‘Smartphone’, forthcoming (2015) on Making Things International Vol II,
edited by Mark B. Salter, University of Minnesota Press.
Peter Chambers
The theory changes the reality it describes.
Philip K. Dick, Flow, My Tears, the Policeman Said
RIOT
In February 2013 a friend sent me a link to an obtained video hosted on The
Guardian’s website, detailing a datamining tool developed by Raytheon1,
called Rapid Information Overlay Technology (RIOT). 2 RIOT allows the user
to quickly assemble a clear picture of a person’s network of associates and
their movements, as revealed through their habitual, normal smartphone use,
the repeated patterns of which can then be visualized in a number of ways to
accurately disclose their networks of association and predict their future
behaviour.
The smartphone is an extremely subtle and complex device whose uses,
agency and affects depend greatly on the assemblages in which it is an actant.
The effectiveness of the smartphone in RIOT’s marketable surveillance
assemblage, for example, depends on the interoperation of a large number of
programmed systems, with interested group agents such as the Raytheon
corporation and the US government at various ends. It also depends on the
broader, shifting social interaction between smartphones and their human
1
and nonhuman users in their average, everyday dealings with one another via
their smartphones – for this is, after all, why the precise pattern of data is
there in the first place and for the foreseeable future.
Careful consideration of the surveillant assemblage visible through RIOT
prompts us to rethink agency and causality: is any ‘one’ in control here? To
what ends are these tools being put, and what are their probable and possible
futures? To what do individual smartphone users and system-agents of their
surveillance tend to pay attention? What kind of control might they seek, and
what might they have? Considering the smartphone’s enmeshment here also
encourages us to think very carefully about the possible political dangers this
engenders, encourages and normalizes. These are political dangers which, the
2013 mass surveillance disclosures3 amply demonstrate, are no longer science
fiction, the cool-but-creepy imaginings of DARPA’s Strategic Technology
Office, or even marginal practices that are only the obsessive worry of
paranoid cranks and conspiracy theorists. Rather, they are the by-now-normal
political technologies of the National Security Agency (NSA) and its project of
total planetary surveillance through PRISM, Boundless Informant4, and the
many other projects, programs and applications of which large numbers of
people are not yet aware, may never be, and may not even care to know
about.
So far, the repercussions of the mass surveillance disclosures have appear to
have perturbed the NSA5 without functionally altering its strategic
programme and its various programs. Nor has it upset smartphone use,
which continues to increase, emanating from affluent young and business
2
users, but diffusing globally as the price of handsets and data continues to
fall. In 2014, global smartphone uptake sits at approximately 1.75 billion
users6. By 2017, most people in wealthier countries who wish to have a phone
will have no choice but to have a smartphone7: it will be the only consumer
choice. In the same year, smartphone use is projected to hit 2.5 billion users,
33.8% of the world’s population.
The further speculative assertion in this paper is that the smartphone is a
paradigm shift in computer use, not just an advance from mobile telephony.
This is evidenced by the business models of Apple, Google, and Facebook,
now predicated on increasing consumer reliance on smartphones: Apple
through the app-hardware-ecosystem, Google through Android and search,
and Facebook through manipulation of attention and emotion8. The
smartphone, I contend, is the qualitatively dominant new paradigm for
pervasive computing. Along with the tablet, it is reshaping what networked
computing means, and thus what it means to be surveilled. The imbrication of
our mundane culture of everyday smartphone use in smartphone-predicated
surveillance has global reach and profound implications for our life in
common.
In this chapter, I read the smartphone as an actant whose modulating agency
and meaning is intelligible through a number of moments, which have been
chosen for their value in helping us better understand the emergent power
relations that now appear visible through assemblages like those to which
smartphone uses like Facebook, Twitter, webmail, RIOT, PRISM, and
Boundless Informant are now attached and interact with. These power
3
relations are also international relations: they upset conventional
understandings of the international while remaking relations anew. From one
perspective, smartphone-predicated surveillance and its implications indicate
that adding Niklas Luhmann’s conception of the international to our existing
understanding is appropriate. For Luhmann, the international no longer
refers to “a relation between two (or more) nations but to the political and the
economic problems of the global system”9. This is not to say that the
international of old, predicated on regional differences, institutionalized
hierarchies of governmental authority, enforceable territorial monopolies on
physical violence, diplomacy and (thus) the political sovereignty of nationstates no longer exist or matter. They do, and greatly: but their precise
meaning, as well as the extent to which they matter, are also being partially
transformed through smartphone predicated-surveillance. It is this making
and remaking of the international that this chapter works toward better
understanding.
What follows also raises the question of the United States as a nation in its
sovereign relation to its others, for both the smartphone and the NSA are
American inventions and American projects. Vladimir Putin was wrong to
describe the Internet as a ‘CIA project’, but perhaps only because he
incorrectly named the central agency and device10. Connecting the
smartphone to its relations also means considering what citizenship means:
‘inside’, ‘outside’ and in relation to this nation-state in particular and the
nation-state form in general. Seeing the NSA’s tools and techniques as ‘merely
that’, and not as political dangers as suggested above, is about trust. It means
trusting government agents who say they are acting in the name of the United
4
States, which nonetheless still professes to be a liberal democracy. But as the
NSA’s practices affect every smartphone user globally, it also means trusting
that the US’ interests, even if they still are the liberal democratic interests of
its citizens, are international interests, global interests, our interests. As
Putin’s remark says in its own way: this is asking a lot. The enmeshment of
our smartphone use in the NSA’s machinations should lead us to question
what USA stands for.
Do Internet users have a right to privacy and anonymity online (did we ever)?
Do we have a right not to be killed – globally, locally, overseas, or at home –
for what traces of our online operations reveal as suspicious to the NSA?
What does citizenship mean when the leaders of powerful nation states and
US citizens all alike are the target objects of this new surveillance? What does
citizenship protect us from when certain among them are assassinated – even
as citizens – based in part upon what their smartphones told the NSA about
who and where they were? These questions guide what follows.
This reading of the smartphone’s power effects and political implications will
be done in three stages. In the first section I take a phenomenologically
inspired approach, touching on what may be significant and different about
the way we tend to pick up, hold and use smartphones, as well as how we
may subjectively understand this experience. The gambit behind the
conjoining of ‘the thing itself’ and the far more general account of power
effects is that we cannot understand the surveillant networks that the
smartphone is entangling increasing numbers of us in without first ‘picking
up the phone’ – not, for a change, to send a message or check the contents of
5
one just received, but to try to encounter those other aspects of it which, as
Heidegger would say, remain veiled in our concernful everyday dealings
with smartphones as ready-to-hand equipment11. This is a matter of
understanding how it is that smartphones have come to pervade so many
people’s lives so quickly, as well as why it might be that so many people seem
stubbornly unworried about their involvement in what are always also
potentially the NSA’s activities.
The second section focuses on the way big data interacts both with subjective
experiences and culturally normal habits and patterns of smartphone use and
surveillant attentions. This provides a bridge and door onto the third section
on emergent power relations. Here, I focus on two salient, broader effects
produced when the cultures of use engendered by everyday interactions of
smartphones become entangled in smartphone-predicated surveillance:
control and spectacle. The assumptions underpinning the particular
importance accorded to the smartphone for understanding power relations
are as follows. There is no NSA without big data; there is no big data without
pervasive networked computer use. This happens once computers are
connected to the Internet by default, part of the ‘always on’ concept that
accompanied the switch to broadband, then wireless, in the first decade of the
twenty-first century. The only simple, effective safeguard against the NSA’s
techniques is an air-gapped computer,12 a computer physically isolated from
unsecured networks. However, pervasive computing is increasingly being
conducted through smartphones, devices which are constitutively networked
and networking. This means that smartphones are always disclosing their
users’ patterns and whereabouts to the NSA, while it also means that the
6
patterns of data are more telling, as RIOT indicates. The further importance
here is that smartphones are very difficult for most users to modify and hack.
Even judicious and well-informed use is no guarantee against the NSA’s
methods, and no guard of privacy and anonymity. In this assemblage, the
smartphone is a surveillant device. These difficulties are also relevant for
understanding tablets. But one thing distinguishes the smartphone from
laptops and tablets. Smartphones follow their users around. Users carry them
everywhere – many even take them to bed. This means they disclose dynamic
locational data, a rich, relational, accurate topography of moments, places and
people. This now-central topography of power relations re-making the
international is where we have to get to, but to begin with, let us first pick up
the thing itself, these telling companions of everyday affluent life.
picking up the smartphone
Smartphones are magical devices to use, to have and to hold. The smartphone
is not merely subtle, complex and magical, it is an extremely seductive piece
of technology. The world in which a smartphone is central, crucial, and
necessary to so many people is vastly different to the one in which the stirrup
occupied a similar place.13 Yet the smartphone’s subtlety and complexity is
belied by the presented unity of the device itself: the user sees, picks up,
holds, and interacts with the tactile graphical user interface of a thoughtful,
even beautiful piece of modernist industrial design. This hides what,
following Benjamin Bratton, we might call a ‘densely stacked architecture’14,
that labyrinthine genealogy of theories, engineering, circuitry and labor that
every manufactured handset holds within its frame. The smartphone is an
7
embodied idea, an enacted metaphor; and it is brimming with over a
century’s worth of deep and careful thought. The presented unity of the unit
effaces this extraordinary work of design and development, the predicates
and predecessors of each of those smoothly integrated elements, the obstacles
of thought, materials, design and manufacturing that stood between its past
and its presence.
The smartphone is also an interface that effaces its traces, as Derrida might
playfully put it. In other words, part of what’s amazing about the paradigm
for smartphone design – set by Apple – is the way the presented unity takes
all that twenty-first century complexity and renders it perceptually invisible
and functionally irrelevant. This is fundamental to generating an end-user
experience that encourages continual smartphone use for a large and growing
number of functions: telephony, email, messaging, photography, social
media, logging in, notetaking, cross-platform data input, storage and
retrieval, etc, etc. The intuitive, appealing ‘simplicity’ of the smartphone’s
interface, regardless of the function or app, leaves the user free to intuit self
and world by calling forth actions, notifications, calculations, information and
sociality all just by stroking and tapping its tactile graphical user interface.
This is, indeed, very smart; but a further part of how it works so well and so
subtly is also about what disappears.
Smartphones are better thought of as mobile computers, not phones. To the
extent they become ubiquitous, smartphones involve pervasive mobile
computing over digital information networks through the tactile graphical
user interface of a device that is handheld, pocketable, and highly portable.
8
Smartphones are about pervasive computing, which as Galloway notes, “seeks
to embed computers into our everyday lives in such ways as to render them
invisible and allow them to be taken for granted.”15 The laptop liberated the
computer from the desktop and the plug outlet, first for the time dictated by
battery life, then for the space dictated by access to Wi-Fi. The smartphone
has done more than liberate networked computing from the lap: the tactile
graphical user interface places any number of computationally-possible
functions behind the touchscreen’s glass in the hand of the user, who is
‘liberated’ not only from having to sit at a desk and type data into a computer,
but from even thinking about the smartphone as ‘a computer’ in the sense
made conventional by the desktop metaphor of computing. The net effect is
already this: in an actant network in which computing is omnipresent, the
computer appears to have vanished.
As the computerness of the smartphone is has been rendered largely invisible,
the valid prepositions16 of computer use are changed, and our relations and
dispositions of computer interaction with it. Smartphones are used for any
number of tasks, all of which – though they involve automating, databasing
and networking actions through a graphical user interface – do so in such a
way that is so unobtrusive that it no longer need be recognized as computing
at all. Smartphones are ‘used with’ and ‘used while’, and here, crucially,
while to an outside observer (or a frustrated loved one, pet, or public spacesharing commuter) our attention is all-too-involved with the device,
subjectively our attention is given over to whatever tasks the device is
performing for us, and not the device as the device, or the device in its
implications for surveillance, or our intimate lives – or the future of humanity.
9
When we use it as equipment, the smartphone in its equipmentality17 recedes
into the background, precisely in order to be available to us as equipment. All
that computing we’re doing becomes both pervasive and unobtrusive. The
smartphone not only means that the computer vanishes, it also means that the
smartphone itself recedes into the background as we focus on the task at
hand. We not only do not think of the smartphone as a computer, very often
we do not think about the smartphone at all.
Having a computer unobtrusively compute while one performs any number
of tasks in a way that is not seen as computing not only renders invisible the
omnipresence of computing. It also seems plausible to suggest that it would
tend to make people unaware that any computing is going on at all –
precisely where-and-while computing is going on all the time. This becomes
significant when so much of this computing amounts to data entry being
performed for corporations in exchange for access to their services. How
many of us think of our messaging practices as ‘doing data entry work for
Facebook’, and by extension the NSA? Facebook’s business model is based on
a wager here: that we will continue to perform the data entry, while never
experiencing this as performing labour for a corporation (or really caring even
if we do), but rather as simply interacting with the people we ‘like’. The
NSA’s surveillance model is based upon a second order wager of sorts: that
not only will we continue to perform the data entry work without
experiencing it as producing the elements of value and profit for a
corporation, but that we will never enquire how that data is being used, or by
whom, nor will we think of it as performing data entry for the NSA. We will
not know if we are being surveilled, not as we perform our data entry, nor
10
afterwards, if our inscriptions are found to contain suspicious patterns.
Pervasive computing using a smartphone according to the double wager
always contains the potentiality for unobtrusive intrusion. Everyday
smartphone use in this assemblage is ambient surveillance, both in the
moment, and in retrospect.
As well as being powerful, handheld, mobile computers that involve us in
ambient surveillance, smartphones, following Christian Licoppe, are
notification devices that are designed-to-occur. They summon subjects to
respond to a huge number of requests, and the momentum generated through
these summons is, if you will, what makes the world go round. This world
precedes the contemporary human subject: the world of the employee,
student, daughter or friend is a world which we all must respond to our
summons, and the smartphone is becoming the de facto device through
which the summons appears.
This goes toward explaining why it is that smartphones have become so
pervasive so quickly18in the affluent West. Among other reasons,
smartphones have been enthusiastically inserted in these actant networks
because of intense social pressure from human actants. For increasing
numbers of these globally diffused groups and classes of people, you cannot
not have a phone; unless you are an eminent old technology theorist like Paul
Virilio – who famously refuses to have a mobile phone of any kind – it is very
difficult to choose not to choose. Sherry Turkle’s recent research in Alone
Together shows clearly that (affluent Western) parents make their children
carry them for their own safety, just as bosses expect their employees to have
11
them – and have them within earshot and arm’s reach, at all times. Being
within reach of a phone, and being flexibly available to respond promptly to
any and all notifications that arrive through it – in a way that only doctors
and drug dealers were available in the early 90s of the rich West, via pagers –
has become an absolute social responsibility for all, whose nonnegotiability
must nevertheless somehow be negotiated.
The culturally normal social pressure to be reachable to negotiate timely
responses via a mobile phone that is increasingly a smartphone tells us
something important about contemporary affluent capitalist human centers of
attention. Most people enmeshed in these assemblages are too busy coping
with their summons to worry about the global implications of smartphonebased surveillance. The combined power of the summons and social pressure
offer two further reasons why people are unwilling or unable to stop using
their phones. Firstly, most people so enmeshed cannot stop using their
smartphones. Smartphone use is a matter of obligation to friends, family and
work19. Secondly, smartphone users can’t or don’t stop, in spite of whatever
misgivings or ambivalence they may have20. This is because, having become
the intermediary that interfaces between the many spheres of people’s lives,
smartphones are also that which is used to cope with the coping.
Smartphones are that through which the heavy summons to work keeps
arriving, but they’re also that through which many people choose to lighten
the load of the work summons – by gossiping and bitching about it.
Christian Licoppe’s empirical research around this conjuncture helps us zoom
in on subjective centers of smartphone attention with greater precision.
12
Licoppe’s research demonstrates that people recover agency in these
pressurized contexts by enacting a very complex intersubjective patterning
around the negotiation of being available to communicate. This is one key
place where the conscious work of coping takes place. Cellular phones,
‘dumb’ and smart alike, offer ways and means of coping by enabling human
actants to negotiate their availability or make others available to them. In this
context, Licoppe argues, people learn ways to cope, playing within the
protocols, but between the rules. This inter-action materializes a key tension.21
The tension is in the attentional involvement the phrasing and timing of a
communicated response; the involvements are in our relationships; and our
relationships, work and play, are profoundly shaped by the anxiety of having
to do things and the subjective necessity of arranging this in such a way that
we can keep coping. In the background is, of course, work under capitalism,
but in the foreground there we are with the phone in our hand – thus these
negotiated moments of coping are key points where the work takes place,
again and again.
In their various functions as part of pervasive computing, smartphones are
also about augmentation22: and this speaks to their subtlety, their subtle,
ongoing additions to our lives. As mentioned, the smartphone is a computer
liberated from the functions, tasks, settings and dispositions that computing
was formerly paradigmatically understood to involve. This also means that
the smartphone can accompany a large and increasing number of everyday
human activities that it adds to by augmenting. That is: providing
information and guidance, keeping records – storing, transmitting, processing
13
things, while we pay attention to what we’re typing, to ‘the content of
content’.
One means of facilitating this augmentation is through the use of an app.
Aside from the institution of the touchscreen mentioned above, one of
Apple’s other paradigm-shifting innovations here was in facilitating the shift
toward fast, searchable app stores. This revolutionized phone use by
transforming the smartphone into a single-interface life augmentation device
that can solve any number of problems through the quick, effortless, cheap
purchase of an app: ‘there’s an app for that’, as the phrase goes. As Charles
Arthur reports, this encouraged the use of larger quantities and different
forms of data, not just text messaging, within what was mobile telephony.
This transformed the mobile telephone market, “where mobile internet
connectivity had previously been parceled in per-megabyte allocations, to
screens with tiny displays”23, ‘data’ became a saleable commodity, driven by
insatiable consumer demand. This transformation, along with increasing
processing speed and screen real estate, further opened the market for apps.
More data and speed, more apps; more apps, more need for data and speed.
Augmentation has fed a recursive loop of data supply and data demand – all
of which, barring government imposed limits on their data collection practice,
offers an ever richer data set to NSA. This brings us to its other specificity: the
interface, and how it’s used both to bring the face close and keep it at a
distance.
My interpretation of findings from Licoppe and Turkle’s research indicates
that smartphone use can be read as affording many users a sense of safety by
14
securing a sense of effective control: used in this way, the smartphone
becomes a control interface24. To follow Turkle a little further, one of the key
patterns within this general culture of use is that many people use their
smartphones to ensure that only some people and things can get close, while
using it as a way of staying in touch – at a distance determined by the
controller. The control that interests individual users most is the control of
social distance: the smartphone allows some to get very close, while keeping
others as distant as possible, or only as close as is absolutely necessary. Many
of these distances are smartphone generated, such as the location-aware gay
dating and cruising app GRINDR25, which makes visible a heretofore invisible
proximate landscape of sexual desire which is both local and between
strangers. GRINDR is a way of using smartphones to make globally mobile
sexual desire local.
These paradoxical relations of intimate distance central to our smartphonemediated social lives are aptly captured by Turkle’s central phrase and title
‘alone together’. To say ‘alone together’ suggests an interface as both a
connection and a gap, and we should add this controlling notion of
interfacing to the notions of pervasive computing and augmentation just
developed. For those involved in this culture of control, the interface becomes
a separation that keeps things together. As Peter Sloterdijk notes (and we
should certainly think of Facebook here):
It is no coincidence that the most distinctive new place in the innovated
medial world is the interface, which no longer refers to the space of
15
encounter between faces, but rather the contact point between the face
and the non-face, or between two non-faces26.
This distinctive new place is, moreover, a control interface that needn’t be
about faces at all anymore, and might even increasingly be about actively defacing face-to-face intimacy in preference for the placid apparent
controllability of the non-faced Gorilla Glass™ tactile graphical user interface.
If power relations consist in the conduct of conduct (to paraphrase Foucault),
then pervasive computing through smartphone control interfaces is surely
one increasingly important ‘contact point’ where that conduct is conducted.
In this section I’ve suggested that this conduct is conducted here for a number
of reasons, key among which is re-establishing relational agency over social
distance. These are subjective practices related to a certain culture of use. Yet
regardless of how we subjectively experience or practice this interfacing,
objectively it is currently a part of Raytheon’s business model and the NSA’s
surveillance model. But how does this person-specific, locational, relational,
dynamic disclosure of and by smartphones and their users in these actant
networks become the kind of resource that makes the NSA’s methods “the
easiest most efficient and most valuable way”27 to achieve surveillant ends?
This can be seen clearly by looking at surveillant smartphone assemblages’
entanglement with big data.
surveillant smartphone assemblages’ entanglement with big data
Surveillance is a form of attention to data. With mid-century modern forms of
surveillance (cold war espionage) good data was difficult to obtain, extremely
16
dangerous to transmit, and often required meticulous decryption if and when
it was finally recovered. With RIOT we can see within the space of a few
minutes how the smartphone’s surveillant interaction with big data means,
first of all, that information about a subject of interest is no longer a scarce
resource. Surveillance here – making good on that data by transforming it
into legible information – becomes a question of access, retrieval, and making
easily intelligible sense of a hyperabundant resource. It also means turning a
vast quantity of data into instantly visualizable, easily legible, quality intel,
which requires computer power, smart coding, and creatively solving many
design problems, including data visualization. Yet RIOT’s skimming of a
mass of publicly available data indicates a further transformation engendered
by pervasive smartphone use. Here, data is a hyperabundant resource that is
easy and legal to obtain, aggregate, and transform into a saleable commodity.
Surveillance in the era of big data and smartphones already looks more like
routine software development than espionage, more geek than spook.
This semblance of technical, defensibly legal surveillant skimming is itself
generative. Big data and smartphones engender a dynamic of reciprocal ease
that feeds recursive increases in data input and data-based surveillance. As
analyzed above through augmentation, the smartphone has lowered the
investment, cost, and effort of the increasing number of actions it enables for
the user, to such an extent that it has actually transformed the mobile phone
market into being about providing cheap, abundant data reliably accessible at
high speeds, while generating a new, multibillion dollar market for apps. The
existence of cheap data, its high speed delivery and beautiful, near-instant
presentation and the prevalence of an enormous number of high-quality,
17
useful apps feeds the recursive development of big data, simply because it
makes it ever more compelling to use a smartphone for almost everything. To
the extent that it’s accessible to the automated datamining analytics and
human analysts of the NSA, this means that a rich source of constantly
updated, highly detailed ostensibly public data has become available for a
number of surveillant purposes limited only by the resources and creativity of
the cybersecurity industrial complex.
Data only becomes information for human purposes to the extent that it is
rendered useful, readable, communicable. Big data is only a resource because
it is capable of becoming decrypted, legible information at various points in a
communication network, and communication networks only exist because
there are faces and/or non-faces ‘on the other end’ (thus far). Dwelling on the
technology in the smartphone, between smartphones, as part-and-parcel of
what they do, shows that in practice it’s impossible to separate what it is from
what it does and who’s using it: it’s entanglement all the way down, all the
way out. That is to say, data’s intelligibility as good information for
surveillant purposes rests upon seeing the functional relation between parts
of a greater entanglement, and the implications and uses thereof.
Government agents are applying inductive reasoning and reflexive
understanding to the smartphone and using it socially according to
culturally-agreed surveillant purposes or ends.
With this in mind, we have to consider the making of the international
through surveillant smartphone assemblages: in order for there to be
surveillant attention such as has been discussed so far, there has to be
18
reflexive understanding that a global network exists and can be used in this
way. Smartphone-based surveillance in its various applications, through its
many tools, all manifest ways of imagining the Internet and social relations.
They are an implemented social theory of control – and it works. The fact that
RIOT exists and that there is a lucrative government market for it tells us,
moreover, that this is a reflexive understanding firmly in possession of a large
number of agents working in the name of states such as the United States and
its allies. We may not think of our normal Internet and smartphone use being
about surveillance, but increasingly large numbers of state-attached actors
already do. That Snowden fled to Hong Kong, then Russia, shows us that the
international of old still matters greatly, but in the light of what Snowden has
disclosed, it matters with a difference that makes a difference to the
international. Snowden’s living body is safe in Russia, but Snowden’s
disclosures teach us that no one connected to the Internet is out of reach of the
NSA, and everyone, anywhere with a smartphone is capable of being tracked
and traced. To the extent that we become conscious of this and it shapes our
conduct in any way, this means we are all being governed by the USA as the
NSA.
Consider also Chancellor Angela Merkel’s ‘Hackberry’ experience.
Notwithstanding its usual functions and the datatrail left by her everyday
smartphone use, Merkel’s Blackberry – a system marketed as being immune
from normal smartphone surveillant attention – was deliberately designed
and intentionally manufactured with exploits that made it a bugging device28.
According to the NSA’s own guidelines, these actions must have been
approved by the Director of National Intelligence and the Attorney General.
19
More recent disclosures show “that the Obama administration obtained a topsecret court order specifically permitting it to monitor communications
related to Germany”29. This opens profound questions about the surveillant
use of the smartphone in contemporary international relations in the
conventional understanding of the term, especially as more recent revelations
show that Merkel was one of over 122 world leaders targeted: on one list,
Merkel’s name appears between Mali’s Amadou Toumani Toure and Syria’s
Bashar Al-Assad30. As it involves reflexive understanding of the surveillant
purposes of smartphones by high-level government employees, it also
renders suspect the meaning of conventional definitions of the international.
Angela Merkel’s ‘Hackberry’ is an instance of the international as a problem
of the global system of society seen within the global system of society. It is
also about the use of the global system of society by US interests in full
knowledge that this is what the international now means. To be sure,
surveillant attention through smartphones is not the only conception or
practice of the international being practiced globally, but it is remaking it in
its form. It is the application of a new understanding to old practices that is
transforming the form, substance and meaning of both, while raising
profound questions about the form sovereignty and liberal democracy being
professed and practiced in the contemporary USA.
Consider, finally, the assassination of ‘militants’, ‘terrorists’, or people
otherwise identified as killable categories of person by the United States, dealt
with according to the Disposition Matrix. Throughout the Global War on
Terror, a key distinction that remained intact – for all its expedient blurring –
from the US side was the distinction between citizens and foreigners. This
20
distinction was consequential for many detained, tortured and killed by the
United States who – arguably – would not have been so treated had they been
US citizens. The application of many GWOT techniques to Chelsea Manning
perhaps shows that the US now only extends the privileges of citizenship to
those who behave in US interests. As for the Disposition Matrix, if the suspect
is abroad, not coming back, cannot be arrested by a reliable government, is
important enough to warrant action overseas, is an operational leader, and is
deemed to present an imminent threat to the US, then he or she can be
targeted with lethal force. There is nothing in the Disposition Matrix about
citizenship, only location. This is its first question: where is the suspect
located31? Where this question becomes a key question for the smartphone’s
entanglement in surveillance is that, much more than earlier iterations of
mobile phones, the smartphone gives precise, ongoing locational data. The
means that the only rational strategic response within a terrorist organization
that does not wish to have its members assassinated is the complete non-use
of the smartphone, while it also means that the smartphone is, in effect, a bug,
a tracker, and a great improvement on earlier missile guidance technologies,
all rolled in to one – not least of all because the target fits themselves, carries
the beacon without having it stuck to them, and pays for doing so.
the effects of surveillant smartphone assemblages: spectacle and control
If smartphones can be thought of as a key conduit for the conduct of conduct,
then understanding their characteristic power relations means rendering
intelligible the predictable broader effects of their use; what their use does. In
other words, what might characterize the politics and power relations of a
21
possible world in which pervasive smartphone use becomes ubiquitous , and
which surveillant attention thereof by NSA is accepted as normal, or
unstoppable, or even acceptable? In what follows I develop these possibilities,
always necessarily speculative, as spectacle and control.
Deleuze’s famous conception of control power32 re-reads Foucault’s account
of panopticism33 in order to apprehend an emergent post-panoptic dispositif.
The operability of control power is, first and foremost, about a reflexive
relation to networks and networking, as well as a know-how that harnesses
this understanding to shape the field of action of others.34 This accords well
with the way in which the surveillant purposes of smartphone use interface
with big data, as explored in the previous section. In every way control power
is about positively harnessing networking by letting agents connect, fostering
conditions of connecting, and promoting mobile connection and active
collaboration as a normative way of being. Where discipline was about
keeping the grid locked down, control is about letting the network free.
Control is not an intentional agent here. Rather, smartphones provide
technical affordances that enable effective control, while their imminent
ubiquity means that effective control is, as it were, now approaching total
network coverage.
A fundamental insight I take from Postscript is that a central political
question of our time is not “who are you?” but “where are you”? Control
power is a know-where, and pervasive computing using smartphones has
allowed this topology of power/knowledge to arrive in a workable form. As
Deleuze wrote, “[In] the conception of a control mechanism, giving the
22
position of any element within an open environment at any given instant...
what counts is not the barrier but the computer that tracks each person’s
position – licit or illicit – and effects a universal modulation.”35 At the time of
writing, Deleuze couched these assertions as speculative, remonstrating that
this conception “it is not necessarily one of science fiction.”36
For us, the point is a fact of average, everyday life with the smartphone, even
if, as explored, much of this escapes human possibilities of perception and
habits of attention. Geolocation, most commonly used at the time of writing in
conjunction with maps and tagged photos, means that an increasing number
of agencies have near-instant access to a rich relational topography of
moments, places, and interactions. Smartphones don't just describe where
they are because they are networked (though this is part of it: IP addresses,
cell tower triangulation), but they do so with an extremely high level of
precision because of GPS, accelerometers etc,. It is this dynamic locational
data that allows RIOT to so accurately map habitual movement and predict
future behaviour, and this is predicated on the ubiquity of GPS and
triangulation technology in smartphones, and their use in conjunction with
maps, photo apps, and certain kinds of social networking apps. The majority
of smartphone users, thus far, use location services37, and do so for an
increasing number of functions: Foursquare, to give one example, relies on a
small but growing and apparently influential market of people willing to
disclose their location to their social network38. This is not a matter of accident
or a lack of consumer awareness, it is, rather, a feature built into smartphones
that has produced an industry coding, designing and marketing apps that
some consumers are very happy to pay for and use on an everyday basis. Is
23
control something that repels people, or attracts them39? Or, perhaps: which
people are so attracted to control, and why do these groups matter to
marketing?
The pervasion of this uptake has the following power effects. That which is
trackable and traceable is controllable, to the extent that it is reachable. This
means that pervasive mobile computing through smartphones is enabling an
effective response to the “where are you?” question. Tagging and tracking is
how control is effectuated; it is now a normal way in which mobility is
transformed into secured circulation. The Disposition Matrix is one practical
governmental application of this power of know where.
Control does things, it achieves conditions (not least of all itself): and it does
them lightly, easily, effortlessly. It is a question of reducing impedance to
effect a universal modulation. Control is also non-coercive in that it enables
various agents to know subjects of interest without breaking (into) anything
or anyone. In this sense control power is about modulating circulation to
ensure it continues safely and softly on its accumulative, consumptive path.
This, in turn, is effective in a more diffuse sense, because it is feeding and
shaping a re-assembly of the relations between power, knowledge and the
body. Control allows actions and functions of the body to be engaged in
virtually unimpeded (unlike discipline); and this also facilitates a partial
realization of the fantasy of the body’s liberation from its own human limits
(an escape from discipline and abjection). This is – yet another – fantasy of
control. It is also fundamentally about pain.
24
Just as it enables control to become effective, the smartphone takes the pain
out of being human by taking discipline into itself. Humans have always
outsourced discipline to their favoured nonhuman objects: outsourcing
hardness to our hammers, sharpness to our knives, and the effort required to
plough to the plough horse. In a sense the smartphone is one continuation of
a whole trajectory of prosthetic technologies. What’s specific about it is the
way it functions as a memory prosthesis: as far as control power is concerned,
the smartphone is a mnemonic device, both for the end user holding her
phone and, as it turns out, for the NSA. Remembering is a pain, it requires
effort, it fails. The smartphone is eminently capable of sparing its users this
pain of remembering, and provided our data entry practice is sensible and
sensical (and we have the appropriate apps to enter that data into), users can
relax and just follow the smartphone’s instructions, messages, reminders (or
for that matter tag and follow a subject of interest, whether friend or foe). The
fact that we still have to conduct data entry and rendezvous in realtime in
timespace may be one aspect of why this feels stressful to many people.
But in a Marxian spirit, consider what this entanglement does to the working
day. The discipline of the smartphone does not fade over the course of the
day; it remains resolutely attentive, not bored, and comprehensively accurate
and complete in its reports, until its battery dies. If it’s on, it works, and if it
works, it totally works – so unlike the human who carries it. What we have to
consider here is how habitual involvement in the smartphone assemblage is
transforming the meaning and value of attention, and how this contributes to
control effects.
25
Human attention is an economic relation, a scarce resource in societies
oriented toward perpetual increases in GDP growth. Here, the netting of
individual attention for capitalism and its tethering to networks of
distribution and consumption is a key potential for the capture of profit.
Attention is the key value that advertising and marketing seeks to attract and
shape, and it is difficult to get people’s attention, and even harder to keep it.
The stream also has to constantly renew itself, because the novelty wears off.
Content production, in Paul Leslie Thiele’s phrasing, routinizes novelty40,
which devalues novelty itself as it becomes expected, demanded, sooner,
more, and for free. Human attention also tends to dissipate; retaining it over
time becomes increasingly difficult.
Smartphones continually solicit human attention, and they are also good at
holding all-too-fickle human attention by allowing it to divide between
several tasks, each of which, being the bearer of continual notifications,
summons the subject again and again to look and respond.41 It matters
profoundly who and what smartphones enable us to pay attention to. Yet for
the purposes of maintaining accumulative circulation, the content of content
is objectively indifferent – content is merely a matter of subjective interest.
What counts is where you click through. The user may be profoundly
invested in the notion that their chosen content is positively contributing to
making them who they are, an individual unlike others. Fresh content
refreshes the individual’s sense of herself as uniquely interested and
interesting, and indeed, Google’s business model is predicated on generating
meaningful, marketable patterns from the big data this produces. However,
from a systemic point of view, what or whether we are watching, playing,
26
working or communicating with does not matter as much as that the users
keep using, as long as we remain a society of content consumers. With
Jonathan Crary’s interpretation of Debord, I want to call this aspect of the
smartphone assemblage spectacle. 42 Here, spectacle would be the generic
relation of separation maintained by our attention to the smartphone, a
relation that contributes to the maintenance of accumulative circulation.
Crary’s work on this set of critical theoretical connections gives us a novel
way to think about spectacle and control together. Spectacle is the generic
social relation of separation engendered by this mobile architecture, and
control is the power-effect generated.
Spectacle is not primarily concerned with a looking at images but
rather with the construction of conditions that individuate, immobilize,
and separate subjects, even within a world in which mobility and
circulation are ubiquitous. In this way attention becomes key to the
operation of noncoercive forms of power.43
Spectacle and control: light, mobile, separated, alone together. Turkle aptly
sums up what may become of everyday lives involved in this assemblage:
“[w]e fill our days with ongoing connection, denying ourselves time to think
and dream. Busy to the point of depletion, we make a new Faustian bargain.
It goes something like this: if we are left alone when we make contact, we can
handle being together”44.
27
A critical theory of the smartphone has to dwell upon the fundamentally
paradoxical, thoroughly ambivalent outcome of all this. The smartphone
enables many novel, useful, fascinating connections, by capturing human
attention and tethering it to networks of associates who seek, intentionally, to
leverage that attention for profit – and the constitution of this network has
also enabled the generalization of a form of surveillant attention that achieves
spectacle and control in a way more effective than previous governmental
attempts here. It’s true we nominate our apps, select our settings, and can
disagree to the terms and conditions, but the common denominators of
control and spectacle apply societally regardless. Moreover they are
conditions that require us to think differently, because they are nonhuman,
trans individual, infrastructural, and systemically integral, all at once.
Apprehending the many intelligible aspects of this assemblage together really
shows us is how something that feels so light and free can also be a form of
domination. What this analysis of the smartphone has pinpointed is two
cultures of control. The first of these is a subjective, individual culture of
control in which the smartphone is used to summon others and regulate
social distance according to a user’s needs, desires and anxieties. The second
of these is an object-oriented open system of control that uses the data
generated by individuals in order to know, govern and treat them as
suspicious objects that can be tagged, tracked, followed, found suspicious,
and in some locations, for certain persons, once certain conditions have been
met, be killed. For individuals and systems alike, the smartphone is a
valuable, cherished device that enables us to find and treat one another
according to our needs, desires and anxieties. It is a device in which the other
28
is transformed from a stranger back into a subject or object of interest based
upon what their retrievable, transmissable, computer-archived transcriptions
say about who they really are, where they are now, who they know, where
they might be, and what they intend to do to us. This tells us something
interesting about who we are to ourselves and each other, what we value, and
the worlds of ambient surveillance in which we now live.
This may seem like a dystopian picture. To the future reader, what I want to
note by way of conclusion is that, at the time of writing, my distinct
impression is that most people I talk to are stubbornly unworried about this.
Few people are sufficiently concerned about the mass surveillance disclosures
so as to cease using their smartphones, or even modify their habitual use.
Smartphones do elicit moments of reflexive worry, but they also solicit hours
of seemingly unworried immersed attention as a matter of everyday life.
Where this will lead, not even our smartphones can tell us yet.
1
As of 2011 Raytheon are the world’s fifth-largest arms producing company. See: http://www.sipri.org/publications (accessed 30
June, 2014).
2
Ryan Gallagher, “Software that tracks people on social media created by defence firm”, guardian.co.uk,
http://www.guardian.co.uk/world/2013/feb/10/software-tracks-social-media-defence (accessed 29 March, 2013).
3
“Edward Snowden, World News”, guardian.co.uk, http://www.theguardian.com/world/edward-snowden (accessed 24 August,
2013).
4
http://en.wikipedia.org/wiki/2013_mass_surveillance_disclosures
5
I use the term ‘NSA’ here more broadly than strictly to refer not only to that agency but the whole project of planetary ambient
surveillance, taking in GCHQ, the Five Eyes, and more diffusely all those directly and indirectly conspiring, colluding,
cooperating or otherwise working with NSA – including, in circular fashion, all smartphone users. Throughout the piece NSA is
used in a tonally sharp way to remind readers about involvements and implications which, as ambient surveillance, tend to keep
slipping into the background.
6
“Smartphone Users Worldwide Will Total 1.75 Billion in 2014”, http://www.emarketer.com/Article/Smartphone-UsersWorldwide-Will-Total-175-Billion-2014/1010536, (accessed 30 June, 2014).
7
Charles Arthur, “Think smartphones are ubiquitous now? Just wait a few years”, guardian.co.uk,
http://www.theguardian.com/technology/2012/jun/27/smartphones-iphone-mobile-market, (accessed 30 June, 2014).
8 cf. Robinson Meyer, “Everything We Know About Facebook's Secret Mood Manipulation Experiment”, www.theatlantic.com,
http://www.theatlantic.com/technology/archive/2014/06/everything-we-know-about-facebooks-secret-mood-manipulationexperiment/373648/ (accessed 30 June, 2014).
29
9
Niklas Luhmann, ‘Globalization or World society: How to conceive of modern society?, International Review of Sociology:
Revue Internationale de Sociologie, 7:1, 1997, 67.
10
Ewen MacAskill, Putin calls internet a 'CIA project' renewing fears of web breakup, guardian.co.uk,
www.theguardian.com/world/2014/apr/24/vladimir-putin-web-breakup-internet-cia, (accessed 30 June, 2014).
11
Martin Heidegger, Being and Time, translated by J. Macquarie and E. Robinson. Blackwell, 1962.
12
The crucial importance of this was impressed upon Glen Greenwald by Edward Snowden in their initial correspondence. See
Glen Greenwald, Nowhere to Hide: Edward Snowden, the NSA, and the Surveillance State, London, Penguin, 2014.
13
Gilles Deleuze and Felix Guattari, ‘1227: Treatise on Nomadology: the War Machine’, A Thousand Plateaus, Continuum,
2004, 440.
14
Benjamin H Bratton, ‘iPhone City’, Architectural Design, 79:4, July-August 2009, 90-97.
15
Alexander Galloway, ‘Intimations of everyday life: Ubiquitous computing and the city’, Cultural Studies, 18:2, 2004, 384 385.
16
cf Jean-Luc Nancy, Being Singular Plural, Stanford University Press, 2000 and Michel Serres and Bruno Latour,
Conversations on Science, Culture and Time, University of Michigan Press, 1995 for two explorations of the centrality of the
preposition to understanding relations.
17
Martin Heidegger, Being and Time, translated by J. Macquarie and E. Robinson. Blackwell, 1962, 97.
18
cf. Australian Bureau of Statistics, ‘How Australia uses the Internet’,
http://www.abs.gov.au/ausstats/abs@.nsf/Lookup/by%20Subject/1301.0~2012~Main%20Features~How%20Australia%20access
es%20and%20uses%20the%20Internet~175 (accessed 25 August, 2013).
19
On the centrality of obligation, as opposed to naïve accounts of ‘freedom’, as a prompt to social presence, I am indebted to the
insights of John Urry. Cf. John Urry, Mobilities, Polity, London, 2007.
20
Turkle’s work uncovers significant amounts of ambivalence, as well as specific and organised forms of resistance, especially
among the young, who are notionally the white middle class ‘kids these days’ ‘digital natives’ supposedly embracing these
technologies with the most enthusiasm and the least circumspection.
21
Licoppe, Summons..., 289.
22
Martin Dodge and Rob Kitchin, ‘Software, objects, and home space’, Environment and Planning: A, 41, 1344-1365
23
Arthur, ‘Think smartphones…’
24
. Smartphones need not be this, they could be so many other things – and to some people they are. It is a question of a culture
of use. Why and how this culture emerged is beyond the purview of this small contribution.
25
cf. Courtney Blackwell, Jeremy Birnholtz and Charles Abbott, ‘Seeing and being seen: Co-situation and impression formation
using Grindr, a location-aware gay dating app’, New Media Society, published online 7 February 2014
26
Peter Sloterdijk, Spheres Volume One: Bubbles – Microspherology, semiotext(e), 2011, 190.
27
Edward Snowden’s wording. See: Lara Poitras and Gleen Greenwald, ‘NSA whistleblower Edward Snowden: 'I don't want to
live in a society that does these sort of things' – video’, guardian.co.uk,
http://www.theguardian.com/world/video/2013/jun/09/nsa-whistleblower-edward-snowden-interview-video, (accessed 30 June,
2014).
28
cf. ‘Privacy Scandal: NSA Can Spy on Smart Phone Data’, www.spiegel.de,
http://www.spiegel.de/international/world/privacy-scandal-nsa-can-spy-on-smart-phone-data-a-920971.html (accessed 30 June,
2014).
29
Ryan Gallagher, ‘Der Spiegel: NSA Put Merkel on List of 122 Targeted Leaders’, The Intercept,
https://firstlook.org/theintercept/article/2014/03/29/der-spiegel-nsa-ghcq-hacked-german-companies-put-merkel-list-122targeted-leaders/ (accessed 30 June, 2014).
30
Gallagher…
31
The Atlantic has visualized the Disposition Matrix on its website. See: ‘How Obama Decides Your Fate If He Thinks You're a
Terrorist’, www.theatlantic.com, http://www.theatlantic.com/misc/disposition-matrix/, (accessed 30 June, 2014).
32
Gilles Deleuze, Postscript on the Societies of Control, October, 59, Winter 1992, 3-7.
33
Michel Foucault, ‘Panopticism’, Discipline and Punish: the Birth of the Prison, Penguin, London, 1975, 195-228.
34
Foucault, The Subject and Power’, 789-80.
35
Deleuze, Postscript..., 7.
36
Deleuze, Postscript..., 7.
37
cf. Kathryn Zickuhr, ‘Location-Based Services’, Pew Research Internet Project,
http://www.pewinternet.org/2013/09/12/location-based-services/ (accessed 30 June, 2014).
38
Ki Mae Heussner, ‘Why Geolocation App Users Matter to Marketers, wwww.adweek.com,
http://www.adweek.com/news/advertising-branding/why-geolocation-app-users-matter-marketers-136950 (accessed 30 June,
2014).
39
Again, this raises the political question of a specific contemporary culture of use, which is contingent, and should be further
analyzed and compared to the many other possible worlds of smartphone-enabled sociality.
40
Leslie Paul Thiele, ‘Postmodernity and the Routinization of Novelty: Heidegger on Boredom and Technology’, Polity, 29:4,
1997, 489-517.
41
Christian Licoppe ‘“The Crisis of the Summons”: A Transformation in the Pragmatics of “Notifications”, from Phone Rings
to Instant Messaging, The Information Society: an International Journal, 26:4, 2010, 288-302.
42
Jonathan Crary, Suspensions of Perception: Attention, Spectacle, and Modern Culture, MIT Press, 1999.
43
Crary, Suspensions..., 74-75.
44
Sherry Turkle, Alone Together: Why We Expect More from Technology and Less from Each Other, Basic Books, 2011, 203.
30