+ All Categories
Home > Documents > Surveillance From the Middle -...

Surveillance From the Middle -...

Date post: 14-Jul-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
10
Media Fields Journal no. 11 (2016) Surveillance from the Middle On Interception, Infrastructure, and the Material Flows of Asynchronous Communication Jason Farman In August 2014, Popular Science published a story that quickly spread to other news venues and online sites. Titled “Mysterious Phony Cell Towers Could be Intercepting Your Calls,” the report detailed the discovery of at least seventeen interceptor cell towers in the United States that tricked mobile devices into believing they were connecting to their carriers’ cell antennas. 1 Each intercepted phone was instead connecting to a dummy tower that, after collecting information from the phone, passed it over to the “real” tower. The story developed for several weeks, as more and more of these interceptor towers were discovered by “ultra-secure” mobile phones that could identify these pseudo-towers’ attempts to intercept the cell signals. Members of the public began to formulate theories about who was setting up these interceptor towers and what their motives were. Newspapers and online news sites ran stories with headlines such as, “Are the mysterious “interceptor” cell towers the handiwork of foreign entities?” 2 Comments in these reports exploded with speculation about who set up these interceptor towers, from terrorist organizations and domestic drug cartels to the National Security Agency and the very corporation who identified the
Transcript
Page 1: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Media Fields Journal no. 11 (2016)

Surveillance from the Middle On Interception, Infrastructure, and the Material

Flows of Asynchronous Communication

Jason Farman InAugust2014,PopularSciencepublishedastorythatquicklyspreadtoothernewsvenuesandonlinesites.Titled“MysteriousPhonyCellTowersCouldbeInterceptingYourCalls,”thereportdetailedthediscoveryofatleastseventeeninterceptorcelltowersintheUnitedStatesthattrickedmobiledevicesintobelievingtheywereconnectingtotheircarriers’cellantennas.1Eachinterceptedphonewasinsteadconnectingtoadummytowerthat,aftercollectinginformationfromthephone,passeditovertothe“real”tower.Thestorydevelopedforseveralweeks,asmoreandmoreoftheseinterceptortowerswerediscoveredby“ultra-secure”mobilephonesthatcouldidentifythesepseudo-towers’attemptstointerceptthecellsignals.Membersofthepublicbegantoformulatetheoriesaboutwhowassettinguptheseinterceptortowersandwhattheirmotiveswere.Newspapersandonlinenewssitesranstorieswithheadlinessuchas,“Arethemysterious“interceptor”celltowersthehandiworkofforeignentities?”2Commentsinthesereportsexplodedwithspeculationaboutwhosetuptheseinterceptortowers,fromterroristorganizationsanddomesticdrugcartelstotheNationalSecurityAgencyandtheverycorporationwhoidentifiedthe

Page 2: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Surveillance from the Middle 2

mysterytowerswithitsultra-securemobilephones.Itseemedlikeeveryonewantedtoknowwhowassurveillingtheirmobilephoneusageandwhy.ThemysteryoftheseinterceptortowerswasactuallysolvedthreeyearspriortothestorybeingpublishedinPopularScience.DanielRigmaiden,servingtimeinprisonforfilingfraudulenttaxreturns,discoveredthattheFederalBureauofInvestigationhadfoundhimthroughoneoftheseinterceptortowers.Yet,thesewerenotcelltowersatall.Instead,RigmaidenuncoveredthatadevicecalledaStingRay,whichsentsignalsintoneighborhoodsinanattempttolocateaparticularmobiledevice,hadlocatedhim.3TheStingRayisacellsitesimulator,oranIMSIcatcher(IMSIstandsfor“internationalmobilesubscriberidentity,”auniqueidentificatorycodeforcellphones),thatsendsoutpingstoallphoneswithinthevicinityofthedevice.4Allphonesintheareapingback,asifthemobiledevicesweresendinginformationbacktotheircarrier’snearestcelltower(whichisusedtokeepaphoneinconstantcontactwiththecarrier’snetwork).Eventually,theStingRayidentifiesthephonethatisbeingsought,usuallyundertheoperationoflocallawenforcement.So,whilethecellsitesimulatorishuntingforaparticularphone(orsetofphones,asutilizedinthePresident’smotorcadeto“protecthimfromattacksandalerttheSecretServicetopeoplewhoshouldn’tbenearthePresident”5),onesideeffectisthatitgathersdatafromeveryphonewithinitsreach.Thesurveillancepracticesofthecell-sitesimulatorbringupmanyimportantaspectsaboutthewayssurveillanceisunderstoodandtheorized.First,thespatialmetaphorsforsurveillanceoftenobfuscatethedynamicarrangementsunderwhichsurveillanceispracticed.Thatis,termslikesurveillance(“towatchfromabove”),sousveillance(“towatchfrombelow”),orlateral/participatorysurveillance(“non-hierarchicalwatching”)allmissthewaysthatmanysurveillancepracticesoperate“fromthemiddle”orfromamulti-sitedposition.Interceptiontroublesthetraditionalspatialmetaphorsforsurveillance.Assuch,thematerialrealitiesofsurveillance-via-interceptionareoftenunknowntothosebeingwatched.Thisarticlethustracestherelationshipbetweenthesetwothings:thespatialarrangementsof“surveillancefromthemiddle”andthewaysthesearrangementsveilthematerialitiesofinterceptionandsurveillance.InterceptionandMediation

Page 3: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Media Fields Journal 3

Surveillancefromthemiddlecanbeunderstoodasmediationinitsmostbasicform.Thisgesturesbacktotheterm“medium”inthenineteenth-centurysenseoftheword:“Aninterveningsubstancethroughwhichaforceactsonobjectsatadistanceorthroughwhichimpressionsareconveyedtothesenses;anysubstanceconsideredwithregardtoitspropertiesasavehicleoflightorsound.”6Amedium’scommonassociationswithamessageorthecarryingofcontentwouldnotsurfaceuntilmuchlater,perhapsfindingitsresonanceasa“communicationmedium”againstthebackdropofelectricityinthe1880s.AsLisaGitelmanandTheresaM.Collinswrite,“Throughoutthenineteenthcenturyamediumwas“aninterveningagencyorsubstance”.So,forinstance,UnitedStatespatentsthatusedthepluralform,media,inthenineteenthcenturydosowithgreatestfrequencyinreferenceto“filteringmedia”,substanceswhichworktofiltersolutionsfrommoretolesscloudy.”7Here,surveillancefromthemiddleisquiteliterallyamediumasan“interveningagency”thatworkstofilter“frommoretolesscloudy.”Thismodeofsurveillanceworksparticularlywellwithcommunicationtechnologiesthatfunctionasynchronously.Aspeoplesendmessagesbackandforthtooneanother,thereisanecessarytime/spacelagthataffordsthepossibilityofinterception.Concernsaboutinterceptionechothroughoutthehistoryofcorrespondence.Forinstance,somecultureshaveresistedasynchronouswrittencommunicationsunderthebeliefthatoralmessagesdeliveredbyamessengerweremoredifficulttointerceptandthusmorereliable.8Inpart,thefearsofinterceptioninletterwritingwereaddressedbytheintroductionofwaxsealstoclosealetterandserveasamaterialsymbolofbothitsauthor(i.e.,royalsealswereuniquetoeachmonarch)andthefactthattheletterhadnotbeenopenedsincetheauthorhadsealeditshut.Shouldthewaxsealbebroken,therecipientwouldknowthatthemessageinsidewascompromised.9

Page 4: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Surveillance from the Middle 4

Figure1.AwaxsealfromtheInstitutoSuperiorTécnicoinLisbon,Portugal.©Domiriel,usedbypermissionunderCreativeCommonsAttributionNon-CommercialLicense.

Inourownmobilemediaculture,wehaveonceagaincometoprioritizeasynchronouscommunication.Since2009,datatransfer—throughmeanssuchasemail,texting,statusupdates,andphotosharing—hasoutpacedvoicecommunicationonmobiledevices.Thus,thetimelagandspatialtransferofthesemessagesareembeddedinoureverydaycommunicationpractices,whichaffordstheopportunityforinterceptionandsurveillancefromthemiddle.Here,itisworthnotingthatinterceptionofthiskindisuniquefromeavesdroppingorwiretapping.Whilethosedoconstituteasimilarformofinterception,practiceslikeeavesdroppingaresimultaneoustotheexchangeofinformationinsteadoffunctioningasamediumthatcollectsthemessagebeforethemessagecanbedelivered.Atfirstglance,thismaynotseemtobeasignificantdistinction,sincebothfunctioninsimilarwaysasmodesofsurveillancetypicallyhiddenfromthecommunicators.However,thespatialarrangementhasalargerimpactonthewaysthatsurveillancepractices—andresistancetothosepractices—areunderstood.Thissignificanceismostclearlyarticulatedbylinkingthespatialconfigurationofsurveillancefromthemiddlewithitsmateriality.

Page 5: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Media Fields Journal 5

MaterialInfrastructuresofSurveillancefromtheMiddleThematerialstructuresandinfrastructuresthataffordsurveillancefromthemiddleshapehowmessagesflowbetweenpeople.Theaffordancesandconstraintsofasynchronouschannelsofcommunicationcreatemodesofpracticethat,inpart,determinethesituationforhowthesemediaareproduced,distributed,consumed,andrespondedto.Assuch,surveillancefromthemiddlepracticesaremediathatrespondtothespecificitiesofthemediatheyinteractwith.Inotherwords,interception-as-surveillancemediates(asaninterveningagent)accordingtotheparticularitiesofthemediumitseekstointercept.Thismedium-specificmediationisthusacontinualnegotiationbetweenthestrategiesoftheonewhoissurveilling,whichmodesofinterceptionarepossibleforaspecificmedium,andthetacticsofthosesendingthemessagewhoattempttocircumventitsinterception.OneexampleIcameacrossrecentlyillustratesthisconstantnegotiationbetweentheseactorsinthismodelofsurveillance.DuringWorldWarI,WalterBoadwaywasacadetaviatorstationedinFranceandotherpartsofEurope.Hewrotelettersconstantlytohiswife,Betty,wholivedinPasadena,California.AsBettybeganreceivinghislettersshortlyafterhewasdeployed,therewerestrangeholesinthepaper.Sometimes,entireportionsofapageweremissingfromhisletters.Afterthishappenedseveraltimes,shewrotetohimtolethimknowthatwordsandparagraphsfromhisletterswerebeingremovedforsomereason.Militarycensorswerenotblackingoutthesepartsoftheletters.Instead,thecensorswereusingX-Actoknivestoliterallyremoveanywordorphrasethatwouldcompromiseclassifiedinformation(seeFigure2).

Page 6: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Surveillance from the Middle 6

Figure2.OneofWalterBoadway’sletterswrittenduringWWI,withawordremovedbyamilitarycensorbeforetheletterarrivedtohiswifeinPasadena,California.ThisletterisapartofthecorpusoflettersownedbytheCenterforAmericanWarLettersatChapmanUniversity.Image©2015JasonFarman,reproducedbypermissionoftheowner.

ForBoadway,whatconstitutedclassifiedinformationremainedmostlyunknown,sincethosedefinitionswereconstantlychanginginresponsetowartimecircumstances.Inhisearlyletterstohiswife,hehadnosensethatnamingthekindofplaneheflewwasexposinginformationthatwouldcompromisethemilitary’smissionifitwereintercepted.Atonepoint,hewasalsotoldthathecouldnotdatehisletters.Subsequently,insteadofwriting“November11,1917,”hesimplywrote“Sunday.”Otherwise,thedatewouldbecutoutentirelybythemilitarycensors.Ashewrotetheseearlyletters,heusedbothsidesofasheetofpaper.Afterthemilitarycensorscutouttheclassifiedinformation,non-classifiedpartsoftheletterswererenderedillegibleaswell(seeFigure3).Hence,thematerialconsequenceofwritingsomethingdeemedclassifiedwasthattheentireletterbecamemoreorlessillegibleduetotheremovalofpiecesofthepaper.

Page 7: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Media Fields Journal 7

Figure3.TwosidesofthesamecensoredsheetinoneofBoadway’sletterstohiswife.ThisletterisapartofthecorpusoflettersownedbytheCenterforAmericanWarLettersat

ChapmanUniversity.Imageusedbypermission.Asthesewords,sentences,orparagraphsarebroughtundererasurethroughtheremovalofthematerialpieceofpaper,wordsareremovedbutsystemsofsurveillancearerevealed.Here,muchinthewaythebrokenwaxsealonaletterrevealedthattheletterhadbeenread,thecensor’scuttingoftheletterrevealedthatinterceptionwashappening.Forsoldiers,inscribingwordsthatwereprohibitedresultedintheinabilitytocommunicate.Buttheremovalofthewordsinthiswayrevealedtheflowofcommunicationtothepeopleattemptingtocorrespondwitheachother:fromauthortocensortointendedrecipient.(Insomecases,theflowmightinsteadrunfromauthortocensortoenemyintelligence.)Insurveillancefromthemiddle,theactofinterceptionisoftenwhenthespatialdynamicsoftheseflowsofmediabecomerevealed.10IttookBoadwaysometimetochangehisrelationshiptothematerialityofhiscorrespondence.Initially,hesimplytriedtoadjustthecontentofthemessageswithoutregardforthefactthatremovalofawordononesideofthepaperwouldalsoremovepartofthemessagewrittenontheothersideofthepaper.Hesoonstartedwritingononlyonesideofeverysheetofpaper(which,asamaterialconsequence,costmoretoshipfromFranceto

Page 8: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Surveillance from the Middle 8

California).Asknowledgeofthespatialflowsofsurveillancefromthemiddleisrevealed,peopleengageintacticstoavoidinterception.Themilitarylearnedofwaysthatenemyintelligencewasinterceptingnewsofitsstrategiesandmovementsandthus,censoreditsownsoldiersaccordingly.WhenBoadwaylearnedofwaysthathisletterswerebeingcensored,herespondedbywritingononlyonesideofasheetofpaperandusingphrasesthatwouldavoidthemilitarycensors’notice.Hisresponsetocensorship(asonemodeandoutcomeofsurveillancefromthemiddle)wastotacticallyrespondtothesurveillancestrategiesofthosesurveillinghisletters.11TacticalResistanceandInfrastructuralLiteracyTheoristsofsurveillancehavearguedthatsurveillanceisproducedalongsidetheveryactofresistanceusedtosubvertorcircumventthissurveillance.AsAaronK.Martin,RosamundeE.vanBrakel,andDanielJ.Bernhardargue,“[R]esistanceisnotmerelyanepiphenomenonofsurveillance—itisabasicandnecessaryco-developmentofsurveillance,existinginmanyformsthatoftengounrecognized.”12Thus,insteadofcounter-tacticsemergingbasedonthemodesofsurveillanceencountered,itcanbearguedthatsurveillanceisaspatialdynamicproducedwithandthroughtheverynotionofresistance.13Whilesuchanargumentisindeedcompellingandpushessurveillancestudiesingenerativedirections,surveillancefromthemiddlerevealsamorecomplexflowofestablishingresistance.WhetheritbesomeonetryingtoavoidanIMSIcatcher,amonarchtryingtosecurealetterthroughawaxseal,orasoldiertryingtomakesurehisletterarrivesintacttoitsrecipient,tacticstoavoidsurveillancefromthemiddlewithinthesescenariosrequirethatthemiddlebeunveiled.Theyalsorequiretheinfrastructuralliteracytodecodetheflowsofasynchronouscommunicationandtheactsofinterception.LisaParksarguesthatwemustadvocateforinfrastructuralliteracyforustoengageinthepoliticsofhiddensystems.14Writingaboutinfrastructure’sinvisibility,shenotes:

Mostpeoplearesocialisedtoknowverylittleabouttheinfrastructuresthatsurroundthemineverydaylife,whetherelectricalsystems,sewerpipesorbroadcastnetworks.Notonlyarepeoplesocialisedtobeunawareofsuchsystems;infrastructuresareoftendesignedpurposefullytobeinvisibleortransparent,integratedwiththebuiltenvironment,whethersubmergedunderground,coveredbyceilingsandwalls,orcamouflagedas‘nature’.15

Page 9: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Media Fields Journal 9

Assurveillancefromthemiddlebecomesasubiquitousasparticipatorysurveillanceonsocialmedia,theresistancetosuchmodesofsurveillanceisoftenlimitedtothosewhomovebeyondacommon-senserelationshiptoit(arelationship,Iargue,thatveilsitselfbehindtheeveryday).16Oncethematerialrealitiesarerevealed,peoplecanfindtacticalmodesofconfrontingsurveillancefromthemiddle,or“creativemisuse”ofthesesurveillancescenariosasamodeofresistance.However,thisactofmovingthematerialrealitiesofsurveillancefromthemiddleoutoftherealmofcommonsenseandintoananalyticalrelationshipthatcritiquesandrespondstosuchsurveillanceisultimatelylimitedtothosewhohavethetools,access,andliteracytounderstandthismodeofsurveillance.Assuch,surveillancefromthemiddleappearstopredominantlybenefitthosewhoconducttheinterceptionasopposedtothosewhosemessagesarebeingintercepted.Yet,astheactofinterceptionrevealsthespatialandmaterialdynamicsofsurveillancefromthemiddle,thoselookingfortheseinterceptionscanbetterrespondintacticalways.Acknowledgments:Thisresearchwasfunded,inpart,byaResearchandScholarshipAwardfromtheGraduateSchoolattheUniversityofMaryland,CollegePark.IamalsoverygratefulfortheassistanceofthoseattheCenterforAmericanWarLettersatChapmanUniversity,especiallyRandBoydandMariaYanez. Notes 1 AndrewRosenblum,“MysteriousPhonyCellTowersCouldbeInterceptingYourCalls,”

PopularScience,Aug.27,2014,http://www.popsci.com/article/technology/mysterious-phony-cell-towers-could-be-intercepting-your-calls

2 BarryLevine,“Arethemysterious“interceptor”celltowersthehandiworkofforeignentities?”VentureBeat,Sept.18,2014,http://venturebeat.com/2014/09/18/are-the-mysterious-interceptor-cell-towers-the-handiwork-of-foreign-entities/.

3 Rigmaiden’sstorywasdetailedonNotetoSelf’sepisode,“WhenYourConspiracyTheoryisTrue,”June19,2015,http://www.wnyc.org/story/stingray-conspiracy-theory-daniel-rigmaiden-radiolab/.

4 FormoreinformationontheIMSIcatcher,seeLisaParks’article“RiseoftheIMSICatcher”inthisissue.

5 ChristopherSoghoian,PrincipalTechnologiesandSeniorPolicyAnalystattheAmericanCivilLibertiesUnion,quotedinNotetoSelf,“WhenYourConspiracyTheoryisTrue.”

6 “Medium,”OxfordEnglishDictionary(Oxford,UK:OxfordUniversityPress),

Page 10: Surveillance From the Middle - PDFstatic1.1.sqspcdn.com/.../1458835852283/Surveillance+From+the+M… · surveillance (“to watch from above”), sousveillance (“to watch from below”),

Surveillance from the Middle 10

http://www.oed.com/view/Entry/115772.7 LisaGitelmanandTheresaM.Collins,“MediumLight:RevisingEdisonianModernity,”

CriticalQuarterly51,no.2(2009):1-14,2.Emphasisinoriginal.8 RichardPankhurstgesturestothistensioninEthiopiaduringtheMiddleAgeswhen

writingwasnotthecommonformofcommunicationexceptinmessagesdeliveredtoverydistantplaces.SeeRichardPankhurst,“LetterWritingandtheUseofRoyalandImperialSealsinEthiopiaPriortotheTwentiethCentury,”TheJournalofEthiopianStudies11,no.1(1973):179-207.

9 Foradiscussionofearlysealsforcorrespondence,seeThomasA.Heslop,“EnglishSealsfromtheMidNinthCenturyto1100,”JournaloftheBritishArchaeologicalAssociation133,no.1(1980):1-16.

10 Forasimilaranalysisonthecensorshipofmaps,seeTrevorPaglen,BlankSpotsontheMap:TheDarkGeographyofthePentagon’sSecretWorld(NewYork:Penguin,2009).

11 Foranexcellentstudyonsuchtactics,seeRitaRaley,TacticalMedia(Minneapolis:UniversityofMinnesotaPress,2009).

12 AaronK.Martin,RosamundeE.vanBrakel,andDanielJ.Bernhard,“Understandingresistancetodigitalsurveillance:Towardsamulti-disciplinary,multi-actorframework,”Surveillance&Society6,no.3(2009):213-232,216.

13 Ihavebuiltonthisargumentinmyarticle,“CreativeMisuseAsResistance:Surveillance,MobileTechnologies,andLocativeGames,”Surveillance&Society12,no.3(2014):377-388.

14 LisaParks,“AroundtheAntennaTree:ThePoliticsofInfrastructuralVisibility,”Flow,Mar.2009,http://flowtv.org/?p=2507.

15 LisaParks,“TechnostrugglesandtheSatelliteDish:APopulistApproachtoInfrastructure,”inCulturalTechnologies:TheShapingofCultureinMediaandSociety,ed.GöranBolin(NewYorkandLondon:Routledge,2012),64-86,64.

16 Here,Ireference“commonsense”inthewaythatAntonioGramscihasusedtheword,toconnotetheembeddedprioritiesofthoseinpowerasamodeofexertingsuchpower.SeeSelectionsfromthePrisonNotebooksofAntonioGramsci,ed.andtrans.QuintinHoareandGeoffreyNowellSmith(London:Lawrence&Wishart,1971).

JasonFarmanisanAssociateProfessorintheDepartmentofAmericanStudiesattheUniversityofMaryland,CollegePark.HeisalsotheDirectoroftheDesignCultures&CreativityProgramandafacultymemberwiththeHuman-ComputerInteractionLab.HeisauthorofthebookMobileInterfaceTheory:EmbodiedSpaceandLocativeMedia(Routledge,2012—winnerofthe2012BookoftheYearAwardfromtheAssociationofInternetResearchers).HeistheeditorofthebooksTheMobileStory:NarrativePracticeswithLocativeTechnologies(Routledge,2014)andFoundationsofMobileMediaStudies:EssentialTextsontheFormationofaField(Routledge,2016).Hehaspublishedscholarlyarticlesonsuchtopicsasmobiletechnologies,thehistoryoftechnology,digitalmapsandculturalgeography,locativeandsite-specificart,videogames,digitalstorytelling,performanceart,socialmedia,andsurveillance.HereceivedhisPh.D.fromUCLA’sSchoolofTheater,Film,andTelevision.


Recommended