” (Mehta and Darier 1998, 108) In conclusion, panoptic notions of Internet surveillance primarily analyze economic aspects of surveillance on the Internet in the context of consumption. Based on the distinction of surveillance in the economy into the spheres of production, circulation, and consumption from chapter three, the following table can be outlined: - 82 - A Critical Contribution to (Internet) Surveillance Studies Economic aspects in panoptic notions of Internet surveillance Internet surveillance in the Internet surveillance in the Internet surveillance in the sphere of production sphere of circulation sphere of consumption Greg Elmer (1997) Dwayne Winseck (2003) Manuel Castells (2001) Manuel Castells (2001) David Wall (2003; 2006) Joseph Turow (2005; 2006) Mark Andrejevic (2002; 2007a; 2007b) John Edward Campbell and Matt Carlson (2002) Ashlee Humphreys (2006) Michael Mehta and Eric Darier (1998) Table 11: Economic aspects in panoptic notions of Internet surveillance Although panoptic notions of Internet surveillance recognize the importance of the economy, they tend to focus on the sphere of consumption and to overlook online surveillance in the spheres of production and circulation as important aspects of contemporary surveillance societies. Furthermore, panoptic notions of Internet surveillance claim that there are particular forms of economic surveillance without a theoretical criterion for a certain typology. In contrast, a typology of Internet surveillance in the modern economy, which is based on Marx’ theory of the political economy, allows to systemize economic surveillance on the Internet and to distinguish online surveillance into the spheres of production, circulation, and consumption. A theoretically founded typology of economic Internet surveillance is important in - 83 - A Critical Contribution to (Internet) Surveillance Studies order to undertake a theoretical analysis of online surveillance in the modern economy. Therefore, in the next chapter, a distinction of Internet surveillance in the economy into the spheres of production, circulation, and consumption will be outlined. - 84 - A Critical Contribution to (Internet) Surveillance Studies 5. A critical contribution to Internet surveillance studies The overall aim of this chapter is to analyze the specific economic mode of Internet surveillance. Based on the distinction of surveillance in the economy into the spheres of production, circulation, and consumption from chapter three, a typology of online surveillance in the economy can be constructed. Economic surveillance on the Internet in the spheres of production, circulation, and consumption will be outlined. The following three sections are therefore structured according to this distinction. The chapter concludes with a summary in section four. - 85 - A Critical Contribution to (Internet) Surveillance Studies 5.1. Internet surveillance in the sphere of production As analyzed in chapter two, Marx argues that surveillance is important for the capitalist process of production and is used for generating absolute and relative surplus value in order to accumulate profit. For explaining newer forms of surveillance in the process of production, the emergence of scientific management was analyzed. The mechanical engineer Frederick Winslow Taylor developed the concept of scientific management, where the meaning of knowledge and information as productive force has permanently increased and management gathers knowledge of the labour process and uses this knowledge in order to control the labour process. According to Robins and Webster (1999, 98ff.), for understanding modern forms of surveillance such as Internet surveillance in the sphere of production, the transformation from a Fordist system of mass production to a post-Fordist system of flexible production has to be analyzed. Therefore I will now give a short overview of some characteristics of what in the French regulation school has been termed the post-Fordist economy. In the 1970’s, an economical, political, and ideological crisis of the Fordist production, based on Taylor’s scientific management, took place and a post-Fordist accumulation regime began to develop. In the context of the development of a post-Fordist production regime, concepts such as “Kaizen” (Imai 1986), “lean production” (Womack , Jones, and Roos 1991), “virtual corporation” (Davidow and Malone 1992), and “reengineered corporation” (Hammer and Champy 1994) emerged. With the help of new information and communication technologies and new systems of data processing, the post-Fordist accumulation regime created a flexible production process with diversified and differentiated products instead of standardized mass production. Moreover, corporations avoided to have long transport distances, attendance time, and overproduction and realized outsourcing and methods for just in time-production and real time productivity. At the same time, new forms of participatory management, decentralization, teamwork, reinforced motivation of employees, identification with the corporation, selfresponsibility, initiative of one’s own, self-discipline, and self-control play an integral role in post-Fordism. (cf. Hirsch 1995: 88ff.) In Capital, Volume I, after Marx has introduced commodities and money, as well as labourproduced surplus value and methods for producing absolute and relative surplus value, he studies the distinction of time wages (based on a certain period of working time) and piece - 86 - A Critical Contribution to (Internet) Surveillance Studies wages (based on a certain amount of produced pieces) (cf. MEW 23, 565-582). When reading Marx’ description of benefits of piece wages for proprietors, it seems like he predicted the consequences of post-Fordist production methods – self-control and self-discipline: “But the wider scope that piece-wage gives to individuality tends to develop on the one hand that individuality, and with it the sense of liberty, independence, and self-control of the labourers, and on the other, their competition one with another.” (MEW 23, 579) Fuchs (2008, 273) stresses a difference of surveillance between Fordist and post-Fordist capitalism: “From the early modern phase until the end of the Fordist accumulation regime, economic surveillance was visible and workers were physically controlled by hierarchic power structures. In post-Fordist capitalism, surveillance is also based on technologies that document and assess behavior and communication and on the ideologies of participatory management, identification, and teamwork. Such mechanisms increasingly produce forms of self-control, self-discipline, and anticipatory obedience because individuals who are uncertain about being watched or not, and compete with other employees, might be more likely to internalize the instrumental performance ethic and to have existential fears of losing their jobs than Fordist workers who knew exactly when they were watched and when they could try to slow down or stop work.” As in the Fordist accumulation regime and in even earlier forms of capitalism and industrial production, managers and overlookers had to walk around in the shop in order to control workers, surveillance was primarily exerted by physically force and was visible. Managers were able to only control a relatively small group of employees at the same time and not all labourers could be controlled permanently. In contrast, in the post-Fordist accumulation regime, surveillance is predominantly technically mediated and physical presence is not necessarily required any more (cf. Lyon 1994, 133). With the help of new surveillance technologies such as the Internet it is possible to undertake large-scale surveillance extensively and intensively, because every worker can be controlled every time by a minimum number of supervisors (cf. Sewell and Wilkinson 1992, 271). Robins and Webster (1995, 95) argue “while employees may have an enhanced degree of autonomy in their day-to-day operations, they are subject to ready and sophisticated surveillance at any time”. Surveillance now works primarily invisibly, anonymously, and indirectly. Not every worker is observed at any moment, but no one knows if she or he is monitored. Observation is possible anytime. As a result, everyone acts as if kept under surveillance all the time – individuals discipline and control themselves. - 87 - A Critical Contribution to (Internet) Surveillance Studies Robins and Webster (1993, 243) furthermore argue in this context that post-Fordism appears to bring autonomy, participation, and decentralization, “while in fact increasingly centralising power”. Similarly, Zureik (2003, 47f.) states a contradiction of new information and communication technologies in the modern workplace in so far as “the same information and communication technology that promises democratization, decentralization and liberation of the worker (i.e., empowerment), imposes measurement techniques on the worker that by far exceed anything practiced in the name of Taylorism through the application of time-and-motion studies.” In this context, Christian Parenti (2003, 138) stresses that “nothing has advanced surveillance on the job like the Internet”. He also emphasizes that companies in the majority of cases act legally when collecting and analyzing employees’ data, because in reference to federal laws “all communications occurring on corporate-owned computers and phone systems are automatically open to monitoring by employers“ (Parenti 2003, 138). According to the American Management Association and the ePolicy Institute (2008) that undertake an annual quantitative survey about electronic monitoring and surveillance with approximately 300 U.S. companies, “more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet“. More than 40% of the companies monitor e-mail traffic of their workers, and 66% of corporations monitor Internet connections. In addition, most companies use software to block non-work related websites such as sexual or pornographic sites, game sites, social networking sites, entertainment sites, shopping sites, and sport sites. The American Management Association and the ePolicy Institute (2008) also stress that companies “tracking content, keystrokes, and time spent at the keyboard ... store and review computer files ... monitor the blogosphere to see what is being written about the company, and ... monitor social networking sites.“ Furthermore, about 30% of the companies were also firing employees for non-work related email and Internet usage such as “inappropriate or offensive language“ and ”viewing, downloading, or uploading inappropriate/offensive content“ (American Management Association and the ePolicy Institute 2008). To sum up: for understanding modern forms of surveillance such as Internet surveillance in the sphere of production, the transformation from a Fordist system of mass production to a post-Fordist system of flexible production has to be analyzed. In the post-Fordist accumulation regime, every worker can be controlled every time with a minimum of supervisors. On an empirical level, more than 40% of companies monitor e-mail traffic of their workers, and 66% - 88 - A Critical Contribution to (Internet) Surveillance Studies of corporations monitor Internet connections. In addition, “more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet“ (American Management Association and the ePolicy Institute 2008). Now, we move on to Internet surveillance in the sphere of circulation. - 89 - A Critical Contribution to (Internet) Surveillance Studies 5.2. Internet surveillance in the sphere of circulation For understanding surveillance in the sphere of circulation, the circuit of capital was introduced in chapter two. For Marx, the circuit of capital contains three stages, namely the stage of money capital, the stage of productive capital, and the stage of commodity capital. Based on these findings, surveillance in the sphere of circulation was identified and classified into (a) surveillance of purchasing labour power in the stage of money capital, (b) surveillance of purchasing means of production in the stage of money capital, and (c) surveillance of produced commodities in the stage of commodity capital. Similarly, we can identify and classify Internet surveillance in the sphere of circulation into (a) Internet surveillance of purchasing labour power in the stage of money capital, (b) Internet surveillance of purchasing means of production in the stage of money capital, and (c) Internet surveillance of produced commodities in the stage of commodity capital: a.) Internet surveillance of purchasing labour power in the stage of money capital Internet surveillance of purchasing labour power in the stage of money capital means online applicant surveillance. Rosalind Searle (2006, 343) states in this context that “checking procedures are increasingly utilised to authenticate candidates’ data. In several countries financial services authorities have sanctioned formal vetting, often outsourcing it to external contractors. The growth in the collection and sale of information databases can be seen by the proliferation of information verification firms, such as Kroll and Carratu International.” The New Yorker risk consulting company Kroll undertakes off- and online pre-employment screening on a large-scale level. Kroll is an operating unit of the insurance and professional services firm Marsh & McLennan, which is the 832nd biggest company worldwide (cf. Forbes 2009). Kroll’s revenues of 2008 were US$ 866 million (cf. Kroll 2010). Kroll offers background screening services of new job applicants for companies and government agencies in order to check information such as address histories, education and employment histories, media coverage, credit reports, civil and bankruptcy records, criminal records, driving histories, liens and judgment histories, and professional licenses and certifications (cf. Kroll 2010). If Kroll realizes a company’s application procedure, the job candidates have to fill out a detailed questionnaire on the Internet as part of their application, which is sent invisibly to Kroll (cf. Searle 2006, 343). “Kroll has pioneered a secure Internet-based system that collects information - 90 - A Critical Contribution to (Internet) Surveillance Studies from job candidates and provides clients with project updates and final reports. Kroll’s Applicant Submission System allows job candidates to fill out a detailed questionnaire online and submit it securely to Kroll.” (Kroll 2010) In order to investigate job candidates, Kroll “searches primary sources (including electronic resources), visits courthouses throughout the country to retrieve and review public documents, and conducts telephone interviews with a job candidate’s professional and personal references” (Kroll 2010). Figure 5: Kroll’s advertising for background screening services (Kroll 2010) Also interesting in this context is the corporate investigation company Carratu International, which is headquartered in London. Carratu International operates around the world with national and multi-national corporations, insurance companies, law firms, and financial institutions, which are primarily found in the Fortune 500 and the Financial Times Top 100 rankings (cf. Carratu International). Carratu International argues that pre-employment screening is crucial, because up to 80% of new job candidates give incorrect information about themselves (see brochure of employee screening services in figure 6). - 91 - A Critical Contribution to (Internet) Surveillance Studies Figure 6: Carratu International brochure of employee screening services (Carratu International) - 92 - A Critical Contribution to (Internet) Surveillance Studies According to Carratu International, the only opportunity to “know that the information provided is complete and honest” is to undertake a systematic off- and online check of information such as personal data and information on civil litigation, credit history, bankruptcy, employment history, educational achievements, professional qualifications, and professional or occupational licensing. In addition, Carratu International provides three levels of off- and online pre-employment screening at different prices: the basic service includes data analyzes of items such as address, educational qualification, and employment history. The intermediate service includes the basic service plus searches of the media, ownership records, company directorship and judicial data. Finally, the professional level includes an investigation of “all details contained on the application document, carry[ing; TA] out all checks as detailed in Level Two validations, together with additional relevant research and investigations to confirm the probity and standing of the applicant” (Carratu International). b.) Internet surveillance of purchasing means of production in the stage of money capital Internet surveillance of purchasing means of production in the stage of money capital includes online screening of suppliers. Kroll (2010) provides a so-called off- and online commercial intelligence program in order to check existing and potential suppliers. According to Kroll (2010), the service “goes beyond the published data” and gives your company “a real sense of who you are doing business with”. Kroll (2010) screens primary source data and analysis of suppliers, performance benchmarking in the sector of suppliers, and collects information based on industry knowledge and contacts. As claimed by Kroll (2010), the “advantage lies in being able to give you the right information, at the right time, to help you make the best possible decision … By accessing reliable and effective commercial intelligence from Kroll, you will gain the confidence to make sound business decisions that will enhance your corporate reputation and bottom line performance”. c.) Internet surveillance of produced commodities in the stage of commodity capital Internet surveillance of produced commodities in the stage of commodity capital contains (material and immaterial) property surveillance as well as surveillance of vendors in cyberspace: Carratu International offers so-called Intellectual Property Protection Services (IPPS) off- and online on behalf of brand, trademark, and patent owners. It includes services such as anti-counterfeiting investigations, trademark infringement and passing-off investigations, - 93 - A Critical Contribution to (Internet) Surveillance Studies market watch, patent investigations, and parallel trade investigations. In order to avoid product counterfeiting, Carratu International provides “brand owners and their legal representatives a unique range of anti-counterfeiting programmes, tracking infringements from point of sale to source, identifying those responsible and building up a comprehensive supply chain diagnosis. We obtain the evidence needed to bring an enforcement action and support clients through the entire process.” Furthermore, the corporate investigation company undertakes trademark infringement and passing-off investigations: “Whether it is your company name or one of your registered or un-registered trademarks, we investigate those individuals behind the infringement and provide you with sufficient evidence to take the appropriate action.” (Carratu International) The company also offers a market watch service. This service “constantly monitors all likely distribution centres with each area covered by a watcher, or watchers, who submit monthly intelligence reports on the outlets and venues checked. If an infringement is found, a test purchase is completed and, when requested, we liaise with the local authorities to ensure that wherever possible, enforcement action is taken.” (Carratu International) In addition, Carratu International carries out parallel trade investigations and assists “trademark owners in determining who is behind the supply of parallel goods and to secure the necessary evidence to take enforcement action and so safeguard regional markets and profits.” Kroll (2010) provides a so-called off- and online vendor integrity program in order to check existing and potential vendors whether they “have criminal records, financial troubles, or business relationships that could create costly conflicts or be deeply embarrassing“ or “could have a negative impact on your company’s revenues and reputation”. Therefore, Kroll (2010) screens criminal records, bankruptcy records, illegal activity allegations, civil cases, liens, as well as media coverage of vendors. For doing so, vendors have to “complete a detailed online questionnaire that’s electronically submitted to Kroll …, Kroll’s staff screens the information provided by vendors and collect additional intelligence“ (Kroll 2010) and publishes an online report. In conclusion, Internet surveillance in the sphere of circulation can be identified and classified into Internet surveillance of purchasing labour power in the stage of money capital (online applicant surveillance), Internet surveillance of purchasing means of production in the stage of money capital (online screening of suppliers), and Internet surveillance of produced commodities in the stage of commodity capital (online property surveillance and online surveil- 94 - A Critical Contribution to (Internet) Surveillance Studies lance of vendors). The next point of discussion is Internet surveillance in the sphere of consumption. - 95 - A Critical Contribution to (Internet) Surveillance Studies 5.3. Internet surveillance in the sphere of consumption For explaining surveillance in the sphere of consumption, the emergence of mass consumption was studied in chapter two: For guaranteeing mass consumption, market research became important in order to target advertising and to stimulate needs and demands. Efficiency and effectiveness were extended from the sphere of production to the sphere of consumption and scientific management was translated to scientific marketing, where the audience is treated as commodity. Although the importance of consumer data for target advertising is as old as the advertising business itself, commodification of privacy on the Internet to enable online target advertising has intensified and extended (cf. Robins and Webster 1999, 98). Andrejevic (2007a, 87) stresses in this context that “in the world of digital capitalism, it’s much easier to induce consumers to submit to detailed forms of information gathering, in part because the work of generating information about purchasing habits can be offloaded onto consumers themselves.” Robins and Webster argue that new information and communication technologies such as the Internet have enhanced a new scientific management of marketing, including new forms of surveillance in the sphere of consumption: “‘Teleshopping’, global and targeted advertising, and electronic market research surveillance, all combine to establish a more rationalised and ‘efficient’ network marketplace. Information, surveillance, efficiency: the very principles of Taylorism become intensified, extended and automated through the application of new communications and information technologies. One fundamental aspect of the ‘communications revolution’ has been to refine that planning and control of consumer behaviour that was already inherent in the early philosophy of Scientific Management.” (cf. Robins and Webster 1999, 99f.) In addition, Fuchs (2008, 273) states in this context that “corporations are keen on knowing our consumption preferences in order to target us with personalized advertisements online. They do so either legally, when you agree in an electronic contract to an analysis of your consumption preferences and to receive advertisements, for example, by e-mail or when you browse a Web platform, or illegally, by sending spam mail or invisible spyware that watches and transmits passwords and online behavior.” In order to get an impression of Internet surveillance in the sphere of consumption, some illustrative examples can be given: For instance, web analytics is an analysis of non-personal Internet data that reports website - 96 - A Critical Contribution to (Internet) Surveillance Studies traffic such as number of visitors and page views of a particular website or of a group of websites in order to enable comparisons and rankings. Web analytics sites such as Alexa Internet, Quantcast, and Nielsen NetRatings are able to measure, collect, analyse, and report detailed statistics about the visitors of a website. These instruments are essential for advertisers in order to know how popular certain sites are and to make online advertising more effective and efficient. Since 1996, the web information company Alexa Internet (a subsidiary company of Amazon) has been publishing web traffic reports, global rankings, and top sites lists by country and category (e.g. arts, business, health, news, science, society) of those users who have downloaded (over 10 million) and installed the Alexa toolbar into their browser. Alexa Internet is collecting web content of about 1.6 terabytes per day. Table 12 indicates an Alexa Internet ranking of the three most visited sites on the web, namely google.com, facebook.com, and youtube.com. Table 12: Top sites on the web (Alexa) In addition, Alexa Internet also gathers detailed data and offers site info in order to analyze a particular website or to compare different websites. The next figure shows the Alexa traffic rank for Porn Hub, a popular pornographic video sharing website: - 97 - A Critical Contribution to (Internet) Surveillance Studies Figure 7: Traffic rank for Porn Hub (Alexa) Porn Hub has been monitored by Alexa Internet since 2008 and is currently the 54th most visited website on the Internet. According to figure 7, the Alexa traffic rank indicates how popular the site is including reach, pageviews, pageviews/user, bounce (percentage of visits to the website that consist of a single page turn), time on site, and search. Furthermore, the audience data show what kind of users are on the website and lists visitors by country: 29.6% of Porn Hub visitors are located in the United States, 5.3% in the United Kingdom, 4.6% in France and Germany, and 4.1% in India. Also interesting is that the clickstream sub-section shows which sites users visited immediately before and after pornhub.com: 6.56% of the users visited google.com, 5.27% partypoker.com, 5.24% livejasmin.com, 3.58% pornhublive.com, and 3.55% facebook.com before the Porn Hub website. Whereas, 7.58% of the users visited partypoker.com, 6.53% livejasmin.com, 5.18% pornhublive.com, 4.86% streamate.com, and 4.19% google.com after the Porn Hub website. According to the top sites of the web by Alexa Internet, Google has the most visits on the Internet. Google uses a wide range of methods in order to collect data on its users, namely click tracking (to log clicks of users), log files (to store server requests), JavaScript and web bugs - 98 - A Critical Contribution to (Internet) Surveillance Studies (to check users visits), as well as cookies (to record individual actions) (cf. Stalder and Mayer 2009, 102). Stalder and Mayer (2009, 101-105) list different Google services, which are able to create a broad profile of each user. The authors distinguish between three main types of data seeking services, namely knowledge being (assembling a knowledge profile), social being (constructing a social profile), and physical being (recreating the user’s real-life embodiment). The following table can be outlined: Google services Knowledge being Google Search, Social being Google Google Physical being Groups, Google Google Health, Google (including Google Account, Google Maps (in- Directory, Google Image Mail Search, News Buzz), Google Talk, Orkut, cluding Search, Google News Ar- Google Calendar, Google View), chive Finance, Google Checkout Google Video, YouTube, Scholar, Google Search, Google Google Books, Google Google Video, Google Blog Search, Google Google Google Voice, Street Earth, Google Wave, Android Product Search, Google AdSense, Google AdWords, Google AdPlanner, Google Analytics, DoubleClick, Google Chrome, Google Toolbar, Google Web History, Google Web Accelerator, Google Desktop, Google Notebook, Google Bookmarks, Google Reader, Google Docs, Google Translate, Blogger Table 13: Google services (updated by the author, based on Stalder and Mayer 2009, 101-105) DoubleClick is one of the main products of Google (cf. Google 2008). DoubleClick is a global leader in ad serving and has developed sophisticated methods in order to collect, analyze, and assess huge amounts of users’ data on the Internet (cf. Campbell and Carlson 2002, - 99 - A Critical Contribution to (Internet) Surveillance Studies 596f.). Google (2007; 2008) acquired DoubleClick in 2008 for US$ 3.1 billion. In this context, Google’s chairman and chief executive officer, Eric Schmidt, expressed that “we are thrilled that our acquisition of DoubleClick has closed. With DoubleClick, Google now has the leading display ad platform, which will enable us to rapidly bring to market advances in technology and infrastructure that will dramatically improve the effectiveness, measurability and performance of digital media for publishers, advertisers and agencies, while improving the relevance of advertising for users.” (Google 2008) Figure 8: Illustration of Google’s acquisition of DoubleClick in 2008 (Microreviews 2009) DoubleClick is headquartered in New York City. It was found in 1996 and works for leading digital publishers, marketers, and agencies around the world such as About, Durex, Ford, Friendster, Optimedia, Scripps, and MTV (cf. DoubleClick). Ad serving companies such as DoubleClick use methods by placing advertisements on websites and analyzing their efficiency. DoubleClick develops and provides Internet ad serving services that are sold primarily to advertisers and publishers. DoubleClick collects personal data on many websites, sells this data, and supports targeted advertising. DoubleClick’s main product is known as DART (Dynamic Advertising, Reporting, and Targeting). DART is an ad serving program working with a complex algorithm and is primarily developed for publishers and advertisers in order to “ensure you get the right message, to the right person, at the right time, on the right device” (DoubleClick). According to the top sites of the web by Alexa Internet, Facebook has the second most visits and YouTube the third most visits on the Internet. Web 2.0 activities such as creating profiles and sharing ideas on Facebook, announcing personal messages on Twitter, uploading or watching videos on YouTube, and writing personal entries on Blogger, enables the collection, - 100 - A Critical Contribution to (Internet) Surveillance Studies analyzes, and sale of personal data by commercial web platforms. Web 2.0 applications and social software sites such as Facebook, Twitter, MySpace, YouTube, and Blogger collect personal behaviour, preferences, and interests with the help of systematic and automated computer processes and sell these data to advertising agencies in order to accumulate profit. As a result, Marx’ dialectically mediated spheres of the capitalistic economy of production, circulation, and consumption as outlined in chapter two work now the other way round: Individuals produce personal data on the Internet, which are circulated by companies such as Alexa Internet, Google, DoubleClick, and Facebook and these personal data are consumed by advertisement agencies. In this context, Andrejevic (2007b, 313) speaks about “digital enclosure as a form of exploitation” and Fuchs (2010a; 2010b) about the “Internet prosumer/produsage commodity”. To sum up: although the importance of consumer data for target advertising is as old as the advertising business itself, commodification of privacy on the Internet to enable online target advertising has intensified and extended. In order to get an impression of Internet surveillance in the sphere of consumption, illustrative examples were given: companies such as Alexa Internet, Quantcast, and Nielsen NetRatings undertake web analytics and report website traffic such as number of visitors and page views of a particular website or of a group of websites in order to enable comparisons and rankings. In addition, ad serving companies such as DoubleClick by Google collect personal data on many websites, sell this data, and support targeted advertising. Furthermore, Web 2.0 applications and social software sites such as Facebook and YouTube collect, analyze, and sell personal data in order to accumulate profit. - 101 - A Critical Contribution to (Internet) Surveillance Studies 5.4. Conclusion The overall aim of this chapter was to analyze the specific economic mode of Internet surveillance. Based on the distinction of surveillance in the economy into the spheres of production, circulation, and consumption from chapter three, a typology of online surveillance in the economy was introduced. As a result, we were able to systemize illustrative examples of Internet surveillance in the modern economy into the spheres of production, circulation, and consumption (see table 14): Internet surveillance in the economy Internet surveillance in the Internet surveillance in the Internet surveillance in the sphere of production sphere of circulation sphere of consumption More than 40% of compa- Background Checks (Kroll), Web Analytics (Alexa Inter- nies monitor e-mail traffic Employee Screening Ser- net, of their workers, and 66% vices (Carratu Internation- NetRatings) of al) corporations monitor Internet connections Nielsen Ad Serving (DoubleClick by Commercial “More than one fourth of Quantcast, Intelligence Google) Program (Kroll) employers have fired work- Web 2.0 activities (Face- ers for misusing e-mail and Intellectual Property Pro- book, nearly one third have fired tection YouTube, Blogger) employees for misusing the Anti-Counterfeiting Investi- Internet“ (American Man- gations, agement Association and fringement and Passing-Off the ePolicy Institute 2008) Investigations, Services (IPPS), Trademark In- Mar- ketWatch, Patent Investigations, Parallel Trade Investigations (Carratu International), Vendor Program (Kroll) Table 14: Internet surveillance in the economy - 102 - Integrity Twitter, MySpace, A Critical Contribution to (Internet) Surveillance Studies For understanding Internet surveillance in the sphere of production, the transformation from a Fordist system of mass production to a post-Fordist system of flexible production was analyzed. In the post-Fordist accumulation regime, every labourer can be controlled every time with a minimum of supervisors. On an empirical level, more than 40% of companies monitor e-mail traffic of their workers, and 66% of corporations monitor Internet connections. In addition, “more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet“ (American Management Association and the ePolicy Institute 2008). In the sphere of circulation, online surveillance can be identified and classified into Internet surveillance of purchasing labour power in the stage of money capital (Background Checks, Employee Screening Services), Internet surveillance of purchasing means of production in the stage of money capital (Commercial Intelligence Program), and Internet surveillance of produced commodities in the stage of commodity capital (Intellectual Property Protection Services, Anti-Counterfeiting Investigations, Trademark Infringement and Passing-Off Investigations, MarketWatch, Patent Investigations, Parallel Trade Investigations, Vendor Integrity Program). Although the importance of consumer data for target advertising is as old as the advertising business itself, commodification of privacy on the Internet to enable online target advertising has intensified and extended. In order to get an impression of Internet surveillance in the sphere of consumption, illustrative examples were given: Companies such as Alexa Internet, Quantcast, and Nielsen NetRatings undertake web analytics and report website traffic such as number of visitors and page views of a particular website or of a group of websites in order to enable comparisons and rankings. In addition, ad serving companies such as DoubleClick by Google collect personal data on many websites, sell this data, and support targeted advertising. Furthermore, Web 2.0 applications and social software sites such as Facebook, Twitter, MySpace, YouTube, and Blogger collect, analyze, and sell personal data in order to accumulate profit. In this context, Andrejevic (2007b, 313) speaks about “digital enclosure as a form of exploitation” and Fuchs (2010a; 2010b) about the “Internet prosumer/produsage commodity”. - 103 - A Critical Contribution to (Internet) Surveillance Studies 6. Conclusion The overall aim of A Critical Contribution to (Internet) Surveillance Studies was to clarify how we can theorize and systemize surveillance in general and Internet surveillance in particular in the modern economy. The thesis constructed theoretically founded typologies in order to systemize the existing literature of surveillance studies and to analyze examples of surveillance. Therefore, it mainly was a theoretical approach combined with illustrative examples, advanced from the abstract to the concrete level. The following figure summarizes the results. How can we theorize and systemize surveillance in general and Internet surveillance in particular in the modern economy? Surveillance in the spheres of production, circulation, and consumption Internet surveillance in the spheres of production, circulation, and consumption Figure 9: A critical contribution to (Internet) surveillance studies - 104 - A Critical Contribution to (Internet) Surveillance Studies Foundations of surveillance theory were analyzed in the second chapter. In the third chapter, a critical contribution to the analysis of surveillance in the modern economy was treated in order to establish a typology of surveillance in the economy and to study surveillance in the spheres of production, circulation, and consumption. Foundations of Internet surveillance theory were studied in the fourth chapter. Finally in the fifth chapter, a critical contribution to the analysis of Internet surveillance in the modern economy was drawn in order to distinguish Internet surveillance into the spheres of production, circulation, and consumption. Based on these findings, we were able to systemize illustrative examples of (Internet) surveillance in the modern economy such as the Electronic Monitoring and Surveillance Survey, Kroll, and Alexa Internet into the spheres of production, circulation, and consumption. The following treatment brings up the thematically grouped research questions and discusses the results more in detail. Foundations of surveillance theory The specific research questions that were addressed in chapter two are: How is surveillance defined in the existing literature? What are commonalties and differences of various notions of surveillance? What are advantages and disadvantages of such definitions? The overall aim of chapter two was to clarify how surveillance is defined in the existing literature, what the different notions of surveillance have in common and what distinguishes them from one another, and what advantages and disadvantages such definitions have. For doing so, Foucault’s understanding of surveillance and the idea of the Panopticon were introduced (section one). Based on these findings, section two and three contained a systematic discussion of the state of the art of surveillance by establishing a typology of the existing literature and discussing commonalties and differences. Section four clarified how different notions treat economic aspects of surveillance and if there is a gap in the existing literature in order to study surveillance in the modern economy. Foucault analyzes surveillance in the context of the emergence of modern disciplinary societies. He understands disciplines as forms of operational power relations and technologies of domination in order to discipline, control, and normalize people in respect of drilling docile - 105 - A Critical Contribution to (Internet) Surveillance Studies bodies. For Foucault, the Panopticon is an ideal symbol of modern surveillance societies. Foucault’s understanding of surveillance and the Panopticon allows to distinguish panoptic and non-panoptic approaches of defining surveillance that can be used for constructing a typology of existing surveillance literature and for discussing commonalties and differences of definitions of surveillance. Non-panoptic notions use a neutral and general notion of surveillance, where everyone has the opportunity to surveil; they are represented by scholars such Anthony Giddens, James Rule, Gary Marx, and Jean Baudrillard. In contrast, panoptic notions consider surveillance to be negative and being connected to coercion, repression, discipline, power, and domination; they are represented by scholars such as Gilles Deleuze, Oscar Gandy, Frank Webster and Kevin Robins, and Mark Poster. Although private actors monitor and watch over other individuals in everyday life experiences (for example parents taking care of their children, providing personal information on Weblogs, and using social networking sites on the Internet), these acts are processes to which people agree and which involve no violence, coercion, or repression. In comparison, economical and political actors use surveillance and exercise violence in order to control a certain behaviour of people and in most cases people do not know that they are surveilled. Corporations control the economic behaviour of people and coerce individuals in order to produce or buy specific commodities for accumulating profit and for guaranteeing the production of surplus value. Corporations and state institutions are the most powerful actors in society and are able to undertake mass-surveillance extensively and intensively (such as for example the collection and gathering of information on Internet user profiles in order to implement targeted advertising), because available resources decide surveillance dimensions. Non-panoptical notions use a broad definition of surveillance and tend to mix up very heterogeneous phenomena on one level of analysis. Furthermore, non-panoptic notions understand surveillance in a non-hierarchical and decentralized way, where everyone has the opportunity to surveil. This argument overlooks the fact that corporations and state institutions are the most powerful actors in society and are able to undertake mass-surveillance, what private actors are not able to do. Neutral concepts of surveillance tend to overlook the power asymmetries of contemporary society and therefore tend to convey the image that private actors are equally powerful as corporations and state institutions. Hence, a general and neutral under- 106 - A Critical Contribution to (Internet) Surveillance Studies standing of surveillance is not fruitful for studying surveillance as it does not take asymmetrical power relations and repressive aspects of society into consideration. Although panoptic notions of surveillance recognize the importance of the economy, they tend to focus only on one or two spheres of the economy. Furthermore, panoptic notions of surveillance claim that there are particular forms of economic surveillance without a theoretical criterion for a certain typology. In contrast, a typology of surveillance in the modern economy, which is based on Marx’ theory of the political economy, allows to systemize economic surveillance and to distinguish surveillance into the spheres of production, circulation, and consumption. A theoretically founded typology of economic surveillance is important in order to undertake a theoretical analysis of surveillance in the modern economy. Therefore, foundations of a political economy approach on surveillance were outlined in chapter three. A critical contribution to surveillance studies The following research questions were subject to chapter three: Which theory provides a typology in order to systemize surveillance in the modern economy? What are characteristics of surveillance in the spheres of production, circulation, and consumption? What are differences between surveillance and Internet surveillance? The overall aim of chapter three was to analyze surveillance in the context of the economy. Based on the foundations of a political economy approach, the distinction of production, circulation, and consumption within the economy was introduced (section one) in order to establish a typology of surveillance in the economy and to study surveillance in the spheres of production, circulation, and consumption (section two). This chapter concluded with a discussion of the emergence of the Internet as new surveillance technologies (section three). In the Introduction to a Contribution to the Critique of Political Economy, Karl Marx (MECW 28, 26-37) distinguishes between (a) production, (b) circulation (distribution and exchange), and (c) consumption as dialectically mediated spheres of the capitalistic economy. Based on the distinction of production, circulation, and consumption, a typology of surveil- 107 - A Critical Contribution to (Internet) Surveillance Studies lance in the economy could be constructed. Such a typology was outlined in section 3.2. Marx argues that surveillance is a central part of the capitalist process of production for generating absolute and relative surplus value in order to accumulate profit. For explaining newer forms of surveillance in the process of production, the emergence of scientific management was analyzed. The mechanical engineer Frederick Winslow Taylor developed the concept of scientific management, where the meaning of knowledge and information as productive force has permanently increased and the management gathers knowledge of the labour process and uses this knowledge in order to control the labour process. For understanding surveillance in the sphere of circulation, the circuit of capital was introduced. For Marx, the circuit of capital contains three stages, namely the stage of money capital, the stage of productive capital, and the stage of commodity capital. Based on these findings, surveillance in the sphere of circulation was identified and classified into surveillance of purchasing labour power in the stage of money capital, surveillance of purchasing means of production in the stage of money capital, and surveillance of produced commodities in the stage of commodity capital. For explaining surveillance in the sphere of consumption, the emergence of mass consumption was studied: For guaranteeing mass consumption, market research became important in order to target advertising and to stimulate needs and demands. Efficiency and effectiveness were extended from the sphere of production to the sphere of consumption and a translation of scientific management to scientific marketing took place. In scientific marketing, the audience is treated as a commodity and produces crucial data for the economy for free. In order to describe surveillance in the context of the emergence of new information and communication technologies, some scholars accentuated terms such as “social control in the computer age” (Rule 1973), “information technology and dataveillance” (Clarke 1988), “in the age of the smart machine” (Zuboff 1988), “the superpanopticon” (Mark Poster 1990), “the electronic eye” (Lyon 1994), “hypercontrol in telematic societies” (Bogard 1996), “social Taylorism of surveillance” (Robins and Webster 1999), “the maximum surveillance society” (Norris and Armstrong 1999), “new surveillance” (Gary Marx 2002), “the intensification of surveillance” (Ball and Webster 2003), “digitizing surveillance” (Graham and Murakami Wood 2003), “profiling machines” (Elmer 2004), “surveillance in the interactive area” (An- 108 - A Critical Contribution to (Internet) Surveillance Studies drejevic 2007), and “the rise of electronic surveillance” (Fuchs 2008). Surveillance technologies are developed by analogy with productive forces in modern societies. New information technologies have generated a “rapid quantitative expansion of surveillance, which simultaneously raises questions of a qualitative shift“ (Lyon 1994, 56). New surveillance is a dialectical sublation of traditional surveillance in the form of elimination, retention, and emergence of new qualities on a higher level. For example, the necessity of face-to-face surveillance is eliminated, but power relations and forms of domination are retained and work on a more intensive and extensive level. Surveillance in the context of new information and communication technologies is a dialectic of continuity and discontinuity. According to Fuchs (2008, 139), the Internet is the most important phenomenon of new information and communication technologies, which involves all different forms of information, communication, and co-operation in one medium. These approaches show that many forms of contemporary surveillance are computer-based and Internet based and that as a reaction a multiplicity of new analytical approaches has emerged. Therefore, different notions of Internet surveillance were outlined in chapter four. Foundations of Internet surveillance theory The specific research questions that were treated in chapter four are: How is Internet surveillance defined in the existing literature? What are commonalties and differences of various notions of Internet surveillance? What are advantages and disadvantages of such definitions? The overall aim of chapter four was to clarify how Internet surveillance is defined in the existing literature, what commonalties and differences of various notions of online surveillance exist, and what advantages and disadvantages such definitions have. For doing so, based on the distinction of panoptic and non-panoptic notions of surveillance from chapter two, sections one and two of this chapter contained a systematic discussion of the state of the art of Internet surveillance by establishing a typology of the existing literature and discussing commonalties and differences. Section four clarified how different notions deal with economic - 109 - A Critical Contribution to (Internet) Surveillance Studies surveillance on the Internet and makes clear if there is a gap in the existing literature in order to study surveillance in the modern economy. In conclusion, non-panoptic notions of Internet surveillance use either a neutral concept that assumes there are enabling as well as constraining effects or a positive concept that identifies comical, playful, amusing, and even enjoyable characteristics; they are represented by scholars such as David Lyon, Seumas Miller and John Weckert, Alder et al. Jeffrey Stanton and Elizabeth Weiss, and Barbara Kaye and Thomas Johnson. In contrast, panoptic notions of Internet surveillance consider online surveillance to be negative. These approaches argue that power, domination, coercion, control, discipline, and surveillance have increased in the era of the Internet; they are represented by scholars such as Greg Elmer, Manuel Castells, John Edward Campbell and Matt Carlson, and Ian Brown and Douwe Korff. Like non-panoptic notions of surveillance, non-panoptic notions of Internet surveillance understand surveillance in cyberspace in a non-hierarchical and decentralized way, where everyone has the opportunity to surveil. This argument overlooks the fact that corporations and state institutions are the most powerful actors in society and are able to undertake masssurveillance online, what private actors are not able to do. Neutral concepts of surveillance on the Internet tend to overlook power asymmetries of contemporary society and therefore tend to convey the image that private actors are equally powerful as corporations and state institutions. Hence, a general and neutral understanding of surveillance in cyberspace is not fruitful for studying online surveillance as it does not take asymmetrical power relations and repressive aspects of society into consideration. Although panoptic notions of Internet surveillance recognize the importance of the economy, they tend to focus on the sphere of consumption and to overlook online surveillance in the spheres of production and circulation as important aspects of contemporary surveillance societies. Furthermore, panoptic notions of Internet surveillance claim that there are particular forms of economic surveillance without a theoretical criterion for a certain typology. In contrast, a typology of Internet surveillance in the modern economy, which is based on Marx’ theory of the political economy, allows to systemize economic surveillance on the Internet and to distinguish online surveillance into the spheres of production, circulation, and consumption. A theoretically founded typology of economic Internet surveillance is important in order to undertake a theoretical analysis of online surveillance in the modern economy. There- 110 - A Critical Contribution to (Internet) Surveillance Studies fore, a distinction of Internet surveillance in the economy into the spheres of production, circulation, and consumption was outlined in chapter five. A critical contribution to Internet surveillance studies The following research questions were subject to chapter five: Which theory provides a typology in order to systemize Internet surveillance in the modern economy? What are characteristics of Internet surveillance in the spheres of production, circulation, and consumption? The overall aim of chapter five was to analyze the specific economic mode of Internet surveillance. Based on the distinction of surveillance in the economy into the spheres of production, circulation, and consumption from chapter three, a typology of online surveillance in the economy was introduced. As a result, we were able to systemize illustrative examples of Internet surveillance in the modern economy into the spheres of production, circulation, and consumption. For understanding Internet surveillance in the sphere of production, the transformation from a Fordist system of mass production to a post-Fordist system of flexible production was analyzed. In the post-Fordist accumulation regime, every labourer can be controlled every time with a minimum of supervisors. On an empirical level, more than 40% of companies monitor e-mail traffic of their workers, and 66% of corporations monitor Internet connections. In addition, “more than one fourth of employers have fired workers for misusing e-mail and nearly one third have fired employees for misusing the Internet“ (American Management Association and the ePolicy Institute 2008). In the sphere of circulation, online surveillance can be identified and classified into Internet surveillance of purchasing labour power in the stage of money capital (Background Checks, Employee Screening Services), Internet surveillance of purchasing means of production in the stage of money capital (Commercial Intelligence Program), and Internet surveillance of produced commodities in the stage of commodity capital (Intellectual Property Protection Services, Anti-Counterfeiting Investigations, Trademark Infringement and Passing-Off Investiga- 111 - A Critical Contribution to (Internet) Surveillance Studies tions, MarketWatch, Patent Investigations, Parallel Trade Investigations, Vendor Integrity Program). Although the importance of consumer data for target advertising is as old as the advertising business itself, commodification of privacy on the Internet to enable online target advertising has intensified and extended. In order to get an impression of Internet surveillance in the sphere of consumption, illustrative examples were given: Companies such as Alexa Internet, Quantcast, and Nielsen NetRatings undertake web analytics and report website traffic such as number of visitors and page views of a particular website or of a group of websites in order to enable comparisons and rankings. In addition, ad serving companies such as DoubleClick by Google collect personal data on many websites, sell this data, and support targeted advertising. Furthermore, Web 2.0 applications and social software sites such as Facebook, Twitter, MySpace, YouTube, and Blogger collect, analyze, and sell personal data in order to accumulate profit. In this context, Andrejevic (2007b, 313) speaks about “digital enclosure as a form of exploitation” and Fuchs (2010a; 2010b) about the “Internet prosumer/produsage commodity”. Finally, it is clarified how we can theorize and systemize surveillance in general and Internet surveillance in particular in the modern economy. As shown in this work, economical actors such as corporations use (Internet) surveillance in the spheres of production, circulation, and consumption. Corporations exercise violence in order to control a certain behaviour of people and in most cases people do not know that they are surveilled. Economical actors control the economic behaviour of people and coerce individuals in order to produce or buy specific commodities for guaranteeing the production of surplus value and for accumulating profit. Corporations and state institutions are the most powerful actors in society and are able to undertake mass-surveillance extensively and intensively, because available resources decide surveillance dimensions. To sum up: based on Gandy (1993, 230f.), Castells (2001, 182ff.), Parenti (2003, 207-212), Ogura (2006, 291ff.), Lyon (1994, 159-225; 2001, 126-140; 2007a, 159-178; 2007b, 368-377), Fuchs (2009, 115ff.), and Allmer (2011), some political recommendations can be drawn in order to overcome economic (online) surveillance: The first recommendations is that support is needed for critical privacy movements in order to develop counter-hegemonic power and advance critical awareness of surveil- - 112 - A Critical Contribution to (Internet) Surveillance Studies lance. “Such public awareness of surveillance issues could further be raised through professional groups and organizations, especially those directly concerned with computing, information management, and so on.” (Lyon 1994, 223) Furthermore, Lyon (2001, 127) states the importance of political activism by critical citizens: “Films, consumer groups, Internet campaigns and international watchdogs are just some of the ways that ongoing surveillance practices are brought to the surface of our consciousness, and thus overtly into the realm of ethical evaluation and political response.” According to Fuchs (2009, 116), “critical citizens, critical citizens’ initiatives, consumer groups, social movement groups, critical scholars, unions, data protection specialists/groups, consumer protection specialists/groups, critical politicians, critical political parties observe closely the relationship of surveillance and corporations and document instances where corporations and politicians take measures that threaten privacy or increase the surveillance of citizens”. In addition, it is recommended to support cyberactivism and “counter-surveillance” (Lyon 1994, 159) in order to surveil corporate surveillants or rather to watch the watchers. Parenti (203, 212) suggests civil disobedience, rebellion, and protest: “It will compel regulators to tell corporations, police, schools, hospitals, and other institutions that there are limits. As a society, we want to say: Here you may not go. Here you may not record. Here you may not track and identify people. Here you may not trade and analyze information and build dossiers.” A further recommendation is to create non-profit, non-commercial social networking platforms on the Internet such as Kaioo. Kaioo is owned by the non-profit organization OpenNetworX, has been available since 2007, and has currently about 30.000 users. Kaioo’s privacy terms are created in common and can be edited online by every user. In addition, the data belong to their users (cf. Kaioo). OpenNetworX can do so, because they are not interested in targeting advertising and they do not need to produce surplus value and to accumulate profit. - 113 - A Critical Contribution to (Internet) Surveillance Studies “To try to advance critical awareness and to surveil corporate and political surveillers are important political moves for guaranteeing civil rights, but they will ultimately fail if they do not recognize that electronic surveillance is not a technological issue that can be solved by technological means or by different individual behaviours, but only by bringing about changes of society.” (Fuchs 2009, 116) Therefore, Internet surveillance has to be put into the larger context of societal problems in public discourse. “We should look at the whole macro picture.” (Ogura 2006, 292) Finally, surveillance is caused by economical and political issues and is inherent in modern society. It is neither just a technical issue, nor an individual problem, but a societal problem. Surveillance in general and Internet surveillance in particular are crucial phenomena, but there are a lot of other features in contemporary society such as information, neoliberalism, globalization, and capital. - 114 - A Critical Contribution to (Internet) Surveillance Studies Bibliography Adorno W., Theodor, and Max Horkheimer. 2002. Dialectic of Enlightenment: Philosophical Fragments Stanford: Stanford University Press. Albrechtslund, Anders. 2008. Online Social Networking as Participatory Surveillance [cited 11.05.2010]. Available from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/ fm/article/view/2142/1949. Albrechtslund, Anders, and Lynsey Dubbeld. 2005. The Plays and Arts of Surveillance: Studying Surveillance as Entertainment. Surveillance & Society 3 (2/3): 216-221. Alder, Stoney, Marshall Schminke, Terry Noel, and Maribeth Kuenzi. 2008. Employee Reactions to Internet Monitoring: The Moderating Role of Ethical Orientation. Journal of Business Ethics 80 (3): 481-498. Alexa, Internet. [cited 12.05.2010]. Available from http://www.alexa.com. Allmer, Thomas. 2011. Towards a Critical Theory of Surveillance in Informational Capitalism. In The Internet & Surveillance, edited by C. Fuchs, K. Boersma, A. Albrechtslund and M. Sandoval. New York: Routledge (Publication forthcoming). American Management Association, and The ePolicy Institute. 2008. Electronic Monitoring and Surveillance 2007 Survey [cited 02.03.2010]. Available from http://www.amanet.org/training/seminars/2007-Electronic-Monitoring-andSurveillance-Survey-41.aspx. Andrejevic, Mark. 2002. The Work of Being Watched: Interactive Media and the Exploitation of Self-Disclosure. Critical Studies in Media Communication 19 (2): 230-248. ———. 2004. Reality TV: The Work of Being Watched. Lanham: Rowman & Littlefield Publishers. ———. 2007a. Ispy: Surveillance and Power in the Interactive Era. Lawrence: University Press of Kansas. ———. 2007b. Surveillance in the Digital Enclosure. The Communication Review 10 (4): 295 -317. Arvidsson, Adam. 2004. On the ‘Pre-History of the Panoptic Sort’: Mobility in Market Research. Surveillance & Society 1 (4): 456-474. ———. 2005. Brands: A Critical Perspective. Journal of Consumer Culture 5 (2): 235-258. Ball, Kirstie, and Frank Webster. 2003. The Intensification of Surveillance: Crime, Terrorism and Warfare in the Information Era. - 115 - A Critical Contribution to (Internet) Surveillance Studies Baudrillard, Jean. 2006. Simulacra and Simulation. Michigan: University of Michigan. ———. 2007. Forget Foucault. Los Angeles: Semiotext(e). Becker, Steffen, and Thomas Sablowski. 1997. Globalisierung und Krise des Fordismus. Zur Einführung. In Jenseits der Nationalökonomie? Weltwirtschaft und Nationalstaat wwischen Globalisierung und Regionalisierung, edited by S. Becker, T. Sablowski and W. Schumm. Berlin: Argument. Beniger, James. 1986. The Control Revolution. Technological and Economic Origins of the Information Society. Cambridge: Harvard University Press. Bigo, Didier. 2006. Security, Exception, Ban and Surveillance. In Theorizing Surveillance: The Panopticon and Beyond, edited by D. Lyon. Cullompton: Willan Publishing. ———. 2008. Globalized (In)Security: The Field and the Ban-Opticon. In Terror, Insecurity and Liberty: Illiberal Practices of Liberal Regimes after 9/11, edited by D. Bigo and A. Tsoukala. London: Routledge. Blanchette, Jean-François, and Deborah Johnson. 2002. Data Retention and the Panoptic Society: The Social Benefits of Forgetfulness. The Information Society 18 (1): 33-45. Bogard, William. 1996. The Simulation of Surveillance: Hypercontrol in Telematic Societies. Cambridge: Cambridge University Press. ———. 2006. Surveillance Assemblages and Lines of Flight. In Theorizing Surveillance. The Panopticon and Beyond, edited by D. Lyon. Cullompton: Willan Publishing. Boyne, Roy. 2000. Post-Panopticism. Economy and Society 29 (2): 285-307. Braverman, Harry. 1998. Labor and Monopoly Capital: The Degradation of Work in the Twentieth Century. New York: Monthly Review Press. Brown, Felicity. 2006. Rethinking the Role of Surveillance Studies in the Critical Political Economy of Communication. International Association for Media and Communication Research (IAMCR) Prize in Memory of Dallas W. Smythe, Cairo [cited 11.05.2010]. Available from https://www.iamcr.org/component/option,com_docman/ task,doc_download/gid,32/. Brown, Ian, and Douwe Korff. 2009. Terrorism and the Proportionality of Internet Surveillance. European Journal of Criminology 6 (2): 119-134. Campbell, John Edward, and Matt Carlson. 2002. Panopticon.com: Online Surveillance and the Commodification of Privacy. Journal of Broadcasting & Electronic Media 46 (4): 586-606. Carratu, International. [cited 11.05.2010]. Available from http://www.carratu.com/. - 116 - A Critical Contribution to (Internet) Surveillance Studies Castells, Manuel. 2001. The Internet Galaxy: Reflections on the Internet, Business, and Society. Oxford: Oxford University Press. Chomsky, Noam, and Michel Foucault. 2006. Human Nature: Justice vs. Power: A Debate between Noam Chomsky and Michel Foucault. In The Chomsky-Foucault Debate: On Human Nature, edited by N. Chomsky and M. Foucault. New York: New Press. Clarke, Roger. 1988. Information Technology and Dataveillance. Communications of the ACM 31 (5): 498-512. Cohen, Stanley. 1987. Visions of Social Control: Crime, Punishment and Classification. Cambridge: Polity Press. Coleman, Roy, and Joe Sim. 2000. ‘You’ll Never Walk Alone’: CCTV Surveillance, Order and Neo-Liberal Rule in Liverpool City Centre. The British Journal of Sociology 51 (4): 623-639. Dandeker, Christopher. 1990. Surveillance, Power, and Modernity: Bureaucracy and Discipline from 1700 to the Present Day. New York: St. Martin’s Press. Davidow, William, and Michael Malone. 1992. The Virtual Corporation: Structuring and Revitalizing the Corporation for the 21st Century. New York: Harpercollins. Deleuze, Gilles. 1988. Foucault. Minneapolis: University of Minnesota Press, 2006. ———. 1992. Postscript on the Societies of Control. October (59): 3-7. Deleuze, Gilles, and Félix Guattari. 1987. A Thousand Plateaus: Capitalism and Schizophrenia. Minneapolis: University of Minnesota Press. DoubleClick. [cited 13.05.2010]. Available from http://www.doubleclick.com. Elden, Stuart. 2003. Plague, Panopticon, Police. Surveillance & Society 1 (3): 240-253. Elmer, Greg. 1997. Spaces of Surveillance: Indexicality and Solicitation on the Internet. Critical Studies in Mass Communication 14 (2): 182-191. ———. 2003. A Diagram of Panoptic Surveillance. New Media Society 5 (2): 231-247. ———. 2004. Profiling Machines: Mapping the Personal Information Economy. Massachusetts: MIT Press. Fiske, John. 1998. Surveilling the City: Whiteness, the Black Man and Democratic Totalitarianism. Theory Culture Society 15 (2): 67-88. ———. 1999. Media Matters: Race and Gender in U.S. Politics. Minneapolis: University of Minnesota Press. Forbes. 2009. The Global 2000 [cited 11.05.2010]. Available http://www.forbes.com/lists/2009/18/global-09_The-Global-2000_Rank.html. - 117 - from A Critical Contribution to (Internet) Surveillance Studies Foucault, Michel. 1995. Discipline and Punish: The Birth of the Prison. New York: Vintage Books. ———. 2002. The Eye of Power: A Conversation with Jean-Pierre Barou and Michelle Perrot. In CTRL [Space] Rhetorics of Surveillance from Bentham to Big Brother, edited by T. Levin, U. Frohne and P. Weibel. Karlsruhe: ZKM Center for Arts and Media. ———. 2003. “Society Must Be Defended”: Lectures at the Collège De France, 1975-76. New York: Picador. ———. 2007. Security, Territory, Population: Lectures at the Collège De France, 19771978. New York: Palgrave Macmillan. Fuchs, Christian. 2001. Leben und Selbstorganisation im postfordistischen, neoliberalen und informationsgesellschaftlichen Kapitalismus [cited 23.04.2010]. Available from http://cartoon.iguw.tuwien.ac.at/christian/gesellschaft.html. ———. 2008. Internet and Society: Social Theory in the Information Age. New York: Routledge. ———. 2009. Social Networking Sites and the Surveillance Society: A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance. Salzburg: Research Group Unified Theory of Information. ———. 2010a. Class, Knowledge and New Media. Media, Culture & Society 32 (1): 141150. ———. 2010b. Labor in Informational Capitalism and on the Internet. The Information Society 26 (3): 179-196. Gandy, Oscar. 1993. The Panoptic Sort: A Political Economy of Personal Information. Boulder: Westview Press. ———. 2003. Data Mining and Surveillance in the Post-9/11 Environment. In The Intensification of Surveillance. Crime, Terrorism and Warfare in the Information Era, edited by K. Ball and F. Webster. London: Pluto Press. Giddens, Anthony. 1985. The Nation-State and Violence: Volume Two of a Contemporary Critique of Historical Materialism. Cambridge: Polity Press. ———. 1995. A Contemporary Critique of Historical Materialism. Stanford: Stanford University Press. Gill, Stephen 2003. Übermacht und Überwachungsmacht im globalen Kapitalismus. Das Argument (249): 21-33. Google. 2007. Press Center: Google to Acquire Doubleclick: Combination Will Significantly Expand Opportunities for Advertisers, Agencies and Publishers and Improve Users’ - 118 - A Critical Contribution to (Internet) Surveillance Studies Online Experience [cited 13.05.2010]. Available from http://www.google.com/intl/en/press/pressrel/doubleclick.html. ———. 2008. Press Center: Google Closes Acquisition of Doubleclick [cited 13.05.2010]. Available from http://www.google.com/intl/en/press/pressrel/20080311_ doubleclick.html. Graham, Stephen, and David Murakami Wood. 2003. Digitizing Surveillance: Categorization, Space, Inequality. Critical Social Policy 23 (2): 227-248. Gramsci, Antonio. 1992. Selections from the Prison Notebooks. New York: International Publishers. Gutting, Gary. 1998. Foucault, Michel (1926-84). In Routledge Encyclopedia of Philosophy. Volume 4, edited by E. Craig. London: Routledge. Haggerty, Kevin, and Richard Ericson. 2000. The Surveillant Assemblage. British Journal of Sociology 51 (4): 605-622. Hammer, Michael, and James Champy. 1993. Reengineering the Corporation: A Manifesto for Business Revolution. New York: HarperBusiness. Hewson, Martin. 1994. Surveillance and the Global Political Economy. In The Global Political Economy of Communication, edited by E. Comor. Basingstoke: Macmillan. Hier, Sean. 2003. Probing the Surveillant Assemblage: On the Dialectics of Surveillance Practices as Processes of Social Control. Surveillance & Society 1 (3): 399-411. ———. 2004. Risky Spaces and Dangerous Faces: Urban Surveillance, Social Disorder and CCTV. Social & Legal Studies 13 (4): 541-554. Hirsch, Joachim. 1995. Der nationale Wettbewerbsstaat. Staat, Demokratie und Politik im globalen Kapitalismus. Berlin: Edition ID-Archiv. Hope, Andrew. 2005. Panopticism, Play and the Resistance of Surveillance: Case Studies of the Observation of Student Internet Use in UK Schools. British Journal of Sociology of Education 26 (3): 359-373. Humphreys, Ashlee. 2006. The Consumer as Foucauldian “Object of Knowledge”. Social Science Computer Review 24 (3): 296-309. Imai, Masaaki. 1986. Kaizen (Ky’zen): The Key to Japan’s Competitive Success. New York: Random House Business Division. Jhally, Sut, and Bill Livant. 1986. Watching as Working: The Valorization of Audience Consciousness. The Journal of Communication 36 (3): 124-143. Kaioo. About Kaioo [cited 29.05.2010]. http://kaioo.com/toro/resource/html?locale=en#wiki.9. - 119 - Available from A Critical Contribution to (Internet) Surveillance Studies Kaye, Barbara, and Thomas Johnson. 2002. Online and in the Know: Uses and Gratifications of the Web for Political Information. Journal of Broadcasting & Electronic Media 46 (1): 54-71. Koskela, Hille. 2004. Webcams, TV Shows and Mobile Phones: Empowering Exhibitionism. Surveillance & Society 2 (2/3): 199-215. ———. 2006. ‘The Other Side of Surveillance’: Webcams, Power and Agency. In Theorizing Surveillance: The Panopticon and Beyond, edited by D. Lyon. Cullompton: Willian Publishing. Kroll. 2010. [cited 11.05.2010]. Available from http://www.kroll.com/. Krueger, Brian. 2005. Government Surveillance and Political Participation on the Internet. Social Science Computer Review 23 (4): 439-452. Levi, Michael, and David Wall. 2004. Technologies, Security, and Privacy in the Post-9/11 European Information Society. Journal of Law and Society 31 (2): 194-220. Lianos, Michalis. 2003. Social Control after Foucault. Surveillance & Society 1 (3): 412-430. Lyon, David. 1994. The Electronic Eye: The Rise of Surveillance Society. Minneapolis: University of Minnesota Press. ———. 1998. The World Wide Web of Surveillance: The Internet and Off-World PowerFlows. Information, Communication & Society 1 (1): 91-105. ———. 2001. Surveillance Society: Monitoring Everyday Life: Issues in Society Maidenhead: Open University Press. ———. 2003a. Cyberspace, Surveillance, and Social Control: The Hidden Face of the Internet in Asia. In Asia.Com: Asia Encounters the Internet, edited by K. C. Ho, R. Kluver and K. Yang. London: Routledge. ———. 2003b. Surveillance Technology and Surveillance Society. In Modernity and Technology, edited by T. Misa, P. Brey and A. Feenberg. Cambridge: MIT Press. ———. 2003c. Surveillance after September 11. Cambridge: Polity Press. ———. 2007a. Surveillance Studies: An Overview. Cambridge: Polity. ———. 2007b. Resisting Surveillance. In The Surveillance Studies Reader, edited by S. Hier and J. Greenberg. Maidenhead: Open University Press. Mann, Steve, Jason Nolan, and Barry Wellman. 2003. Sousveillance: Inventing and Using Wearable Computing Devices for Data Collection in Surveillance Environments. Surveillance & Society 1 (3): 331-355. Marx, Gary. 1988. Undercover: Police Surveillance in America. Berkeley: University of California Press. - 120 - A Critical Contribution to (Internet) Surveillance Studies ———. 2002. What’s New About the “New Surveillance”? Classifying for Change and Continuity. Surveillance & Society 1 (1): 8-29. Marx, Karl. 1973. Grundrisse. London: Penguin. ———. 1992. Capital: A Critique of Political Economy: Volume Two. London: Penguin. ———. (MEW 23). 2005. Das Kapital: Kritik der politischen Ökonomie: Erster Band: Der Produktionsprozeß des Kapitals. Berlin: Dietz. Marx, Karl, and Friedrich Engels (MECW 28). 1986. Collected Works: Volume 28. New York: International Publishers. Mathiesen, Thomas. 1997. The Viewer Society: Michel Foucault’s ‘Panopticon’ Revisited. Theoretical Criminology 1 (2): 215-234. Mehta, Michael, and Eric Darier. 1998. Virtual Control and Disciplining on the Internet: Electronic Governmentality in the New Wired World. The Information Society 14 (2): 107116. Microreviews. 2009. Google-Doubleclick [cited 13.05.2010]. Available from http://microreviews.org/files/2009/10/google-doubleclick.gif. Miller, Seumas, and John Weckert. 2000. Privacy, the Workplace and the Internet. Journal of Business Ethics 28 (3): 255-265. Murakami Wood, David. 2009. Situating Surveillance Studies. Surveillance & Society 6 (1): 52-61. Norris, Clive, and Gary Armstrong. 1998. Introduction: Power and Vision. In Surveillance, Closed Circuit Television and Social Control, edited by C. Norris, J. Moran and G. Armstrong. Aldershot: Ashgate Publishing. ———. 1999. The Maximum Surveillance Society: The Rise of CCTV. Oxford: Berg. Ogura, Toshimaru. 2006. Electronic Government and Surveillance-Oriented Society. In Theorizing Surveillance. The Panopticon and Behind, edited by D. Lyon. Portland: Willan Publishing. Orwell, George. 2004. Nineteen Eighty-Four. Fairfield: 1st World Library. Parenti, Christian. 2003. The Soft Cage: Surveillance in America: From Slavery to the War on Terror. New York: Basic Books. Poster, Mark. 1990. The Mode of Information: Poststructuralism and Social Context. Cambridge: Polity Press. Pryor, Benjamin. 2006. Foucault, Michel (1926-1984). In Encyclopedia of Philosophy. Volume 3, edited by D. Borchert. Detroit: Thomson Gale. - 121 - A Critical Contribution to (Internet) Surveillance Studies Robins, Kevin, and Frank Webster. 1999. Times of Technoculture: From the Information Society to the Virtual Life. London: Routledge. Rule, James. 1973. Private Lives and Public Surveillance: Social Control in the Computer Age. New York: Schocken Books. ———. 2007. Privacy in Peril. How We Are Sacrificing a Fundamental Right in Exchange for Security and Convenience. Oxford: Oxford University Press. Searle, Rosalind. 2006. New Technology: The Potential Impact of Surveillance Techniques in Recruitment Practices. Personal Review 35 (3): 336-351. Sewell, Graham, and Barry Wilkinson. 1992. ‘Someone to Watch over Me’: Surveillance, Discipline and the Just-in-Time Labour Process. Sociology 26 (2): 271-289. Simon, Bart. 2005. The Return of Panopticism: Supervision, Subjection and the New Surveillance. Surveillance & Society 3 (1): 1-20. Smythe, Dallas. 2006. On the Audience Commodity and Its Work. In Media and Cultural Studies: Keyworks, edited by M. G. Durham and D. Kellner. Oxford: Blackwell Publishing. Soanes, Catherine, and Angus Stevenson. 2005. Surveillance. The Oxford Dictionary of English [cited 11.05.2010]. Available from http://www.oxfordreference.com/pub/ views/home.html. Stalder, Felix, and Christine Mayer. 2009. The Second Index: Search Engines, Personalization and Surveillance. In Deep Search: The Politics of Search Beyond Google, edited by K. Becker and F. Stalder. Wien: Studienverlag. Stanton, Jeffrey, and Elizabeth Weiss. 2000. Electronic Monitoring in Their Own Words: An Exploratory Study of Employees’ Experiences with New Types of Surveillance. Computers in Human Behavior 16 (4): 423-440. Taylor, Frederick Winslow. 2003. The Early Sociology of Management and Organizations: Volume I: Scientific Management: Comprising: Shop Management, the Principles of Scientific Management, Testimony before the Special House Committee. London: Routledge. Turow, Joseph. 2005. Audience Construction and Culture Production: Marketing Surveillance in the Digital Age. The ANNALS of the American Academy of Political and Social Science 597 (1): 103-121. ———. 2006. Cracking the Consumer Code: Advertising, Anxiety and Surveillance in the Digital Age. In The New Politics of Surveillance and Visibility, edited by K. Hagerty and R. Ericson. Toronto: University of Toronto Press. - 122 - A Critical Contribution to (Internet) Surveillance Studies Turow, Joseph, and Michael Hennessy. 2007. Internet Privacy and Institutional Trust: Insights from a National Survey. New Media Society 9 (2): 300-318. Vaz, Paulo, and Fernanda Bruno. 2003. Types of Self-Surveillance: From Abnormality to Individuals ‘at Risk’. Surveillance & Society 1 (3): 272-291. Wall, David. 2003. Mapping out Cybercrimes in a Cyberspatial Surveillant Assemblage. In The Intensification of Surveillance: Crime Terrorism and Warfare in the Information Age, edited by F. Webster and K. Ball. London: Pluto Press. ———. 2006. Surveillant Internet Technologies and the Growth in Information Capitalism: Spams and Public Trust in the Information Society. In The New Politics of Surveillance and Visibility, edited by K. Haggerty and R. Ericson. Toronto: University of Toronto Press. Webster, Frank, and Kevin Robins. 1993. ‘I’ll Be Watching You’: Comment on Sewell and Wilkinson. Sociology 27 (2): 243-252. Williams, Katherine, and Craig Johnstone. 2000. The Politics of the Selective Gaze: Closed Circuit Television and the Policing of Public Space. Crime, Law and Social Change 34 (2): 183-210. Winseck, Dwayne. 2003. Netscapes of Power: Convergence, Network Design, Walled Gardens, and Other Strategies of Control in the Information Age. In Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, edited by D. Lyon. London: Routledge. Wise, Macgregor. 2004. An Immense and Unexpected Field of Action – Webcams, Surveillance and Everyday Life. Cultural Studies 18 (2-3): 424-442. Womack, James, Daniel Jones, and Daniel Roos. 1991. The Machine That Changed the World: The Story of Lean Production: How Japan’s Secret Weapon in the Global Auto Wars Will Revolutionize Western Industry. New York: Harper Perennial. Zuboff, Shoshana. 1988. In the Age of the Smart Machine: The Future of Work and Power. Oxford: Heinemann Professional Publishing. Zureik, Elia. 2003. Theorizing Surveillance: The Case of the Workplace. In Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination, edited by D. Lyon. London: Routledge. Zwick, Detlev, and Janice Denegri Knott. 2009. Manufacturing Customers: The Database as New Means of Production. Journal of Consumer Culture 9 (2): 221-247. - 123 -