Big Data, Subjectification and Preventing Fires

  • Nathaniel O’Grady


In this chapter, the book investigates how the Fire and Rescue Services (FRS) develop risk profiles which outline the people, and the places that they live in, that are most vulnerable to fire risk. The chapter reveals in detail how these risk profiles are assembled in a way that draws on both information supplied by software called MOSAIC that is designed and sold by the credit-checking company Experian and anonymised information that has been generated through investigations where fatalities have resulted from fires. I argue that risk profiling allows for an elaboration on the processes of subjectification and forms of subjectivity that emerge where massive sets of data are used and governance seeks to intervene upon futures yet to occur.


  1. Amoore, L. (2006). Biometric Borders: Governing Mobilities in the War on Terror. Political Geography, 25(3), 336–351.CrossRefGoogle Scholar
  2. Anderson, B. (2010a). Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies. Progress in Human Geography, 34, 777–798.CrossRefGoogle Scholar
  3. Anderson, B. (2010b). Security and the Future: Anticipating the Event of Terror. Geoforum, 41(2), 227–235.CrossRefGoogle Scholar
  4. Aradau, C. (2016). Political Grammars of Mobility, Security and Subjectivity. Mobilities, 11(4), 564–574.CrossRefGoogle Scholar
  5. Aradau, C., & Van Munster, R. (2011). The Politics of Catastrophe: Genealogies of the Unknown. Abingdon: Routledge.Google Scholar
  6. Barad, K. (2007). Meeting the Universe Halfway: Quantum Physics and the Entanglement of Matter and Meaning. Durham: Duke University Press.CrossRefGoogle Scholar
  7. Bryant, L. (2011). The Democracy of Objects. Ann Arbor, MI: Open Humanities Press.CrossRefGoogle Scholar
  8. Butler, J. (2004). Precarious Life: The Power of Mourning and Violence. London: Verso.Google Scholar
  9. Deleuze, G. (1992). Postscript on the Societies of Control. October, 59, 3–7.Google Scholar
  10. Dillon, M. (2008). Security, Race and War. In M. Dillon & A. Neal (Eds.), Foucault on Politics, Security and War. Basingstoke: Palgrave Macmillan.CrossRefGoogle Scholar
  11. Dittmer, J. (2014). Geopolitical Assemblages and Complexity. Progress in Human Geography, 38(3), 385–401.CrossRefGoogle Scholar
  12. Ericson, R. V., Doyle, A., & Barry, D. (2003). Insurance as Governance. Toronto: University of Toronto Press.Google Scholar
  13. Ewald, F. (1991). Insurance and Risk. In G. Burchell, C. Gordon, & P. Miller (Eds.), The Focuault Effect. Studies in Governmentality (pp. 197–210). Chicago: Chicago University Press.Google Scholar
  14. Experian Limited. (2009). Improved Outcomes Through Applied customer Insight; Experian’s MOSAIC Public Sector Citizen Classification for the United Kingdom.Google Scholar
  15. Foucault, M. (1984). What is Enlightenment? In P. Rabinow (Ed.), The Foucault Reader. London: Routledge.Google Scholar
  16. Foucault, M. (1986). The History of Sexuality Volume 3: The Care of the Self. London: Penguin.Google Scholar
  17. Foucault, M. (1990). The History of Sexuality Volume 1: The Will to Knowledge. London: Penguin.Google Scholar
  18. Foucault, M. (2007). Security, Territory, Population: Lectures at the College de France 1977–78. Basingstoke: Palgrave Macmillan.Google Scholar
  19. Foucault, M. (2008). The Birth of Bio-Politics: Lectures at the College de France 1978–1979. Basingstoke: Palgrave Macmillan.Google Scholar
  20. Gitelman, L., & Jackson, V. (2013). Introduction. In L. Gitelman (Ed.), “Raw Data” is an Oxymoron. Cambridge, MA: MIT Press.Google Scholar
  21. de Goede, M. (2012). Speculative Security: The Politics of Pursuing Terrorist Monies. Minneapolis, MN: University of Minnesota Press.CrossRefGoogle Scholar
  22. Grove, K., & Pugh, J. (2015). Assemblage Thinking and Participatory Development: Potentiality, Ethics and Biopolitics. Geography Compass, 9(1), 1–13.CrossRefGoogle Scholar
  23. Hacking, I. (2006). Making People Up. London Review of Books, 28(16), 23–26.Google Scholar
  24. Lyon, D. (2015). Surveillance After Snowden. London: Polity Press.Google Scholar
  25. Mach, E. (1883). The Science of Mechanics: A Critical and Historical Account of Its Development. London: Open Court Publishing.Google Scholar
  26. Mythen, G., Walklate, S., & Khan, F. (2013). ‘Why should we have to Prove we’re Alright?’: Counter-Terrorism, Risk and Partial Securities. Sociology, 47(2), 383–398.CrossRefGoogle Scholar
  27. O’Malley, P. (2012). Risk, Uncertainty and Government. London: Routledge.Google Scholar
  28. Raley, R. (2013). Dataveillance and Countervailance. In L. Gitelman (Ed.), “Raw Data” is an Oxymoron. Cambridge, MA: MIT Press.Google Scholar
  29. Valverde, M. (2007). Genealogies of European States: Foucauldian Reflections. Economy and Society, 36(1), 159–178.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Nathaniel O’Grady
    • 1
  1. 1.Geography and Environmental ManagementUniversity of the West of EnglandBristolUK

Personalised recommendations