Download full Surveillance Studies: A Reader Torin Monahan ebook all chapters
Download full Surveillance Studies: A Reader Torin Monahan ebook all chapters
Download full Surveillance Studies: A Reader Torin Monahan ebook all chapters
com
https://ebookmass.com/product/surveillance-studies-a-reader-
torin-monahan/
OR CLICK HERE
DOWLOAD NOW
https://ebookmass.com/product/the-disability-studies-reader-5th-
edition-ebook-pdf/
ebookmass.com
https://ebookmass.com/product/practice-makes-perfect-christopher-
monahan/
ebookmass.com
https://ebookmass.com/product/must-know-high-school-algebra-
christopher-monahan/
ebookmass.com
https://ebookmass.com/product/a-history-of-russian-literature-andrew-
kahn/
ebookmass.com
The oxford handbook of METAPHOR IN ORGANIZATION STUDIES
Anders Örtenblad
https://ebookmass.com/product/the-oxford-handbook-of-metaphor-in-
organization-studies-anders-ortenblad/
ebookmass.com
https://ebookmass.com/product/neurologic-interventions-for-physical-
therapy-4th-edition-suzanne-tink-martin/
ebookmass.com
https://ebookmass.com/product/psicologia-de-los-grupos-jose-c-sanchez/
ebookmass.com
https://ebookmass.com/product/ai-for-radiology-oge-marques/
ebookmass.com
https://ebookmass.com/product/romans-data-science-how-to-monetize-
your-data-1st-ed-edition-roman-zykov/
ebookmass.com
N Gregory Mankiw Brief principles of macroeconomics
Cengage Learning 2021 Gregory Mankiw
https://ebookmass.com/product/n-gregory-mankiw-brief-principles-of-
macroeconomics-cengage-learning-2021-gregory-mankiw/
ebookmass.com
OUP UNCORRECTED PROOF – REVISES, Thu Jul 12 2018, NEWGEN
ii
iii
SURVEILL ANCE
S TUDIES
A READER
Edited by
Torin Monahan
David Murakami Wood
iv
1
Oxford University Press is a department of the University of Oxford. It furthers
the University’s objective of excellence in research, scholarship, and education
by publishing worldwide. Oxford is a registered trade mark of Oxford University
Press in the UK and certain other countries.
9 8 7 6 5 4 3 2 1
Paperback printed by WebCom, Inc., Canada
Hardback printed by Bridgeport National Bindery, Inc., United States of America
CONTENTS
vi
vi Contents
vi
Contents vii
vi
viii Contents
xi
Contents ix
x Contents
Index 407
xi
L I S T O F F I G U R E S A N D TA B L E S
Figures
Table
1 Surveillance Dimensions 25
xi
xi
ACKNOWLEDGMENTS
This book was made possible through generous financial assistance from our universities.
The Department of Communication at the University of North Carolina at Chapel Hill pro-
vided support through a Kenneth and Mary Lowe Challenge Fund/Faculty Excellence Grant.
The Department of Sociology and the Surveillance Studies Centre at Queen’s University
provided support with the aid of the Canada Research Chairs Program.
vxi
v
x
xvi
xvi
Chicago: University of Chicago Press, 2001 (2):161–78. 2011 [161–64, 167–69]. Reprinted with
[2–7, 9–10, 43–4 4, 67–68]. Reprinted with permission.
permission. Nicole S. Cohen. “The Valorization of
Colin J. Bennett. “In Defense of Privacy: The Concept Surveillance: Towards a Political Economy of
and the Regime.” Surveillance and Society 8 Facebook.” Democratic Communiqué 22 (1):5–22.
(4):485–96. 2011. Reprinted with permission. 2008 [7–15, 18]. Reprinted with permission.
Shoshana Zuboff. “Big Other: Surveillance
Capitalism and the Prospects of an Information
Section 9: Ubiquitous Surveillance Civilization.” Journal of Information Technology
30 (1):75–89. 2015 [77, 80–85]. Reprinted with
Roger Clarke. “Information Technology and permission.
Dataveillance.” Communications of the ACM 31
(5):498–512. 1988 [499, 502–508]. Reprinted with
permission. Section 12: Participation and
Dana Cuff. “Immanent Domain: Pervasive Computing
and the Public Realm.” Journal of Architectural Social Media
Education 57 (1):43–49. 2003 [43–48]. Reprinted Mark Andrejevic. “The Work of Being Watched:
with permission. Interactive Media and the Exploitation of
Mike Crang and Stephen Graham. “Sentient
Self-Disclosure.” Critical Studies in Media
Cities: Ambient Intelligence and the Politics of
Communication 19 (2):230–48. 2002 [231–32,
Urban Space.” Information, Communication &
238–39, 243–45]. Reprinted with permission.
Society 10 (6):789–817. 2007 [791–97, 811–1 4].
Hille Koskela. “Webcams, TV Shows, and Mobile
Reprinted with permission. Phones: Empowering Exhibitionism.”
Mark Andrejevic. “Surveillance in the Big Data Surveillance & Society 2 (2/3):199–215. 2004.
Era.” In Emerging Pervasive Information and Reprinted with permission.
Communication Technologies (PICT), edited by Anders Albrechtslund. “Online Social Networking as
K. D. Pimple, 55–69. New York: Springer, 2014 Participatory Surveillance.” First Monday 13 (3).
[58–64]. Reprinted with permission. 2008. Reprinted with permission.
Priscilla Regan and Valerie Steeves. “Kids R
Us: Online Social Networking and the Potential
Section 10: Work and Organization for Empowerment.” Surveillance & Society 8
(2):151–65. 2010. Reprinted with permission.
Graham Sewell and Barry Wilkinson. “Someone to Alice E. Marwick. “The Public Domain: Social
Watch over Me: Surveillance, Discipline, and Surveillance in Everyday Life.” Surveillance
the Just-in-Time Labour Process.” Sociology 26 & Society 9 (4):378–93. 2012. Reprinted with
(2):271–89. 1992 [271–81, 283–84]. Reprinted with permission.
permission.
Kirstie Ball. “Workplace Surveillance: An Overview.”
Labor History 51 (1):87–106. 2010 [89, 91–94, 98–
101]. Reprinted with permission. Section 13: Resistance and Opposition
Gavin J. D. Smith. “Behind the Screens: Examining
Constructions of Deviance and Informal Colin J. Bennett. The Privacy Advocates: Resisting the
Practices among CCTV Control Room Operators Spread of Surveillance. Cambridge, MA: MIT
in the UK.” Surveillance & Society 2 (2/3):376–95. Press, 2008 [ix, 199, 210–1 1, 217, 220–22, 225].
2004. Reprinted with permission. Reprinted with permission.
Christian Fuchs. “Web 2.0, Prosumption, and Laura Huey, Kevin Walby, and Aaron Doyle.
Surveillance.” Surveillance & Society 8 (3):288– “Cop Watching in the Downtown
309. 2011. Reprinted with permission. Eastside: Exploring the Use of (Counter)
Surveillance as a Tool of Resistance.” In
Surveillance and Society: Technological Power in
Section 11: Political Economy Everyday Life, edited by T. Monahan, 149–65.
New York: Routledge, 2006 [149–50, 152–54,
Adam Arvidsson. “On the Pre-History of the Panoptic 156–57, 161–65]. Reprinted with permission.
Sort: Mobility in Market Research.” Surveillance Finn Brunton and Helen Nissenbaum. “Vernacular
& Society 1 (4):456–74. 2004. Reprinted with Resistance to Data Collection and Analysis: A
permission. Political Theory of Obfuscation.” First Monday 16
David Murakami Wood and Kirstie Ball. “Brandscapes (5). 2011. Reprinted with permission.
of Control? Surveillance, Marketing and the Steve Mann, Jason Nolan, and Barry Wellman.
Co-construction of Subjectivity and Space in “Sousveillance: Inventing and Using Wearable
Neo-L iberal Capitalism.” Marketing Theory 13 Computing Devices for Data Collection in
(1):47–67. 2013 [47, 49–52, 54–55, 57, 60–62]. Surveillance Environments.” Surveillance & Society 1
Reprinted with permission. (3):331–55. 2003. Reprinted with permission.
Anthony Amicelle. “Towards a ‘New’ Political Anatomy Torin Monahan. “The Right to Hide? Anti-
of Financial Surveillance.” Security Dialogue 42 Surveillance Camouflage and the
xvii
xi
xx Introduction
or legal designations, whereas for others it process. There are always value judgments
signals any form of systematic monitoring and power imbalances, and they usually
that exerts an influence or has a tangible reproduce social inequalities. Because of
outcome. Additionally, because of its neg- growing awareness of the central role of
ative connotations, practitioners on the surveillance in shaping power relations
ground often disagree about whether sur- and knowledge across social and cultural
veillance is taking place. For instance, so- contexts, scholars from many different ac-
cial scientists who conduct empirical work ademic disciplines have gravitated to sur-
with policing agencies have found that veillance studies and contributed to its
most law-enforcement personnel do not see solidification as a field.
their work in that way, even as they describe But academic fields do not develop en-
their professional functions in terms that tirely on their own, just from a set of shared
researchers would label as surveillance. ideas or concerns. Rather, they depend on
Surveillance may be ubiquitous, but it the concerted efforts of individuals to pull
acquires different forms, functions, and and hold people together, to initiate and
meanings across social settings. Broadly, sustain conversations over time, and, ulti-
one could say that all formations of capital, mately, to institutionalize the field in a set
nation, and state—three aspects that consti- of organizational practices and artifacts
tute the structure of contemporary societies (Mullins 1972). For surveillance studies,
(Karatani 2014)—depend on mechanisms those practices entailed workshops begin-
of surveillance to control markets, regulate ning in the early 1990s and continuing
bodies, and protect institutions. Recently, with greater frequency in the 2000s; the
these processes were illuminated in the formation of the international Surveillance
arena of national security and state intelli- Studies Network (SSN)1 in 2006; and the
gence, where the public gained newfound hosting of international conferences every
awareness of the extent of state surveillance two years, starting in 2004. The artifacts
operations with the trove of US National include numerous edited volumes, many
Security Agency (NSA) documents released of them outgrowths of the aforementioned
by Edward Snowden in 2013. Clearly, sur- workshops, and, crucially, the founding of
veillance flourishes in other spheres too, the open-access online journal Surveillance
beyond explicit state operations or formal & Society2 in 2002. Many of the people in-
governance structures. For instance, public volved in these activities, including the
interest in surveillance has likewise been editors of this Reader, are represented
piqued by revelations about peer and corpo- in this book, but special mention must
rate monitoring on social media sites like be made of sociologist David Lyon, who
Facebook, which are platforms that also en- was instrumental early on in organizing
gage in the robust collection, analysis, and workshops and conference panels and
sharing of data, sometimes even running producing edited volumes that drew
undisclosed “experiments” on users to scholars into dialogue, thus helping to con-
see how they respond to different types of stitute the field.
content. Clearly this is an “origin story,” and
Across domains, from state security such stories are always political: they set
agencies to social media sites, surveil- the parameters for who and what counts
lance regulates boundaries and relations. or should be counted. As a collection of
It reinforces separation and different curated materials, Readers, such as this
treatment along lines of class, race, gender, one, are similarly political and necessarily
sexuality, age, and so on. Regardless of exclusionary, if only because there simply
the context, surveillance is never a neutral is not sufficient room to include everything
xxi
Introduction xxi
that one would like to— or should— This should not be read as a romanticiza-
include. Although such politics and tion of the field. Certainly not every sur-
exclusions are unavoidable, we choose to veillance studies scholar welcomes being
be self-reflexive about our standpoints and challenged from a disciplinary perspective
the choices we are making. We are interdis- other than her or his own. That said, as the
ciplinary scholars with backgrounds and field as a whole has been forced to grapple
direct experience in surveillance studies, with such challenges, and continues to do
science and technology studies (STS), ge- so, the general tone has not been one of de-
ography, sociology, communication, and fensiveness but rather appreciation. Not of
history. Indirectly, through conferences, exclusion and ostracism, but of inclusion
publications, and collaborations, we partici- and acceptance. These are the norms that
pate in many other fields: anthropology, po- characterize the field for many participants,
litical science, law and society, criminology, and they are ones we try to reproduce with
American studies, gender studies, cultural our selection, grouping, and framing of
studies, and others. excerpts in this book.
This interdisciplinary orientation inflects
the explicit and implicit arguments of this
Reader. Instead of overemphasizing the
contributions of one discipline, for instance, Histories of Surveillance and
we seek to illustrate how different discipli- Surveillance Studies
nary perspectives bring different concerns,
methods, and theoretical positions to the There may be an allure to seeing surveil-
study of surveillance in society. We feel that lance as novel, but there are important his-
this is an empirically accurate representa- torical contexts and lineages that inform
tion of the field, as well, in that there are and shape the present. Some of the earliest
many voices and disciplines represented influential work in the field, by pioneers like
in the conversations of the field, as any pe- James B. Rule and Michel Foucault, came
rusal of conference programs will bear out. out of a 1960s and 1970s context of state
More than being a static “snapshot,” how- surveillance that included the monitoring,
ever, there is a deeper and ongoing story disruption, and repression of progressive
here about a correspondence between the groups by both totalitarian and democratic
field’s institutionalization and its increasing states (Murakami Wood 2009b). At this
interdisciplinarity. The two have occurred, time, as is still the case today, state actors
and continue to occur, together. Perhaps were emboldened by new technologies that
the field’s defining feature is its search for afforded the collection and analysis of infor-
commonalities among tensions in disci- mation on an unprecedented scale. Rule’s
plinary approaches to surveillance. This book Private Lives and Public Surveillance
is the reason we prefer to call surveillance (1973) delved into these trends with a focus
studies a “transdisciplinary field.” It draws on the implications of government agencies
its strength and forms its identity from and corporations adopting new computer
shared general concerns and productive databases as central tools of governance
frictions among disciplines, all the while and customer management. Rule saw these
fostering departures and innovations. It has changes as introducing the threat of a “total
achieved cohesion as a bona fide new field surveillance society” that could lead to di-
with shared concepts, “citation classics,” minished autonomy, curtailed rights, and
and forms of institutionalization (e.g., a political repression.
journal and conferences), but it also invites, Foucault (1977), on the other hand,
and often seems to embrace, critiques. cast his eye backward to illustrate how
xx
ii
xxii Introduction
xx
ii
Introduction xxiii
picture of biology and evolution and the In the late nineteenth century, biological
development of physiology and kinetics theories of racial inferiority fused with new
(movement)— was inspired by and pro- identification techniques like physiognomy,
vided the basis for a new kind of efficient photography, and fingerprinting—the early
and compliant workforce. Typically, these systems of biometric measurement (Cole
efforts mobilized surveillance to extract 2001; Sekula 1986). These were policing
as much labor from bodies as was phys- technologies deployed in an effort to cata-
ically possible. Frederick Winslow Taylor logue offenders and make criminality leg-
(1911) is well known in this regard, due to ible, and perhaps even predictable, through
his efforts to implement a system of “sci- scientific means. In tandem with the rise of
entific management” of factory workers. the eugenics movement of the Progressive
This early form of workplace surveillance Era in the United States, these scientific
relied on close observation, segmentation schemes drew upon narratives of biolog-
of tasks, and division of labor, all overseen ical difference to justify unequal treatment
by a new class of managerial elites whose of supposedly inferior groups: immigrants,
technocratic functions would, in Taylor’s racial minorities, the poor, the illiterate,
view, advance the social and economic or the cognitively impaired (Kevles 1995).
prosperity of the nation. Behind the facade of objective science, dis-
Whereas Taylor believed in a voluntary criminatory practices were institutional-
system where incentives and effective man- ized through such identification systems,
agement would compel heightened pro- and social hierarchies were reinforced in
ductivity, brutal forms of involuntary labor a time of heightened migration and social
extraction—as with slavery in the United mobility.
States, Brazil, Haiti, and elsewhere—also The period at the end of the nineteenth
depended on surveillance innovations. As century saw the creation of new rights and
Nicholas Mirzoeff (2011) explains, state freedoms. The modern legal concept of
visuality regimes, including those used in privacy arose in the context of polite New
the institutional management of slaves, England society and the frustrations of
rely on techniques of classification, sep- the American bourgeoisie with an increas-
aration, and aestheticization, such that ingly intrusive media, in particular popular
people are reduced to governable units and newspapers in their reporting of society
represented in bureaucratic systems that functions. Louis Brandeis and Samuel
obscure the symbolic and real violence of Warren’s (1890) famous line about the
dehumanizing complexes. In the case of “right to be let alone” comes from this con-
slavery in the United States, especially as text, where privacy was mobilized as a right
the institution started to unravel, surveil- of the privileged. Perhaps awareness of un-
lance took the form of hot-iron branding, equal access to privacy rights, even during
slave passes and “lantern laws” to regulate its emergence as a legal construct over
movement, and wanted posters encour- a century ago, helps explain the general
aging the apprehension of runaway slaves reservations that many surveillance studies
(Browne 2015). In her important work scholars have about privacy discourses
on the surveillance of blackness, Simone today. As we develop in Section 8, there
Browne reveals how forms of agency and are clearly disciplinary reasons as well for
resistance were always a part of the slave one’s commitment to— or suspicion of—
experience and that exercises of resistance privacy protections as responses to surveil-
continue today in people’s confrontations lance. However, for better or worse, within
with discriminatory and racist surveillance policy arenas and liberal academia, privacy
apparatuses (see Section 14). and the “private life” remain both tactically
x
vxi
xxiv Introduction
v
x
Introduction xxv
To start with, the allure of Foucault’s or critical of such discourses. We have al-
(1977) writings on Bentham’s Panopticon ready observed, for example, that although
prison design was that he transformed it into perceived threats to privacy may be a
a powerful metaphor for the ways in which clarion call to arms for civil-society groups
institutions could provide scripts for people and progressives more generally (Bennett
to internalize the surveillant gaze and po- 2008; Regan 1995), whether in its origins
lice themselves into social conformity (see or today, privacy has never truly been a
Section 2). There has been increasing dissat- universal human right. Some other limita-
isfaction with the concept, though, perhaps tions of the concept might be its difficulty
because of the way people feel compelled to in overcoming the individualistic frame to
modify it and devise clunky spin-off terms assist with understanding encroachments
(e.g., “superpanopticon,” “synopticon,” on social groups or public spaces (Patton
“ban- opticon”) to match new phenomena 2000); tensions between its presentation as
rather than invent something altogether an easily identifiable universal value and its
new. Foucault intended the Panopticon to remarkable messiness in practice (Nippert-
serve as an illustration of a particular histor- Eng 2010); or the empirical reality that
ical moment in the development of modern some of the targets of the most intrusive
thinking about subjectivity and social con- forms of surveillance are more concerned
trol (Murakami Wood 2009), but it has be- with issues of domination and power, not
come an almost hegemonic construct in the abstract notions like privacy (Gilliom 2001).
field. It is often applied or intoned as if it has Finally, George Orwell’s (1949) exceed-
some kind of universal explanatory value but, ingly disturbing fictional portrayal of a to-
if used this way, it lacks empirical validity. talitarian society (in Nineteen Eighty-Four),
Rather than being rational, centralized, and with the human face forever crushed
totalizing, surveillance is more often par- under the boot of Big Brother, has simi-
ticularistic, multi-sited, and highly special- larly made it difficult to escape motifs of
ized, leading Bruno Latour (2005) to refer to all-powerful, centralized state surveillance.
contemporary surveillance—using another Notwithstanding the resilience of the Big
derivative neologism—as oligoptic, that is, Brother figure in the media or common
narrow and focused rather than broad and parlance, the field continues to stress the
distributed. Of course, the focus and inten- heterogeneous mix of surveillance flows,
sity is not random. It varies according to even with state surveillance (e.g., Guzik
one’s social address (Monahan 2010) and is 2016; Hayes 2009; Monahan and Regan
more likely to sort, exclude, and marginalize 2012; Walby and Monaghan 2011). Edward
populations, not homogenize people and Snowden’s revelations about NSA surveil-
shape them into uniform docile bodies (see lance programs, for instance, reveal that
Section 14). private companies are the source of much
The concept of privacy remains salient data analyzed by state agencies and that
in the field, as well as in legal, policy, and private contractors, just as Snowden was,
popular discourses. Along with data pro- are essential to the state surveillance ap-
tection concerns, privacy resonates deeply paratus. In other words, state surveillance
with many people and provides something is only part of the picture. Across many
to organize around. That said, whereas the arenas, the blend of state, corporate, and
concept’s universalizing and individualizing social surveillance shapes life chances
tendencies undoubtedly lend it force in in concrete ways: whether someone gets
legal and policymaking arenas, these have health insurance or a bank loan, gets
been seen as deficiencies as well, espe- fired because of a Facebook posting or
cially by academics trained to be suspicious discriminated against because of their
xvi
xxvi Introduction
credit score, gets targeted for police scru- into sections based on historical periods, ge-
tiny because she lives in a crime “hot spot,” ographical focus, conceptual frameworks,
or spied upon as a potential “terrorist” be- topical areas, or disciplinary perspectives,
cause he protests environmental polluters. among other options. Following from our
Thus, even within surveillant assemblages, earlier observation that surveillance studies
as Sean Hier and Josh Greenberg (2009) is a transdisciplinary field defined by its
note, hierarchies of visibility persist, such search for commonalities among tensions
that descriptions of exposure alone are in- in disciplinary approaches to surveillance,
sufficient to account for the uneven politics we have chosen a hybrid organizational
of surveillance. approach that seeks to triangulate, some-
On the other end of the spectrum, what loosely, topical areas, disciplinary
many people would find Orwell’s dysto- perspectives, and the field’s chronological de-
pian vision bizarre today because they see velopment. Thus, each section concentrates
surveillance— especially social networking primarily on a topical area, but this often
and media-based surveillance—as fun, con- reflects disciplinary preferences, and those
venient, or inconsequential (Albrechtslund preferences have changed over time as
2008; Ellerbrok 2011; McGrath 2004). It is scholars from different disciplines have
worth mentioning here that scholars doing joined the conversation. So, by reading the
literary analyses of surveillance have long sections in order, one can also get a sense of
observed that Orwell’s vision was highly how the field has mutated over time.
derivative of earlier writing by the Russian Emphatically, the order of sections
author Yevgeny Zamyatin (1972 [1921]). It does not represent a neat evolutionary
also seems that Aldous Huxley’s Brave New development but instead a fascinating it-
World (1932)—in which control is exercised erative process, where scholars studying
through a combination of eugenics, in one area are oftentimes influenced by
pleasure, drugs, and peer pressure— the contributions of those in an entirely
provides a far more convincing set of different area, leading to recombinant
metaphors for the contemporary situation knowledge for the collective advancement
(Marks 2005; Murakami Wood 2009a). of the field. For instance, while crimino-
With the exception of the concept of logical studies of police video surveillance
privacy, which remains central for many were some of the earliest and most for-
scholars in surveillance studies, the field mative empirical projects in surveillance
has largely departed from these genera- studies, researchers did not cease to inves-
tive concepts. Nonetheless, they have pro- tigate police video surveillance once others
foundly shaped the field’s discourses and drew the field toward explorations of resist-
remain useful as symbols of the extremes ance, ubiquitous surveillance, or the polit-
of universal or totalizing forms of surveil- ical economy; instead, scholars folded these
lance. As the next section will show, the lines of inquiry into their projects, making
field’s topical and conceptual apparatuses their findings both unpredictable and re-
have exploded as the field has grown, freshing, all the while furthering the dia-
adding complexity, nuance, and renewed logue with others (e.g., Coaffee and Fussey
vigor to what came before. 2015; McCahill and Finn 2014; Smith 2015).
Likewise, world events can suddenly re-
kindle interest in older areas of investi-
gation, as can be observed with terrorist
Book Overview attacks drawing attention back to national
security, Snowden’s leaks foregrounding
There are many possible ways to organize a state intelligence operations, or police
Reader such as this one. It could be divided killing of unarmed black men raising
xxivi
Introduction xxvii
interest in the documentary evidence that larger systems of power and influence. This
video surveillance might provide, albeit makes sense given that with the exception
with an emphasis on police accountability, of Oscar Gandy, who is a communication
not citizen wrongdoing. This iterative scholar, each of the other authors in this
process is represented within most of the section would identify as a sociologist.
sections too, where we include excerpts Section 2, “Society and Subjectivity,”
from older and newer explorations of the provides excerpts from some of the key
area and note the influences in our section theoretical texts that shaped the field.
introductions so that these iterations and These include Bentham’s and Foucault’s
cross-fertilizations can be appreciated. writings on the Panopticon prison design,
It should be mentioned that some of the Deleuze’s delineations of the emergence
excerpts are by scholars who would not nec- of control dynamics replacing the disci-
essarily identify with the field of surveil- plinary ones outlined by Foucault, and
lance studies. This is to be expected with others exploring how such control might
foundational theoretical works that pre- manifest in decentralized networks or ar-
date the formation of the field, but there ticulate with powerful media institutions
are other instances of more contemporary that are characterized more by the many
selections by people working in aligned watching the few. Because the emphasis
fields. We chose to include such pieces if is on how subjectivity is produced through
they were exemplary works in new areas or exposure to surveillance, especially in or by
they challenged the status quo in ways we institutions, we also include selections that
found productive. Given that we valorize illustrate how public health campaigns in-
the relative porousness and inclusiveness form medical imaginaries and surveillance-
of the field, it seemed appropriate that we based zoo designs cultivate conservationist
would not exclude significant publications values in zoogoers.
simply because of how an author positioned The next two sections, “State and
themself. Authority” (Section 3) and “Identity and
The Reader’s first content section, Identification” (Section 4), explore the ways
“Openings and Definitions,” offers a pre- in which surveillance was a critical part
sentation of originary works that helped of the rise of the modern nation-state, es-
constitute surveillance studies. The authors pecially pertaining to the identification
wrestle with different definitions of surveil- and governance of people at borders and
lance, illustrating a lack of consensus at the within state territories. The authors an-
incipient stages of the field. Some position alyze incarnations of state surveillance
the target of surveillance as an individual in the service of totalitarian and postcolo-
person whose freedoms are infringed upon, nial regimes, such as Cold War–era East
while others question the larger effects on Germany and apartheid-era South Africa,
subject populations or society as a whole. respectively, and question the extent to
There is general agreement, however, that which totalitarian tendencies are present in
surveillance is widespread, facilitated by in- all modern nation-states. When states de-
formation systems used by most organiza- fine themselves by territorial demarcations,
tions, and permeating down to the capillary then the regulation of movement, through
level of society—that is, on the level of eve- passports or other identity documents, ef-
ryday interactions in most arenas of public fectively conjures “citizens” into being as
and private life. This movement between identifiable representatives of the state.
the macro and the micro is indicative of Unfortunately, identification efforts cannot
authors working to develop what C. Wright be divorced from the prejudices of their cul-
Mills (1959) called “the sociological imagi- tural contexts, so they usually reproduce
nation,” situating everyday practices within those prejudices in technological form.
xx
iivi
xxviii Introduction
The section on “Borders and Mobilities” conducted the first empirical research on
(Section 5) picks up these themes and police video surveillance, largely found
places them within more of a contemporary that it was not effective at preventing most
national-security context. The identifica- crimes, just for displacing criminal activity
tion and sorting of populations is increas- to areas under less overt observation or, at
ingly embedded in computer algorithms, best, assisting with the identification of
facilitating social exclusion through au- suspects after the fact. While not entirely
tomated means. This is perhaps most absent from these criminological accounts,
apparent with border control systems that other excerpts advance an explicit gender
are effectively distributed across geographic critique of surveillance, seeing technolog-
territories and temporalities, as anywhere ical systems as potentially adding layers
or anytime that someone is identified and of harassment while not mitigating vio-
assessed against software- encoded risk lence against women. Additional pieces
profiles. As a few of the excerpts in this investigate the ways in which police and
section reveal, these functions are delegated security schemes connect to the political
not only to computer systems, but also to in- economy— securing places of commerce,
dividual travelers and the general public, advancing the security industry, and
who are responsibilized to submit volun- enforcing an actuarial form of risk man-
tarily to security demands and inform on agement that invariably punishes poor and
others who seem suspicious in some way, racialized populations. Of course, with the
usually due to their racial or ethnic iden- spread of camera-equipped mobile phones,
tity markers. Given this focus on terri- the power dynamics between the police
tory, mobility, and risk management, it is and the public may be open, at least par-
not surprising that the main disciplines tially, to renegotiation.
represented in this section are geography, We turn next to “Privacy and Autonomy”
political science, and criminology. (Section 8), with a number of treatments
National security and policing are two that address the field’s apprehensions with
of the most prevalent areas of concern in the privacy concept. These selections add
non-academic discussions of surveillance. complexity to the concept, showing both
The sections on “Intelligence and Security” how it is a dynamic social norm and how
(Section 6) and “Crime and Policing” theorizations of it have advanced well be-
(Section 7) offer a sampling of critical aca- yond many of the depictions of its critics.
demic and journalistic works in these areas. Technological developments seem to pro-
Some of it details the mind-boggling extent duce the greatest threats to privacy, at
of the NSA’s telecommunications surveil- least from the perspective of surveillance
lance systems, while other pieces allow us studies, especially as information gath-
to situate these intelligence practices in a ering and sharing become routine. Privacy
longer history of state overreach, with illegal scholars— who tend to come from the
targeted spying on activists, journalists, in- disciplines of political science, philosophy,
ternational allies, and others. Importantly, and legal studies—point out that as long as
as other excerpts show, internal state sur- privacy is presented solely as an individual
veillance is almost always coupled with and good, it is destined to be compromised
informed by similar applications in distant and eroded in policy realms that, fairly or
war zones and occupied territories. not, tend to view any other concerns as
When it comes to domestic policing advancing public interests. Thus, persua-
(Section 7), video surveillance—or closed- sive arguments are needed about the social
circuit television (CCTV)— is the most good provided by privacy protections. A few
obvious focal point. Criminologists, who of the excerpts offer just such arguments,
xxi
Introduction xxix
while others concentrate on the impor- self-discipline on the part of workers, for
tance of respecting the context of infor- instance through team- based projects
mation generation or of safeguarding where peers depend on one’s reliability.
opportunities for boundary negotiation Information technologies facilitate the
between individuals and information sys- reach of workplace surveillance too. On
tems. Finally, to flesh out the surveillance- one hand, mobile technologies lead to a
studies debate a bit further, we offer both a condition that Melissa Gregg (2011) refers
critique of privacy and a more general re- to as “presence bleed,” where one is ex-
sponse in defense of the concept. pected to be always available to work and to
Privacy concerns are so pressing, in part, be monitored, even at home. On the other
because surveillance is becoming routine, hand, the very systems of commerce or
pervasive, and increasingly hidden. The communication (e.g., cashier checkout sys-
next section, “Ubiquitous Surveillance” tems or social media sites) are fundamen-
(Section 9), brings together insights from tally ones of surveillance: either of employee
scholars with backgrounds in informa- performance or of user activity, where, in
tion studies, communication, geography, the case of social media, users effectively
and architecture to document this move engage in “free labor” to generate value
toward invisible, automated control in for companies. Then again, it is impor-
built environments and data practices. tant to remember that those charged with
The excerpts show how information- surveilling others are themselves engaged
rich environments— characterized by in mostly tedious and unrewarding work.
embedded sensors, mobile computing, and This brings us to closer scrutiny of the
algorithmic processes— are fundamen- relationship between surveillance and the
tally surveillant. Their logic is that all data political economy (Section 11). In the service
elements (objects, people, conditions) must of company profits, customer surveillance
be “addressable” and subject to remote or takes many forms, ranging from the devel-
automated management. This can be seen opment of customer categories to facilitate
with what has been called the “Internet of effective advertising throughout the twen-
things,” with networked appliances like tieth century to the hidden screening of
refrigerators or with “smart cities” that use customers by financial industries charged
embedded sensors and other technologies with implementing risk- management
to regulate transportation systems, elec- techniques to block potential money
tricity usage, and sewage treatment in “real launderers or terrorists. The emphasis on
time.” Whether integrated with urban in- company brands also compels technolog-
frastructure or occurring in abstract “big ical innovations in surreptitiously “reading”
data” practices, ubiquitous surveillance customers’ physiological responses to
depends on decisions about data priorities products and shaping their affective
and values that are clearly political in their attachment to brands. Finally, several
effects. excerpts enumerate the ways that Internet
The next two sections, “Work and giants such as Facebook and Google have
Organization” (Section 10) and “Political made value extraction through information
Economy” (Section 11), are closely related, systems a science, creating new information
as two sides of the same coin. From a ecologies that threaten to become totalizing
largely sociological perspective, analyses systems of control. In these selections, one
of workplace surveillance show how early can see the convergence of historical, soci-
techniques of scientific management and ological, criminological, and communica-
performance monitoring have mutated tion approaches to the political economy of
into managerial strategies to cultivate surveillance.
xxx Introduction
xxi
Introduction xxxi
xxixi
xxxii Introduction
a necessary element, in order to trace power 3. Obviously, these are broad brushstrokes that
relations in the production and circulation occlude much of the nuance and do not represent
of cultural meanings, many of which rely all contributions to the field. The aim of this
on representations of people and narratives summary is to offer a general sense of the arc of
about their identities (Monahan 2011). Thus, the field’s development.
feminist studies, queer studies, and critical
race studies scholars might draw attention to references
depictions of threats or worthiness, showing Albrechtslund, Anders. 2008. Online Social
how those markers are encoded in surveil- Networking as Participatory Surveillance. First
lance systems and practices, propagating vi- Monday 13 (3). Available from http://fi rstmonday.
org/htbin/cgiwrap/bin/ojs/index.php/fm/article/
olence against marginalized groups. Those viewArticle/2142/1949 [accessed December
studying cinema, literature, media, or art 26, 2010].
Andrejevic, Mark. 2007. iSpy: Surveillance and Power
often highlight the ways in which cultural in the Interactive Era. Lawrence: University Press
products form perception and a sense of per- of Kansas.
sonhood, normalizing the idea of being a Bennett, Colin J. 2008. The Privacy Advocates:
Resisting the Spread of Surveillance. Cambridge,
surveillance subject, while also presenting MA: MIT Press.
avenues for resistance and critique. Brandeis, Louis D., and Samuel D. Warren. 1890. The
Performance studies scholars interrogate and Right to Privacy. Harvard Law Review 4 (5):193,
195–97.
contest, sometimes through performance, Browne, Simone. 2015. Dark Matters: On the Surveillance
the meaning and politics of the many sur- of Blackness. Durham, NC: Duke University Press.
veillance routines that characterize daily life. Clarke, Roger. 1988. Information Technology and
Dataveillance. Communications of the ACM 31
Finally, communication scholars and others (5):498–512.
seek to understand the participatory trend in Coaffee, Jon, and Pete Fussey. 2015. Constructing
Resilience through Security and
self-and peer-surveillance (e.g., through the Surveillance: The Politics, Practices, and
“Quantified Self” movement or social media Tensions of Security-Driven Resilience. Security
use), often by starting from the perspective of Dialogue 46 (1):86–105.
Cole, Simon A. 2001. Suspect Identities: A History
users themselves.3 of Fingerprinting and Criminal Identification.
This Reader provides one possible Cambridge, MA: Harvard University Press.
mapping of the field of surveillance studies. Deleuze, Gilles. 1992. Postscript on the Societies of
Control. October 59:3–7.
We take our inspiration from the field’s Ellerbrok, Ariane. 2011. Playful Biometrics: Controversial
many generous participants—our mentors, Technology through the Lens of Play. The
colleagues, and students— who have Sociological Quarterly 52 (4):528–47.
Fichte, Johann Gottlieb. 2000 [1796/97]. Foundations
brought, and continue to bring, this vibrant of Natural Right. Translated by M. Baur.
field into being. Importantly, this book does Cambridge, UK: Cambridge University Press.
not aspire to be a final representation of Foucault, Michel. 1977. Discipline and Punish: The
Birth of the Prison. New York: Vintage.
what the field is or what counts in it, but in- ———. 1978. The History of Sexuality: An Introduction.
stead a provisional sketch of a dynamic and Vol. 1. New York: Vintage.
Gandy, Oscar H. 1993. The Panoptic Sort: A Political
exciting process of mutation. Foremost, it Economy of Personal Information. Boulder,
is an invitation for others to explore, delve CO: Westview.
deeper into full texts that are only partially Gandy Jr., Oscar H. 2009. Coming to Terms with
Chance: Engaging Rational Discrimination
reproduced here, and participate in the on- and Cumulative Disadvantage. Burlington,
going conversations and debates. VT: Ashgate.
Gilliom, John. 2001. Overseers of the Poor: Surveillance,
Resistance, and the Limits of Privacy.
Chicago: University of Chicago Press.
notes Gilliom, John, and Torin Monahan. 2013.
SuperVision: An Introduction to the Surveillance
Society. Chicago: University of Chicago Press.
1. http://w ww.surveillance-studies.net/. Gregg, Melissa. 2011. Work’s Intimacy. Malden,
2. http://w ww.surveillance-and-society.org/. MA: Polity.
xxix
ii
Introduction xxxiii
Groebner, Valentin. 2007. Who Are You? Identification, Mirzoeff, Nicholas. 2011. The Right to Look: A
Deception, and Surveillance in Early Modern Counterhistory of Visuality. Durham, NC: Duke
Europe. Translated by M. Kyburz and J. Peck. University Press.
Cambridge, MA: Zone Books. Monahan, Torin. 2010. Surveillance in the Time
Guzik, Keith. 2016. Making Things Stick: Surveillance of Insecurity. New Brunswick, NJ: Rutgers
Technologies and Mexico’s War on Crime. University Press.
Oakland: University of California Press. ———. 2011. Surveillance as Cultural Practice. The
Hacking, Ian. 1990. T he Taming of Sociological Quarterly 52 (4):495–508.
Chance. Cambridge, UK: Cambridge Monahan, Torin, and Priscilla M. Regan. 2012. Zones
University Press. of Opacity: Data Fusion in Post-9/1 1 Security
Haggerty, Kevin D., and Richard V. Ericson. 2000. Organizations. Canadian Journal of Law and
The Surveillant Assemblage. British Journal of Society 27 (3):301–17.
Sociology 51 (4):605–22. Mullins, Nicholas C. 1972. The Development of a
Hall, Rachel. 2015. The Transparent Traveler: The Scientific Specialty: The Phage Group and the
Performance and Culture of Airport Security. Origins of Molecular Biology. Minerva 10:52–82.
Durham, NC: Duke University Press. Murakami Wood, David. 2009a. Can a Scanner See
Hayes, Ben. 2009. Neoconopticon: The EU the Soul? Philip K. Dick against the Surveillance
Security-Industrial Complex: Statewatch and Society. Review of International American Studies
the Transnational Institute. Available from 3 (3)–4 (1):46–59.
http://w ww.tni.org/sites/w ww.tni.org/fi les/ ———. 2009b. The ‘Surveillance Society’: Questions
download/neoconopticon_ 0.pdf [accessed May of History, Place and Culture. European Journal of
17, 2013]. Criminology 6 (2):179–94.
Hier, Sean P., and Josh Greenberg. 2009. The Politics Nippert-Eng, Christena E. 2010. Islands of Privacy.
of Surveillance: Power, Paradigms, and the Field Chicago: University of Chicago Press.
of Visibility. In Surveillance: Power, Problems, and OED Online. 2016. “eavesdrop, v.” Available from
Politics, edited by S. P. Hier and J. Greenberg, 14– http://w ww.oed.com/v iew/Entry/59159?rskey=elS
29. Vancouver: UBC Press. 7Jf&result=2&isAdvanced=false [accessed August
Huxley, Aldous. 2006 [1932]. Brave New World. 19, 2016].
Reprint ed. New York: Harper Perennial. Orwell, George. 1949. Nineteen Eighty-Four.
Karatani, Kojin. 2014. The Structure of World Centennial ed. New York: Harcourt Brace.
History: From Modes of Production to Modes Patton, Jason W. 2000. Protecting Privacy in
of Exchange. Translated by M. K. Bourdaghs. Public?: Surveillance Technologies and the
Durham, NC: Duke University Press. Value of Public Places. Ethics and Information
Kevles, Daniel J. 1995. In the Name of Technology 2:181–87.
Eugenics: Genetics and the Uses of Human Porter, Theodore M. 1995. Trust in Numbers: The
Heredity. Cambridge, MA: Harvard Pursuit of Objectivity in Science and Public Life.
University Press. Princeton, NJ: Princeton University Press.
Latour, Bruno. 2005. Reassembling the Social: An Poster, Mark. 1990. The Mode of
Introduction to Actor-Network-T heory. Information: Poststructuralism and Social Context.
Oxford: Oxford University Press. Chicago: University of Chicago Press.
Lefait, Sébastien. 2013. Surveillance on Regan, Priscilla M. 1995. Legislating Privacy:
Screen: Monitoring Contemporary Films and Technology, Social Values, and Public Policy.
Television Programs. Lanham, MD: Scarecrow Chapel Hill: University of North Carolina
Press, Inc. Press.
Lyon, David. 1988. The Information Society: Issues and Rosen, David, and Aaron Santesso. 2013. The
Illusions. Cambridge, UK: Polity. Watchman in Pieces: Surveillance, Literature,
———. 1994. The Electronic Eye: The Rise of and Liberal Personhood. New Haven, CT: Yale
Surveillance Society. Minneapolis: University of University Press.
Minnesota Press. Rule, James B. 1973. Private Lives and Public
———. 2001. Surveillance Society: Monitoring Everyday Surveillance: Social Control in the Computer Age.
Life. Buckingham, UK: Open University. London: Allen Lane.
Marks, Peter. 2005. Imagining Surveillance: Utopian Scott, James C. 1998. Seeing Like a State: How Certain
Visions and Surveillance Studies. Surveillance & Schemes to Improve the Human Condition Have
Society 3 (2/3):222–39. Failed. New Haven, CT: Yale University Press.
Marx, Gary T. 1988. Undercover: Police Surveillance Sekula, Allan. 1986. The Body and the Archive.
in America. Berkeley: University of October 39:3–64.
California Press. Smith, Gavin J. D. 2015. Opening the Black Box: The
McCahill, Michael, and Rachel L. Finn. 2014. Work of Watching. New York: Routledge.
Surveillance, Capital, and Resistance: Theorizing Staples, William G. 2000. Everyday
the Surveillance Subject. New York: Routledge. Surveillance: Vigilance and Visibility in
McGrath, John E. 2004. Loving Big Postmodern Life. Lanham, MD: Rowman &
Brother: Performance, Privacy, and Surveillance Littlefield Publishers.
Space. New York: Routledge. Taylor, Frederick Winslow. 1911. The Principles of
Mills, C. Wright. 1959. The Sociological Imagination. Scientific Management. New York: Harper &
New York: Oxford University Press. Brothers.
vxxi
xxxiv Introduction
Torpey, John C. 2000. The Invention of the in the Suppression of Animal Rights Activists in
Passport: Surveillance, Citizenship, and the State. Canada. Social Movement Studies 10 (1):21–37.
Cambridge, UK: Cambridge University Press. Wise, J. Macgregor. 2016. Surveillance and Film.
U.S. Office of Technology Assessment. 1987. The New York: Bloomsbury.
Electronic Supervisor: New Technology, New Zamyatin, Yevgeny. 1972 [1921]. We. Translated by
Tensions, OTA-CIT-333. Washington, DC: U.S. M. Ginsburg. New York: Viking.
Office of Technology Assessment. Zimmer, Catherine. 2015. Surveillance Cinema.
Walby, Kevin, and Jeffrey Monaghan. 2011. Private New York: New York University Press.
Eyes and Public Order: Policing and Surveillance
Section 1
data (or “dataveillance”) and develop it further. field like surveillance studies is the “imperial
Even today, information and data remain cen- urge” to redefine everything as surveillance,
tral to most contemporary definitions of sur- and while some, like Gary Marx (2016), do
veillance and to the field more broadly, as the indeed argue for a maximalist definition that
selections in this reader testify. recasts casual observation or just “looking” as
By crafting definitions to emphasize somewhere on a continuum of surveillance, a
populations or groups as the targets, one primary purpose of definitions is to clarify the
can focus analytic attention on issues of gov- object of study, as well as its social context.
ernance. For instance, in his influential book Lyon’s highlighting of the “focused, systematic
Surveillance, Power, and Modernity (1990), and routine” nature of surveillance separates
Christopher Dandeker defines surveillance as out surveillance from other, more casual, oc-
“the gathering of information about and the casional, and disorganized forms of attention.
supervision of subject populations in organi- It does not, of course, say anything about the
zations” (Dandeker 1990: vii). This definition social significance or morality of either, merely
seems to offer a rather wider sense of who or that they are not the same. Gary Marx’s own
what is under surveillance—the term “subject modus operandi, as demonstrated by his ex-
populations” both strips out the requirement cerpt in this section, is to produce compre-
for the subject of surveillance to be an indi- hensive lists of features and characteristics of
vidual or even to be human at all. Through its surveillance, against which any particular thing
explicit reference to subjection, it also draws can be assessed. He stresses key differences
attention to power, and with the last phrase between earlier modes of surveillance and
of the definition, “in organizations,” provides “new” digital surveillance.
an institutional framework for that power. In These definitions offer different prisms
some ways, one could argue that surveillance for thinking about the various sites, forms,
is about making and remaking both subject targets, and functions of surveillance. Some
populations and organizations, often at the mechanism of control or regulation may
same time. William Staples (excerpted in be seen as necessary for surveillance to
Chapter 3) emphasizes this co- constitutive be taking place, but the theoretical frames
relationship in his investigation and theoriza- adopted by scholars color their views of
tion of “everyday surveillance.” what else matters most (e.g., individuals,
Likewise, David Lyon’s oft-quoted definition groups, contexts). While the goals of those
of surveillance—as “the focused, systematic implementing surveillance systems may
and routine attention to personal details for seem like an obvious focal point, for some
purposes of influence, management, protec- time the field has been concentrating in-
tion or direction” (excerpted in Chapter 4)— stead on conditions, contexts, experiences,
retains a focus on the person, but his analysis and negotiations of surveillance (e.g., Ball
is further concerned with “sites” of surveil- 2009; McCahill and Finn 2014; Saulnier
lance (both actual and metaphorical) and with 2016). Perhaps with the advent of big data
processes. Beyond simply “watching,” Lyon’s and automated analytics, definitions will
definition explicitly considers the purposes have to shift to emphasize the construction
and qualities of attention that are needed for of emergent purposes in a society in which
something to be “surveillance.” One of the surveillance is ubiquitous and all data are
dangers inherent in a new transdisciplinary collected as a matter of course.
JAMES B. RULE
P R I V AT E L I V E S A N D
PUBLIC SURVEILL ANCE
Social Control in the Computer Age
surveillance. In the first place, surveillance of earlier behaviour. Nor would the single
entails a means of knowing when rules are master agency compartmentalize informa-
being obeyed, when they are broken, and, tion which it collected, keeping certain data
most importantly, who is responsible for for use only in certain kinds of decisions.
which. In some instances these things may Instead, it would bring the whole fund
be easy to accomplish, e.g., a flagrant armed of its information to bear on every deci-
robbery by notorious criminals. In the case sion it made about everyone. Any sign of
of other forms of disobedience, such as in- disobedience— present or anticipated—
come tax evasion, it may be extremely diffi- would result in corrective action. The fact
cult. A second element of surveillance, also that the system kept everyone under con-
indispensable, is the ability to locate and stant monitoring would mean that, in the
identify those responsible for misdeeds of event of misbehaviour, apprehension and
some kind. Again, this may be simple in sanctioning would occur immediately. By
many cases . . . however, it may be the most making detection and retaliation inevitable,
difficult condition of all to fulfil. such a system would make disobedience al-
In practice, it is often very difficult to most unthinkable.
draw boundaries between processes of sur- One should never expect to encounter a
veillance and the application of what has real system like the one just described. That
been termed the powers of control . . . the is just the point. The only usefulness of this
same people and the same bodies are paradigm is as a foil for comparison to real
often engaged in the collection of infor- systems, as a case guaranteed to be more ex-
mation and in the application of sanctions. treme than the real world could ever produce.
Nevertheless, when I want to emphasize True, some agencies may develop something
those activities having to do with collecting like systems of total surveillance over very
and maintaining information, I speak of limited numbers of people, for short periods
systems of surveillance. Where the concern of time. Police may keep constant watch over
lies more with the actual management of a small group of conspirators, or the staff
behaviour, through sanctioning or exclu- of a hospital may exercise something like
sion, I refer to systems of control. . . . total surveillance over those in the intensive
[L]et me sketch a model of the most ex- care ward. But difficulties of staging, and
treme possible development of mass sur- especially prohibitive costs, rule out such
veillance, an ideal type of a social order techniques for larger clienteles over longer
resembling the one portrayed by Orwell, periods of time. No, the usefulness of the
though perhaps even more extreme. This paradigm lies in its making it possible to
I call a total surveillance society. compare systems of surveillance and control
In such a world, first of all, there would now in existence to this theoretical extreme
be but a single system of surveillance and and to one another in terms of their prox-
control, and its clientele would consist of imity to this extreme. . . .
everyone. This system would work to en- [A]ny real surveillance system is limited
force compliance with a uniform set of in size. This means, for one thing, limita-
norms governing every aspect of everyone’s tion to the numbers of persons whom it can
behaviour. Every action of every client would depict in its files. Second, there is always
be scrutinized, recorded and evaluated, a limitation in the amount of information
both at the moment of occurrence and for with which a system can cope, the amount
ever afterwards. The system would collate which it can meaningfully use in its deci-
all information at a single point, making sion-making on each person. Indeed, . . . the
it impossible for anyone to evade responsi- amount of usable information is often less
bility for his past by fleeing from the scene than that which is theoretically available on
Setä Juhani oli oikeassa. Peijakas — oli sitä tuota tiedon roskaa
Lunnasjärvelläkin! Se jos olisi tuo Juhani saanut kouluja käydä, olisi
se pappi taikka rohvessoori.
Sitä hän vain suri hiljakseen, että hän oli rumentunut. Entinen
kukkea ihonväri oli kadonnut ja sijaan astunut kalvakkuus. Hän
katseli muotoaan Suomen-Huotarin lahjoittamasta peilistä ja silloin
hän toisinaan raskaasti huokasi….
Se pisti hiukan Matin sydäntä, että Sabinan pojan nimi oli Jonne.
Miksi piti vielä tuon petturin nimi pojalle antaa? Eikö nyt muuta nimeä
oltu keksitty?
Tämä syksy erosi suuresti edellisestä. Silloin oli vielä toivottu, nyt
ei enää.
Karuliina hätääntyi.
*****
Hän oli kerran ennen toivonut samaa. Silloin oli Sabina vielä tyttö.
Oli tullut sitten sellainen aika, jolloin hän oli nauranut aikaisemmille
kuvitteluilleen. Sabinako Matin vaimoksi? Heh! Muurmannin poika oli
ilmestynyt näyttämölle ja lyönyt Matin laudalta kuin kuivan tallukan.
Nyt hän taas taipui aikaisempiin ajatuksiinsa.
— En.
Matti siirtyi pöydän päähän. Hän kulki pikku pojan kehdon päitse.
Siinä nukkui Muurmannin Jonnen poika. Se auttoi asiaa alkuun.
— Mie tässä arvelin, että etköhän sie nyt tarvitseisi sille isää, kun
ei tullut se vasittu…
Mutta ei hätää. Hänellä oli kuivia lautoja. Niistä hän kyllä pian
kehdon kaputtelisi kokoon. Laittaisi oikein ruusatut jalat… sellaiset
kiperänokkaiset. Siinäpä oli Sabinan sitten hyvä lastansa keinutella.
Eikä Matilla ollut sitä vastaan ollut. Sopi lähteäkin. Hän oli
sellainen peräänantavainen mies. Matkalla ei oltu monta sanaa
puhuttu. Hirvijängän laidassa oli istahdettu levähtämään. Sabina oli
syöttänyt lasta.
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
ebookmass.com