Vernacular resistance to data collection and analysis: A political theory of obfuscation

Computer-enabled data collection, aggregation, and mining dramatically change the nature of contemporary surveillance. Refusal is not a practical option, as data collection is an inherent condition of many essential societal transactions. We present one vernacular response to this regime of everyday surveillance, a tactic we call obfuscation. With a variety of possible motivations, actors engage in obfuscation by producing misleading, false, or ambiguous data with the intention of confusing an adversary or simply adding to the time or cost of separating bad data from good. Our paper develops a political theory of obfuscation, linking contemporary and historical cases to develop a descriptive account of obfuscation that is able to capture key commonalities in systems from radar chaff to BitTorrent.

[1]  J. Reiman Driving to the Panopticon: A Philosophical Exploration of the Risks to Privacy Posed by the Highway Technology of the Future , 1995 .

[2]  Daniel J. Solove,et al.  Data Mining and the Security-Liberty Debate , 2007 .

[3]  Tal Zarsky Online Privacy, Tailoring, and Persuasion , 2006 .

[4]  Dominick A. Pisano,et al.  A Passion for Wings: Aviation and the Western Imagination, 1908-1918 , 1994 .

[5]  William W. Stead,et al.  Committee on Engaging the Computer Science Research Community in Health Care Informatics , 2009 .

[6]  Herbert S. Lin,et al.  Computational Technology for Effective Health Care: Immediate Steps and Strategic Directions , 2009 .

[7]  Mireille Hildebrandt,et al.  Profiling and the rule of law , 2008 .

[8]  Helen Nissenbaum,et al.  On Notice: The Trouble with Notice and Consent , 2009 .

[9]  F. Cohen The Use of Deception Techniques : Honeypots and Decoys , 2004 .

[10]  Helen Nissenbaum,et al.  The Meaning of Anonymity in an Information Age , 1999, Inf. Soc..

[11]  Qi Xie,et al.  FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.

[12]  Guillaume de Syon,et al.  The Spectacle of Flight: Aviation and the Western Imagination 1920-1950, by Robert WohlThe Spectacle of Flight: Aviation and the Western Imagination 1920-1950, by Robert Wohl. New Haven, Connecticut, Yale University Press, 2005. x, 364 pp. $39.95 US (cloth). , 2006 .

[13]  Suman Nath,et al.  Privacy-Preserving Reconstruction of Multidimensional Data Maps in Vehicular Participatory Sensing , 2010, EWSN.

[14]  Bryan Pfaffenberger,et al.  Technological Dramas , 1992 .

[15]  S. Fender The New York Review of Books , 1986 .

[16]  Gary T. Marx,et al.  A Tack in the Shoe: Neutralizing and Resisting the New Surveillance , 2003 .

[17]  Jonathan M. Smith,et al.  Disinformation: A Taxonomy , 2011, IEEE Security & Privacy.

[18]  Romit Roy Choudhury,et al.  Hiding stars with fireworks: location privacy through camouflage , 2009, MobiCom '09.

[19]  Julian Freeman,et al.  THE SPECTACLE OF FLIGHT AVIATION AND THE WESTERN IMAGINATION, 1920–1950 , 2006 .

[20]  Mani Subramani,et al.  How Do Suppliers Benefit from Information Technology Use in Supply Chain Relationships? , 2004, MIS Q..

[21]  Gloria González Fuster,et al.  Inaccuracy as a privacy-enhancing tool , 2010, Ethics and Information Technology.

[22]  Neil Postman,et al.  Informing Ourselves to Death , 2013 .

[23]  Hugh Kenner,et al.  A Passion For Wings: Aviation and the Western Imagination, 1908-1918 , 1995 .

[24]  H. Nissenbaum Toward an Approach to Privacy in Public: Challenges of Information Technology , 1997 .

[25]  Katherine J. Strandburg,et al.  Privacy and Technologies of Identity: A Cross-Disciplinary Conversation , 2005 .