Codes of Life: Identification Codes and the Machine-Readable World

In this paper we present a detailed examination of identification codes, their embeddedness in everyday life, and how recent trends are qualitatively altering their nature and power. Developing a Foucaultian analysis we argue that identification codes are key components of governmentality and capitalism. They provide a means of representing, collating, sorting, categorising, matching, profiling, regulating, of generating information, knowledge, and control through processes of abstraction, computation, modeling, and classification. Identification codes now provide a means of uniquely addressing all the entities and processes that make up everyday life—people, material objects, information, transactions, and territories. Moreover, they provide a means of linking these entities and processes together in complex ways to form dense rhizomic assemblages of power/knowledge. At present, however, the information that identification codes provide access to are, at best, oligopticon in nature—that is, they afford only partial and selective views. In the latter part of the paper we outline four trends—wide-scale trawling for data, increased granularity, forever storage, and enhanced processing and analysis—that seek to convert these partial oligopticons into more panoptic arrangements. In turn, we contend that these trends are part of a larger metatrend—the creation of a machine-readable world in which identification codes can be systematically and automatically ‘read’ and acted on by software independent of human control. This metatrend is supported by interlocking discourses such as safety, security, efficiency, antifraud, citizenship and consumer empowerment, productivity, reliability, flexibility, economic rationality, and competitive advantage to construct powerful, supportive discursive regimes.

[1]  J. Goss “We Know Who You Are and We Know Where You Live”: The Instrumental Rationality of Geodemographic Systems , 1995 .

[2]  David Rhind,et al.  Framework for the world , 1997 .

[3]  Peter F. Fisher,et al.  Geoslavery - IEEE Technology and Society Magazine , 2001 .

[4]  N. Thrift Remembering the Technological Unconscious by Foregrounding Knowledges of Position , 2004 .

[5]  Celia Lury,et al.  Cultural Rights: Technology, Legality and Personality.@@@The Panoptic Sort: A Political Economy of Personal Information. , 1993 .

[6]  F. Crick,et al.  Molecular Structure of Nucleic Acids: A Structure for Deoxyribose Nucleic Acid , 1953, Nature.

[7]  N. Thrift Driving in the City , 2004 .

[8]  Roger Clarke,et al.  The Digital Persona and Its Application to Data Surveillance , 1994, Inf. Soc..

[9]  David Lyon,et al.  Airports as data filters: Converging surveillance systems after September 11th , 2003, J. Inf. Commun. Ethics Soc..

[10]  M. Hannah Space and the Structuring of Disciplinary Power: An Interpretive Review , 1997 .

[11]  Philip Mirowski,et al.  Trust in Numbers: The Pursuit of Objectivity in Science and Public Life , 1996 .

[12]  Michaelis Lianos DANGERIZATION AND THE END OF DEVIANCE The Institutional Environment , 2000 .

[13]  James B. Rule,et al.  Documentary identification and mass surveillance in the United States , 1994 .

[14]  Martin Innes,et al.  Control Creep , 2001 .

[15]  W. Elizabeth Jepson,et al.  Mapping an Empire: The Geographical Construction of British India, 1765-1843 , 1998 .

[16]  D. Kahn The codebreakers : the story of secret writing , 1968 .

[17]  A. DeMaria A structure for deoxyribose nucleic acid. , 2003, Journal of the American College of Cardiology.

[18]  Angel J. Gordo-Lpez,et al.  Inventing our selves: Psychology, power, and personhood , 2000 .

[19]  Glover T. Ferguson Have your objects call my objects , 2002 .

[20]  M. Curry The Digital Individual and the Private Realm , 1997 .

[21]  John Gilliom,et al.  Overseers of the Poor: Surveillance, Resistance, and the Limits of Privacy , 2001 .

[22]  David Lyon,et al.  Everyday Surveillance: Personal data and social classifications , 2002 .

[23]  Jeremy W. Crampton,et al.  Cartographic Rationality and the Politics of Geosurveillance and Security , 2003 .

[24]  William Bogard,et al.  The Simulation of Surveillance: Hypercontrol in Telematic Societies , 1996 .

[25]  J. Overhage,et al.  Sorting Things Out: Classification and Its Consequences , 2001, Annals of Internal Medicine.

[26]  James B. Rule,et al.  Documentary Identification and Mass Surveillance in the United States , 1983 .

[27]  E. Larson,et al.  The Naked Consumer: How Our Private Lives Become Public Commodities , 1992 .

[28]  Edward Grochowski,et al.  Technological impact of magnetic hard disk drives on storage systems , 2003, IBM Syst. J..

[29]  Louis Althusser,et al.  Lenin and Philosophy and Other Essays , 1971 .

[30]  Alan Q. Morton Packaging history: The emergence of the uniform product code (UPC) in the United States, 1970–75 , 1994 .

[31]  Sue Holwell,et al.  Information, Systems and Information Systems: Making Sense of the Field , 1998 .

[32]  Howard Becker Science, Culture, and Society , 1952, Philosophy of Science.

[33]  David Savir,et al.  The Characteristics and Decodability of the Universal Product Code , 1975, IBM Syst. J..

[34]  Rob Kitchin,et al.  Flying through Code/Space: The Real Virtuality of Air Travel , 2004 .

[35]  Hildegard Binder Johnson,et al.  Order Upon the Land: The U.S. Rectangular Land Survey and the Upper Mississippi Country , 1977 .

[36]  A. Debons,et al.  The control revolution: Technological and economic origins of the information society , 1990, J. Am. Soc. Inf. Sci..

[37]  Norman Paskin Identification and Metadata , 2003, Digital Rights Management.

[38]  Catarina Fróis,et al.  Documenting individual identity: the development of state practices in the modern world , 2006 .

[39]  David J. Phillips Beyond Privacy: Confronting Locational Surveillance in Wireless Communication , 2003 .

[40]  Trevor J. Barnes,et al.  The Place of Numbers: Histories, Geographies, and Theories of Quantification , 2001 .

[41]  Matthew Henry Edney Mapping an Empire: The Geographical Construction of British India, 1765-1843 , 1997 .

[42]  Chuihua Judy Chung,et al.  Harvard Design School Guide to Shopping , 2000 .

[43]  John Torpey The invention of the passport : surveillance, citizenship and the state , 1999 .

[44]  Roger Clarke,et al.  Human Identification in Information Systems , 1994 .

[45]  David Lyon,et al.  Surveillance as social sorting : Computer codes and mobile bodies , 2005 .

[46]  N. Thrift,et al.  Lists come alive: electronic systems of knowledge and the rise of credit-scoring in retail banking , 1999 .

[47]  James B. Rule,et al.  The Invention of the Passport: Surveillance, Citizenship, and the State , 1999 .

[48]  Joshua Cole,et al.  :Documenting Individual Identity: The Development of State Practices in the Modern World , 2004 .

[49]  A. Danna,et al.  All That Glitters is Not Gold: Digging Beneath the Surface of Data Mining , 2002 .

[50]  Roy Want,et al.  Bridging physical and virtual worlds with electronic tags , 1999, CHI '99.

[51]  Mordechai Haklay Public Environmental Information Systems: Challenges and Perspectives , 2002 .

[52]  Mark Cenite Code and Other Laws of Cyberspace , 2000 .

[53]  Rob Kitchin,et al.  Code and the Transduction of Space , 2005 .

[54]  D. G. Hitchner,et al.  Home Office , 2010, Risk, Fraud & Compliance.

[55]  N. Thrift,et al.  The automatic production of space , 2002 .

[56]  R. Fraser The structure of deoxyribose nucleic acid. , 2004, Journal of structural biology.

[57]  Kelly Gates,et al.  Wanted Dead or Digitized , 2002 .

[58]  D. Lyon Surveillance as social sorting : privacy, risk, and digital discrimination , 2003 .

[59]  Randolph C. Grace,et al.  The politics of large numbers: A history of statistical reasoning , 2000 .

[60]  Colin J. Bennett Cookies, web bugs, webcams and cue cats: Patterns of surveillance on the world wide web , 2001, Ethics and Information Technology.

[61]  Lawrence Lessig,et al.  Free Culture: How Big Media Uses Technology and the Law to Lock Down Culture and Control Creativity , 2004 .

[62]  K. Clayton,et al.  Transactions of the Institute of British Geographers , 1959 .

[63]  A. Hayford The Limits to Capital , 1984 .

[64]  P. M. Alexander,et al.  Towards reconstructing meaning when text is communicated electronically , 2003 .

[65]  Simon G. Davies,et al.  Touching Big Brother , 1994 .