Data Power - Radical Geographies of Control and Resistance-Thatcher
Data Power - Radical Geographies of Control and Resistance-Thatcher
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:54:27 +00:00
All use subject to https://about.jstor.org/terms
Data Power
“A call to arms [...] sets out a clear, persuasive argument for the need to
challenge the power of platforms and systems, and details the tools to do so.
A thought-provoking read.”
—Professor Rob Kitchin, Maynooth University
“The first non-technical guidebook on how to live with location data and it
is a truly radical response for our times. Spatial data for us, not about us.”
—Jeremy W. Crampton, Professor of Urban Data Analysis,
Newcastle University
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:54:27 +00:00
All use subject to https://about.jstor.org/terms
Radical Geography
Series Editors:
Danny Dorling, Matthew T. Huber and Jenny Pickerill
Former editor: Kate Derickson
Also available:
Disarming Doomsday:
The Human Impact of Nuclear Weapons since Hiroshima
Becky Alexis-Martin
Unlocking Sustainable Cities:
A Manifesto for Real Change
Paul Chatterton
In Their Place:
The Imagined Geographies of Poverty
Stephen Crossley
Geographies of Digital Exclusion:
Data and Inequality
Mark Graham and Martin Dittus
Making Workers:
Radical Geographies of Education
Katharyne Mitchell
Space Invaders:
Radical Geographies of Protest
Paul Routledge
New Borders:
Migration, Hotspots and the European Superstate
Antonis Vradis, Evie Papada, Joe Painter and Anna Papoutsi
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:54:27 +00:00
All use subject to https://about.jstor.org/terms
Data Power
Radical Geographies of
Control and Resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:54:27 +00:00
All use subject to https://about.jstor.org/terms
First published 2022 by Pluto Press
New Wing, Somerset House, Strand, London WC2R 1LA
www.plutobooks.com
Front cover designed by David Drummond for the Radical Geography series;
with additional image and color work by artist, geographer, and friend Nick
Lally. Image source: “2020.06.06 Protesting the Murder of George Floyd,
Washington, DC USA 158 20209” by tedeytan and is licensed with CC BY-SA
2.0. The color scheme, viridis, was created by Stéfan van der Walt and Nathaniel
Smith and is intended to more clearly visualize data for readers with common
forms of colorblindness.
The right of Jim E. Thatcher and Craig M. Dalton to be identified as the authors
of this work has been asserted in accordance with the Copyright, Designs and
Patents Act 1988.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:54:27 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:02 +00:00
All use subject to https://about.jstor.org/terms
Contents
Notes133
Bibliography140
Index159
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:02 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:13 +00:00
All use subject to https://about.jstor.org/terms
Figures and Tables
figures
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:13 +00:00
All use subject to https://about.jstor.org/terms
figures and tables . vii
tables
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:13 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:26 +00:00
All use subject to https://about.jstor.org/terms
Series Preface
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:26 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:35 +00:00
All use subject to https://about.jstor.org/terms
Acknowledgments
Change requires hard work and building solidarity. With the help of so
many others, we’ve written this book as an exercise on building alterna-
tives.
Books are weird, complicated things in which there are fragments of
both ephemeral conversations and decadal arguments. For Jim, this book
would have been impossible without the support of family and friends
near and far. I’d like to first thank Courtney, my partner for nearly two
decades now, for her support, calm, and general equanimity. Hannah,
age eight, and Ben, age four, were similarly crucial for the development
of this book, as were my parents, Sally and Richard, for their periodic
care of those two. Intellectually, I owe a debt of gratitude to Craig for our
many collaborations, but also to folks including Luke Bergmann (who
provided notes on an early draft), Nick Lally (who revised the cover),
Laura Imaoka, Clancy Wilmott, Emma Fraser, David O’Sullivan, Dillon
Mahmoudi, Alicia Cowart, Ryan Burns, Kelly Kay, Alida Cantor, Chris
Knudson, Carolyn Fish, Anthony Robinson, Danny Kunches, David
Retchless, Lauren Anderson, Megan Finn, Madelynn von Baeyer, Josh
Gray, Karen Thatcher, and—I am certain—a host of individuals I’m
unintentionally forgetting.
Also, I appreciate the many master’s students with whom I’ve had
long-standing discussions on these topics, including Corrine Armi-
stead, Matt Seto, and Ryan Mitchell. Although gone now, David Waring
deserves mention for our many late-night conversations over nearly 20
years of friendship. A special, long-term, thanks must go to my erst-
while advisor, James McCarthy—any misapplication of rigorous Marxist
thinking should not reflect poorly upon the source. Finally, I must thank
Joe, Jon, Dan, Steve, Jason, and Mike for Friday evening gaming; we’ll
make diamond in Rocket League someday.
This book was also only possible with the support of many people in
Craig’s life. This includes both those who directly inform the ideas of my
work and those whose reproductive labor and support made it possible
to develop and write a book at all while simultaneously raising a child
and teaching heavy loads every semester though a pandemic. Cecilia, I
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:35 +00:00
All use subject to https://about.jstor.org/terms
x . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:35 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:48 +00:00
All use subject to https://about.jstor.org/terms
Abbreviations
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:48 +00:00
All use subject to https://about.jstor.org/terms
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:55:48 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
Chapter Title: Introduction: Technology and the Axes of Hope and Fear
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
Introduction
Technology and the Axes of Hope and Fear
One step after another, each recorded and located by the Global Position-
ing System (GPS) and shared with the world. Sequential steps repeated
daily in our morning run or commute become part of an economic
cycle of digital tracking, extracting our location data and serving parts
back to us as directions, as ads, as insurance rates. And also as egregious
privacy violations which set off, like clockwork, another cycle—a media
cycle. In 2018, Nathan Ruser revealed that Strava’s Global Heatmap of
users’ exercise routes had inadvertently revealed the locations of several
nominally secret military bases. A parade of news articles followed that
ranged from how-to pieces on managing the fitness application’s privacy
settings (Pardes 2018) to more widely questioning the very concept of
privacy and informed consent (Tufekci 2018).
The problem with this media cycle is not with any individual piece of
content. Pardes’ WIRED article is an excellent guide to navigating Strava’s
privacy and security settings. Rather, the problem lies in how each data
scandal is framed as separate and surprising, seemingly unforeseeable
even as each extraction of data for the purpose of profit inevitably sets
up the conditions for exactly this kind of event (Thatcher 2018). Even a
cursory glance at recent technology news reveals the cyclical nature of
such spatial (geographic/location) data abuse narratives: before Strava
there was Microsoft’s Avoiding the Ghetto patent (Thatcher 2014), and
before that, Girls Around Me leveraged the Foursquare and Facebook
data to help men stalk women (Bilton 2012). Examples of outrage, and
even congressional and European Union (EU) court hearings (Jacobson
2020), abound, but policy is slow and at times reversed or co-opted by
the companies it is meant to regulate. As with running for exercise, the
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
2 . data power: radical geographies of control and resistance
destination of this data cycle isn’t the point; maintaining the cycle is.
Continuing to extract our data themselves,1 and spatial data in particu-
lar, is profitable. While an individual application or feature might change
due to a data scandal, the overarching cycle of spatial data creation,
extraction, and exchange with little regard for the users producing the
data or other consequences continues apace.
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
introduction: technology and the axes of hope and fear . 3
At this point, you’ve picked up and opened a book from Pluto Press’
Radical Geography series titled Data Power. From our perspective, it
seems safe to assume that you have at least a passing interest in the role
of data and technologies in culture and society, radical geography’s ideas
and practices, or the critical orientation of Pluto’s publications. If that is
the case, then this book is for you.
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
4 . data power: radical geographies of control and resistance
This book does not assume any deep familiarity with technical
systems or digital spatial data’s creation, dispossession, and commodi-
fication as we introduce what is important and relevant over the course
of the chapters. That said, it is useful to begin here with a brief descrip-
tion of the production of data through everyday living as a key means of
capitalist profit-seeking. The book centers on these social processes and
how they may be resisted.
Put simply, each interaction with a digital system produces data. For
example, a post to Facebook will often record not simply the post itself,
but also where the user was when it was made, other users who were
with them, and even the browser/device used to make the post (this is
often referred to as the post’s metadata). These data are extracted, tied
to other data points about the user, and analyzed to produce digital rep-
resentations of them. These representations are not complete captures
of their life, but specifically focused on predicting their actions and, in
particular, their consumptive practices. This is why Craig receives adver-
tisements for a new tent after mentioning camping on Twitter.
While each individual data point holds little meaning or value, a collec-
tion of data points tends to mean more than the same points in isolation.
Data are much more valuable when connected to still more data. The
degree to which multiple data points can be tied together, especially if it
can anticipate how likely (or able) a user is to spend money, determines
the value of the data they produce for advertising and data analytic firms
like Facebook, Google, Twitter, and many others. The massive scales of
data and users at which such data technology companies operate produce
centralized, multi-billion-dollar industries that continually seek to shape
your actions, your life, in ways more amenable to predictable consump-
tion, and therein, their bottom line.
In light of these ongoing processes, this book does three things. First, it
surveys the current context in which new technological regimes, histori-
cally contingent socio-political systems, of spatial data play in our world.
Rather than the one-off solutionism offered by technology’s most dis-
ruptive boosters, we instead “move slow,” purposefully turning towards
the long history of critical and radical thought concerning the questions
technology poses for our lives, from Walter Benjamin to Ruha Benjamin.
We find these ideas to be the best available tools for “staying with the
trouble” (Haraway 2016), situating what we know about the present and
sifting through the past to help create alternative futures. Second, we
examine current individualized responses to data regimes, demonstrat-
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
introduction: technology and the axes of hope and fear . 5
ing both where these practices succeed and where their limitations lie.
Third, we outline a clear set of collective practices focused on developing
radical solidarities, kinships against and through spatial technologies.
Our purpose is to develop ways of (re)asserting our humanity within the
sociotechnical milieu in which we live—a guidebook of sorts for living
with data. Perhaps these pages will even be as “disruptive” as the unicorns
and rock stars of the tech industry dream themselves to be.
What we promise is that by the end of this book, you will have a deeper
perspective on why and where the location data you create in your day-
to-day life are extracted, analyzed, and come to stand for you as well as
a conceptual toolkit for evaluating, resisting, and making use of those
systems more on your own terms.
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
6 . data power: radical geographies of control and resistance
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
introduction: technology and the axes of hope and fear . 7
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
8 . data power: radical geographies of control and resistance
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
introduction: technology and the axes of hope and fear . 9
lective for women active in Spain in the 2000s. Building on their work, we
propose applying the dérive to the current contexts of the data spectacle.
The resulting “data dérive” is a way to purposefully approach spaces of
everyday life while cognizant of associated data regimes (Thatcher and
Dalton 2017). Building on the dérive, we next engage another Situation-
ist approach to develop what we call data détournement. This approach
involves employing or differently applying data not as a commodity,
but as a means for political change. Counter-mapping provides exciting
examples of this sort of practice. For the last mode of collective resis-
tance, we briefly propose a data strike. The idea is to withhold data, to
the extent possible, from data-driven companies to incentivize them to
make changes. We say strike, not boycott, because producing data, and
therein value, is labor.
Chapter 5, “Our Data Are Us, So Make Them Ours,” returns to the
idea that the data regimes in which we find ourselves are not wholly
“new” and have their roots in long-standing processes of exploitation
and domination within modern, capitalist societies. For example, the
direct development of modern locational tracking for targeted adver-
tising springs from earlier geodemographic profiling and anti-poverty
initiatives (Dalton and Thatcher 2015; Eubanks 2018). History matters,
as examples of taking back or repurposing data indicate some of the
radical moves available to us today.
Eschewing blanket rejections of the role of technology in our lives,
we return to the question of liberation, of asserting our humanity with
and through technology. Based on the critical and empirical examples
throughout the book, we argue that we can both anticipate and under-
stand the role data and their analyses play in enabling and constraining
our everyday spaces and knowledges. In so doing, we are able to contest,
repurpose, and recreate these spaces through a set of concrete practices
that inform a radical politics of change. We end the book with three
“calls to action” that form the basis of a more engaged, technologically
informed radical politics.
The first is a rejection of the “Who could have known?” fictions that
perpetuate modern popular press coverage of the media. The second is
a return to the examples from Chapters 3 and 4 to once more suggest
where and how we might find working solidarities in a world of data-
derived value. Third, we suggest a praxis that “lives in the cracks,” one
that embraces incomplete knowledge, partiality, and the subversion and
repurposing of technology in novel ways. We provide examples of this
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
10 . data power: radical geographies of control and resistance
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
introduction: technology and the axes of hope and fear . 11
never to suggest that any reader must follow any given recommendation
or that to not do so is some kind of moral failing. Depending on the cir-
cumstances, some modes of resistance may not be appropriate because
under those circumstances they are dangerous or likely to harm other
people, or they simply may not be possible.
The practices and ideas we develop ultimately stem from our own
positionality. We are cis white men raised and educated in the global
north. We each hold professor positions within neoliberal universi-
ties and live in urban areas. While our experiences differ, they are also
limited. While we bring in examples of spatial data regimes and resis-
tances from around the globe and ideas from different kinds of thinkers,
there are blind spots and aporias in our work, just as there are in any
scholarship. We say all this to make clear from the outset that as reflexive
as we try to be throughout this work, we recognize those efforts are never
complete. Indeed, working with individualized data offers new oppor-
tunities to connect and entwine subjects and objects, such as their own
spatial data, for better-situated thinking.
Our goal is to build shared affinities, tactics, and solidarities through
experiences of new spatial data regimes that are sorting and oppress-
ing, enabling, and constraining our actions. To do so, we draw upon our
decades of experience researching and teaching geospatial technologies
at the undergraduate and graduate levels; but rather than eschew our
limitations, we call attention to them now and ask that readers keep their
own perspectives in mind as they read.
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
12 . data power: radical geographies of control and resistance
In the chapters that follow, we chart the history, present, and future of
spatial data and the devices which create, extract, and analyze it in our
lives. Together, they develop practices that we can carry through our
everyday lives, describing not only what is, but more importantly, what
might and must be. Spatial data stand for us, but we must learn how to
make them our own.
This content downloaded from 157.97.134.138 on Tue, 16 Jul 2024 00:29:20 UTC
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
1
Life in the Age of Big Data1
Not many of those who use the apparatus know what devastation it
once wreaked in family circles. The sound with which it rang between
two and four in the afternoon, when a schoolfriend wished to speak
to me, was an alarm signal that menaced not only my parents’ midday
nap but the historical era that underwrote and enveloped this siesta.
(Benjamin 2008[1938], 77)
[Chaplin’s] unique significance lies in the fact that, in his work, the
human being is integrated into the film image by way of his gestures—
that is, his bodily and mental posture. The innovation of Chaplin’s
gestures is that he dissects the expressive movements of human beings
into a series of minute innervations. Each single movement he makes
is composed of a succession of staccato bits of movement. Whether it
is his walk, the way he handles his cane, or the way he raises his hat—
always the same jerky sequence of tiny movements applies the law of
cinematic image sequence to human motorial functions.
(Benjamin 2008[1935b], 340)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
14 . data power: radical geographies of control and resistance
Figure 1.1 The Lackawana Valley, by George Inness. (National Gallery of Art,
public domain)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 15
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
16 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 17
This means that one could be doubtful of all claims, for example, that
the bias or the violence could be excised from the algorithm and begin
instead from the intractable political relations between the algorithm
and the data from which it learns.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
18 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 19
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
20 . data power: radical geographies of control and resistance
a menacing alarm
Figure 1.2 An 1863 image of Philip Reis’ telephone from the German
newspaper Die Gartenlaube. While Bell’s legal patent eventually won primacy,
Reis had invented a telephone-like device (and coined the term Telephon) in
Germany by 1861. (Public domain)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 21
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
22 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 23
there is no alternative
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
24 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 25
ways out?
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
26 . data power: radical geographies of control and resistance
only a god
Martin Heidegger was a Nazi. While his public persona always attempted
to eschew this reality after the war, publication of his so-called “black
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 27
notebooks” after his death has removed any pretense or doubt.14 Never-
theless, his thinking on the relations between technology and society and
his pursuit of alternatives and escapes from the excessive alienation of
humanity under modern capitalism cannot be so easily dismissed, espe-
cially in light of our actually existing world.
Heidegger makes clear that technology is in no way neutral or
impartial. First, viewing it as such delivers humanity “to it [technology]
in the worst possible way” (Heidegger 1977b, 4), akin to Thoreau’s line
that people “have become the tools of their tools” (Thoreau 1910, 47).
Second, while “[s]cience is the theory of the real,” the real will always
approach mankind through modern technology (Heidegger 1977b,
157). Third, “[t]echnology is … no mere means. Technology is a way
of revealing” (Heidegger 1977b, 12). These three points concerning the
neutrality of technology, its relationship to the real, and the revealing of
technology provide powerful insight into the means and limits of tech-
nology as it functions in our world today.
Heidegger’s insights build upon the phenomenological movement in
philosophy. In this line of thinking, “things” are objects that appear as
present in consciousness as “things themselves” without having a hidden
or deeper existence (Husserl 2001). Heidegger’s thinking insists that as a
technological object functions, it retreats from conscious consideration
and becomes a “thing” taken for granted (Harman 2010). In modern
terms, we rarely notice when our phones seamlessly find a restaurant
nearby when we are looking for dinner in an unfamiliar place. Only
a few years ago, choosing our cultural and culinary experience would
have been up to a generic guidebook, a friendly recommendation, or
chance, not a GPS-indexed, personalized algorithmic ranking. Digital
media scholar David M. Berry has highlighted modern technology’s par-
ticular ability to elide the technical considerations by which it works.
He suggests that algorithms have moved people from knowing that to
knowing how (Berry 2011, 121). We know how to search for a restaurant
using Yelp, but we do not stop to think about the obfuscated system of
hardware (processing units, cell towers, and so on), software (operating
systems, Yelp’s app), and data (Yelp’s individualized profile of each of us)
that make finding a restaurant possible.
Heidegger’s insistence that technology is not and cannot be neutral
helps dispel the liberal belief that “it’s not the technology, but how an
individual uses it.”15 The idea that a technology itself, regardless of
the intention of its users, may have intrinsic orientations towards the
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
28 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 29
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
30 . data power: radical geographies of control and resistance
an off ramp
The images detached from every aspect of life merge into a common
stream in which the unity of that life can no longer be recovered.
Fragmented views of reality regroup themselves into a new unity as a
separate pseudo-world that can only be looked at. … The spectacle is a
concrete inversion of life, an autonomous movement of the nonliving.
(Debord 1967, Thesis 2; original emphasis)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 31
interactions and integrates them into market exchange (Beller 2012, 8).
This is a totalizing concept, “the autocratic reign of the market economy
which had acceded to an irresponsible sovereignty, and the totality of
new techniques of government which accompanied this reign” (Debord
1998, 2). Some argue this limits its utility, for how can we resist that
which is total? Is it not better to, as Heidegger suggested, wait for a god?
But, as we’ve written elsewhere (Thatcher and Dalton 2017, 137), such
views mistake “a totalizing tendency for a static totality.” The point of the
spectacle is that it dynamically attempts to colonize and subjugate daily
life at all levels of experience and at all times. This dynamic tendency
opens fertile ground for resistance, both among the Situationists and
later activists who take inspiration from them.
The Situationists are not known for direct success in their resistances,
whether overthrowing capitalism or shaping the mid-century redevel-
opment of Paris. Rather, as we see with the May 1968 Revolution, their
ultimate impact tends to be cultural, which reflects the nature of their
methods. They developed and practiced their own resistance methods,
such as détournement, artistic repurposing of existing advertising and
spectacle imagery turned back on itself. Perhaps most relevant to geo-
graphic data is the dérive (drifting), a form of semi-systematic wandering
to better know and articulate a place.19 Such cultural practices are signifi-
cant because the Situationists see the possibility of a world built on play,
an alternative to the howling feedback loops of consumption in which
capitalism entrenches us. Moreover, such play opens paths through
engagements with and repurposing of existing systems, destruction
through plagiarism of ideas, media, and actions (Wark 2013). A similar
ethos suffuses this work.
earnest multidimensionality
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
32 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 33
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
34 . data power: radical geographies of control and resistance
the flickering screens, the dynamics of real-time data and the prospect
of behavioural change intersect in a glossy imaginary where being
technologically fashionable and facile supersedes concerns of differ-
ential docility. … [W]e are assured of the untapped potential at the
touch of the flat screens in some of our pockets, that the possibil-
ity of our “fittest” bodies and “smartest” cities rests with individual
behaviour.
(Wilson 2015a, 39)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 35
Figure 1.3 Images at two scales around Boston from the “One Dot Per
Person for the Entire United States” visualization created by the Demographics
Research Group at the University of Virginia. A dot-density map built upon the
2010 census enumeration. Though blurry here, this style is emblematic of many
current approaches to data visualization. At regional scales (the left), the dots
blend into one another, producing what appear to be filled areal units; however,
when zoomed in to more local scales (the right), the dots disaggregate and
show the emptiness within said units. (Image copyright © 2013 Weldon Cooper
Center for Public Service, Rector and Visitors of the University of Virginia,
Dustin A. Cable, creator)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
36 . data power: radical geographies of control and resistance
data and 1.4 trillion coordinate points, it promised the “largest, richest,
and most beautiful dataset of its kind” (Robb 2017). Why build such a
map, on a worldwide scale so far divorced from the distance that people
actually run daily? Chief Technologist of User Experience and Sustain-
ability at Intel Melissa Gregg points to a specific scopophilic pleasure to
be found in viewing large data sets. Building on Orit Halpern’s Beautiful
Data (2014), she describes the appearance of “command and control
through seeing” that follows from the rendering of massive sets of data
imaginable through their visualization (Gregg 2015). Figure 1.3 illus-
trates how in such over-loaded visualizations, data points bleed together
at more extensive, regional scales, only to pull apart at more local scales,
providing the illusion of analytical meaning. To see is to know, to imagine
the whole of a complex system that constitutes data points beyond the
scale of which we could otherwise think.
Nonetheless, visualizing this kind of spatial information, connecting
who, when, and where, has profound implications beyond aesthetics,
as quickly became apparent in Strava’s Global Heatmap. On January
27, 2018, Nathan Ruser, then an analyst for United Conflict Analysts,
tweeted:
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 37
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
38 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 39
Even if the topic isn’t crime, data assembled into such maps become
an aesthetic representation of “hotness,” where one is likely to be/have
been at some time, where some act has occurred or is likely to occur. In
New Dark Age, James Bridle suggests that the very excess of informa-
tion creates the very conditions in which it is unlikely for us to think
and to know in detail; with every new piece added to the pile, the world
expands beyond our ability to conceptualize and threatens our ability to
act in it. Mapping and visualization offer a path through this fog. In the
face of overwhelming data, Orit Halpern (2014, 22) illustrates how these
methods become a “map for action” that transforms what it means to
know through what it means to see. Pivoting from nineteenth-century
motifs of extracting value from natural resources, she writes of how in
the twentieth century there emerged:
an aspiration and desire for data as the site of value to emerge from the
seeming informational abundance once assumed to be the province
of nature. Data … appeals to our senses and can be seen, felt, and
touched with seemingly no relationship to its content.
(Halpern 2014, 15)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
40 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 41
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
42 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 43
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
44 . data power: radical geographies of control and resistance
Figure 1.5 Inspired by Nikita Barsukov’s work, Nathan Yao built these
maps using public RunKeeper data. https://flowingdata.com/2014/02/05/
where-people-run/ (last accessed July 2021). (Used with author’s
permission)
Figure 1.6 Sample code to scrape RunKeeper’s public routes for the city
of Tacoma. Written in Ruby by Josh Gray working with Jim Thatcher, it
demonstrates the ease with which data may be acquired for those with specific
technical knowledge. (See https://github.com/DataResistance for more
examples of our work; also, note this script may violate RunKeeper’s terms of
service)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
life in the age of big data . 45
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:00 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
Chapter Title: What Are Our Data, and What Are They Worth?
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
2
What Are Our Data,
and What Are They Worth?
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 47
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
48 . data power: radical geographies of control and resistance
and technologies make feasible. His revenue per user estimate misses the
asymmetric relationship between Facebook and people. He pointedly
ignores the extent to which the company sets the terms for how an indi-
vidual’s data are extracted even if the person is not a consenting Facebook
user. This view of the world and people in it as a standing reserve of data
to be monetized by the few who have the means to do so is dangerous.
Mark Andrejevic, a professor of media studies, describes this as the
“big data divide.” While the data are extracted from many individuals,
they only emerge as having meaning and value for those who are able
to collect, store, and analyze large volumes of such data (Andrejevic
2014). While you or I may be able to sell Amazon’s van of hard drives, it’s
very unlikely that we would be able to put the data on those hard drives
to much use without both access to advanced technical and computa-
tional infrastructures as well as some kind of business plan related to the
buying and selling of goods online. It matters where, when, and for whom
data emerge as commodities. Illustrating this point, geographer Jeremy
Crampton and his co-authors have suggested that if the production of
data can be seen as the production of value, then the object of our study
should be not so much the content of the data, but the moments where
“subjects are constituted as laborers in an exploitative economic system”
of data production (Crampton et al. 2014, 3). Sociologist Christan Fuchs
comes to a similar conclusion through a meticulous study of how social
media users produce value for major technology firms under coercive,
exploitative, unpaid circumstances (Fuchs 2014). These data economies
work through processes of commodification and dispossession.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 49
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
50 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 51
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
52 . data power: radical geographies of control and resistance
With your permission, you give us more information about you, about
your friends, and we can improve the quality of our searches. We don’t
need you to type at all. We know where you are. We know where
you’ve been. We can more or less know what you’re thinking about.
(quoted in Thompson 2010)
The technology will be so good it will be very hard for people to watch
or consume something that has not in some sense been tailored for
them.
(quoted in Jenkins 2010)
While the expression of this ideal varies from firm to firm, its underly-
ing ethos has two important aspects. First, it is an invocation of the high
priests of data, the idea that “data will make you better, because you are
data.” Moreover, this belief is realized in our daily rituals of truth-seek-
ing, from searching Google Maps for a local store to checking what
people are tweeting today (Hillis et al. 2013). In thought and practice,
this reflects a fundamental shift from speaking with our data to them
speaking for us. Second, it highlights a world in which, according to
Ruha Benjamin, an attitude that seeks to “disrupt” life and convert it
from “analog to digital” (Benjamin 2019b, 13) pervades the worlds’
largest corporations and governments, but does so without consider-
ation of “the people and places broken in the process” (Benjamin 2019b,
15; original emphasis).
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 53
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
54 . data power: radical geographies of control and resistance
tool for better understanding the roles of technology and data in current
societies. Melissa Gregg, Chief Technologist for User Experience and
Sustainability at Intel, connects the concept of the spectacle to data. She
problematizes performative representations of data as visual spectacle,
such as in pitches for “big data” services. This gives rise to unsuitable
ocular metaphors, such as data shadows, that distance a seemingly
empowered agent from their data (Gregg 2015). Following Debord, we
extend her critical analysis to incorporate the role of data as commod-
ities, constituting a data spectacle that extends beyond the visual and
that is intimately connected to the information political economy of our
times (Thatcher and Dalton 2017).
With the advent of “big data,” and specifically of spatial data of the
everyday, a key article of faith in tech industries is the very representa-
tion and reproduction of self within those data systems cum spectacles.
Data are valuable for multiple business models, so there is incentive to
colonize everyday life to extract people’s data, particularly spatial data.
Tech companies use these data to accumulate value chiefly through
targeted advertising, but also consumer and business services such as
insurance and credit ratings.
The data spectacle comes into play when data are combined, processed,
analyzed, and fed back to those from whom it was extracted and their
peers. For example, instead of walking around a neighborhood to learn
about an area, Craig tends to use apps on his phone to assist and augment
his practice. The actions of his daily life have been colonized through
the extraction of data by that device. Based on his location and multiple
other data about him, those location-based apps present him a spectacle
of his surroundings, algorithmically selected local features, advertise-
ments, and reviews. These are likely relevant to him, but they also serve
the app owner’s business plan. These suggestions, inputs, and images are
more than possibilities he chooses from freely. They shape how he sees
the area and what he perceives as options, thereby effectively delimit-
ing his actions to what the app’s owners deem profitable to present. This
is the data spectacle in action. Perhaps there are other things to see and
do, and perhaps he may end up outside of the spectacle, but it is hard
to know they are there, and much easier to not look. The data spectacle
presents a commodified, fun-house mirror of the world and ourselves,
exaggerating some things, minimizing others, and not showing things
outside the frame. But the realities of the data spectacle are far from fun
for many people.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 55
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
56 . data power: radical geographies of control and resistance
interface daily. Melissa Gregg (2015) uses the delightfully visceral term
“data sweat” for data that are essentially of us, but may exude in ways we
don’t quite intend. She goes on to suggest that:
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 57
social credit
While smart cities move in this direction, initiatives like China’s social
credit system drive “biopolitics 2.0” to its logical conclusion. The intent
with this kind of system is to algorithmically calculate a reputation or
“trustworthiness” score for each adult citizen based on multiple indi-
cators which may include taxes, debts, crimes or citations, purchasing
histories, and community service. Not paying debts, crimes, minor
rule-breaking such as jaywalking or eating on public transit, and even
too much time playing video games could decrease the score. Actions
deemed as positive for society, such as caring for the elderly, donating
blood, community service, and raising a child would increase it. Too low
a score results in punitive measures, which may include being banned
from commercial air travel and high-speed trains, being prohibited from
receiving a loan or purchasing property, exclusion of one’s children from
admission to desirable schools, and even potentially public shaming,
such as seeing one’s name and face on billboards listing “untrustworthy”
individuals (Vanek Smith and Garcia 2018). Those with a high score
enjoy benefits which may include shorter waiting times for govern-
ment services, easier access to credit, and even the option to publicize
their score on dating services (Kobie 2019). While social credit could
in the future become a unified system at the national scale, Chinese
social credit currently exists as a web of multiple different systems. Some
are thematically focused, including the justice system, while others are
regional, working only in particular cities or provinces. Still others, such
as Alibaba’s Sesame Credit, run through contracts with major private
companies.
Regardless of whether the ultimate intent is direct or merely symbolic
control, the extent of such a system is only possible by collecting data
from multiple sources and calculating them in an automatic fashion.6
Once again, the resulting numbers are assumed to speak for themselves.
The question of “why,” much less the contributing social circumstances
for a score, is not deemed important. Unsurprisingly, such systems are
ripe for abuse by unscrupulous authorities, unintentional bureaucratic
errors, or cultural biases, any of which can have dramatic consequences
for someone’s life.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
58 . data power: radical geographies of control and resistance
This all sounds dystopian, and it is. That point is belabored by many
breathless English-language press accounts (Matsakis 2019a; Mozur
2018). Nevertheless, it bears mention that similar social mechanisms
employing algorithmic calculation of personal data are already in place
in the United States, Europe, and elsewhere. Our debts are monitored not
only by banks, but also by entirely unaccountable credit rating companies
such as Experian and TransUnion. Insurance companies assess risk by
monitoring driving and attempt to incentivize and monitor exercise
and other healthy behavior (see, for example, Progressive’s “Snapshot”
discount for “good” drivers). Criminal justice, from policing focusing
on minor infractions to sentencing to incarceration, and even public
shaming on the internet, is increasingly algorithmically guided (Eubanks
2018). Travel is limited not by official prohibition, but through the
market.7 Similarly, money provides access to services and legal counsel,
largely preventing those with means from having to deal with waiting
for government bureaucracies. The implications of falling down due to
initially minor mistakes, uncontrollable circumstances, incorrect data,
or biased algorithms are no less extreme in North America or Europe.
What makes the Chinese system different is its use in the context of a
non-democratic government.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 59
down protesters after the fact using digital data. For example, when two
police cars in Philadelphia were set on fire:
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
60 . data power: radical geographies of control and resistance
lighted, but little mention is given to the Interpol Terrorist Watch List,
the US Department of Homeland Security’s No Fly List, or any of the
other myriad lists that have tracked millions of individuals for decades in
other countries. No, this is new and different. The fact that it has already
and continues to occur within other nations is immaterial, that it is in
line with data extraction and analysis efforts by state and private indus-
tries around the globe is ignored; here, China remains the other.
And then, in late 2019, COVID-19 emerged in Wuhan. As our societies
and lives continue to writhe and contort as global capitalism attempts
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 61
speaking for
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
62 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
what are our data, and what are they worth? . 63
us rather than speaking with us. When that speech aligns with our prayers
or hopes, a match on Tinder, a job offer, a mortgage, we reproduce those
actions, hoping that the past will predict the future—praying that we’ve
found a confession that works.
This is what we, along with others, suggest forms part of a spectacular
“howling feedback loop” in which “[t]he data generated by such actions
is then fed into systems which algorithmically shape what options will
be presented the next time (s)he makes use of the service” (Thatcher and
Dalton 2017, 140; Lohr 2012; Wilson 2012).
This may feel benign or seem (or even be) beneficial in certain cir-
cumstances. Individuals may have preferences for specific kinds of food.
If a food-delivery service notices that Craig tends to get pizza not nearby,
but at Mama Rosa’s in the next neighborhood over, it can be helpful for
him to get coupons or promotions for Mama Rosa’s rather than pizzerias
closer to his home. With modern machine-learning, this occurs without
the algorithm ever needing (or trying) to understand why, it simply
detects a pattern along some dimensional axes of data (Mackenzie 2017).
As long as coupons are the upshot, it does not matter if it is because
Mama Rosa’s pizza is better or because Mama Rosa’s happens to be along
his commute home.
uneven data
And yet what opportunities (and peoples) are foreclosed from con-
sideration by these loops? Information Studies scholar Safiya Umoja
Noble argues that while it is “certainly laudable” to suggest that major
technology firms like “Google/Alphabet [have] the potential to be dem-
ocraticizing force[s],” it is necessary to consider both who benefits from
data and algorithmic practices as well as how the effects of their adoption
are not experienced equally across populations (Noble 2018, 163–164).
Someone without access to credit may not be able to use a credit card to
access pizza deliveries. Not only can some people fall through the cate-
gorical and algorithmic cracks, social biases are replicated and catalyzed
by such systems. In Automating Inequality, one of the many individuals
Virginia Eubanks spoke to echoes this sentiment, suggesting that more
privileged individuals should pay attention to the surveillance and algo-
rithmic governance enforced upon the less privileged because they, the
privileged, will be next (Eubanks 2018). Ruha Benjamin puts it more
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
64 . data power: radical geographies of control and resistance
bluntly when she writes that “Black people already live in the future”
(Benjamin 2019b, 32; original emphasis).
Whether we focus our attention on race, gender identity, age, income,
or geographical location, who is counted and how they count in data plays
out unevenly. Writing several years ago with Linnet Taylor, we discussed
the “uneven development of data,” how the data profile of a mobile device
user in Mauritania would likely differ significantly from that of someone
in central London (Dalton et al. 2016, 1). As we have seen, this difference
not only affects what these individuals can come to know within digital
systems (search results are tailored by location and profile), but also their
very access to opportunities like investment capital.
This is why the “decision” to participate within these systems, to
exchange our data for their notional advantages, is such a disingenu-
ous framing. On the one hand, there are real material advantages to the
acts of participation that play out differently across different popula-
tions and places. Ordering groceries for delivery is very helpful during a
pandemic. On the other hand, the very choice is one only offered to those
who have access to the advantages through other means. Keanu Reeves
can famously use a flip phone because he has a coterie of assistants that
can handle his financial and personal needs. A single mother who has
just been laid off may be forced into accepting a variety of surveillance
and data generation processes simply to access financial support for
her family.
The ability to opt out, to the degree that it does exist, favors those
whose lives are not predicated upon participation. Inclusion and
exclusion within data generating systems, and the algorithmic results
they produce, matter. The stakes of actual resistance, as opposed to priv-
ileged side-stepping, are steep. They may result in denied health benefits,
inability to access needed financial resources, or even refusal to be con-
sidered for employment or housing.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:13 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
3
Existing Everyday Resistances
In early 2020, artist Simon Weckert became a traffic jam all by himself.
He did not cause a traffic jam by blocking a street; rather, he appeared
as a traffic jam on Google Maps, causing cars on the surrounding blocks
to be routed around the street he was on. Weckert’s jam was a simple art
performance/installation he called “Google Maps Hacks.”
Weckert’s “hack” works by leveraging how the Google Maps app tracks
individuals to generate its traffic information. If location services are
enabled on a mobile device, especially when turn-by-turn navigation is
active, the company is collecting location and speed information from
that device. Those data are then fed into a system that estimates traffic
conditions based on the aggregate movement of phones along that street.
Weckert thought of his concept during a May Day rally in Berlin, when he
noticed that his Google Maps application was assuming that the people
in the streets were cars and therefore symbolizing them as a slow-mov-
ing traffic jam. As he notes, this intersection of material and virtual is a
powerful forum for “performance of activism” (Goldstein 2020).
Weckert’s actions are amusing and inspiring, but it doesn’t take an
artist or an activist for someone to exert greater control over the data
they produce and how it is extracted from them. In this chapter, we
survey different individualized ways of responding to the geographic
data collection in everyday lives. Here, the focus is on tactics: small-
scale, everyday actions that resist, contest, and alter the production and
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
66 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 67
even built-in to some browsers, data firms also continue to find ways to
collect data by other means (Nield 2021). Broad, meaningful changes in
the design of data technologies and related policy require more coordi-
nated efforts that engage not only the economies and politics of data, but
also the cultures and norms around them.
Even with all the biases and structural limitations, everyday tactics can
offer a degree of data control that is comparatively easy to implement. It
probably won’t save the world, but it might help you.
Read at face value, technology firms’ press releases make the case that
their top priority is users’ privacy and that it has never been easier for
users to control how their data are collected and shared. Of course, the
seemingly endless succession of data scandals (Bishop 2018), threats of
regulations and fines (Information Commissioner’s Office 2020), and
antitrust and class action lawsuits (Georgiadis and Beioley 2021) suggest
that other factors are at play in these promises.2 Whatever the motivation,
some firms are beginning to allow individual users some control and
intentionality in how each user’s data are collected and shared. Examples
include app-specific access control to GPS information and the amount
of time before location history data are deleted from a Google account
(Morrison 2020).
However, not only does such language deceptively shift responsibil-
ity towards the individual, it also does nothing to alter the underlying
business model and profit incentives on which these firms rest. Data cap-
italism is built upon the creation, extraction, appropriation, analysis, and
trade of data. Privacy-washing provides the appearance of conscientious
responsibility to ensure the continued profitability of this strategy. For
example, Facebook, currently the world’s largest social media company,
has been most brazen in its privacy-washing attempts and, as such, has
drawn a great deal of media scrutiny and proposed regulatory action.
The company’s Cambridge Analytica scandal and its media coverage
illustrate both how responsibility is shifted to the individual and how the
profit motive drives considerations of “privacy” within systems of data
dispossession.
Cambridge Analytica was a third-party research and data broker
firm that improperly obtained upwards of 87 million Facebook users’
personal data which it then sold to predominantly (though not exclu-
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
68 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 69
everyday practices
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
70 . data power: radical geographies of control and resistance
advertised, and second, that consumers/users will only act in line with
the designers’ intentions. A closer examination of these assumptions
reveals a dialectical tension, rather than a diametric choice, between
“privacy” and “surveillance.”
For the first, technology companies, and startups in particular, are
notorious for promoting “vaporware,” over-promising the functional-
ities and possibilities of their products to attract publicity and investors.
Perhaps the most infamous example, Theranos, was once valued at $9
billion before collapsing under the weight of fraud and the fundamental
impossibility of its various medical promises (Carreyrou 2018). Driv-
erless cars may someday be commonplace, but as of this writing, the
billions of dollars invested in their engineering and geographic data do
not live up to the hype of technology company tycoons. For example, in
July 2020, Tesla CEO Elon Musk anticipated a car that required no driver
input by the end of that year (BBC News 2020).
Data technologies not only frequently fail to live up to popular expec-
tations, they can, and often do hang, break, and crash. In our experience,
GPS-enabled turn-by-turn navigation usually works as intended, but
sometimes it just doesn’t (Dalton and Thatcher 2019). Under the right
circumstances, glitches can be opportunities for wildly different, even
liberatory, experiences and modes of expression (Russell 2020). A tech-
nological navigational error could send us to a better (or worse) location
with different possibilities than originally intended.
The second assumption, that users will always do as the designers
intended, runs into problems when exploiting those glitches becomes
intentional. Users will attempt to utilize a technology to fulfill their own
needs and desires beyond what the technology’s designers intended.
However, users do not have total freedom, as their actions are limited
by the material structure of technology developed by the designers for
their own purposes: the users’ margin of maneuver. A pool noodle can’t
hammer nails, no matter how hard you swing it. Users operate within
a margin of maneuver between how they want to employ a piece of
hardware or software and what is possible given its designed material
structure. Under the right circumstances, within that margin of maneuver
can be found the means to repurpose/refashion/redesign a technol-
ogy that sparks subsequent larger technological and social changes.
Using components from a junkyard, Grandmaster Flash (Joseph Sadler)
developed an early cross-fader/DJ mixer, a vital tool in the early develop-
ment of sampled music in general, and now an inexorable part of audio
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 71
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
72 . data power: radical geographies of control and resistance
acceptance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 73
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
74 . data power: radical geographies of control and resistance
The reason people click “yes” is not that they understand what they’re
doing, but that it is the only viable option other than boycotting a
company in general, which is getting harder to do.
(Lanier 2014, 314)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 75
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
76 . data power: radical geographies of control and resistance
providing a false postal code when registering for a grocery store loyalty
program or giving the email address of a politician you don’t support
when asked for one to receive a slight discount, are common practices
that don’t require additional technical familiarity expertise. Similarly, in
many places people can wear full or partial facial coverings when attend-
ing a protest or otherwise engaged in activities that fall under increased
surveillance. More technically complex measures include the use of end-
to-end cryptography for email communications, virtual private networks
for web browsing, data poisoning by providing a deluge of meaningless
data through an extension like AdNauseam, and spoofing GPS readings
on a smartphone to produce false location information.
Privacy advocates continue to release and support applications which
engage in a variety of these practices. At time of writing, ProtonMail,
run by Proton Technologies AG and with servers located in Switzerland,
outside both EU and US jurisdiction, offers free encrypted email. The
Tor network, run by the Tor Project, Inc. out of Massachusetts, uses a
variety of techniques to attempt to preserve anonymity online.
Despite these best efforts, there are two flaws in these tactics of active
resistance. First, they continue to rely upon the acts of individuals to step
outside norms of use. Tinder requires Facebook to function, Facebook
requires a verified email account, and so on. Individuals can step
outside these systems to escape, or they can tinker at the edges, perhaps
supplying a fake birth date, not using an email address tied to their name,
or cleverly obfuscating facial images of themselves.
Second, individual acts of resistance, even when aggregated, run into
an ongoing arms race between those who would extract data from users
and those who seek to resist it. The existence of and resistance to timing
attacks upon the Tor network demonstrates the limits of this approach
at present. Without diving into the technical details, Tor can best be
understood as working as an intermediary between a user and a website.
Patrick O’Neill, writing for Daily Dot explains it succinctly:
A user fires up the client and connects to the network through what’s
called an entry node. To reach a website anonymously, the user’s
Internet traffic is then passed encrypted through a so-called middle
relay and then an exit relay (and back again). That user-relay con-
nection is called a circuit. The website on the receiving end doesn’t
know who is visiting, only that a faceless Tor user has connected. An
eavesdropper shouldn’t be able to know who the Tor user is either,
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 77
making present
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
78 . data power: radical geographies of control and resistance
of this tactic, it has the most plentiful published examples to point to.
Furthermore, the range of practitioners and their motivations engage a
wealth of diverse audiences from highly theoretically oriented academic
research to a casually engaged general public.
As we’ve already seen, perhaps the most common kind of making
present is the work of journalists who raise questions and concerns
around data hacks, data collection, and/or legal proceedings involving
companies’ and law enforcement’s use of geographic data. While these
exposés too often take the form of breathless and ahistorical recount-
ings or reduce responsibility to the individual consumer, popular media
remain a powerful way to impact public discourse, capable of reaching
millions of people in a way that few scholarly articles do.
One powerful way to make things present is to call attention to the
physical infrastructure of data in everyday life. Perhaps the best example
of this is the work of artist-activist Ingrid Burrington on identifying,
mapping, and visualizing data centers and major data cables. Doing
so renders visible and understandable the material infrastructures on
which the internet relies (Burrington 2016b). By travelling in person
to data centers and creating guides to interpreting maintenance hole
covers, Burrington’s work calls these features out of banal invisibility and
shows how close and embodied data infrastructure and associated state
power are to each of us. In a similar move, the Internet Atlas attempts
to present a “comprehensive repository of the physical internet” (http://
internetatlas.org), but with a focus more towards academic research,
rather than direct, embodied political engagement. More recently, and
building directly on this and related works, both scholars (such as Lally
et al. 2019; Levenda and Mahmoudi 2019; Hogan and Vonderau 2019;
Nost 2020) and activist groups (such as Greenpeace’s Clicking Clean
report, Cook et al. 2016) have worked to make the intrinsic ties between
our digital worlds and the material impacts they have upon our environ-
ment and climate more present.
In practice, data and infrastructure rely on one another, so other
projects employ this connection to tie data imperatives to specific
material geographies. The early work of Matt Zook, one-time state
geographer of Kentucky, examined the geography of the internet as a
geography of industry, wherein the relationality of space had material
impacts (Zook 2005). One such example of the importance of “coloca-
tion” or “proximity hosting” in high-frequency trading (HFT) on stock
exchanges. While HFT set-ups often involve significant sums spent on
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 79
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
80 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 81
escape
Throw out your phone. Use only cash. Wear masks everywhere …
While always wearing a mask may increasingly seem like a de facto norm
for society in a post-COVID-19 world, the other ideas begin a list of
possible steps to elude data creation and extraction. In many, even most,
cases, efforts to escape are always partial and contingent, and many rest
upon privilege and position within society. At times, escape is more per-
formative than substantive. In this final section, we articulate some of the
more common tactics individuals can use to escape while also noting the
ultimate impossibility of total escape within modern global capitalism.
Jim uses a flip phone, and has for several years now. Apparently, so
does Keanu Reeves (this is roughly where their similarities end), as
do a number of other celebrities, including, according to CBC, Daniel
Day-Lewis, Rihanna, and Kim Kardashian (Osler 2018). For many such
people, these phones are simply supplements to other smartphones. It
may not even be a conscious choice about data creation. For many celeb-
rities, the “dumb” phone is an accessory that complements a “smart” one.
The dumb phone acts as a more exclusive number only for voice calls or
simply a marker of the ability to conspicuously consume by choice rather
than necessity. For others, such as Jim and allegedly Keanu, the “dumb
phone” is the only phone they carry. Because they can.
Neither has a job that forces them to be reachable by email at all times,
much less requires them to carry a smartphone, as an Uber driver must.
Neither operates in a situation where finding a map would be particularly
difficult nor, as white men, is asking for directions terribly dangerous.
Both have the capital necessary to survive if something goes awry, be it a
broken-down car, missing a bus, or even simply deciding to walk into an
Apple Store and purchase the latest model iPhone.6 The ability to escape
from the myriad of ways that smartphones create, mine, and extract data
correlates directly with one’s existing privilege within society.
For those who do only use a “dumb” phone, it’s still not a full escape
from location tracking. First, as long as the phone is connected to a
network, location can still be tied to the closest cell phone tower (the
one to which the phone is connected). Further, geolocation abilities in
phones go back much further than many consumers realize. Starting in
the mid-1990s, the US Government’s Federal Communications Com-
mission (FCC) initiated a phased implementation of Enhanced-911 that
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
82 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
existing everyday resistances . 83
So, then, for the rest of us sitting on the other side of the chasm, with
limited access to the data and the systems necessary to analyze them,
what is to be done? In the final two chapters, we argue for collectiv-
ized practices, strategies, that produce affinities between individuals.
We suggest a move from the neoliberal subject to the collective group,
a move done through new systems of communication and data exchange,
and done in a way that supports a radical, liberatory politics, rather than
data capitalism.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:21 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
4
Contesting the Data Spectacle
At this point, it should be fairly clear that whether we like it or not, and
even whether we’re aware of it or not, the technologies of modern society
are part of constant attempts to create, extract, and derive value from
data produced through our daily actions. Many choose to accept the
terms and conditions of use with little to no contestation, whether due to
lack of consideration, calculated acceptance of costs and benefits, more
immediate concerns, or because they have no choice. We aren’t here to
judge others on this: sometimes you just want Yu Xiang Qie Zi delivered
and UberEats will give you 20 percent off if you tie your account to
Facebook. But even those who choose to resist actively, passively, or
attempt to escape data generating systems are ultimately caught in an
asymmetric game where the vast majority of power is exercised by
private, for-profit corporations for which users and their data are a means
to an end. Our senses are flooded with data-driven spectacles, artificially
shaping what can be known and what can be imagined in such contexts,
and thereby foreclosing what might be done. Even when we look up from
our devices and take out our earbuds, our lived environments are still
suffused with the data collection and extraction processes that signal
the core conditions of data capitalism. Once we are separated from
our dataselves, they are fed back to us as affective sensations intended
to produce specific actions, to sell specific commodities: Gregg’s data
spectacle (2015). But what happens to the data in the interim, how they
are processed and classified, is not visible, much less available, to most of
us. Technology companies separate individuals not only from their data,
but also the tools with which to aggregate and analyze their data on their
own terms (Andrejevic 2014; see also Wark 2004 and 2020). This separa-
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 85
tion of both data and the means to analyze them is not an accident, and it
did not come about in a day. Such data dispossessions reflect the founda-
tional social priorities that gave rise to these technology companies, and
understanding that suggests some means by which these relationships
may be challenged and changed.
In the last chapter, we focused on resistances practiced by individu-
als amidst their everyday lives. As actions of individuals, those tactics
are inherently limited, with little prospect for broader systemic change
(de Certeau 1984). One reason is that such actions are always-already
incomplete, lacking the tools with which to confront and contest the
structural power and associated strategies and technologies of large
companies. Those tools, at work in Google search results, Facebook
newsfeeds, and Apple’s app store, allow those companies to operate at
a different scale, combining and analyzing data from tens of millions
or even billions of users. In most cases, these tools of data analysis, the
very means by which data are rendered into actionable information,
are closed to those outside the company. This is not just to retain the
trade secrets of analysis, though that’s part of the reason, nor is it simply
a matter of expertise, though that’s also part of the picture. Above all
else, it is because those data processing tools are the means by which
the company reaps the value of data, making the tools essential to the
company’s enterprise. Contesting these data relationships or refocusing
them to more productive social ends therefore requires work not just
on data themselves, but also how data are synthesized, analyzed, and
classified on scales larger than what is possible for the self-valorizing
individual consumer within the neoliberal order. This turf requires col-
lective modes of resistance, a political praxis.
In this chapter, we’ll first explore how the separation of ourselves from
our data developed at Twitter. Twitter is an illustrative example of the
separated, asymmetric nature of the relations between individual and
platform-owning corporations. It also shows how the drive to colonize
new moments of life as data in order to scale up profits developed and
shaped what can be known across time and space. Second, building
from the individual tactics described in the previous chapter and the
theoretical works explored in Chapter 2, we propose and describe shifts
towards collective, solidarity-building modes of resistance that could be
employed to contest the data spectacle. These don’t necessarily operate
at the same scales as Twitter or other technology company platforms,
but they nonetheless forge broader engagements for systemic change. We
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
86 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 87
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
88 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 89
and desire” (Plant 1992, 1). The spectacle is not just what is desired, but
all that can be desired: “The spectacle turns the goods into The Good”
(Wark 2013, 5).
The idea of the spectacle, particularly as a totalizing system in which
all life occurs, is not without its critics. We’ve noted elsewhere that:
Such a conception of data, daily life, and what can be imagined runs the
risk of being too centered on a single concept. If we’re trying to resist the
relations of data technologies today, why not center upon the work of
Marx? Or Weber? Or Gramsci? Or why not abandon the dead white men
and structure resistance around the ideas of Audre Lorde, bell hooks,
Donna Haraway, Ruha Benjamin, Catherine D’Ignazio, and others?
Without in any way overwriting such work and while encouraging our
readers to seek out and follow the scholars and practitioners they find
most useful, we offer one set of potential strategies for resistance focused
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
90 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 91
daily life are powerful ones that have echoed through the decades, even
if their antics and infightings have made them a ripe target for mockery.
contestations
How can existing relations of data be resisted and changed to forge more
equitable societies and empowering uses of geographic technologies?
The measures of active resistance, making present, and escape we’ve
covered thus far are small in scale. They make a difference on that scale,
but are limited in their ability to provoke systemic change. Confronting
and altering the data spectacle we face today requires larger actions, col-
lective modes of resistance.
We outline four types of collective actions which hold promise for
realizing systemic change, whether singly or in combination: data reg-
ulation, data dérive, data détournement, and data strikes. As with the
typology of individualized tactics, our scope here is not to comprehen-
sively engage every existing instance or case. Rather, our intent is to
survey a range of promising possibilities and grounds for potential soli-
darities and empowerment through, rather than somehow against, new
mobile and spatial technologies. With each mode of resistance, we seek
to find ways by which these technologies can be made to speak for people
in ways of their own choosing.
Data Regulation
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
92 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 93
better analyze their own data for themselves, much less build solidarity
between them.
Even with the promise of the GDPR and similar laws, regulation alone
will not save us. It’s not that regulation never works (it clearly can), but
that regulation on its own is insufficient, even as it is the only systemic or
collective form of resistance to current data regimes widely discussed in
the popular press. While regulation has an increasingly promising track
record in providing data subjects better control over their data, we need
to keep in mind the limitations of what it can do.
Regulation of current data capitalism faces two broad limitations, one
political, one cultural: First, regulations tend towards maintenance of
the status quo of the spectacle. Structural change generally is not the
intention so much as maintaining existing relations in line with contex-
tual social standards and the demands of weighty political and financial
stakeholders. Because formal regulatory policy inherently operates
through governmental means, it is thus subject to disproportionately
powerful corporate stakeholders. Technology companies employ armies
of lobbyists and truckloads of campaign donations. In the United States,
Google, Amazon, Microsoft, Facebook, and even TikTok all had lobbyists
making The Hill’s 2020 “Top Lobbyists” list (Hill Staff 2020). As a result,
getting substantial regulations passed into law is difficult. Moreover,
once law, there is always the risk of regulatory capture or evasion. Such
corporate strategies can hollow out a law, rendering it meaningless, such
as through revised terms of service or arguing that a law simply does not
apply to them, as Uber is notorious for doing. In extreme cases, powerful
stakeholders may even reverse the law, say if a different political party
takes power or through massive spending on a voter proposition. For
example, in 2020, California Assembly Bill 5 took effect, ensuring basic
labor protections such as minimum wage and sick leave for gig-econ-
omy workers. Later that same year, firms like Uber, Lyft, and DoorDash
successfully collectively spent over $185 million on California Ballot
Proposition 22,7 which removed those protections, reclassifying gig
workers as “independent contractors” (O’Brien 2020).
Second, regulations are governmental, which is good for crafting
policy, but less effective in shaping culture and associated social change.
The data spectacle works not only through economic and legal means,
but also how data subjects see and understand the world and how they
interact with one another. This cultural realm is where the limits of
imagination and social acceptability are set, defining not only what is
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
94 . data power: radical geographies of control and resistance
The world we live in, and beginning with its material décor, is discov-
ered to be narrower by the day … this world governs our way of being,
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 95
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
96 . data power: radical geographies of control and resistance
Figure 4.1 Le Corbusier’s Plan Voisin model for the redevelopment of Paris,
displayed at the Nouveau Esprit Pavilion in 1925, is the sort of vision the
Situationists we working against. (Wikimedia commons/SiefkinDR, licensed
under Creative Commons Attribution-Share Alike 4.0 International, https://
creativecommons.org/licenses/by-sa/4.0/, last accessed July 2021)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 97
Figure 4.2 Guy Debord’s Life Continues to Be Free and Easy (1959).
This piece, sent as gift (potlatch) to Constant Nieuwenhuys, features
a collage of images placed upon a portion of the iconic The Naked
City map. Simon Sadler uses it for the frontispiece of his book The
Situationist City (2010), noting that “[i]ts layering of allusions—to
colonialism, war, urbanism, situationist ‘psychogeography’ and
playfulness—was dizzying.” The original is preserved at the Rijksbureau
voor Kunsthistorische Documentatie, The Hague. (No copyright)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
98 . data power: radical geographies of control and resistance
For all their best attempts, this original Situationist form of drifting
suffered from a serious conceptual failing. In their formulation, unities
of ambiance were real, material things experienced in the same way
by everyone, but as anyone who has ever walked through a city might
realize, such drifting was highly subjective. They went out looking for
unities of ambiance, but what they found as much reflected their own
gendered privileges, racialized standpoints, and critical theory-informed
perspectives as the material form of the city itself. In fact, an editorial
note states that Abdelhafid Khatib was repeatedly harassed by police and
arrested while drifting in Les Halles because at the time, North African
men were forbidden from the streets at night (Khatib 1958). Despite this
conceptual failing, parts of the Situationists’ psychogeographic work now
appear prophetic. Today, much urban design focuses on the experiences
of pedestrians, and in 2012, Paris permanently closed the expressway
along the Seine, making that space walkable once again.
In a broader context, the dérive has served as a basis for many subse-
quent geographical engagements with urban life and continues to offer
hope as a collective means to resist current social relations. To us, the
most significant of these sprang from an unlikely context given the priv-
ileged perspectives of many of the original Situationists and the ancestral
connection to the flâneur. Precarias a la Deriva (“Precarious Women
Adrift”) was a feminist activist collective founded in Madrid in 2002.
Sparked by calls for a general strike that year, group members confronted
a question: how could they as gig/temp workers, domestic caregivers,
self-employed workers, and similar feminized, precarious laborers go on
strike? Excluded from site-based, male-dominated formal unions, they
had no access to support like strike pay or other structures of formalized
solidarity. Thus, in their “First Stutterings,” they asked themselves, “What
is your strike?” (Precarias a la Deriva 2003b). What would a strike for pre-
carious, feminized (and often reproductive) labor involve, and what would
winning look like? Building on the Situationists’ dérive, they developed
their own form of drifting designed to facilitate self-care and mutual aid
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 99
in the places of their everyday lives as a way to address the situated chal-
lenges of precarious, feminized work and the multiple places where it
occurs:
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
100 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 101
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
102 . data power: radical geographies of control and resistance
emphasized the role of forms of labor that are overlooked because they
have disappeared into plain view: reproductive labor, care work, and the
frequently precarious relations of those involved. So 3Cs extended this
to knowledge-producing labor, which while more valorized, is directly
connected to the creation of data. Data production is labor, even if it is
unpaid or paid only by providing a service, because data are valuable
within data capitalism (Fuchs 2014). However, much like the labor
Precarias focused upon, the labor of such data tends to be ignored or
overlooked as it occurs in the banal moments of everyday life.
So how does one actually do a data drift, what does it mean in practice?
At its heart, a data drift involves moving through everyday geographic
data and/or space paying special, critical attention to how data are
collected and structured, their limits, their effects, and above all sites
or openings for different kinds of data practices and associated social
relations of data. Like other forms of the dérive, it inherently depends
on the situation, participant(s), and the type(s) of data involved. It may
be literally stationary, as some of 3Cs drifts were, and entirely mediated
through devices, employing maps and tables to explore the data in
question. Alternatively, it may involve moving through the spaces in
question with a device and drifting mindset, akin to the Situationists,
or employing the drifting mindset while going through the geographic
practices of daily life as Precarias a la Deriva did. Likewise, the number
of people involved will depend on the situation and focus of the drift. As
Debord observed and others have replicated, while it is possible to drift
alone, groups of two to four people are often the most fruitful. This is
not for greater objectivity or inter-rater reliability, but rather, as Precarias
demonstrated, to best build interpersonal solidarity and trust. This is
also a vital difference from regulation as a collective mode of resistance.
Drifting does not attempt to work at the national or state/provincial scale.
Its exploratory focus is everyday geographies and solidarities, though the
geographic insights, openings, and promising sites for resistance may be
further leveraged by other collective actions. A drift’s duration may be
a few hours, a day, or as the Situationists did, even a series of days. The
exact time spent drifting is less important than reaching familiarity or
saturation with the data geographies in question.
That does not mean there is no material praxis to follow. The two
indispensable aspects of a data drift are first, data situated in a context
through which to drift, and second, the critical, investigatory drifting
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 103
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
104 . data power: radical geographies of control and resistance
with such intimate data ethically requires not only trust, but discussing
and agreeing about expectations of confidentiality, ideally ahead of time.
Identifying the most useful or helpful data also depends on the second
component: a critical approach to the situation. This involves both a
reflexive mindset and purposeful actions, including how participants
work with the data and what writing or making occurs as they think
through the data. Engage the data, play with them! Move through the
data physically and digitally, move through time with the data. Rank
order items. Plot them on a map. Turn the map upside down. Run more
advanced statistics if need be. How frequently did drifters walk down a
certain street, on what days? Through that, pose and attempt to answer
critical questions about what appears (and what doesn’t), where those
are (and aren’t), and why? The data dérive is a means of opening for
consideration the contours of the data spectacle, the very processes of
data capitalism. Are there subjective unities of ambiance? Where are the
contradictions and limitations? Where and what is a real material expe-
rience in light of and through the data? Where and what is spectacle?
And above all, where are potential sites for solidarity, for disrupting
the spectacular cycle of data creation, extraction, and analysis? Where
are the moments, spaces, and times for resistance? In addressing these
questions, we find that it helps to encode the experience of the drift to
facilitate critical reflection. This may take the form of notes and subse-
quent written papers (as with the Situationists), making a map (as with
the 3Cs), or even filming the process and creating a documentary, as
Precarias a la Deriva did (Precarias a la Deriva 2003a).
For example, in one data drift in 2017, Jim examined the limitations
and even patently absurd assumptions of his smart device’s location
history. It shows several locations he visited, including work and a coffee
shop, but the vision of this spectacle also shows its farcical aspects.
His apparent path through the day appears to have involved travelling
only along Euclidean lines, diagonally across city blocks and straight
through walls.
This sort of data drifting reveals not just the limitations of GPS
waypoints, but also poses questions about what sites do not appear in
this fun-house mirror reflection of a day’s movements. Where is this
system of data collection vulnerable? What sites and experiences are
missing, not just because of technical glitches, but because they are not
important to Google’s data collection regime? Where is labor (of all
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 105
Data Détournement
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
106 . data power: radical geographies of control and resistance
Figure 4.5 “Cat and Girl are Situationists,” by Dorothy Gambrell. http://catandgirl.com/cat-and-
girl-are-situationists/ (last accessed July 2021). (Shared with author’s permission)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 107
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
108 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 109
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
110 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 111
Figure 4.8 A screenshot of Inside Airbnb’s web map, created by Murray Cox
and Inside Airbnb. (Shared with author’s permission)
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
112 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 113
Data Strikes
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
114 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 115
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
116 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
contesting the data spectacle . 117
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
118 . data power: radical geographies of control and resistance
… put down their phones and share real, unmediated human contact.
There will be those who together make their data their own. There will
be those who …
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:36 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
5
Our Data Are Us, So Make Them Ours
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
120 . data power: radical geographies of control and resistance
Unable to have students sit their A-level exams due to the pandemic,1
the UK government turned to Ofqual, an exams regulator, to provide
an algorithm to assign grades to pupils in England. Ofqual, in an unsur-
prising move, kept the majority of its algorithms’ inner workings as
proprietary secrets.
As anyone reading this far into the book can guess, a fiasco ensued.
Without diving fully into the technical workings of Ofqual’s algorithm,
the crux of the issue revolved around how the algorithm used students’
circumstances to automatically adjust grades. These circumstances
included aspects outside the students’ control, such as the achievement of
students from their school in previous years. Ofqual’s algorithm decided
on the most likely highest and lowest grades for each class, then force-
fitted students’ scores across that range. No matter how hard a student had
studied or how hard teachers had worked to improve a school, Ofqual’s
algorithm would not (and by design could not) take these factors into
account. Predictably, students from disadvantaged areas were assigned
lower scores. Ofqual also, naturally, removed students’ ability to dispute
grades.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
our data are us, so make them ours . 121
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
122 . data power: radical geographies of control and resistance
Ultimately, this book asks: what are the liberatory ideas and actions, the
politics of emancipation, that can or might occur with new spatial tech-
nologies? In An Essay on Liberation, Marcuse (1969, 12) asks:
Is it still necessary to repeat that science and technology are the great
vehicles of liberation, and that it is only their use and restriction in the
repressive society which makes them into vehicles of domination?”
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
our data are us, so make them ours . 123
Where brilliant legal scholars, like Frank Pasquale (2015) and others,
see a path forward through regulation and legislation, we see that as
another utopic approach to a declaration of “science and technology” as
inherently liberatory in potential. Within existing capitalist systems, the
asymmetric relations between individual people and tech firms are such
that piecemeal approaches, while obviously laudatory, will fail across
and between the scales at which these firms operate. Uber, for example,
is well known to purposefully ignore existing laws and regulations that
would adversely affect its operations up until (and even after) it is legally
challenged and forced to comply. The massive spending on California
Proposition 22 in 2020, which effectively removed the right to minimum
wage, sick leave, and other basic protections from gig-economy workers,
demonstrates how regulation can and will be subverted by large, monied
interests (see Chapter 4 for greater discussion).
While continuing to press for regulation and legislation, we suggest
also turning towards other practices—practices that reshape how we
engage with spatial data in our daily lives and simultaneously use said
technologies to push towards wider-scale radical political change. The
first step, we’ve argued, is to inform our daily device use with a radical
praxis.
Geographer Greg Downey (2002) used the history and plight of
telegraph messenger boys within the United States to illustrate the long
history of labor exploitation that always undergirds technologies. More
recently, the work of internet geographer Mark Graham and his col-
leagues has well illustrated how similar processes continue within the
so-called gig economy (Graham et al. 2017). In light of this, in Chapter
1 we leveraged the works of late nineteenth- and early twentieth-century
thinkers to demonstrate how new sociotechnical regimes are entwined
with capitalist development and exploitation. Our goal in focusing on
Heidegger, Debord, and Marcuse as “paths out” is not to suggest that they
are the only notable scholars in this area, but instead to draw forward
through the intervening decades a specific set of pertinent theoretical
questions and critiques.
This informs our action. At its most fundamental, these ideas simply
refuse to allow Google, Facebook, Amazon, Twitter, or any others to
obfuscate spatial data exploitation. We can and do know, and through
that knowing are able to make informed decisions on, how we do (and
do not) make use of spatial data. This is the first call to action of this
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
124 . data power: radical geographies of control and resistance
The second call to action for our practices of informed use is for a (re)
turn to détourned, digitally informed practices. Following from the work
of Precarias a la Deriva’s question, “What is your strike?”, we must also
ask ourselves (and our data selves) “Where is our strike?” Within the
situated entanglements of a data-suffused world, where are the places
and moments for potential resistance, for the building of solidarities?
If we can intentionally understand our use of devices and our produc-
tion of data through considerations of acceptance, resistance, making
present, and escape (Chapter 3), then emergent strategies of resistance
can begin to be formed via new acts of dérive, détournement, and ulti-
mately, strikes (Chapter 4).
Such actions begin with the exploratory, such as the dérive. By inten-
tionally opening for consideration the data that constitute ourselves
within larger systems, we are able to unpack the moments, spaces, and
even peoples that are elided in said systems. Whether this is something
as banal as the path to a coffee shop or as profound as the oft-unmarked
sites where large-scale computation occurs, the dérive unifies technol-
ogy, politics, and self for consideration and contestation. Détournement
takes data both from the drift and other sources and repurposes them,
subverting the spectacle back upon itself in a way that calls attention
to and inspires resistance. From creative hacking of corporate APIs
and the creation of maps like Inside Airbnb to the reflexive, situated
politics of groups like the Anti-Eviction Mapping Project, data détour-
nement draws much from the practices of counter-data.3 These efforts
lead us back to the question, “Where is our strike?” Where Precarias
a la Deriva found ways to mobilize without traditional forms of labor
support, data strikes call us to do the same in the face of technical
systems imbricated with many of our daily practices. If moments like
#DeleteUber demonstrate the potential power carried in intentional
use of technology, dérive, détournement, and strikes can help us realize
them more.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
our data are us, so make them ours . 125
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
126 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
our data are us, so make them ours . 127
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
128 . data power: radical geographies of control and resistance
carious users and gig workers. We must explore and better know our
own data to make them ours, to repurpose them in ways that build sol-
idarities with others. Greater regulation may help, but the methods of
dérive, détournement, and strikes are directly useful, even as they are not
intended to be the only techniques.
Putting the first two calls into practice helps produce the spaces and
places of the third. Living in the gaps is not a total escape. It is situated,
always incomplete and temporary, and yet it does provide benefits. It
facilitates greater agency, not only over data, but through those data to
a broader being in the world. After all, the value of going places to relax
on a day off is not just the production of a location history; it is the expe-
rience of being there. It can also allow for greater solidarity, rather than
the constant gamesmanship of marketized relationships, particularly in
personal relationships of the everyday.
Living in the gaps is not a call for everyone to learn how to code as
some sort of panacea for public good. Being able to program is only one
of many means of living in the cracks. While it can be useful to learn
to write code, far too often it is forced into curriculums and careers as
some modern-day tonic to cure the ills of rampant data capitalism. In the
politics of resistance to spatial data, there is no room for a techno-elit-
ist vanguard. Rather, there are a panoply of situated means by which to
act with, through, and against spatial data and the algorithms which sort
daily life.
One example is part of this book. We developed and will continue
to maintain DataResistance (https://github.com/DataResistance) as
a collaborative public repository. It is a space for both ourselves and
readers to share not just code and computational tools, but also tech-
niques and stories of life in the cracks. From the ability to create maps of
public running routes in a city to guides for personal data dérives (both
available at time of writing), the repository is not an arcane location for
cryptic Python code, but a living, breathing document of our struggles.
While we encourage every reader to consider participating, that’s hardly
necessary. It is but one space of consideration, one example of a praxis
that must run through all of life.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
our data are us, so make them ours . 129
Table 5.1 Suggested yarn colors for a temperature blanket based on Tacoma, WA
>101 Crimson
91–100 Raspberry
81–90 Tropical Pink
71–80 Radiant Yellow
61–70 Mint
51–60 Forest
41–50 Sea Blue
33–40 Orchid
<32 Mixed Berry
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
130 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:45 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:53 +00:00
All use subject to https://about.jstor.org/terms
Epilogue
The precise algorithms, apps, and data formats through which we engage
the world are constantly evolving, as noted throughout this book. A
tactic that works today may be co-opted into a value-producing act of
data dispossession in the future; an app or API may disappear or change
its terms of service in new and unexpected ways. Even now, despite
claims of the end of moving fast and breaking stuff, venture capitalists
continue to bet on the ability of any given startup to successfully disrupt
and envelop existing modes of living and social relations.
This book was conceived of during the summer and fall of 2019, and
written predominantly during the long pandemic-inflected months of
2020 between periods of no childcare. As such, it necessarily focuses on
moments and examples that came before that time; but the fundamen-
tal relations between spatial data, individual, and society remain. Apple’s
new (at time of writing) iOS 14.5 helps to illustrate this point. iOS 14.5
introduces a new feature that requires all applications to ask for explicit
permission from the user in order to track any data between applica-
tions or websites. In response, Facebook and Instagram have begun to
warn users that only through allowing tracking can they “help keep [the
services] free” (Haslam 2021).
While this beautifully illustrates what “free” means in the context of
the social media giant, it’s also rather beside the point with respect to
larger structures of data dispossession. First, there’s the obvious tension
between Apple’s attempts to keep users and their data within Apple’s
monopolistic ecosystem and Facebook’s requirement to extract that
self-same data for its own profits. It’s not that Apple devices aren’t gen-
erating huge swathes of data, it’s that they aren’t letting their competitors
access that data without your consent. Second, even as Apple nominally
steps up its transparency with respect to data privacy, new services like
Amazon Sidewalk come online to offer exciting new moments of data
dispossession.1 The technologies change, the capitalist imperatives don’t.
This is why, again and again, we cannot allow the terms of our engage-
ment with technology to be solely dictated by profit motives. In Dear
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:53 +00:00
All use subject to https://about.jstor.org/terms
132 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:56:53 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:04 +00:00
All use subject to https://about.jstor.org/terms
Notes
introduction
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:04 +00:00
All use subject to https://about.jstor.org/terms
134 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:04 +00:00
All use subject to https://about.jstor.org/terms
notes . 135
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:04 +00:00
All use subject to https://about.jstor.org/terms
136 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:04 +00:00
All use subject to https://about.jstor.org/terms
notes . 137
1. At release, one of the cited examples of the need for an API was a map of
tweets called “This world is small!” The original announcement can be
found here: https://blog.twitter.com/official/en_us/a/2006/introducing-the-
twitter-api.html (last accessed July 2021).
2. A complete description of the technical specifications of DOLLY may be
found here: http://www.floatingsheep.org/p/dolly.html (last accessed July
2021).
3. RIP Hana Kimura.
4. In a slightly bemusing bit of corporate speak, in its 2019 fiscal year report to
the Securities and Exchange Commission (Twitter 2019, 5), Twitter eschews
the term “user” in order to show “empathy” for those that make use of its
platform. We apologize for our lack thereof.
5. What data are stored, how they are communicated, and so on all have epis-
temological effects—see Thatcher (2014) for more discussion.
6. Without belaboring the point, the “base” for Marx would be the relations
of material production, a factory making cars or the like, while the “super-
structure” would be, roughly, everything else, the realm of ideas and culture.
For Marx, the base determined the superstructure (for more, see Williams
1973).
7. Then a record for spending on a California voter proposition.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:04 +00:00
All use subject to https://about.jstor.org/terms
138 . data power: radical geographies of control and resistance
1. The A-level exams are a set of college qualification exams offered in England.
They are not mandatory, but are a major factor in the university admission
process.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:04 +00:00
All use subject to https://about.jstor.org/terms
notes . 139
epilogue
1. Installed on all Echo devices produced since 2018 and in many Ring surveil-
lance and doorbell products, Sidewalk is a bandwidth-sharing technology
that creates a mesh network allowing for other devices to access the internet
through your internet connection, unless you opted out before the June
2021 deadline.
2. In her book, McKittrick eloquently pushes against extractive academic
citational practices; here, we have included a portion of her much larger
thoughts as an attempt to think with while acknowledging; a necessarily
imperfect practice within an academic discourse that still prizes citation
counts and impact factors. For an in-depth discussion of citational practice
and its impacts, we recommend Carrie Mott and Daniel Cockayne’s
excellent article “Citation Matters: Mobilizing the Politics of Citation toward
a Practice of ‘Conscientious Engagement’” (2017).
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:04 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
Bibliography
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 141
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
142 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 143
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
144 . data power: radical geographies of control and resistance
Couldry, Nick, and Mejias, Ulises A. (2019a) “Data Colonialism: Rethinking Big
Data’s Relation to the Contemporary Subject.” Television & New Media 20(4):
336–349.
Couldry, Nick, and Mejias, Ulises A. (2019b) The Costs of Connection: How Data
Are Colonizing Human Life and Appropriating It for Capitalism. Oxford, UK:
Oxford University Press.
Counter Cartographies Collective, Dalton, Craig, and Mason-Deese, Liz. (2012)
“Counter (Mapping) Actions: Mapping as Militant Research.” ACME: An
International Journal for Critical Geographies 11(3): 439–466.
Cox, Kate. (2021) “Military Intelligence Buys Location Data Instead of Getting
Warrants, Memo Shows.” Ars Technica. https://arstechnica.com/tech-
policy/2021/01/military-intelligence-buys-location-data-instead-of-getting-
warrants-memo-shows/ (last accessed January 2021).
Crampton, Jeremy W., Roberts, Susan M., and Poorthuis, Ate. (2014) “The New
Political Economy of Geographical Intelligence.” Annals of the Association of
American Geographers 104(1): 196–214.
Dahlqvist, Fredrik, and Patel, Mark. (2019) “Growing Opportunities in the
Internet of Things.” McKinsey & Company. www.mckinsey.com/industries/
private-equity-and-principal-investors/our-insights/growing-opportunities-
in-the-internet-of-things# (last accessed January 2021).
Dalton, Craig M. (2015) “For Fun and Profit: The Limits and Possibilities of
Google-Maps-based Geoweb Applications.” Environment and Planning A
47(5): 1,029–1,046.
Dalton, Craig M. (2020) “Rhizomatic Data Assemblages: Mapping New
Possibilities for Urban Housing Data.” Urban Geography 41(8): 1,090–1,108.
Dalton, Craig M., and Stallmann, Tim. (2018) “Counter-mapping Data Science.”
The Canadian Geographer 62(1): 93–101.
Dalton, Craig M., and Thatcher, Jim. (2015) “Inflated granularity: Spatial ‘Big
Data’ and Geodemographics.” Big Data & Society July–December: 1–15.
Dalton, Craig M., and Thatcher, Jim. (2019) “Seeing by Starbucks: The Social
Context of Mobile Maps and Users’ Geographic Knowledges.” Cartographic
Perspectives 92: 24–42.
Dalton, Craig M., Taylor, Linnet, and Thatcher, Jim. (2016) “Critical Data
Studies: A Dialog on Data and Space.” Big Data & Society January–June: 1–9.
Dalton, Craig M., Wilmott, Clancy, Fraser, Emma, and Thatcher, Jim. (2020)
“‘Smart’ Discourses, the Limits of Representation, and New Regimes of Spatial
Data.” Annals of the American Association of Geographers 110(2): 485–496.
Dance, Gabriel J.X., LaForgia, Michael, and Confessore, Nicholas. (2018) “As
Facebook Raised a Privacy Wall, It Carved an Opening for Tech Giants.” The
New York Times. www.nytimes.com/2018/12/18/technology/facebook-privacy.
html (last accessed January 2021).
Davies, Harry. (2015) “Ted Cruz Using Firm that Harvested Data on Millions of
Unwitting Facebook Users.” The Guardian. www.theguardian.com/
us-news/2015/dec/11/senator-ted-cruz-president-campaign-facebook-user-
data (last accessed January 2021).
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 145
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
146 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 147
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
148 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 149
Hirschorn, Michael. (2010) “Closing the Digital Frontier.” The Atlantic. www.
theatlantic.com/magazine/archive/2010/07/closing-the-digital-
frontier/308131/ (last accessed January 2021).
Hogan, Mél, and Vonderau, Asta. (2019) “The Nature of Data Centers.” Culture
Machine. https://culturemachine.net/wp-content/uploads/2019/04/HOGAN-
AND-VONDERAU.pdf (last accessed January 2021).
Horkheimer, Max. (1995) Critical Theory: Selected Essays. New York: Continuum.
Horkheimer, Max, and Adorno, Theodor W. (2002[1947]) Dialectic of
Enlightenment: Philosophical Fragments. Translated by Edmund Jephcott.
Stanford, CA: Stanford University Press.
Hsu, Jeremy. (2018) “The Strava Heat Map and the End of Secrets.” WIRED.
www.wired.com/story/strava-heat-map-military-bases-fitness-trackers-
privacy/ (last accessed December 2020).
Hunt, Sarah. (2014) “Ontologies of Indigeneity: The Politics of Embodying a
Concept.” Cultural Geographies 21(1): 27–32.
Husserl, Edmund. (2001) Logical Investigations. Moran, D. (ed.). London:
Routledge.
Information Commissioner’s Office. (2020) “ICO Fines British Airways £20m for
Data Breach Affecting More than 400,000 Customers.” https://ico.org.uk/
about-the-ico/news-and-events/news-and-blogs/2020/10/ico-fines-british-
airways-20m-for-data-breach-affecting-more-than-400-000-customers/ (last
accessed January 2021).
Intersoft Consulting. (2016) General Data Protection Regulation. https://
gdpr-info.eu/ (last accessed January 2021).
Jacobson, Don. (2020) “EU Court Rejects Data-sharing Deal Due to Privacy
Concerns.” UPI. www.upi.com/Top_News/World-News/2020/07/16/EU-
court-rejects-data-sharing-deal-due-to-privacy-concerns/7091594894502/
(last accessed November 2019).
Jameson, Fredric. (2003) “Future City.” New Left Review 21. https://newleftreview.
org/issues/ii21/articles/fredric-jameson-future-city (last accessed December
2020).
Jefferson, Brian. (2017) “Digitize and Punish: Computerized Crime Mapping and
Racialized Carceral Power in Chicago.” Environment and Planning D: Society
and Space 35(5): 775–796.
Jefferson, Brian. (2020) Digitize and Punish: Racial Criminalization in the Digital
Age. Minneapolis, MN: University of Minnesota Press.
Jeffries, Stuart. (2016) Grand Hotel Abyss: The Lives of the Frankfurt School.
London: Verso Books.
Jenkins Jr., Holman W. (2010) “Google and the Search for the Future.” The Wall
Street Journal. www.wsj.com/articles/SB1000142405274870490110457542329
4099527212 (last accessed January 2021).
Jennings, Michael W. (2008) “The Production, Reproduction, and Reception of
the Work of Art.” In: Jennings, Michael W., Doherty, Brigid, and Levin,
Thomas Y. (eds.) The Work of Art in the Age of Its Technological Reproducibility
and Other Writings on Media. 9–17. Cambridge, MA: The Belknap Press of
Harvard University Press.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
150 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 151
Loukissas, Yanni Alexander. (2019) All Data Are Local: Thinking Critically in a
Data-driven Society. Cambridge, MA: MIT Press.
Mackenzie, Adrian. (2017) Machine Learners: Archaeology of a Data Practice.
Cambridge, MA: MIT Press.
Magid, Larry. (2009) “Facebook’s New Policy Makes Users Think about Privacy.”
The Mercury News. www.mercurynews.com/2009/12/10/magid-facebooks-
new-policy-makes-users-think-about-privacy/ (last accessed January 2021).
Mann, Steve. (1998) “‘Reflectionism’ and ‘Diffusionism’: New Tactics for
Deconstructing the Video Surveillance Superhighway.” Leonardo 31(2):
93–102.
Marcuse, Herbert. (1991[1964]) One-dimensional Man. Boston, MA: Beacon
Press.
Marcuse, Herbert. (1969) An Essay on Liberation. Boston, MA: Beacon Press.
Marcuse, Herbert. (1982) “Some Social Implications of Modern Technology.” In:
Arato, A., and Gebhardt, E. (eds.) The Essential Frankfurt School Reader.
138–162. New York: Continuum.
Marcuse, Herbert. (2009) Negations: Essays in Critical Theory. London: MayFly
Books.
Martínez, Antonio García. (2019) “No, Data Is Not the New Oil.” WIRED. www.
wired.com/story/no-data-is-not-the-new-oil/ (last accessed January 2021).
Marx, Gary T. (2009) “A Tack in the Shoe and Taking off the Shoe: Neutralization
and Counter-neutralization Dynamics.” Surveillance & Society 6(3), 294–306.
Marx, Karl. (1955[1847]) The Poverty of Philosophy. Translated by the Institute of
Marxism Leninism. www.marxists.org/archive/marx/works/1847/poverty-
philosophy/index.htm (last accessed November 2020).
Marx, Karl. (1990[1848]) Capital Volume 1. Translated by Ben Fowkes. London:
Penguin Books.
Marx, Karl. (1975[1852]) The Eighteenth Brumaire of Louis Bonaparte. Dutt, C.P.
(ed.). New York: International Publishers.
Marx, Karl. (1978[1888]) “Theses on Feuerbach.” In: Tucker, R.C. (ed.) The
Marx-Engels Reader. 143–145. New York: W.W. Norton.
Marx, Karl, and Engels, Friedrich. (1978[1848]) “Manifesto of the Communist
Party.” In: Tucker, R.C. (ed.) The Marx-Engels Reader. 469–500. New York:
W.W. Norton.
Matsakis, Louise. (2019a) “How the West Got China’s Social Credit System
Wrong.” WIRED. www.wired.com/story/china-social-credit-score-system/
(last accessed January 2021).
Matsakis, Louise.( 2019b) “The WIRED Guide to Your Personal Data (and Who
Is Using It).” WIRED. www.wired.com/story/wired-guide-personal-data-
collection/ (last accessed January 2021).
Mattern, Shannon. (2017) Code and Clay, Data and Dirt. Minneapolis, MN:
University of Minnesota Press.
McCarthy, James. (2013) “We Have Never Been ‘Post-political.’” Capitalism
Nature Socialism 24(1): 19–25.
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
152 . data power: radical geographies of control and resistance
McDonald, Aleecia M., and Cranor, Lorrie Faith. (2008) “The Cost of Reading
Privacy Policies.” I/S: A Journal of Law and Policy for the Information Society
4(3): 543–568.
McKittrick, Katherine. (2021) Dear Science and Other Stories. Durham, NC:
Duke University Press.
Milan, Stefania, and Treré, Emiliano. (2019) “Big Data from the South(s): Beyond
Data Universalism.” Television & New Media 20(4): 319–335.
Minxi, Zhou. (2019) “The Truths and Myths about China’s Social Credit System.”
CGTN. https://news.cgtn.com/news/3d3d774e7751444f32457a6333566d54/
index.html (last accessed January 2021).
Mitchell, Andrew J., and Trawny, Peter (eds.). (2017) Heidegger’s Black Notebooks:
Responses to Anti-Semitism. New York: Columbia University Press.
Morrison, Sara. (2020) “How to Make Sure Google Automatically Deletes Your
Data on a Regular Basis.” Vox recode. www.vox.com/recode/2020/6/24/
21301713/google-auto-delete-location-youtube (last accessed January 2021).
Mott, Carrie, and Cockayne, Daniel G. (2017) “Citation Matters: Mobilizing the
Politics of Citation toward a Practice of ‘Conscientious Engagement.’” Gender,
Place & Culture 24(7): 954–973.
Mozur, Paul. (2018) “Inside China’s Dystopian Dreams: A.I., Shame and Lots of
Cameras.” The New York Times. www.nytimes.com/2018/07/08/business/
china-surveillance-technology.html (last accessed January 2021).
Nakamura, Lisa. (2014) “Indigenous Circuits: Navajo Women and the
Racialization of Early Electronic Manufacture.” American Quarterly 66(4):
919–941.
Neate, Rupert. (2018) “Over $119bn Wiped off Facebook’s Market Cap after
Growth Shock.” The Guardian. www.theguardian.com/technology/2018/
jul/26/facebook-market-cap-falls-109bn-dollars-after-growth-shock (last
accessed January 2021).
Neff, Gina, and Nafus, Dawn. (2016) The Quantified Self. Cambridge, MA: MIT
Press.
New York State. (2016) Senate Bill S6340A. 2015–2016 Legislative Session. www.
nysenate.gov/legislation/bills/2015/s6340/amendment/a (last accessed
February 2021).
Nield, David. (2021) “What’s Google FLoC? and How Does It Affect Your
Privacy?” WIRED. www.wired.com/story/google-floc-privacy-ad-tracking-
explainer/ (last accessed June 2021).
Noble, Safiya Umoja. (2018) Algorithms of Oppression. New York: New York
University Press.
Nost, Eric. (2020) “Infrastructuring ‘Data-driven’ Environmental Governance in
Louisiana’s Coastal Restoration Plan.” Environment and Planning E. DOI:
10.1177/2514848620909727.
O’Brien, Sara Ashley. (2020) “The $185 Million Campaign to Keep Uber And
Lyft Drivers as Contractors in California.” The Hill. https://thehill.com/
business-a-lobbying/top-lobbyists/529550-the-hills-top-lobbyists-2020 (last
accessed January 2021).
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 153
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
154 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 155
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
156 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
bibliography . 157
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
158 . data power: radical geographies of control and resistance
Žižek, Slavoj. (2009) The Ticklish Subject: The Absent Centre of Political Ontology.
London: Verso Books.
Zook, Matthew A. (2005) The Geography of the Internet Industry: Venture Capital,
Dot-coms, and Local Knowledge. Boston, MA: Blackwell.
Zook, Matthew, and Graham, Mark. (2007) “The Creative Reconstruction of the
Internet: Google and the Privatization of Cyberspace and DigiPlace.”
Geoforum 38(6) 1,322–1,343. https://doi.org/10.1016/j.geoforum.2007.05.004
(last accessed January 2021).
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:10 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:18 +00:00
All use subject to https://about.jstor.org/terms
Index
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:18 +00:00
All use subject to https://about.jstor.org/terms
160 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:18 +00:00
All use subject to https://about.jstor.org/terms
index . 161
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:18 +00:00
All use subject to https://about.jstor.org/terms
162 . data power: radical geographies of control and resistance
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:18 +00:00
All use subject to https://about.jstor.org/terms
index . 163
Uber 2, 18, 40, 81, 83, 93, 117, 123; see Yelp 27, 127
also #DeleteUber
Union Pacific 50 Zuckerberg, Mark 2, 26, 68; see also
Unities of ambiance see dérive (drift) Facebook, scandals
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:18 +00:00
All use subject to https://about.jstor.org/terms
Pluto Press
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Pluto Press is collaborating with JSTOR to digitize, preserve and extend access to Data Power
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:26 +00:00
All use subject to https://about.jstor.org/terms
Thanks to our Patreon Subscribers:
This content downloaded from 94.140.8.158 on Mon, 08 Jul 2024 16:57:26 +00:00
All use subject to https://about.jstor.org/terms