Origin Stories, Surveillance, and Digital Alter Egos

in Screen Bodies
Author:
Sarah YoungErasmus University, Netherlands young@eshcc.eur.nl

Search for other papers by Sarah Young in
Current site
Google Scholar
PubMed
Close
View More View Less
Restricted access

Abstract

The origin story is an important element for any superhero/villain, as it provides context for a character's seemingly out-of-this-world abilities. A radioactive spider bit Spiderman, and the Penguin was bullied in his youth. It can also be beneficial for surveillance scholars, inasmuch as it provides context for a once invisible but superhuman body of digital information that circulates as a proxy for us in digital milieus. This body is best understood through contemporary surveillance practices, yet metaphors of the panopticon and George Orwell's 1984 proliferate in the surveillant imagination. I argue here that mapping an origin story onto a view of our data as a superhuman body not only creates a tangible representation of surveillance, but it also emphasizes and animates alternative surveillance theories useful for circulation in the surveillant imagination.

Contributor Notes

Sarah Young is a Marie Skłodowska-Curie LEaDing Fellows Postdoc at Erasmus University in Rotterdam, The Netherlands. She researches surveillance, information studies, rhetoric, and technical communication. Email: young@eshcc.eur.nl

  • Collapse
  • Expand

Screen Bodies

The Journal of Embodiment, Media Arts, and Technology

  • Beck, Estee. N. 2015. “The Invisible Digital Identity: Assemblages in Digital Networks.Computers and Composition 35: 125140. doi:.

    • Crossref
    • Search Google Scholar
    • Export Citation
  • Bentham, Jeremy. 1995. The Panopticon Writings. Ed. Miran Bozovic. New York: Verso.

  • Bernal, Paul. 2016. “Data Gathering, Surveillance and Human Rights: Recasting the Debate.Journal of Cyber Policy 1 (2): 243264. doi:.

    • Crossref
    • Search Google Scholar
    • Export Citation
  • Bernier, Andrew. 2016. “How Peoria Police are Using New Technology to Better Predict When and Where Crime Will Happen.KJZZ, 24 February. https://science.kjzz.org/content/269439/how-peoria-police-are-using-new-technology-better-predict-when-and-where-crime-will.

    • Search Google Scholar
    • Export Citation
  • Bigo, Didier. 2006. “Security, Exception, Ban, and Surveillance.” In Theorizing Surveillance: The Panopticon and Beyond, ed. David Lyon, 4668. Portland, OR: Willan Publishing.

    • Search Google Scholar
    • Export Citation
  • Boyne, Roy. 2000. “Post-Panopticism.Economy and Society 29 (2): 285307. doi:.

  • Cheney-Lippold, John. 2011. “A New Algorithmic Identity: Soft Biopolitics and the Modulation of Control.Theory, Culture & Society 28 (6): 164181. doi:.

    • Crossref
    • Search Google Scholar
    • Export Citation
  • Citron, Danielle Keats, and Frank Pasquale. 2014. “The Scored Society: Due Process for Automated Predictions.Washington Law Review 89 (1): 133. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2376209

    • Search Google Scholar
    • Export Citation
  • Crawford, Kate, and Jason Schultz. 2014. “Big Data and Due Process: Toward a Framework to Redress Predictive Privacy Harms.Boston College Law Review 55 (1): 93128. http://lawdigitalcommons.bc.edu/bclr/vol55/iss1/4

    • Search Google Scholar
    • Export Citation
  • Crouch, Ian. 2013. “So Are We Living in 1984?The New Yorker, 11 June. www.newyorker.com/books/page-turner/so-are-we-living-in-1984.

    • Search Google Scholar
    • Export Citation
  • Deleuze, Gilles. 1995. Negotiations—1972–1990. Trans. Martin Joughin. New York: Columbia University Press.

  • Deleuze, Gilles, and Félix Guattari. 1987. A Thousand Plateaus: Capitalism and Schizophrenia. Trans. Brian Massumi. London: Continuum.

  • Dennett, Thomas. 2018. “The Hulk: 10 Times He Was Marvel's Greatest Villain (And 10 Times He Was Its Greatest Hero).” CBR, 25 May. www.cbr.com/hulk-greatest-villain-and-hero/.

    • Search Google Scholar
    • Export Citation
  • Draper, Robert. 2018. “They Are Watching You—And Everything Else on the Planet.” National Geographic, February. www.nationalgeographic.com/magazine/2018/02/surveillance-watching-you/.

    • Search Google Scholar
    • Export Citation
  • Eldeib, Duaa. 2016. “Stateville's Controversial ‘Roundhouse’ Prison Area Shuttered.Chicago Tribune, 1 December. www.chicagotribune.com/news/local/breaking/ct-stateville-roundhouse-closed-met-20161201-story.html.

    • Search Google Scholar
    • Export Citation
  • Federal Trade Commission. 2019. “The Equifax Data Breach.” Federal Trade Commission, ww.ftc.gov/equifax-data-breach, accessed 22 February 2019.

    • Search Google Scholar
    • Export Citation
  • Foucault, Michel. 1977. Discipline and Punish: The Birth of the Prison. New York: Pantheon Books.

  • Giddens, Anthony. 1999. “Risk.” BBC Reith Lectures. http://news.bbc.co.uk/hi/english/static/events/reith_99/week2/week2.htm. accessed 19 October 2019.

    • Search Google Scholar
    • Export Citation
  • Gill, Stephen. 1995. “The Global Panopticon? The Neoliberal State, Economic Life, and Democratic Surveillance.Alternatives: Global, Local, Political 20 (1): 149. doi:.

    • Crossref
    • Search Google Scholar
    • Export Citation
  • Gilliom, John, and Torin Monahan. 2013. SuperVision: An Introduction to the Surveillance Society. Chicago: University of Chicago Press.

  • Giroux, Henry A. 2015. “Totalitarian Paranoia in the Post-Orwellian Surveillance State.Cultural Studies 29 (2): 108140. doi:.

  • Gordon, Diana R. 1990. The Justice Juggernaut: Fighting Street Crime, Controlling Citizens. New Brunswick, NJ: Rutgers University Press.

    • Search Google Scholar
    • Export Citation
  • Haggerty, Kevin D. 2006. “Tear Down the Walls: On Demolishing the Panopticon.” In Theorizing Surveillance: The Panopticon and Beyond, ed. David Lyon, 2345. Portland, OR: Willan Publishing.

    • Search Google Scholar
    • Export Citation
  • Haggerty, Kevin D., and Richard V. Ericson. 2000. “The Surveillant Assemblage.British Journal of Sociology 51 (4): 605622. doi:.

  • Illinois Department of Corrections. 2016. “Stateville Correctional Center's F House Officially Closed.” 1 December. Illinois Department of Corrections, www2.illinois.gov/idoc/news/2016/Pages/StatevilleCorrectionalCenter%E2%80%99sFHouseofficiallyclosed.aspx.

    • Search Google Scholar
    • Export Citation
  • Internal Revenue Service. 2004. “Internal Revenue Bulletin: 2004-31.” www.irs.gov/irb/2004-31_IRB#d0e1647, accessed 22 February 2019.

    • Search Google Scholar
    • Export Citation
  • Johnson, Deborah G., and Kent A. Wayland. 2010. “Surveillance and Transparency as Sociotechnical Systems of Accountability.” In Surveillance and Democracy, ed. Kevin D. Haggerty and Minas Samatas, 1933. New York: Routledge-Cavendish.

    • Search Google Scholar
    • Export Citation
  • Kammerer, Dietmar. 2012. “Surveillance in Literature, Film, and Television.” In The Routledge Handbook of Surveillance Studies, ed. Kirstie Ball, Kevin D. Haggerty, and David Lyon, 99106. New York: Routledge.

    • Search Google Scholar
    • Export Citation
  • Koskela, Hille. 2003. “‘Cam Era’ – The Contemporary Urban Panopticon.Surveillance & Society 1 (3): 292313. https://doi.org/10.24908/ss.v1i3.3342

    • Search Google Scholar
    • Export Citation
  • Lyon, David. 1993. “An Electronic Panopticon? A Sociological Critique of Surveillance Theory.Sociological Review 41 (4): 653678. doi:.

    • Crossref
    • Search Google Scholar
    • Export Citation
  • Lyon, David. 2003. Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. New York: Routledge.

  • Lyon, David. 2006. “The Search for Surveillance Theories.” In Theorizing Surveillance: The Panopticon and Beyond, ed. David Lyon, 3-20. Portland, OR: Willan Publishing.

    • Search Google Scholar
    • Export Citation
  • Lyon, David. 2007. Surveillance Studies: An Overview. Cambridge: Polity Press.

  • Malin, Bradley, Latanya Sweeney, and Elaine Newton. 2003. “Trail Re-identification: Learning Who You Are from Where You Have Been.” Carnegie Mellon University, School of Computer Science, Data Privacy Laboratory Technical Report, LIDAP-WP12. Pittsburgh: Carnegie Mellon University, Laboratory for International Data Privacy. https://pdfs.semanticscholar.org/2e6b/d05fffdd762c9aef4c3273e263e8694c9177.pdf.

    • Search Google Scholar
    • Export Citation
  • Marx, Gary T. 1988. Undercover: Police Surveillance in America. Berkeley: University of California Press.

  • Marx, Gary T. 2012. “‘Your Papers Please’: Personal and Professional Encounters with Surveillance.” In Routledge Handbook of Surveillance Studies, ed. Kirstie Ball, Kevin D. Haggerty, and David Lyon, xxxxxi. New York: Routledge.

    • Search Google Scholar
    • Export Citation
  • Marx, Gary T. 2016. Windows into the Soul: Surveillance and Society in an Age of High Technology. Chicago: University of Chicago Press.

  • Marwick, Alice E. 2014. “How Your Data Are Being Deeply Mined.” New York Review of Books 61 (1). www.nybooks.com/articles/2014/01/09/how-your-data-are-being-deeply-mined/.

    • Search Google Scholar
    • Export Citation
  • Mathiesen, Thomas. 1997. “The Viewer Society: Michel Foucault's ‘Panopticon’ Revisited.” Theoretical Criminology 1 (2): 215234. doi.

    • Crossref
    • Search Google Scholar
    • Export Citation
  • McGrath, John. 2012. “Performing Surveillance.” In The Routledge Handbook of Surveillance Studies, ed. Kirstie Ball, Kevin D. Haggerty, and David Lyon, 8390. New York: Routledge.

    • Search Google Scholar
    • Export Citation
  • NCTE. 2018. “The George Orwell Award.” www.ncte.org/volunteer/groups/publiclangcom/orwellaward, accessed 19 October 2019.

  • Nelson, Ben. 2018. “Why Is the Hulk Considered Uncontrollable, Chaotic, and Monstrous? He Seems to Demonstrate Self-Control, Altruism, Kindness and Consideration of Others When in His Green Form.” Quora, 18 December. www.quora.com/Why-is-the-Hulk-considered-uncontrollable-chaotic-and-monstrous-He-seems-to-demonstrate-self-control-altruism-kindness-and-consideration-of-others-when-in-his-green-form.

    • Search Google Scholar
    • Export Citation
  • Orwell, George. 1949. 1984. New York: Signet.

  • Pagello, Federico. 2017. “The ‘Origin Story’ Is the Only Story: Seriality and Temporality in Superhero Fiction from Comics to Post-Television.Quarterly Review of Film and Video 34 (8): 725745. doi:.

    • Crossref
    • Search Google Scholar
    • Export Citation
  • Poster, Mark. 1990. The Mode of Information: Poststructuralism and Social Context. Chicago: University of Chicago Press.

  • Pridmore, Jason. 2012. “Consumer Surveillance: Context, Perspectives and Concerns in the Personal Information Economy.” In Routledge Handbook of Surveillance Studies, eds. Kirstie Ball, Kevin D. Haggerty, and David Lyon, 321-329. New York: Routledge.

    • Search Google Scholar
    • Export Citation
  • Reuters. 2018. “Your Personal Info Is Valuable, even if It's Wrong. Reuters, 2 March. www.reuters.com/video/2018/03/29/your-personal-info-is-valuable-even-if-i?videoId=413079941&videoChannel=118169.

    • Search Google Scholar
    • Export Citation
  • Romagnoli, Alex S., and Gian S. Pagnucci. 2013. Enter the Superheroes: American Values, Culture, and the Canon of Superhero Literature. Lanham, MD: Scarecrow Press.

    • Search Google Scholar
    • Export Citation
  • Shilton, Katie. 2012. “Participatory Personal Data: An Emerging Research Challenge for the Information Sciences.Journal of the American Society for Information Science and Technology 63 (10): 19051915. doi:.

    • Crossref
    • Search Google Scholar
    • Export Citation
  • Silverman, Lauren. 2016. “Using Data to Predict Child Abuse.Marketplace, 14 April. www.marketplace.org/2016/04/14/world/using-data-predict-child-abuse-hot-spots.

    • Search Google Scholar
    • Export Citation
  • Simon, Bart. 2005. “The Return of Panopticism: Supervision, Subjection and the New Surveillance.Surveillance & Society 3 (1): 120.doi:.

  • Smith, Gavin J. D. 2016. “Surveillance, Data and Embodiment: On the Work of Being Watched.Body & Society 22 (2): 108139. doi:.

  • Solove, Daniel J. 2004. The Digital Person: Technology and Privacy in the Information Age. New York: New York University Press.

  • Spinuzzi, Clay. 2008. Network: Theorizing Knowledge Work in Telecommunications. New York: Cambridge University Press.

  • Staples, William G. 2000. Everyday Surveillance: Vigilance and Visibility in Postmodern Life. Lanham, MD: Rowman & Littlefield Publishers, Inc.

    • Search Google Scholar
    • Export Citation
  • Torpey, John. 2007. “Through Thick and Thin: Surveillance after 9/11.Contemporary Sociology 36 (2): 116119. doi:.

  • U.S. Federal Reserve. 2006. “Federal fair lending regulations and statutes: Fair Housing Act.” https://www.federalreserve.gov/boarddocs/supmanual/cch/fair_lend_fhact.pdf (accessed 22 February 2019).

    • Search Google Scholar
    • Export Citation
  • Weller, Toni. 2012. “The Information State: An Historical Perspective on Surveillance.” In The Routledge Handbook of Surveillance Studies, ed. Kirstie Ball, Kevin D. Haggerty, and David Lyon, 5763. New York: Routledge.

    • Search Google Scholar
    • Export Citation
  • Wise, J. Macgregor. 2002. “Mapping the Culture of Control: Seeing through The Truman Show.” Television New Media 3 (1): 2947. doi:.

  • Wise, J. Macgregor. 2016. Surveillance and Film. New York: Bloomsbury.

  • Young, S. (Forthcoming). Your Digital Alter Ego—The Superhero/villain You (Never) Wanted Transcending Space and Time? Computers and Composition.

    • Search Google Scholar
    • Export Citation
  • Zuboff, Shoshana. 2019. “The Surveillance Threat Is Not What Orwell Imagined.Time, 6 June. https://time.com/5602363/george-orwell-1984-anniversary-surveillance-capitalism/.

    • Search Google Scholar
    • Export Citation

Metrics

All Time Past Year Past 30 Days
Abstract Views 290 97 11
Full Text Views 61 4 2
PDF Downloads 83 6 2