Advertisement

GeoJournal

, Volume 80, Issue 4, pp 519–531 | Cite as

Collect it all: national security, Big Data and governance

  • Jeremy W. CramptonEmail author
Article

Abstract

This paper is a case study of complications of Big Data. The case study draws from the US intelligence community, but the issues are applicable on a wide scale to Big Data. There are two ways Big Data are making a big impact: a reconceptualization of (geo)privacy, and “algorithmic security.” Geoprivacy is revealed as a geopolitical assemblage rather than something possessed and is part of emerging political economy of technology and neoliberal markets. Security has become increasingly algorithmic and biometric, enrolling Big Data to disambiguate the biopolitical subject. Geoweb and remote sensing technologies, companies, and knowledges are imbricated in this assemblage of algorithmic security. I conclude with three spaces of intervention; new critical histories of the geoweb that trace the relationship of geography and the state; a fuller political economy of the geoweb and its circulations of geographical knowledge; and legislative and encryption efforts that enable the geographic community to participate in public debate.

Keywords

Big Data Privacy National security Geoweb Political economy 

References

  1. 113th Congress, First Session. (2013). Electronic Communications Privacy Act (ECPA) (Part II): Geolocation Privacy and Surveillance. T. Subcommittee on Crime, Homeland Security and Investigations, of the Committee on the Judiciary. House of Representatives. Washington, DC: USGPO.Google Scholar
  2. Alderton, M. (2013). Transformation within NGA promises new opportunities for the GEOINT community. Trajectory Magazine, 3. http://trajectorymagazine.com/web-exclusives/item/1552-geoint-30.html. Accessed October 20, 2013.
  3. Amoore, L. (2009). Algorithmic war: Everyday geographies of the war on terror. Antipode, 41(1), 49–69.CrossRefGoogle Scholar
  4. Amoore, L. (2011). Data derivatives: On the emergence of a security risk calculus for our times. Theory, Culture & Society, 28(6), 24–43. doi: 10.1177/0263276411417430.CrossRefGoogle Scholar
  5. Amoore, L. (2014). Security and the claim to privacy. International Political Sociology, 8(1), 108–112. doi: 10.1111/ips.12044.CrossRefGoogle Scholar
  6. Anderson, C. (2008). The end of theory: The data deluge makes the scientific method obsolete. Wired, 16(7).Google Scholar
  7. Ball, J., NSA Stores Metadata of Millions of Web Users for up to a Year, Secret Files Show. (2013, September 30). The guardian. http://gu.com/p/3j6mj/tw.
  8. Ball, J., Schneier, B., & Greenwald, G., NSA and Gchq Target Tor Network That Protects Anonymity of Web Users. (2013, 4 October). The guardian. http://gu.com/p/3ja7d/tw. Accessed October 20, 2013.
  9. Bamford, J. (1982). The puzzle palace: A report on America’s most secret agency. Boston: Houghton Mifflin.Google Scholar
  10. Bamford, J. (2008). The shadow factory. New York: Anchor Books.Google Scholar
  11. Bankston, K. S., & Soltani, A. (2014). Tiny constables and the cost of surveillance: Making cents out of United States V. Jones. The Yale Law Journal Online, 123, 335–357.Google Scholar
  12. Barnes, T. J. (2006). Geographical intelligence: American geographers and research and analysis in the office of strategic services 1941–1945. Journal of Historical Geography, 32, 149–168.CrossRefGoogle Scholar
  13. Barnes, T. J. (2014). Big Data, little history. Dialogues in Human Geography, 3(2), 297–302.Google Scholar
  14. Barr, A., Winkler, R., & MacMillan, D., Google to Buy Satellite-Imaging Startup for $500 Million. (2014, June 10). The Wall Street Journal. http://online.wsj.com/articles/google-to-buy-satellite-imaging-company-for-500-million-1402421980. Accessed July 10, 2014.
  15. Bellovin, S. M., Hutchins, R. M., Jabara, T., & Zimmeck, S. (2014). When enough is enough: Location tracking, mosaic theory, and machine learning. New York University Journal of Law & Liberty, 8(2), 555–628.Google Scholar
  16. Birchall, C. (2011a). Introduction to ‘secrecy and transparency’: The politics of opacity and openness. Theory, Culture & Society, 28(7–8), 7–25.CrossRefGoogle Scholar
  17. Birchall, C. (2011b). Transparency, interrupted. Secrets of the Left. Theory, Culture and Society, 28(7–8), 60–84.CrossRefGoogle Scholar
  18. Blomley, N. K. (1994). Law, space, and the geographies of power. New York: Guilford Press.Google Scholar
  19. Boyd, D., & Crawford, K. (2012). Critical questions for Big Data. Information, Communication & Society, 15(5), 662–679. doi: 10.1080/1369118X.2012.678878.CrossRefGoogle Scholar
  20. Braverman, I., Blomley, N., Delaney, D., & Kedar, A. (2014). The expanding spaces of law: A timely legal geography. Stanford: Stanford University Press.CrossRefGoogle Scholar
  21. Brown, W. (2014). Governmentality in the age of neoliberalism. Paper presented at the Pacific Centre for Technology and Culture, University of Victoria, Canada.Google Scholar
  22. Clarke, R. A. (2004). Against all enemies: Inside America’s war on terror. New York: Free Press.Google Scholar
  23. Cohen, J. E. (2012a). Irrational privacy? Journal on Telecommunications and High Technology Law, 10(2), 241–249.Google Scholar
  24. Cohen, J. E. (2012b). Configuring the networked self: Law, code, and the play of everyday practice. New Haven: Yale University Press.Google Scholar
  25. Crampton, J. W. (2007). The biopolitical justification for geosurveillance. Geographical Review, 97(3), 389–403.Google Scholar
  26. Crampton, J. W. (2012). Outsourcing the state. Geopolitics, 17(3), 687–691.Google Scholar
  27. Crampton, J. W., Roberts, S., & Poorthuis, A. (2014). The new political economy of geographic intelligence. Annals of the Association of American Geographers, 104(1), 196–214.CrossRefGoogle Scholar
  28. Crawford, K., & Schultz, J. (2013). Big Data and due process: Toward a framework to redress predictive privacy harms. Boston College Law Review, 55(1). Available at SSRN: http://ssrn.com/abstract=2325784.
  29. Dalton, C., & Thatcher, J. (2014). What does a critical data studies look like, and why do we care? Seven points for a critical approach to ‘Big Data.’. Society and Space Open Site. http://societyandspace.com/material/commentaries/craig-dalton-and-jim-thatcher-what-does-a-critical-data-studies-look-like-and-why-do-we-care-seven-points-for-a-critical-approach-to-big-data/. Accessed May 22, 2014.
  30. Defense Science Board Task Force on Defense Intelligence. (2011). Report of the defense science board task force on defense intelligenceCounterinsurgency (COIN) intelligence, surveillance, and reconnaissance (ISR) operations. Washington, DC: Office of the Under Secretary of Defense for Acquisition, Technology and Logistics.Google Scholar
  31. Devereaux, R., Greenwald, G., & Poitras, L. (2014). Data pirates of the Caribbean: The NSA is recording every cell phone call in the Bahamas. (May 22). https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/. Accessed May 25, 2014.
  32. Dey, S., Roy, N., Xu, W., Choudhury, R. R., & Nelakudit, S. (2014). Accelprint: Imperfections of accelerometers make smartphones trackable. Paper presented at the NDSS 14, San Diego, CA.Google Scholar
  33. Dittmer, J. (2014). Geopolitical assemblages and complexity. Progress in Human Geography, 38(3), 385–401. doi: 10.1177/0309132513501405.CrossRefGoogle Scholar
  34. Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of facebook “friends:” social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168. doi: 10.1111/j.1083-6101.2007.00367.x.CrossRefGoogle Scholar
  35. Elwood, S., & Leszczynski, A. (2011). Privacy, reconsidered: New representations, data practices, and the geoweb. Geoforum, 42(1), 6–15.CrossRefGoogle Scholar
  36. Foucault, M. (2000). “Omnes Et Singulatim”: Toward a critique of political reason. In J. Faubion (Ed.), Power. The essential works of Michel Foucault 19541984. (Vol. 3, pp. 298–325). New York: New Press.Google Scholar
  37. Gellman, B., & Miller, G., US Spy Networks’ Successes, Failures and Objectives Detailed in ‘Black Budget’ Summary. (2013, August 19). The Washington Post. Accessed May 25, 2014.Google Scholar
  38. Gellman, B., & Poitras, L. US, British Intelligence Mining Data from Nine US Internet Companies in Broad Secret Program. (2013, June 6). The Washington Post. http://wapo.st/1888aNq. Accessed October 17, 2013.
  39. Gellman, B., & Soltani, A., NSA Collects Millions of E-Mail Address Books Globally. (2013a, October 14). The Washington Post. http://wapo.st/1gFM2f9. Accessed October 17, 2013.
  40. Gellman, B., Tate, J., & Soltani, A. In NSA-Intercepted Data, Those Not Targeted Far Outnumber the Foreigners Who Are. (2014, July 5). The Washington Post. http://wapo.st/1xyyGZF. Accessed July 10, 2014.
  41. Gellman, B., US Surveillance Architecture Includes Collection of Revealing Internet, Phone Metadata. (2013, June 15). The Washington Post. http://wapo.st/JKDpDm. Accessed May 25, 2014.
  42. Gellman, B., & Soltani, A., NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. (2013b, October 30). The Washington Post. http://wapo.st/1dpsecg. Accessed May 25, 2014.
  43. Gellman, B., & Soltani, A., NSA Tracking Cellphone Locations Worldwide, Snowden Documents Show. (2013c, December 4, 2014). The Washington Post. http://wapo.st/IIaYWp. Accessed May 25, 2014.
  44. Greenwald, G. (2014). No place to hide. New York: Metropolitan Books.Google Scholar
  45. Greenwald, G., & Hussain, M., Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On. (2014). The intercept. https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/. Accessed July 10, 2014.
  46. Greenwald, G., NSA Collecting Phone Records of Millions of Verizon Customers Daily. (2013, June 6). The guardian. http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order. Accessed May 25, 2014.
  47. Gregory, D. (2008). ‘The rush to the intimate’: Counterinsurgency and the cultural turn. Radical Philosophy, 150, 8–23.Google Scholar
  48. Gregory, D. (2014). Drone geographies. Radical Philosophy, 183, 7–19.Google Scholar
  49. Jhally, S., & Livant, B. (1986). Watching as working: The valorization of audience consciousness. Journal of Communication, 36(3), 124–143.Google Scholar
  50. Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 8788–8790. doi: 10.1073/pnas.1320040111.CrossRefGoogle Scholar
  51. Leszczynski, A. (2012). Situating the geoweb in political economy. Progress in Human Geography, 36(1), 72–89.CrossRefGoogle Scholar
  52. Leszczynski, A., & Wilson, M. W. (2013). Guest editorial: Theorizing the geoweb. GeoJournal, 78(6), 915–919. doi: 10.1007/s10708-013-9489-7.CrossRefGoogle Scholar
  53. Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, consequences, critique. Big Data & Society, 1(2), 1–13. doi: 10.1177/2053951714541861.CrossRefGoogle Scholar
  54. Mackenzie, A., & Vurdubakis, T. (2011). Codes and codings in crisis: Signification, performativity and excess. Theory, Culture & Society, 28(6), 3–23. doi: 10.1177/0263276411424761.CrossRefGoogle Scholar
  55. Mayer, J. (2008). The dark side: The inside story of how the war on terror turned into a war on American ideals. New York: Doubleday.Google Scholar
  56. Mayer-Schönberger, V., & Cukier, K. (2013). Big Data: A revolution that will transform how we live, work, and think. Boston: Houghton Mifflin Harcourt.Google Scholar
  57. Miller, G., Activity-Based Intelligence Uses Metadata to Map Adversary Networks. (2013, 8 July). Defense news. http://www.defensenews.com/article/20130708/C4ISR02/307010020. Accessed October 20, 2013.
  58. Miller, G., Brennan Speech Is First Obama Acknowledgement of the Use of Armed Drones. (2012a, 30 April). The Washington Post. http://articles.washingtonpost.com/2012-04-30/world/35452340_1_drone-strikes-drone-program-brennan-speech. Accessed October 20, 2013.
  59. Miller, G., Plan for Hunting Terrorists Signals US Intends to Keep Adding Names to Kill Lists. (2012b, 23 October). The Washington Post. Accessed October 20, 2013.Google Scholar
  60. Murdock, D. G., Tomes, R. R., & Tucker, C. K. (2014). Human geography. Socio-cultural dynamics and challenges to global security. Herdon, VA: United States Geospatial Intelligence Foundation.Google Scholar
  61. Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., & Vigna, G. (2013). Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Security and privacy (SP), 2013 IEEE symposium on, 1922 May 2013 (pp. 541–555). doi: 10.1109/SP.2013.43.
  62. Quinn, K. (2012). A better toolbox. Trajectory Magazine, Winter. http://trajectorymagazine.com/defense-inteligence/item/1349-a-better-toolbox.html. Accessed October 20, 2013.
  63. Richards, N. M., & King, J. H. (2013). Three paradoxes of Big Data. Stanford Law Review Online, 41(September 3), 41–46.Google Scholar
  64. Richelson, J. T. (1995). A century of spies. Intelligence in the twentieth century. New York: Oxford University Press.Google Scholar
  65. Richelson, J. T. (2012). The US intelligence community (6th ed.). Boulder, CO: Westview Press.Google Scholar
  66. Risen, J., & Poitras, L., NSA Gathers Data on Social Connections of US Citizens. (2013, September 28). The New York Times. http://nyti.ms/1fxW2c6. Accessed October 17.
  67. Roy, N., Wang, H., & Choudhury, R. R. (2014). I am a smartphone and i can tell my user’s walking direction. In Proceedings of the 12th international conference on Mobile systems, applications, and services, MobiSys 14. (pp. 329–342). ACM.Google Scholar
  68. Schwartz, R., & Halegoua, G. R. (2014). The spatial self: Location-based identity performance on social media. New Media & Society,. doi: 10.1177/1461444814531364.Google Scholar
  69. Singer, P. W. (2009). Wired for war. The robotics revolution and conflict on the 21st century. New York: Penguin Books.Google Scholar
  70. Soltani, A., & Gellman, B., New Documents Show How the NSA Infers Relationships Based on Mobile Location Data. (2013, December 10). The Washington Post. http://wapo.st/1hrSi9F.
  71. Soltani, A., Peterson, A., & Gellman, B., NSA Uses Google Cookies to Pinpoint Targets for Hacking. (2013, December 10). The Washington Post. http://wapo.st/1d7oCvx.
  72. Sorenson, J., Big Data: How to Fulfill the Promise of Limitless Intelligence. (2013, 19 September). C4ISR&Networks. http://www.c4isrnet.com/article/20130919/C4ISRNET18/309190007. Accessed October 20, 2013.
  73. Surden, H. (2007). Structural rights in privacy. Southern Methodist University Law Review, 60, 1605–1629.Google Scholar
  74. U.S. Government. (2013). US policy standards and procedures for the use of force in counterterrorism operations outside the United States and areas of active hostilities. Washington DC: Office of the President.Google Scholar
  75. Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, IV(5), 193–220.Google Scholar
  76. Wilson, M. W. (Forthcoming). New Lines? Enacting a social history of GIS. The Canadian Geographer/Le Géographe canadien.Google Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2014

Authors and Affiliations

  1. 1.Department of GeographyUniversity of KentuckyLexingtonUSA

Personalised recommendations