Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web

This article addresses the question of whetherpersonal surveillance on the world wide web isdifferent in nature and intensity from that inthe offline world. The article presents aprofile of the ways in which privacy problemswere framed and addressed in the 1970s and1990s. Based on an analysis of privacy newsstories from 1999–2000, it then presents atypology of the kinds of surveillance practicesthat have emerged as a result of Internetcommunications. Five practices are discussedand illustrated: surveillance by glitch,surveillance by default, surveillance bydesign, surveillance by possession, andsurveillance by subject. The article offerssome tentative conclusions about theprogressive latency of tracking devices, aboutthe complexity created by multi-sourcing, aboutthe robustness of clickstream data, and aboutthe erosion of the distinction between themonitor and the monitored. These trendsemphasize the need to reject analysis thatframes our understanding of Internetsurveillance in terms of its “impact” onsociety. Rather the Internet should beregarded as a “form of life” whose evolvingstructure becomes embedded in humanconsciousness and social practice, and whosearchitecture embodies an inherent valence thatis gradually shifting away from the assumptionsof anonymity upon which the Internet wasoriginally designed.

[1]  Gary T. Marx,et al.  Undercover: Police Surveillance in America , 1988 .

[2]  Andrew McLaughlin The Whale and the Reactor: A Search for Limits in an Age of High Technology , 1987 .

[3]  M. Foucault The Subject and Power , 1982, Critical Inquiry.

[4]  Selma C. Etter Database Nation the Death of Privacy in the 21st Century , 2000, Journal of Computing in Higher Education.

[5]  Alan F. Westin,et al.  Databanks in a free society : computers, record-keeping, and privacy : report of the Project on Computer Databanks of the Computer Science and Engineering Board, National Academy of Sciences , 1972 .

[6]  Ithiel de Sola Pool,et al.  Technologies of Freedom: On Free Speech in an Electronic Age , 1984 .

[7]  Michael Grüninger,et al.  Introduction , 2002, CACM.

[8]  J. Reidenberg Lex Informatica: The Formulation of Information Policy Rules through Technology , 1997 .

[9]  H. Dreyfus,et al.  Michel Foucault: Beyond Structuralism and Hermeneutics. , 1985 .

[10]  A. L. Shapiro The Control Revolution , 1999 .

[11]  Mark Fischetti,et al.  Weaving the web - the original design and ultimate destiny of the World Wide Web by its inventor , 1999 .

[12]  T. Jordan Cyberpower: The culture and politics of cyberspace and the Internet , 1999 .

[13]  C. Dandeker Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day , 1990 .

[14]  P. Schwartz Privacy and Democracy in Cyberspace , 2000 .

[15]  L. Winner The Whale and the Reactor , 2020 .

[16]  Joel R. Reidenberg,et al.  Resolving Conflicting International Data Privacy Rules in Cyberspace , 2000 .

[17]  L. Winner Autonomous Technology: Technics-out-of-Control as a Theme in Political Thought , 1977 .

[18]  Lawrence Lessig,et al.  Code and Other Laws of Cyberspace , 1999 .

[19]  Colin J. Bennett Computers, Personal Data, and Theories of Technology: Comparative Approaches to Privacy Protection in the 1990s , 1991 .

[20]  David Lyon,et al.  The Electronic Eye: The Rise of Surveillance Society , 1994 .

[21]  Don Tapscott,et al.  Who Knows? : Safeguarding Your Privacy in a Networked World , 1995 .

[22]  Roger A. Clarke,et al.  Information technology and dataveillance , 1988, CACM.