Академический Документы
Профессиональный Документы
Культура Документы
Abstract
Kate Crawford has recently suggested that the everyday lived experience of big data is one of
surveillant anxiety: the fear that the personal information that individuals disclose about
themselves and that others generate about them is intercepted and analyzed by the intelligence
services within emergent praxes of pervasive dataveillance. I empirically assess this notion of
surveillant anxiety in the context of spatial big data. Drawing on the results of a small-scale
survey of understandings of location data collection and dissemination via mobile devices and
their contextualization against other available data, I demonstrate that individuals are seemingly
more concerned with transparency in data collection and in controlling flows of personal spatial
information about themselves than they are with practices of data capture or their eventual
use(s). Rather than a generalizable societal condition of surveillant anxiety, I argue that the
realities of living in a (spatial) big data present are better characterized in terms of what I designate
as anxieties of control: the desire to discern (be aware of) and direct (determine the
disclosure of) personal spatial big data flows about oneself while feeling that any attempt at
exerting such control is effectively futile.
Keywords
Big data, location, surveillance, anxiety, control
Introduction
The disclosures made public by the release of classied intelligence documents by Edward
Snowden beginning in June 2013 are revelatory of the ways in which emergent regimes of
state-sponsored surveillance are crystallizing around big data. The publication of these les
in leading global press media outlets has informed the public of the extent to which the
securities services of the Five Eyes alliance1 are organizing a series of signals intelligence
activities predicated on the mining, interception, and analytics of vast swaths of personal
data. A recent Pew study found that only 6% of Americans surveyed had not heard anything
about data-centric signals intelligence programs involving practices such as the ubiquitous
sweep of communications metadata and the monitoring of internet use (Shelton et al., 2015).
In light of broad public awareness of these practices, individuals must reconcile with
Corresponding author:
Agnieszka Leszczynski, School of Environment, University of Auckland, Private Bag 92019, Auckland 1142, New Zealand.
Email: agnieszka.leszczynski@auckland.ac.nz
966 Environment and Planning D: Society and Space 33(6)
spatial big data particularly valuable to corporate entities, law enforcement, and the
securities agencies. While it is dicult to meaningfully separate state from corporate
practices of data production, capture, repurposing, and correlation through analytics
(see Brown, 2013), I give analytical precedence to the state for two important reasons.
First, state dataveillance practices increasingly depend on data produced and stored by
corporate entities and/or generated through quotidian uses of their products (applications,
services, and devices). The securities agencies procure these data through legal requests
served to private enterprises such as data rms, interception of this data (tapping of ber-
optic cables, but also through piggybacking o of mobile and Internet cookies and
mandating spyware be built into hardware), and via attempts at breaking encryption
rmware.5 The nature of this relationship, however, is not reciprocal (i.e., does not ow
from the state to corporate entities). Second, while corporate practices of big data
production and analytics have not gone unreported, the piecemeal media coverage of
corporate data-driven surveillance pales in comparison to the concerted, longitudinal, and
consistent traction that the Snowden revelations have had and continue to have in the press.
As such, if anxieties around surveillance are born of public knowledge of big data practices
to track and digitally dis/assemble individuals as per Crawford (2014), then the anxieties to
which she refers, where they may be evidenced to arise, likely do so from public knowledge
of state surveillance activities rather than that of corporate actors.
As locational information is coming to gure centrally within the securities agencies
emergent surveillance rationalities, it represents an ideal context for empirically examining
whether individuals connect (spatial) big data productions about themselves to the
dataveillance practices of the intelligence services. In this paper, I empirically assess the
notion of surveillant anxiety by synthesizing the results of several publicly available
polls and surveys gauging public responses to locational tracking and data collection.
Against this background, I present the results of a small-scale pilot study I conducted
gauging individuals perceptions of and quotidian practices around the tracking and
disclosure of their locational information through mobile devices. Respondents to myriad
surveys do express a general level of concern about the ubiquitous sweep of personal
locational information enabled by app, services, and devices. However, these concerns,
rather than being articulated in terms of the uses of the data within analytics regimes tend
instead to be application (app) and device specic. I argue that surveillant anxiety may not
be discerned on the basis of empirical evidence as a generalized societal condition in
Crawfords (2014) formulation of pervasive apprehension about the operationalization of
personal locational data to structure individuals daily lives by positioning them as spatially
vulnerable in particular ways. However, the stark realities of the pervasive generation,
collection, capture, and repurposing of personal (locational) data via largely mobile
digital platforms and devices do provoke highly individualized anxieties of controlof
individuals desiring to determine and direct the ow of personal locational data about
themselves while simultaneously realizing that any attempt to exert such control is
eectively futile.
more information beyond that contained within piecemeal data themselves by forming
linkages between data events. This has consequences not only for privacy but also
governance, with increasing attention being given to the ways in which big data signies
pronounced changes in the status and function of information in society. Emergent modes of
governance predicated on the securitization of everyday life are part and parcel of broader
trends toward the algorithmic management of persons, places, and behaviors through data
practices such as predictive analytics (Couldry and Powell, 2014; Crampton, 2014; Kitchin,
2014a, 2014b; Kitchin and Lauriault, 2014; Klauser and Albrechtslund, 2014; Lyon, 2014).
Abilities to algorithmically discern, address, and shape ever more intimate aspects of daily
life depend on the availability of vast, continuous reams of highly personal data that
represent a near real-time snapshot of an individuals movements, activities at specic
locations, relationships and aliations, political beliefs, and even mood (sentiment).
Of the kinds of personal information that are generated, intercepted, and appropriated by
the securities services, personal locational data are one of the most sought after. The
Snowden les extensively evidence this. 2010 documents reveal that the National Security
Agency (NSA) and Government Communications Headquarters (GCHQ) exploit
weaknesses in leaky mobile social and gaming applications that veil secondary data
mining operations behind primary interfaces, piggybacking o of commercial data
collection by syphoning up personal information including contacts (social graph), device
information, age of users, and location (Ball, 2014; Glanz et al., 2014; Soltani and Gellman,
2013a; Soltani et al., 2013; Yadron, 2014). Here, the national securities services intercept
personal data in real time, using this data to actively track users under a signals intelligence
program code named Tracker Smurf after the childrens animated classic (Ball, 2014). In a
series of GCHQ-produced slides (also 2010), the agency highlights that at the time, there
were over 200 third-party location aware apps available for the iPhone alone.6 The so-
called Mobile Applications Project detailed in these documents aimed to provide target-
centric converged analysis of voice, text, and location data. In a set of complementary slides
produced by the NSA, emphasis is likewise given to capturing and processing locational data
emanating from mobile devices.7 Specically, the slides stress the ways in which locational
data oozing from both apps and devices can be used to track persons of interest and in doing
so allow analysts to answer the question, Where is the target? It points out that Android
devices pass GPS data in the clear and gives prominence to mining geodata from raw
geotags, specically that embedded as metadata in natively geotagged photos uploaded to
social photo-sharing sites online. A perfect scenario is identied as consisting of a [t]arget
uploading photo [sic] to a social media site taken with a mobile device. As GPS traces are
sent to both carriers/network providers (stored on their servers) and towers/receivers, the
agency proclaims the resulting ability to geo[locate] phones from virtually anywhere.
These two documents reveal that the mining and capture of locational data are not
incidental to the capture of other personal information. Rather, the emphasis given to
geo identies location to be one of the direct, primary objectives of data interception
because of the kinds of questions it allows the agencies to answer, for example, Where
was my target when they did this? and Where is my target going? (Glanz et al., 2014).
Soltani and Gellman (2013a) have identied at least 10 American signals intelligence
programs (or SIGADS; Signals Intelligence Activity Designators) that explicitly sweep up
location data. Under the auspices of a SIGAD-designated HAPPYFOOT, the NSA taps
directly into mobile app data trac that streams smartphone locations to location-based
advertising networks organized around the delivery of proximately relevant mobile ads
(Soltani and Gellman, 2013a). This locational data, which is often determined through
mobile device GPS capabilities, are far higher resolution than network location, allowing
Leszczynski 969
the NSA to map Internet addresses to physical locations more precisely than is possible
with traditional Internet geolocation services (Soltani et al., 2013).
The utility of intercepting real-time ows of personal locational data is not simply that it
allows for the tracking of known persons/persons of interest, but it is furthermore central to
target development. The NSA analytics suite CO-TRAVELER consists of a myriad of
analysis techniques for bulk processing cellular network location data, of which the NSA
collects ve billion records a day8 worldwide (Soltani and Gellman, 2013a, 2013b). The
objective of these analytics tools is to identify (new) targets for surveillance based on
location behaviors they exhibit, regardless of whether or not they were previously a
suspect (Soltani and Gellman, 2013a, no page). This analytics suite has been designated
co-traveller because it allows for the identication of co-presenceindividuals who may
be shown, by virtue of their mobile position, as being within the vicinity of an existing target,
particularly if the sweep of data reveals that their mobiles have pinged of more than one of
the same locations as that of an existing target. This may be seen as suspicious and reason
enough to enroll this co-traveler as a surveillance target in their own right. This approach
to target development, only possible given the indiscriminate sweep of personal locational
data, is premised on incidental data capture of potentially all individuals, not only foreign
nationals and/or suspects abroad but also citizens domestically.
In a related practice, through a SIGAD code named LEVITATION, the Canadian
Communications Security Establishment (CSE) intercepts data cable trac to monitor up
to 15 million le downloads a day in an attempt to identify political and religious extremists
and potential terrorists (Gallagher and Greenwald, 2015; Hildebrandt et al., 2015). This is
informed by a hypothesis that (potential) extremists may be located (or identied as having
been present at a particular location at the time of upload/download) on the basis of global
IP addresses. Particularly signicant in this CSE document,9 marked as shareable with other
Five Eyes members, is that the CSE explicitly states that it is looking to location data to
improve LEVITATION capabilities for intercepting both GPS waypoints and [d]evices
close to places so as to further isolate and develop surveillance targets, including those
carrying and using devices within proximity of designated locations. Several months prior,
the CSE was also revealed to have been tracking the locations of both Canadians and foreign
travelers via Wi-Fi at major Canadian airports for up to two weeks after passing through the
airports and subsequent nodes including other airports, urban Wi-Fi hotspots, transport
hubs, major hotels and conference centers, and even public libraries both within Canada and
abroad (Weston et al., 2014).10 The documents indicate that this program represents a new
analytics approach to detecting erratic or anomalous spatial behavior based on registered
locational signals and the tracking of both known and potential targets across international
borders (Weston et al., 2014).
The value of location in personal data ows is not simply that it designates position or
proximity. What makes spatial meta/data of particular interest to the securities apparatuses
is that these data are not standalone locational data events, but are rather spatiotemporal and
spatialrelational in nature. In other words, what is important about the coincidence of time
and location is that it allows for the monitoring of not only individuals positions but also
their movements (Kitchin, 2014a). Equally importantly, individuals movements and
behaviors in, through, and across space may subsequently be correlated with known or
inferred aliations, sentiments, and political associations.
These practices of the indiscriminate capture, interception, and mining of spatiotemporal/
spatialrelational data such as that evidenced in the select activities of the Five Eyes
securities agencies proled above are signicant in that they extend potentials for making
persons spatially vulnerable in dierent ways. For example, if an individuals mobile device
970 Environment and Planning D: Society and Space 33(6)
pings o of the same cell towers in the same succession as that as a known target of
surveillance, do they become designated a co-traveler? Is this data further correlated
with other variables such as gender, race, ethnic background, and religious aliation,
which position certain kinds of bodies as more likely to be ensnared within the location-
tracking dragnet? If an individual frequently connecting from Canadian airports
demonstrates a pattern of taking longer than average to transit through the spaces of
these transit hubs, and moves on to stay in hotels in specied parts of the world, does
this likewise render them a developable target for continuous locational and behavioral
monitoring and surveillance? How it is that location (both spatiotemporal and spatial
relational data) comes to actually enter into ows of intimate, revealing information about
individuals is the subject of the next section.
location oriented or enable some degree of intractivity on the basis of real-time position,
individuals may be involved in generating locational information about themselves through,
for example, enabling the automated geotagging of content shared across social platforms
(such as geocoded Tweets and Instagrams), using navigation services such as Waze that
collect user mobility data to inform the picture of the real-time trac patterns and route
users around zones of congestion, or using explicitly geosocial services such as Swarm and
Highlight that continuosly harness the locational aordances of smartphones so as to foster
interaction with content or other users. The networked nature of social and mobile platforms
enables not only the voluntary generation of personal locational information about oneself
but also allows people to share information about others (Marwick and boyd, 2014; Ricker
et al., 2014).
As per Ricker et al. (2014), the collection of locational data and its subsequent disclosure
to other parties is an interceonnected cyclical process making it dicult to distinguish when
and where each act [of data collection, disclosure, access, etc.] begins and ends (no page).
The networked ecology of big data productions means that user-generated locational
informationwhether about oneself or about othersis easily repurposed by third parties
that tap into these data ows beyond the platforms of native information contribution. Yet
the amount of locational information that users freely generate about themselves or others
pales in comparison to the volumes of locational data generated or captured about them
by myriad sensors, their devices themselves, and, most notably, corporate entities
(The White House, 2014a: 2). This includes the logging of personal positional data
through apps where location is entirely peripheral to the purpose of the service. Twitter
for instance accesses mobile device location so as to autogeotag Tweets where users have
enabled this feature; here, location is central to the functionality of this aordance of the
application. In contrast, for music services such as Pandora that access the locational utilities
of the devices on which they are deployed, location is not necessary to the functionality of
the platform in any way.
beyond blanket privacy or total publicity (Elwood and Leszczynski, 2011; Marwick, 2013b).
Even where engineered into platforms, these mechanisms are failure prone, as evidenced by
highly publicized security breaches aecting multiple services and operating systems.12
Moreover, these mechanisms tend to be platform specic, meaning that individuals may
only (attempt to) control the ow of their locational information at the level of individual
devices, applications, and services.
While most privacy violations are still experienced as being highly individual (see Solove,
2006 for a taxonomy), privacy itself is being relocated beyond the individual to the level of
the network (Marwick and boyd, 2014). This means that individual senses of privacy harm,
where experienced, are intimately bound up with the interconnected, interoperable, and
relational nature of devices and data that make the establishment of correlations across
information ows central to big data practices possible. It is not only the integrity of
information disclosure that is collapsed in a networked data ecology. In a data-driven
age where sexual orientation may be discerned on the basis of patterns in the kinds of ads
that an individual clicks on within Facebook13 rather than personal disclosure, the material,
and metaphorical separation between the self, the state, and society that Cohen (2012)
argues is essential for the kinds of identity formation and freedom of expression on which
the functioning of democracy depends is likewise narrowed and/or eliminated. In this rapidly
changing privacy context, individuals work to exercise control over personal data ows in an
attempt to mediate, and maintain the integrity of, disclosure. Big data implicate privacy
violations around disclosure because despite of their fragmented, piecemeal nature, their
inherent relationality allows for more information than that contained within any one data
event to be generated through the establishment of correlations across data streams through
analytics (boyd and Crawford, 2012; Crawford and Schultz, 2014).
Much of the research about how individuals work to negotiate privacy in this networked
context has focused on strategies enacted vis-a-vis dominant social platforms such as
Facebook and Twitter (see, e.g., boyd, 2014; Marwick, 2013a; Marwick and boyd, 2014;
Shelton et al., 2015). This is reasonable, given that digital practices tend to coalesce around
populist platforms and services, and network eects make dislodging dominant platforms
dicult (Graham and Shaw, 2015). But because the capture of personal locational data is
comparatively more complex and occurs across a variegated array of contexts, the
identication and development of practices meant to control how individual locational
information is abstracted into spatial big data ows is comparatively much more dicult.
The irreducibility of personal locational data ows to singular or unique devices, platforms,
applications, services, or situational contexts complicates the fashioning of practices and
devising of strategies for concealing, obscuring, or avoiding leaving behind locational traces.
The complexity of locational information generation, capture, disclosure, and
repurposing does not, however, correspond to a lack of awareness on the part of
individuals about spatial data generation, collection, and repurposing. Participants in a
recent study evaluating how mobile users value their PII identied location as the most
sensitive and valued form of PII (Staiano et al., 2014). This echoes the results of a UK
study in which respondents (n 1254) identied location as being one of the forms of PII
that they were least willing to share with mobile apps (TRUSTe Inc., 2013). Whereas, over
30% of participants identied that they would consent to share their gender, email address,
and full name with mobile applications, only eight would grant an app permission to access
their devices location utilities. Elsewhere, 52% of respondents (n 1500) to a survey
commissioned by Microsoft (2011) across ve countries14 expressed strong concern with
having their locational information shared with other persons and/or corporate
organizations. While generally respondents indicated being more concerned with their
Leszczynski 973
locational data being disclosed to organizations than other individuals (Microsoft, 2011), a
2010 Webroot survey of 1500 Americans using social media on mobile devices found that
concerns about other persons having access to personal locational information are
nevertheless very real: 32% of males and 59% of female respondents expressed being
very worried about the potentials of their locational information being used by another
individual to stalk them (Sass, 2010).
User awareness of the collection and disclosure of personal locational data may also be
evidenced in practices and activities enacted around applications as well as the mobile
devices on which they run. According to the most recent Pew report on location-based
services (Zickuhr, 2013), 35% of US adult smartphone owners reported having at one
point or another turned o location-tracking features on their mobile device as a result of
privacy concerns. Similarly, 46% of American teenaged mobile app users indicated having at
some instance turned o the location tracking feature either of their device or within a
specic app (Madden et al., 2013). In the aggregate, the results of these studies evidence
sensitivity to locational privacy15 as a present concern among a noninsignicant proportion
of mobile device users. The question that remains, however, is whether these concerns with
locational privacy are indicative of surveillant anxiety as a generalized societal response to
state-sponsored and enacted (geo)surveillance.
70 68.8%
66.7%
60
50
40
31.3% 31.33%
30
20
10
6.2%
0
I am trying to I do not want I do not want I am worried Other.
save battery the applications my cell phone about my
power. on my device to carrier/network location being
have access to provider having tracked.
have access to access to my
my exact exact location.
location.
Figure 1. When you intentionally disable (turn off) the GPS on your mobile device, what are your reasons
for doing so?
not an expression of concern with intelligence and law enforcement agencies gaining access
to this data and actively enrolling it within analytics approaches to geosurveillance.
35
concern with
network providers
30
Percentage of Respondents
having access
25
15
concern with data being
passed to law enforccement
and government ag encies
1 2 3 4 5
not at all somewhat very
concerned concerned concerned
Figure 2. Degree of concern with select entities having access to personal locational data collected via
mobile devices.
In a study of locational privacy conducted by Ricker et al. (2014), the researchers indicate
that users are generally aware that governments [and] unwanted watchers . . . have the
ability to infringe on their privacy through the use of other smartphone services
(no page). Yet, while awareness of such practices is high, a very low proportion (only
25%) of participants feared the government actually possessed their locational
information (Ricker et al., 2014). Americans privacy strategies post-Snowden reported on
by the Pew are similarly indicative of broad ambiguity, rather than generalizable societal
anxiety, regarding government dataveillance practices (Shelton et al., 2015). This is
discernible in the degree of concern reported with regard to government monitoring of
data and electronic communications. When asked broadly about their level of concern
with such practices, the large share of respondents indicated being either somewhat (35%)
or not very (22%) concerned with such practices (Shelton et al., 2015). When prompted
with more specicity about particular dataveillance practices, such as state monitoring of
email, social media, and mobile apps, expressions of concern were even more subdued, with
only 29% of participants responding that they were either very or somewhat concerned
with government surveillance of their own personal mobile application data and use (Shelton
et al., 2015). At the level of applications and devices, however, there is evidence of
heightened concern: 39% of Americans surveyed reported that they never (11%) or
hardly ever (28%) allowed mobile apps to access their location.
This apparent disconnect between general ambiguity around state dataveillance practices
on the one hand, and stronger sentiments around spatial data privacy at the level of
applications and devices on the other may be contextualized vis-a-vis the results of a
public survey conducted as part of the 90-day review of big data and privacy
Leszczynski 977
Anxieties of control
Control anxiety meaningfully captures the device- and application-centric nature of
apprehensions of living in a big data present. I suggest that it arises around locational
information because of the lack of control over the interception, mining, repurposing, and
disclosure of this information that results from the indiscriminate, platform independent,
and pervasive nature of contemporary modes of geosurveillance. This makes dening or
delimiting the context in which personal locational data are captured, passed on to others, or
repurposed beyond the primary hardware/software objects of initial data collection within
networked information ecologies practically unfeasible (Kitchin, 2014a; Marwick and boyd,
2014; Nissenbaum, 2010). This complicates the enactment of strategies or practices for
mitigating where and when locational traces are generated, left, or surreptitiously
intercepted. As Soltani and Gellman (2013b) argue, the ability of the surveillance
978 Environment and Planning D: Society and Space 33(6)
the distance between individuals, their data, and the uses of these data, Shklovski et al.
(2014) assert that it is very dicult for individuals to foresee deleterious eects arising
from the capture, interception, disclosure, and repurposing of personal information for
two primary reasons. First, most individuals have never actually experienced the negative
implications of having their spatial behaviors, activities, and patterns analyzed. Even if they
were identied as a person of interest to develop as a target for surveillance based on the
analytics and cross correlation of spatial behaviors, they would likely be unaware of this
reality in the early stages. Second, individuals experience great diculty anticipating any
negative consequences of being abstracted into spatial big data ows because often, there
are too many variables to consider (Shklovski et al., 2014: 2354). As demonstrated in this
paper, this is particularly true of locational tracking and monitoring because the capture,
interception, and registration of locational signals and data occur across contexts, material
spaces, landscapes, platforms, devices, and applications and services.
Conclusion
Rather than a discernible sweeping societal condition of generalized anxiety provoked by the
public disclosures of the scope and nature of dataveillance theorized by Crawford as
surveillance anxiety, in this paper, I have demonstrated that available data evidences
societal apprehensions around big data to be manifesting in terms of anxieties of control
articulated at the level of devices, services, and applications. Surveillance and control are,
however, intimately related. The liquidity of seamless, everywhere, and all-the-time data-
centric surveillance (Bauman and Lyon, 2013), such as that characteristic of the highly
publicized signals intelligence activities of the Five Eyes securities services, implicates
anxieties that are realized as concerns vis-a-vis control that I have framed as control
anxiety. In other words, even though there is apparent ambiguity around state-
sponsored dataveillance practices, device- and application-centric anxieties of control must
be understood as a response to the eects of the intensifying organization of surveillance
around big data productions and analytics, if not to mass surveillance itself. For example,
the lack of transparency that is necessary to maintain state secrecy in requests for personal
data (see Crampton, 2014) does not beget expressions of societal concern with what the
government will do with such data once it is accessed and/or acquiredwhether these will be
fed into locational data-centric analytics suites under eponymous SIGADs such as Tracker
Smurf, for example. Rather, these concerns are expressed in terms of anxieties around
potential privacy harms of exclusion that individuals try to forestall by attempting to
control personal data ows about themselves at sourcei.e., at the level of devices,
applications, and services. Hardware/software is the nadir of correspondenceand
coincidencebetween personal identity (what is disclosed about oneself) and personal
data (abstraction of identity), coalescing. . . information into a single, personal object[s]
(Silverman, 2015: no page).
As per Brown (2013), [t]he most fundamental impact surveillance has on identity is that
it reduces individuals control over the information they disclose about their attitudes in
dierence social contexts (p. 7). Alternatively stated, pervasive, exhaustive, and continuous
dataveillance practices commensurate with networked information ecologies result in what
Marwick and boyd (2011) term context collapse whereby the integrity of personal data
ows can no longer be functionally maintained. Control over personal identity is of critical
importance to not only democracy (Cohen, 2012) but also to quotidian social interaction in
that managing information owi.e., maintaining contextual integrityis fundamental to
regulating and indeed sustaining social relationships (Brown, 2013). Disclosure is a basis of
980 Environment and Planning D: Society and Space 33(6)
trust in intimate relationships (Brown, 2013); conversely, the ability to withhold information
is often important in conict resolution (Brown, 2013). Managing identity through partial
disclosure is furthermore essential to gaining access to life opportunities (e.g., not being
discriminated against in hiring practices).
The amenability of technically mediated social interaction to liquid data interception,
monitoring, and analytics practices such as those bound up with emergent forms of
continuous, pervasive, exhaustive, and extensive state-sponsored geosurveillance present
serious complications for managing identity in networked data ecologies (Brown, 2013).
In the context of spatial big data, anxieties of control are provoked not only by the
inability to maintain the integrity of data ows but indeed also by the diculty of
identifying the very contexts of locational data capture, interception, generation, registry,
and leakage across devices, applications, platforms, landscapes, and environments.
Individuals are reconciling with a quotidian reality in which data have become, as per
Taylor et al. (2014: 1), entirely ordinary presences in the practices and spaces of
everyday life by attempting to controldiscern and directows of spatial big data
about themselves.
Acknowledgments
I am grateful for the thoughtful reections and feedback of members of the Surveillance Studies Centre
at Queens University, to whom I presented a working version of the ideas expressed herein.
Funding
This research was generously supported by a SSHRC Postdoctoral Researcher Award (756-2012-0031).
Notes
1. The intelligence apparatuses of the UK (Government Communications Headquarters; GCHQ),
the United States National Security Agency (NSA), and the intelligence branches of Canada (CSE;
Communications Security Establishment Canada), Australia, and New Zealand.
2. I intend a broad definition of everyday life consistent with what Amin and Thrift (2002) refer to
as that which is familiar[:] the lived experience of spatiality and temporality; the force of
embodiment; the manifestation of subjectivity, affect, and desire; the importance of the event;
[and] the ethico-aesthetic movement of encounter p. 94.
3. After Thatcher (2014).
4. Originally attributable to Clarke (1988), dataveillance is defined as surveillance enacted
through the processing and analyzing of data records (Kitchin, 2014b: 15).
5. Very recently, for example, it was made known that the CIA had invested in research to break and
ultimately infiltrate Apples iOS (mobile-operating system) encryption (Scahill and Begley, 2015).
6. Mobile Themed Briefing, accessed via The New York Times, http://www.nytimes.com/
interactive/2014/01/28/world/28mobile-annotateB.html
7. Converged Analysis of Smartphone Devices: Identification/Processing/TaskingAll in a days
work, accessed via The New York Times, http://www.nytimes.com/interactive/2014/01/28/world/
28mobile-annotateA.html
8. This designates five billion individual pings off of a cellular network tower, rather than the
exhaustive locational records of five billion persons per day.
9. Levitation and the FFU Hypothesis, CSE document, no date. Accessed via CBC News, http://
www.cbc.ca/news/canada/cse-tracks-millions-of-downloads-daily-snowden-documents-1.2930120
10. IP Profiling Analytics & Mission Impacts, CSE document dated 2012. Accessed via CBC News,
http://www.cbc.ca/news2/pdf/airports_redacted.pdf
Leszczynski 981
11. This is a network access point that communicates with a Wi-Fi-enabled device but does not
actually allow access to any usable network (i.e., does not provide Internet connectivity).
12. A notorious example is the Locationgate scandal that unfolded in 2011 when researchers
discovered that Apple devices running versions of iOS 4 were collecting and storing up to a
years worth of time-stamped, highly granular location data in an unencrypted file within iOS
itself, even where users had intentionally disabled Location Services on their devices (Allan and
Warden, 2011).
13. In 2010, it was publicized that Facebook was selling data disclosing the sexual orientation of its
users to advertisers (Cheng, 2010). Individuals sexual orientation was discerned from the kinds of
ads that individuals were clicking on in Facebook (even where the ads were sexualorientation
neutral) rather than on self-reported sexual identity (Cheng, 2010).
14. The US, UK, Germany, Canada, and Japan.
15. Locational privacy refers to the expectations, on the part of individuals, that their locations,
spatial mobility patterns, and behaviors and activities in and across space are not being
surreptitiously recorded, monitored, stored, and repurposed in ways that are compromising of
their safety, security, and confidentiality (Blumberg and Eckersley, 2009).
16. This study received ethics approval from the General Research Ethics Board at Queens
University, where the study was conducted.
17. Respondents were asked about their concerns regarding six data practices: data storage
and security; transparency in data use; legal standards and oversight; collection of location
data; collection of video/audio data; and, collection of telecom (meta)data (The White House,
2014b).
References
Allan A and Warden P (2011) Got an iPhone or 3G iPad? Apple is recording your moves. OReilly
Radar, 20 April. Available at: http://radar.oreilly.com/2011/04/apple-location-tracking.html
(accessed 1 June 2011).
Amin A and Thrift N (2002) Cities: Reimagining the Urban. Cambridge, Malden, MA: Polity Press.
Ball J (2014) NSA and GCHQ target leaky phone apps like Angry Birds to scoop user data. The
Guardian, 27 January. Available at: http://www.theguardian.com/world/2014/jan/27/nsa-gchq-
smartphone-app-angry-birds-personal-data (accessed 28 January 2014).
Bauman Z and Lyon D (2013) Liquid Surveillance. Cambridge, Malden, MA: Polity Press.
Blumberg AJ and Eckersley P (2009) On locational privacy, and how to avoid losing it forever.
Electronic Frontier Foundation. Available at: http://www.e.org/wp/locational-privacy (accessed
1 July 2010).
boyd d (2014) Its Complicated: The Social Lives of Networked Teens. New Haven, London: Yale
University Press.
boyd d and Crawford K (2012) Critical questions for big data. Information, Communication & Society
15: 662679.
Brown I (2013) Future identities: Changing identities in the UKThe next 10 years j DR 5: How will
surveillance and privacy technologies impact on the psychological notions of identity?. Government
Oce for Science. Available at: https://www.gov.uk/government/uploads/system/uploads/
attachment_data/le/275755/13-507-surveillance-and-privacy-technologies-impact-on-identity.pdf
Cheng J (2010) More privacy headaches for Facebook: Gay users outed to advertisers. Ars Technica,
21 October. Available at: http://arstechnica.com/tech-policy/2010/10/more-privacy-headaches-for-
facebook-gay-users-outed-to-advertisers/ (accessed 22 October 2010).
Clarke RA (1988) Information technology and dataveillance. Communications of the ACM 31:
498512.
Cohen JE (2012) Conguring the Networked Self: Law, Code and the Play of Everyday Practice.
New Haven: Yale University Press.
Couldry N and Powell A (2014) Big data from the bottom up. Big Data & Society. JulyDecember
2014: 15. DOI: 10.1177/2053951714539277.
982 Environment and Planning D: Society and Space 33(6)
Crampton J (2014) Collect it all: National security, big data and governance. GeoJournal. Advance
online publication. DOI: 10.1007/s10708-014-9598-y.
Crawford K (2014) The anxieties of big data. The New Inquiry, 30 May. Available at: http://
thenewinquiry.com/essays/the-anxieties-of-big-data/ (accessed 11 June 2014).
Crawford K and Schultz J (2014) Big data and due process: Toward a framework to redress predictive
privacy harms. Boston College Law Review 55: 93128.
Cvrcek D, Kumpost M, Matyas V, et al. (2006) A study on the value of location privacy. Paper
presented at the 2006 ACM Workshop on Privacy in the Electronic Society (WPES 06),
30 October, Alexandria, VA. Available at: http://dl.acm.org/citation.cfm?id1179621 (accessed
15 July 2015).
de Montjoye Y-A, Hidalgo CA, Verleysen M, et al. (2013) Unique in the crowd: The privacy bounds of
human mobility. Scientic Reports 3: 15.
Elwood S and Leszczynski A (2011) Privacy, reconsidered: New representations, data practices, and
the geoweb. Geoforum 42: 615.
Gallagher R and Greenwald G (2015) Canada casts global surveillance dragnet over le downloads.
The Intercept, 28 January. Available at: https://rstlook.org/theintercept/2015/01/28/canada-cse-
levitation-mass-surveillance (accessed 13 February 2015).
Glanz J, Larson J and Lehren AW (2014) Spy agencies tap data streaming from phone apps. The New
York Times, 27 January. Available at: http://www.nytimes.com/2014/01/28/world/spy-agencies-
scour-phone-apps-for-personal-data.html?_r0 (accessed 28 January 2014).
Graham M and Shaw J (2015) Code, content, and control: Global geographies of digital participation
and representation. Paper presented at The 7th Doreen Massey Annual Event (DM7), 24 March,
Open University, Milton Keynes.
Haggerty K and Ericson R (2000) The surveillant assemblage. British Journal of Sociology 54: 605622.
Hansen MN (2012) Bodies in Code: Interfaces with Digital Media. New York and London: Routledge.
Hern A (2014) What is Apples iBeacon? The Guardian, 13 January. Available at: http://
www.theguardian.com/technology/2014/jan/13/what-is-apple-ibeacon-retail-tracking (accessed 16
January 2014).
Heuer S and Tranberg P (2014) These companies are ghting for your right to privacy online. The
Daily Dot, 09 June. Available at: http://www.dailydot.com/opinion/big-data-mining-privacy-
sustainability/
Hildebrandt J, Pereira M and Seglins D (2015) CSE tracks millions of downloads daily: Snowden
documents. CBC News, 27 January. Available at: http://www.cbc.ca/news/canada/cse-tracks-
millions-of-downloads-daily-snowden-documents-1.2930120 (accessed 13 February 2015).
Kitchin R (2014b) Continuous geosurveillance in the Smart City. DIS Magazine, February.
Available at: http://dismagazine.com/issues/73066/rob-kitchin-spatial-big-data-and-geosurveillance/
(accessed 21 February 2015).
Kitchin R (2014b) The Data Revolution: Big Data, Open Data, Data Infrastructures and Their
Consequences. London, Thousand Oaks, New Delhi, Singapore: SAGE.
Kitchin R and Lauriault TP (2014) Towards critical data studies: Charting and unpacking data
assemblages and their work. In: Eckert J, Shears A and Thatcher J (eds) The Geoweb and Big
Data. Omaha: University of Nebraska Press.
Klauser FR and Albrechtslund A (2014) From self-tracking to smart urban infrastructures: Towards
an interdisciplinary research agenda on Big Data. Surveillance & Society 12: 273286.
Kleinman Z (2015) Battery power alone can be used to track Android phones. BBC News Technology,
23 February. Available at: http://www.bbc.co.uk/news/technology-31587621 (accessed 24 February
2015).
Lin J, Amini S, Hong JI, et al. (2012) Expectation and purpose: Understanding users mental models of
mobile app privacy through crowdsourcing. Paper presented at the 14th International Conference
on Ubiquitous Computing (Ubicomp 2012), 58 September, Pittsburgh, PA. Available at: http://
dl.acm.org/citation.cfm?id2370290 (accessed 15 July 2015).
Lyon D (2014) Surveillance, Snowden, and big data: Capabities, consequences, critique. Big Data &
Society 1: 113.
Leszczynski 983
Madden M, Lenhart A, Contesi S, et al. (2013) Teens and Mobile Apps Privacy. Washington, DC: Pew
Research Center. Available at: http://pewinternet.org/Reports/2013/Teens-and-Mobile-Apps-
Privacy.aspx
Marwick AE (2013a) Status Update: Celebrity, Publicity, and Branding in the Social Media Age. New
Haven: Yale University Press.
Marwick AE (2013b) Networked privacy & social surveillance. Paper presented as part of the
Surveillance Studies Centre Seminar Series, 20 November, Queens University, Kingston, Canada.
Marwick AE and boyd d (2011) I tweet honestly, I tweet passionately: Twitter users, context collapse,
and the imagined audience. New Media & Society 13: 96113.
Marwick AE and boyd d (2014) Networked privacy: How teenagers negotiate context in social media.
New Media & Society 16: 140511067.
McFarland M (2014) How iBeacons could change the world forever. The Washington Post, 07 January.
Available at: http://www.washingtonpost.com/blogs/innovations/wp/2014/01/07/how-ibeacons-
could-change-the-world-forever/ (accessed 16 January 2014).
Microsoft (2011) Location-based services usage & perceptions survey. Available at: http://
www.microsoft.com/en-gb/download/details.aspx?id3250 (accessed 3 March 2013).
Nissenbaum HF (2010) Privacy in Context: Technology, Policy, and the Integrity of Social Life. Palo
Alto: Stanford Law Books.
Ricker B, Schuurman N and Kellser F (2014) Implications of smartphone usage on privacy and spatial
congition: Academic literature and public perceptions. GeoJournal. Advance online publication.
DOI: 10.1007/s10708-014-9568-4.
Sass E (2010) You can check in, but you cant check out: Users worried by location apps. The
Social Graf, 19 July. Available at: http://www.mediapost.com/publications/index.cfm?fa
Articles.showArticle&art_aid132210 (accessed 19 August 2011).
Scahill J and Begley J (2015) The CIA campaign to steal Apples secrets. The Intercept, 10 March.
Available at: https://rstlook.org/theintercept/2015/03/10/ispy-cia-campaign-steal-apples-secrets/
(accessed 11 February 2014).
Shelton M, Rainie L, Madden M, et al. (2015) Americans Privacy Strategies Post-Snowden.
Washington, DC: Pew Research Center. Available at: http://www.pewinternet.org/2015/03/16/
americans-privacy-strategies-post-snowden/ (accessed 15 July 2015).
Shklovski I, Mainwaring SD, Skuladottir HH, et al. (2014) Leakiness and creepiness in App Space:
Perceptions of privacy and mobile app use. Paper presented at the SIGCHI Conference on Human
Factors in Computing Systems (CHI 14), 26 April01 May, Toronto. Available at: http://
scott.mainzone.com/pubs/14-leakiness-creepiness.pdf (accessed 15 July 2015).
Silverman J (2015) Big datas big libertarian lie: Facebook, Google and the Silicon
Valley ethical overhaul we need. Salon, 26 April. Available at: http://www.salon.com/2015/04/
26/big_datas_big_libertarian_lie_facebook_google_and_the_silicon_valley_ethical_overhaul_we_
need/ (accessed 30 April 2105).
Solove DJ (2006) A taxonomy of privacy. University of Pennsylvania Law Review 154: 477460.
Soltani A and Gellman B (2013a) New documents show how the NSA infers relationships based on
mobile location data. The Switch, 10 December. Available at: http://www.washingtonpost.com/
blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-
mobile-location-data/ (accessed 11 December 2013).
Soltani A and Gellman B (2013b) NSA tracking cellphone locations worldwide, Snowden documents
show. The Washington Post, 04 December. Available at: http://www.washingtonpost.com/world/
national-security/nsa-tracking-cellphone-locations-worldwide-snowden-documents-show/2013/12/
04/5492873a-5cf2-11e3-bc56-c6ca94801fac_story.html (accessed 6 December 2013).
Soltani A, Paterson A and Gellman B (2013) NSA uses Google cookies to pinpoint targets for
hacking. The Switch, 10 December. Available at: http://www.washingtonpost.com/blogs/
the-switch/wp/2013/12/10/nsa-uses-google-cookies-to-pinpoint-targets-for-hacking/ (accessed 4
January 2014).
Staiano J, Oliver N, Lepri B, et al. (2014) Money walks: A human-centric study on the economics of
personal mobile data. Paper to be presented at the ACM International Joint Conference on
984 Environment and Planning D: Society and Space 33(6)
Pervasive and Ubiquitous Computing (UbiComp 2014), 1317 September, Seattle, WA. Availbale
at: http://arxiv.org/abs/1407.0566
Taylor AS, Lindley S, Regan T, et al. (2014) Data and life on the street. Big Data & Society 1: 17.
Thatcher J (2014) Living on fumes: Digital footprints, data fumes, and the limitations of spatial big
data. International Journal of Communication 8: 17651783.
The White House (2014a) Big Data: Seizing Opportunities, Preserving Values. Washington, DC: The
White House. Available at: http://www.whitehouse.gov/issues/technology/big-data-review
(accessed 4 May 2014).
The White House (2014b) The Big Data and Privacy Review. Washington, DC: The White House.
Available at: http://www.whitehouse.gov/issues/technology/big-data-review (accessed 5 May 2014).
TRUSTe Inc. (2013) UK consumer data privacy studyMobile edition. Available at: http://
www.truste.com/uk-mobile-privacy-index-2013/ (accessed 2 July 2014).
Weston G, Greenwald G and Gallagher R (2014) CSEC used airport Wi-Fi to track Canadian
travellers: Edward Snowden documents. CBC News, 30 January. Available at: http://
www.cbc.ca/news/politics/csec-used-airport-wi--to-track-canadian-travellers-edward-snowden-
documents-1.2517881 (accessed 31 January 2014).
Yadron D (2014) Angrier Birds: NSA turns to app data to track targets. Digits, 27 January. Available
at: http://blogs.wsj.com/digits/2014/01/27/angrier-birds-nsa-turns-to-app-data-to-track-targets/?mg
blogs-wsj&urlhttp%253A%252F%252Fblogs.wsj.com%252Fdigits%252F2014%252F01%
252F27%252Fangrier-birds-nsa-turns-to-app-data-to-track-targets (accessed 28 January 2014).
Zickuhr K (2013) Location-Based Services. Washington, DC: Pew Research Center. Available at:
http://pewinternet.org/Reports/2013/Location.aspx (accessed 21 September 2013).
Zickuhr K and Smith A (2010) Check-In Apps: The Results. Washington, DC: Pew Research Center.
Available at: http://www.utest.com/bugbattle/q210/results (accessed 19 June 2010).