Skip to main content

Collect it all: national security, Big Data and governance

Abstract

This paper is a case study of complications of Big Data. The case study draws from the US intelligence community, but the issues are applicable on a wide scale to Big Data. There are two ways Big Data are making a big impact: a reconceptualization of (geo)privacy, and “algorithmic security.” Geoprivacy is revealed as a geopolitical assemblage rather than something possessed and is part of emerging political economy of technology and neoliberal markets. Security has become increasingly algorithmic and biometric, enrolling Big Data to disambiguate the biopolitical subject. Geoweb and remote sensing technologies, companies, and knowledges are imbricated in this assemblage of algorithmic security. I conclude with three spaces of intervention; new critical histories of the geoweb that trace the relationship of geography and the state; a fuller political economy of the geoweb and its circulations of geographical knowledge; and legislative and encryption efforts that enable the geographic community to participate in public debate.

This is a preview of subscription content, access via your institution.

Notes

  1. Wikileaks identified country X as Afghanistan (http://bit.ly/1niGf56).

  2. See http://wh.gov/lg4h2.

  3. See http://1.usa.gov/1f4w8re.

  4. See https://www.schneier.com/blog/archives/2013/11/surveillance_as_1.html.

  5. The government was unable to determine if about 300,000 cleared individuals were government employees or contractors, so 1 m contractors is likely to be a lower bound.

  6. http://www.fas.org/irp/offdocs/ppd/ppd-19.pdf.

  7. See http://blogs.fas.org/secrecy/2014/05/odni-prepub/.

  8. According to Gellman et al. (2014) a “target” may indicate a single individual or an IP address used by hundreds of persons.

  9. See http://bit.ly/1nUKoYV.

  10. The contract was signed in 2010 but has since been complicated by government sequestration and cut-backs, and the merging of DigitalGlobe and GeoEye in early 2013. The contract provided government funds for WorldView-3, DigitalGlobe’s 0.31 m resolution satellite launched in August 2014. Six months after launch, DigitalGlobe will be permitted to sell panchromatic imagery up to 0.25 m.

  11. One geopolitical complication is that the launches take place in Baikonur Cosmodrome, which is Russian-controlled. US sanctions against Russia may prohibit future launches.

  12. One company, DigitalGlobe, has approximately 50 petabytes of data.

  13. The Supreme Court case United States v. Jones has proved to be the most significant ruling to date. The justices ruled that a GPS tracker placed on a car without a warrant was unconstitutional (although violation of privacy was not determining).

  14. For example, Internet companies such as Google and Yahoo could practice encryption such as PGP. However, there are market and government forces strongly resisting such a development. For these companies the user is a “product” whose privacy is bought and sold on. Additionally, the companies are susceptible to a National Security Letter (NSL) which could secretly demand the master encryption key from the company. There is no recourse against a secret NSL, except ultimately to shut down the service, as the Lavabit email company did—an unlikely action for a Silicon Valley company. To the contrary, the Snowden documents show extensive private–public surveillance cooperation.

References

  • 113th Congress, First Session. (2013). Electronic Communications Privacy Act (ECPA) (Part II): Geolocation Privacy and Surveillance. T. Subcommittee on Crime, Homeland Security and Investigations, of the Committee on the Judiciary. House of Representatives. Washington, DC: USGPO.

  • Alderton, M. (2013). Transformation within NGA promises new opportunities for the GEOINT community. Trajectory Magazine, 3. http://trajectorymagazine.com/web-exclusives/item/1552-geoint-30.html. Accessed October 20, 2013.

  • Amoore, L. (2009). Algorithmic war: Everyday geographies of the war on terror. Antipode, 41(1), 49–69.

    Article  Google Scholar 

  • Amoore, L. (2011). Data derivatives: On the emergence of a security risk calculus for our times. Theory, Culture & Society, 28(6), 24–43. doi:10.1177/0263276411417430.

    Article  Google Scholar 

  • Amoore, L. (2014). Security and the claim to privacy. International Political Sociology, 8(1), 108–112. doi:10.1111/ips.12044.

    Article  Google Scholar 

  • Anderson, C. (2008). The end of theory: The data deluge makes the scientific method obsolete. Wired, 16(7).

  • Ball, J., NSA Stores Metadata of Millions of Web Users for up to a Year, Secret Files Show. (2013, September 30). The guardian. http://gu.com/p/3j6mj/tw.

  • Ball, J., Schneier, B., & Greenwald, G., NSA and Gchq Target Tor Network That Protects Anonymity of Web Users. (2013, 4 October). The guardian. http://gu.com/p/3ja7d/tw. Accessed October 20, 2013.

  • Bamford, J. (1982). The puzzle palace: A report on America’s most secret agency. Boston: Houghton Mifflin.

    Google Scholar 

  • Bamford, J. (2008). The shadow factory. New York: Anchor Books.

    Google Scholar 

  • Bankston, K. S., & Soltani, A. (2014). Tiny constables and the cost of surveillance: Making cents out of United States V. Jones. The Yale Law Journal Online, 123, 335–357.

    Google Scholar 

  • Barnes, T. J. (2006). Geographical intelligence: American geographers and research and analysis in the office of strategic services 1941–1945. Journal of Historical Geography, 32, 149–168.

    Article  Google Scholar 

  • Barnes, T. J. (2014). Big Data, little history. Dialogues in Human Geography, 3(2), 297–302.

    Google Scholar 

  • Barr, A., Winkler, R., & MacMillan, D., Google to Buy Satellite-Imaging Startup for $500 Million. (2014, June 10). The Wall Street Journal. http://online.wsj.com/articles/google-to-buy-satellite-imaging-company-for-500-million-1402421980. Accessed July 10, 2014.

  • Bellovin, S. M., Hutchins, R. M., Jabara, T., & Zimmeck, S. (2014). When enough is enough: Location tracking, mosaic theory, and machine learning. New York University Journal of Law & Liberty, 8(2), 555–628.

  • Birchall, C. (2011a). Introduction to ‘secrecy and transparency’: The politics of opacity and openness. Theory, Culture & Society, 28(7–8), 7–25.

    Article  Google Scholar 

  • Birchall, C. (2011b). Transparency, interrupted. Secrets of the Left. Theory, Culture and Society, 28(7–8), 60–84.

    Article  Google Scholar 

  • Blomley, N. K. (1994). Law, space, and the geographies of power. New York: Guilford Press.

    Google Scholar 

  • Boyd, D., & Crawford, K. (2012). Critical questions for Big Data. Information, Communication & Society, 15(5), 662–679. doi:10.1080/1369118X.2012.678878.

    Article  Google Scholar 

  • Braverman, I., Blomley, N., Delaney, D., & Kedar, A. (2014). The expanding spaces of law: A timely legal geography. Stanford: Stanford University Press.

    Book  Google Scholar 

  • Brown, W. (2014). Governmentality in the age of neoliberalism. Paper presented at the Pacific Centre for Technology and Culture, University of Victoria, Canada.

  • Clarke, R. A. (2004). Against all enemies: Inside America’s war on terror. New York: Free Press.

    Google Scholar 

  • Cohen, J. E. (2012a). Irrational privacy? Journal on Telecommunications and High Technology Law, 10(2), 241–249.

    Google Scholar 

  • Cohen, J. E. (2012b). Configuring the networked self: Law, code, and the play of everyday practice. New Haven: Yale University Press.

    Google Scholar 

  • Crampton, J. W. (2007). The biopolitical justification for geosurveillance. Geographical Review, 97(3), 389–403.

    Google Scholar 

  • Crampton, J. W. (2012). Outsourcing the state. Geopolitics, 17(3), 687–691.

    Google Scholar 

  • Crampton, J. W., Roberts, S., & Poorthuis, A. (2014). The new political economy of geographic intelligence. Annals of the Association of American Geographers, 104(1), 196–214.

    Article  Google Scholar 

  • Crawford, K., & Schultz, J. (2013). Big Data and due process: Toward a framework to redress predictive privacy harms. Boston College Law Review, 55(1). Available at SSRN: http://ssrn.com/abstract=2325784.

  • Dalton, C., & Thatcher, J. (2014). What does a critical data studies look like, and why do we care? Seven points for a critical approach to ‘Big Data.’. Society and Space Open Site. http://societyandspace.com/material/commentaries/craig-dalton-and-jim-thatcher-what-does-a-critical-data-studies-look-like-and-why-do-we-care-seven-points-for-a-critical-approach-to-big-data/. Accessed May 22, 2014.

  • Defense Science Board Task Force on Defense Intelligence. (2011). Report of the defense science board task force on defense intelligenceCounterinsurgency (COIN) intelligence, surveillance, and reconnaissance (ISR) operations. Washington, DC: Office of the Under Secretary of Defense for Acquisition, Technology and Logistics.

  • Devereaux, R., Greenwald, G., & Poitras, L. (2014). Data pirates of the Caribbean: The NSA is recording every cell phone call in the Bahamas. (May 22). https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/. Accessed May 25, 2014.

  • Dey, S., Roy, N., Xu, W., Choudhury, R. R., & Nelakudit, S. (2014). Accelprint: Imperfections of accelerometers make smartphones trackable. Paper presented at the NDSS 14, San Diego, CA.

  • Dittmer, J. (2014). Geopolitical assemblages and complexity. Progress in Human Geography, 38(3), 385–401. doi:10.1177/0309132513501405.

    Article  Google Scholar 

  • Ellison, N. B., Steinfield, C., & Lampe, C. (2007). The benefits of facebook “friends:” social capital and college students’ use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143–1168. doi:10.1111/j.1083-6101.2007.00367.x.

    Article  Google Scholar 

  • Elwood, S., & Leszczynski, A. (2011). Privacy, reconsidered: New representations, data practices, and the geoweb. Geoforum, 42(1), 6–15.

    Article  Google Scholar 

  • Foucault, M. (2000). “Omnes Et Singulatim”: Toward a critique of political reason. In J. Faubion (Ed.), Power. The essential works of Michel Foucault 19541984. (Vol. 3, pp. 298–325). New York: New Press.

  • Gellman, B., & Miller, G., US Spy Networks’ Successes, Failures and Objectives Detailed in ‘Black Budget’ Summary. (2013, August 19). The Washington Post. Accessed May 25, 2014.

  • Gellman, B., & Poitras, L. US, British Intelligence Mining Data from Nine US Internet Companies in Broad Secret Program. (2013, June 6). The Washington Post. http://wapo.st/1888aNq. Accessed October 17, 2013.

  • Gellman, B., & Soltani, A., NSA Collects Millions of E-Mail Address Books Globally. (2013a, October 14). The Washington Post. http://wapo.st/1gFM2f9. Accessed October 17, 2013.

  • Gellman, B., Tate, J., & Soltani, A. In NSA-Intercepted Data, Those Not Targeted Far Outnumber the Foreigners Who Are. (2014, July 5). The Washington Post. http://wapo.st/1xyyGZF. Accessed July 10, 2014.

  • Gellman, B., US Surveillance Architecture Includes Collection of Revealing Internet, Phone Metadata. (2013, June 15). The Washington Post. http://wapo.st/JKDpDm. Accessed May 25, 2014.

  • Gellman, B., & Soltani, A., NSA Infiltrates Links to Yahoo, Google Data Centers Worldwide, Snowden Documents Say. (2013b, October 30). The Washington Post. http://wapo.st/1dpsecg. Accessed May 25, 2014.

  • Gellman, B., & Soltani, A., NSA Tracking Cellphone Locations Worldwide, Snowden Documents Show. (2013c, December 4, 2014). The Washington Post. http://wapo.st/IIaYWp. Accessed May 25, 2014.

  • Greenwald, G. (2014). No place to hide. New York: Metropolitan Books.

  • Greenwald, G., & Hussain, M., Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On. (2014). The intercept. https://firstlook.org/theintercept/article/2014/07/09/under-surveillance/. Accessed July 10, 2014.

  • Greenwald, G., NSA Collecting Phone Records of Millions of Verizon Customers Daily. (2013, June 6). The guardian. http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order. Accessed May 25, 2014.

  • Gregory, D. (2008). ‘The rush to the intimate’: Counterinsurgency and the cultural turn. Radical Philosophy, 150, 8–23.

    Google Scholar 

  • Gregory, D. (2014). Drone geographies. Radical Philosophy, 183, 7–19.

    Google Scholar 

  • Jhally, S., & Livant, B. (1986). Watching as working: The valorization of audience consciousness. Journal of Communication, 36(3), 124–143.

  • Kramer, A. D. I., Guillory, J. E., & Hancock, J. T. (2014). Experimental evidence of massive-scale emotional contagion through social networks. Proceedings of the National Academy of Sciences, 111(24), 8788–8790. doi:10.1073/pnas.1320040111.

    Article  Google Scholar 

  • Leszczynski, A. (2012). Situating the geoweb in political economy. Progress in Human Geography, 36(1), 72–89.

    Article  Google Scholar 

  • Leszczynski, A., & Wilson, M. W. (2013). Guest editorial: Theorizing the geoweb. GeoJournal, 78(6), 915–919. doi:10.1007/s10708-013-9489-7.

    Article  Google Scholar 

  • Lyon, D. (2014). Surveillance, Snowden, and Big Data: Capacities, consequences, critique. Big Data & Society, 1(2), 1–13. doi:10.1177/2053951714541861.

    Article  Google Scholar 

  • Mackenzie, A., & Vurdubakis, T. (2011). Codes and codings in crisis: Signification, performativity and excess. Theory, Culture & Society, 28(6), 3–23. doi:10.1177/0263276411424761.

    Article  Google Scholar 

  • Mayer, J. (2008). The dark side: The inside story of how the war on terror turned into a war on American ideals. New York: Doubleday.

    Google Scholar 

  • Mayer-Schönberger, V., & Cukier, K. (2013). Big Data: A revolution that will transform how we live, work, and think. Boston: Houghton Mifflin Harcourt.

    Google Scholar 

  • Miller, G., Activity-Based Intelligence Uses Metadata to Map Adversary Networks. (2013, 8 July). Defense news. http://www.defensenews.com/article/20130708/C4ISR02/307010020. Accessed October 20, 2013.

  • Miller, G., Brennan Speech Is First Obama Acknowledgement of the Use of Armed Drones. (2012a, 30 April). The Washington Post. http://articles.washingtonpost.com/2012-04-30/world/35452340_1_drone-strikes-drone-program-brennan-speech. Accessed October 20, 2013.

  • Miller, G., Plan for Hunting Terrorists Signals US Intends to Keep Adding Names to Kill Lists. (2012b, 23 October). The Washington Post. Accessed October 20, 2013.

  • Murdock, D. G., Tomes, R. R., & Tucker, C. K. (2014). Human geography. Socio-cultural dynamics and challenges to global security. Herdon, VA: United States Geospatial Intelligence Foundation.

    Google Scholar 

  • Nikiforakis, N., Kapravelos, A., Joosen, W., Kruegel, C., Piessens, F., & Vigna, G. (2013). Cookieless monster: Exploring the ecosystem of web-based device fingerprinting. In Security and privacy (SP), 2013 IEEE symposium on, 1922 May 2013 (pp. 541–555). doi:10.1109/SP.2013.43.

  • Quinn, K. (2012). A better toolbox. Trajectory Magazine, Winter. http://trajectorymagazine.com/defense-inteligence/item/1349-a-better-toolbox.html. Accessed October 20, 2013.

  • Richards, N. M., & King, J. H. (2013). Three paradoxes of Big Data. Stanford Law Review Online, 41(September 3), 41–46.

  • Richelson, J. T. (1995). A century of spies. Intelligence in the twentieth century. New York: Oxford University Press.

    Google Scholar 

  • Richelson, J. T. (2012). The US intelligence community (6th ed.). Boulder, CO: Westview Press.

    Google Scholar 

  • Risen, J., & Poitras, L., NSA Gathers Data on Social Connections of US Citizens. (2013, September 28). The New York Times. http://nyti.ms/1fxW2c6. Accessed October 17.

  • Roy, N., Wang, H., & Choudhury, R. R. (2014). I am a smartphone and i can tell my user’s walking direction. In Proceedings of the 12th international conference on Mobile systems, applications, and services, MobiSys 14. (pp. 329–342). ACM.

  • Schwartz, R., & Halegoua, G. R. (2014). The spatial self: Location-based identity performance on social media. New Media & Society,. doi:10.1177/1461444814531364.

    Google Scholar 

  • Singer, P. W. (2009). Wired for war. The robotics revolution and conflict on the 21st century. New York: Penguin Books.

    Google Scholar 

  • Soltani, A., & Gellman, B., New Documents Show How the NSA Infers Relationships Based on Mobile Location Data. (2013, December 10). The Washington Post. http://wapo.st/1hrSi9F.

  • Soltani, A., Peterson, A., & Gellman, B., NSA Uses Google Cookies to Pinpoint Targets for Hacking. (2013, December 10). The Washington Post. http://wapo.st/1d7oCvx.

  • Sorenson, J., Big Data: How to Fulfill the Promise of Limitless Intelligence. (2013, 19 September). C4ISR&Networks. http://www.c4isrnet.com/article/20130919/C4ISRNET18/309190007. Accessed October 20, 2013.

  • Surden, H. (2007). Structural rights in privacy. Southern Methodist University Law Review, 60, 1605–1629.

    Google Scholar 

  • U.S. Government. (2013). US policy standards and procedures for the use of force in counterterrorism operations outside the United States and areas of active hostilities. Washington DC: Office of the President.

  • Warren, S. D., & Brandeis, L. D. (1890). The right to privacy. Harvard Law Review, IV(5), 193–220.

  • Wilson, M. W. (Forthcoming). New Lines? Enacting a social history of GIS. The Canadian Geographer/Le Géographe canadien.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jeremy W. Crampton.

Rights and permissions

Reprints and Permissions

About this article

Verify currency and authenticity via CrossMark

Cite this article

Crampton, J.W. Collect it all: national security, Big Data and governance. GeoJournal 80, 519–531 (2015). https://doi.org/10.1007/s10708-014-9598-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10708-014-9598-y

Keywords

  • Big Data
  • Privacy
  • National security
  • Geoweb
  • Political economy