nettime on Thu, 24 Jun 1999 16:53:05 +0200 (CEST) |
[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]
pagre@alpha.oac.ucla.edu: [RRE]Imagining Surveillance |
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - <nettime-l-temp@material.net> is the temporary home of the nettime-l list while desk.nl rebuilds its list-serving machine. please continue to send messages to <nettime-l@desk.nl> and your commands to <majordomo@desk.nl>. nettime-l-temp should be active for approximately 2 weeks (11-28 Jun 99). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Date: Tue, 22 Jun 1999 09:15:43 -0400 From: t byfield <tbyfield@panix.com> To: nettime@desk.nl Subject: [pagre@alpha.oac.ucla.edu: [RRE]Imagining Surveillance] ----- Forwarded Date: Tue, 22 Jun 1999 02:30:18 -0700 (PDT) From: Phil Agre <pagre@alpha.oac.ucla.edu> To: "Red Rock Eater News Service" <rre@lists.gseis.ucla.edu> Subject: [RRE]Imagining Surveillance =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= This message was forwarded through the Red Rock Eater News Service (RRE). Send any replies to the original author, listed in the From: field below. You are welcome to send the message along to others but please do not use the "redirect" command. For information on RRE, including instructions for (un)subscribing, see http://dlis.gseis.ucla.edu/people/pagre/rre.html or send a message to requests@lists.gseis.ucla.edu with Subject: info rre =-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-= Imagining Surveillance: Notes on 1984 and Enemy of the State Philip E. Agre Department of Information Studies University of California, Los Angeles Los Angeles, California 90095-1520 USA http://dlis.gseis.ucla.edu/pagre/ pagre@ucla.edu Paper presented at the 21st International Conference on Privacy and Personal Data Protection, Hong Kong, September 1999. This is a draft. Please do not quote from it. Version of 21 June 1999. 5300 words. Comments appreciated. ABSTRACT Privacy policies will only be legitimate if they are consistent with cultural constructions of privacy. These cultural constructions can be approached through the depiction of privacy and privacy invasion in popular films. Two widely-seen films, Michael Radford's film version of 1984 (itself released in 1984) and Tony Scott's Enemy of the State (1998), are compared and contrasted. Although these two films share certain elements in common, Enemy of the State differs from the earlier film in several ways. Some of these can be attributed to differences in political culture between Britain, whose history makes Big Brothers regime intelligible as a perverted form of Catholic and Anglican religious institutions, and the United States, whose history has brought forth a powerful but marginalized tradition of conspiracy theories. Others pertain to differences in technology between Orwell's imagined future and Scott's imagined present, and specifically to the spatialized forms of activity in which the different forms of surveillance technology participate. Yet others pertain to a historical shift, particularly in the United States, of cultural conceptions of power and resistance, from the solidary action of aggrieved communities to the solitary revenge of betrayed warriors. These observations suggest that privacy policy address the connections between privacy and propaganda, and emerging ways in which personal boundaries are negotiated. They also raise concerns about the consequences of privacy issues for cultural constructions of democracy. 1 INTRODUCTION The success of privacy policy depends on its legitimacy. Citizens must perceive policy to be rationally related to privacy problems as they exist in the world. Full-time policy specialists have the expertise and leisure to analyze specific privacy problems in the esoteric language of technology, politics, and economics. But a privacy policy can only be legitimate in the eyes of the broad public if its basic concepts are consistent with constructions of privacy in the popular imagination in the culture. These cultural constructions can be sought in many ways, for example through ethnography, folklore, and linguistics. As a small contribution to this larger project, I propose to investigate a specific question: how state surveillance is depicted in two films: Michael Radford's film version of George Orwell's 1949 novel 1984 (itself released in 1984) and Tony Scott's Enemy of the State (1998). Analyses of films, of course, do not provide direct access to popular understandings. Films, however, do play a significant role in the shaping of culture; they are more likely to succeed if they draw upon and give dramatic form to popular understandings, and they provide input to the formation of culture in turn. Greenblatt (1988) explains the point in terms of the role of drama in the circulation of "social energy"; anecdotes and polls suggest that privacy issues are highly charged in the popular imagination, and mass culture provides a channel through which that energy can move. This may be particularly true in the United States, in which widespread popular concerns about privacy have not led to coherent party platforms, much less successful legislation. These two films, 1984 and Enemy of the State, would seem to make promising objects of study because of their contrasts. Orwell's novel was influential in its day, and remains so. The dystopian society it describes, Oceania, has provided a pattern and metaphor for the interpretation of innumerable issues in public spheres throughout the industrial world, and particularly in English-speaking countries. The focus of Oceanias cult of personality, Big Brother, has become practically synonymous with the invasion of privacy, not least through the INGSOC Party slogan, "Big Brother is Watching You". Enemy of the State, for its part, claims to identify a new development in state surveillance: the "infection" of a vast range of electronic communications and information processing technologies by the surveillance apparatus of the US National Security Agency (NSA), and by extension its counterparts in other countries. The films were made in different enough contexts that any contrasts between them should be interpreted with caution. Nonetheless, the comparison does promise at least heuristic guidance on changing cultural constructions of privacy. These notes on 1984 and Enemy of the State are very much a provisional exercise, and I should take care to delimit my ambitions. I do not propose to evaluate the technical plausibility of either film, or the degree to which the depiction of the NSA in Enemy of the State corresponds to the NSA's actual practices or capabilities. I do not propose to evaluate whether Orwell's predictions have come true (cf. Howe 1983). Nor will I take any care to distinguish between Michael Radford's film and George Orwell's book. In particular, I will assume for the sake of simplicity that Radford has accurately represented Orwell's intentions on film -- not only his political intentions but the visual form that Orwell would have imagined for his story as he wrote it in 1948. I will proceed as follows. Section 2 offers some preliminary observations on the films, including a number of similarities between them. Section 3 contrasts the very different contexts in which the two films place the theme of surveillance, outlines a hypothesis concerning the differences in political culture between Britain and the United States that may explain the contrast. Section 4 concerns the construction of space in each film, and particularly the very different ways in which technology is embedded in patterns of embodied activity. Section 5 describes the different conceptions of power and resistance in the two films. Section 6 concludes by drawing lessons and indicating directions for research on privacy policy. 2 THE FILMS In genre terms, 1984 and Enemy of the State could hardly be more different. Made in London with a British cast, 1984's leading characters -- Winston, his girlfriend Julia, and the Ministry of Love official O'Brien -- stand out only slightly from a drab and emotionally flat environment. Enemy of the State is a violent and manipulative Hollywood action movie organized around a pair of male buddies -- Dean himself and an ex-NSA agent living under the pseudonym of Brill. (Dean is played by comedian Will Smith; only his light demeanor prevents the film from straying into the non-Hollywood realm of "political films" along the lines of Constantin Costa-Gavras despite its anxious sound track and relatively restrained melodrama. Enemy of the State sometimes alludes to an earlier film about surveillance technology, Francis Ford Coppola's The Conversation (1974), and Gene Hackman's role as the eccentric Brill seems to be a lighter version of the character he played in that film, the tormented Harry Caul.) Each film follow an ordinary man as he struggles against the full power of the state. In 1984, Winston Smith is a functionary in Oceania's Ministry of Truth, responsible for editing newspapers to reflect the Party's current version of history. This task places him in the middle rung of a strict social hierarchy; above him are the members of the Inner Party and below him are the proles. He is socially isolated, as is the norm for Outer Party members such as himself, but he is haunted by the loss of his mother during the war that gave rise to the dystopia, and because of this disturbance he is unable to subordinate his mind to the dictates of the Party. In Enemy of the State, Robert Dean is a labor lawyer in Washington whose current case involves a mafia-controlled union's attempt to fix a union election. His wife Carla is an ACLU attorney who rants at government invasions of privacy, but he refuses to take her objections seriously until his life is destroyed by a rogue NSA official after he accidentally comes into possession of evidence linking them to the murder of a Congressman. Both films are organized around a dichotomy between a real life -- defined principally in terms of intimate family relationships but secondarily in terms of material prosperity and a subjective sense of normalcy -- and a life that has subverted by the state. Each man's real life is symbolized by an object -- for Dean, a kitchen blender that is part of his fulfilling daily routine; for Smith, an antique coral paperweight that, he believes, dates to a time before the war. The NSA villains destroy Dean's entire identity by conducting vast research into his vulnerabilities, publicizing fabricated criminal evidence, and leading his wife to believe that he has recommenced an old affair. They also appropriate his blender and prepare drinks with it as they watch his life fall apart. As the chase heats up, he is literally stripped of all his possessions, including his clothes, and reduced to climbing on hotel balconies and running through a sewer in his underwear. Smith begins the film with much of his life already largely destroyed along with everyone else's, and though he tries to build a real life for himself, he only knows about real life through vague memories, rumors, and dreams. Dean succeeds in getting his real life back, and we assume that he will be able to recover his blender from the wreckage of his antagonists' plans. Smith does not succeed; we see the Thought Police break his paperweight against a wall in the rented room where he thought he was hiding from them, whereupon they reduce him to an even more extreme degree of nonpersonhood than Dean's. On the surface, the two films imagine the technologies of surveillance in different ways. Whereas Enemy of the State enthusiastically demonstrates a tremendous range of technologies that it implicitly claims to be both possible and real today, 1984 is plainly yesterday's tomorrow: every technology it depicts would have been readily imaginable to Orwell as he was writing his novel in 1948. Video screens and microphones are central to the architecture of both film's bureaucracies. In Enemy of the State we see the inside of the NSA; visually busy and crammed with people and machines, it is built with glass walls around a cavernous central space that is dominated by a matrix of video monitors whose endless displays of mayhem the film never explains. The NSA's computer screens are likewise busy, with most of the data displayed graphically and dynamically atop several translucent layers of other data. In 1984, on the other hand, video screens are instruments of both surveillance and propaganda, most particularly the large two-way screen that dominates every dwelling. In 1984 we never see the inside of Big Brother's surveillance organization, but we do see the routine drudgery of the Ministry of Truth, whose crude computer monitors resemble television screens and whose data is transferred both by image databases and by paperwork through pneumatic tubes. The paperwork functions symbolically as well: the Party holds historical memory to reside not in digital media but in newsprint, and part of Smith's job is precisely to burn the only copy of any news article that has been superseded by the Party's ever-changing version of truth. Remarkably, both films present the use of information technology as a social activity; both the flexibly organized NSA conspirators and the regimented workers in the Ministry of Truth perform their work through conversations. Both films also invite the audience to share in the state's surveillance by showing the view through the surveillance cameras; 1984 does this just once in demonstrating the two-way screen in Smith's flat, but Enemy of the State does it constantly, for example as a device for switching perspectives between Smith's and that of his pursuers. The contrast between the visible NSA and the opaque Thought Police is crucial for the films' plots: we see the NSA conspirators ceaselessly improvising on the edge of failure, but the Thought Police appear infallible. 3 POLITICAL CULTURE For all these small points of similarity and contrast, the two films differ in one fundamental way. The world of 1984 is imagined totally, and Oceania is depicted as a nearly complete totalitarian society. The film portrays the reconstruction of language, personality, family, sexuality, economics, food, and war. Its views on surveillance are not nearly as developed as its reputation might suggest; individuals are monitored through their two-way video screens and are encouraged to inform on one another. INGSOC rules not principally through surveillance but through thought control. This begins with the internalization of surveillance, to be sure, but INGSOC's practices of surveillance cannot be dissociated from a much more pervasive microphysics of power, one whose center is not surveillance but mind control. Enemy of the State, by contrast, suggests almost nothing about the state's real motives in building its apparatus of surveillance. The NSA conspirators are led by a bureaucrat named Thomas Reynolds whose promotion to deputy director depends on his persuading Congress to pass a vaguely defined bill that eliminates legal constraints on domestic surveillance. When a Republican Congressman from New York stands in his way, Reynolds has him killed. The murder is fortuitously caught on videotape by a biologist, who manages to pass the tape to Dean before he is killed himself. To recover the tape, Reynolds gathers a large team of NSA employees and calls upon a larger network of contacts in the government, either openly or through deception. All of them work under the guise of a "standard training op". And when the NSA director becomes aware that something is going on, he unknowingly precipitates the film's climax by threatening to send whoever is responsible for the problem to prison. Why this difference between the total vision of 1984 and the strictly delimited picture in Enemy of the State? No real evidence suggests that Scott intends to protect the government's reputation, much less that of the NSA's leadership. The official justifications in terms of terrorism and other threats to national security are invariably treated as so much yakking. The rogue-bureaucrat scenario does serve dramatic purposes: it invokes the genre conventions of the murder mystery, it motivates an exceptionally intensive use of technology, and it ultimately creates qualitative symmetry between the NSA conspirators and their prey. But it also prevents the film from falling into a trap. The narrative of the totalitarian state and its actions against the individual have different meanings in American culture than elsewhere, and different meanings particularly than in Britain. Enemy of the State's road-not-taken is available for comparison in Oliver Stone's JFK (1991), which presented as true some of the most extreme explanations of the strange events around the assassination of John F. Kennedy. And the fate of Stone's film is instructive: widely denounced as a conspiracy theory, it and its director were both effectively discredited. Enemy of the State develops the technological imagination while leaving the substantive politics to the imagination of the audience. Orwell's story cannot be taken for a conspiracy theory. Some of the reasons for this are straightforward: it is set in the future, not the present, and it can be interpreted in some detail as a representation of the Soviet Union under Stalin. The bombed-out London of the film will be entirely familiar to the British, either from memory or from narratives of the German attacks. And the communist movement was much stronger in the Britain of both 1948 and 1984 than it was in the United States. But these factors do not account fully for the ways in which 1984 is intelligible. Differences in political culture are surely also at stake. The shadowy machinations of the conspiracy theorist's state is foreign to the European imagination, just as the thoroughgoing intimacy of the individual's relation to the state in 1984 is foreign to the American imagination. Although this contrast should not be oversimplified, one element of it is surely religious. The relationship between the individual and Big Brother in 1984 does resemble in some detail the emotional economy of the Soviet Union under Stalin. But both of them also resemble a perverted version of the Catholic Church with its monastic asceticism and rituals of confession, as well as the historical memory of the Inquisition. It is thus that O'Brien can be understood, through a monstrous distortion, as lovingly helping Smith to overcome his pride and open his heart to Big Brother. Conservatives have contended that communism is the logical consequence of man's attempt to play God, and Stalin's position as both the beloved father figure and arbiter of the Party's totalitarian definition of truth certainly stands as evidence that they are right. This point will be readily evident in a country whose political culture took form in the presence of a Catholic -- or in the case of Britain, an Anglican -- religious establishment. But the narratives will parse differently for those, for example in the United States, whose political culture derives more from Protestant sources. The United States did not simply import Protestant religious doctrines from Europe; it imported the concrete experience of rebellion against centralized religion. The story of 1984, like the Catholic Bible, is allegory as well as representation, but the story of Enemy of the State does not present itself allegorically at all. It is a story for a literal-minded culture, one whose narratives locate evil in the conspiracies of corrupt institutions (Fuller 1995). In 1984 the apocalypse has already come and gone, but Enemy of the State warns that it is soon to come. The focus of 1984 is the destruction of the soul in the guise of its salvation; the focus of Enemy of the State is the revelation of evil in high places. The prevailing sentiment in 1984 is pessimism; in Enemy of the State it is urgency. 4 CONSTRUCTIONS OF SPACE Michael Radford made a point of shooting 1984 in and around London in the spring of 1984, the exact time and place that Orwell had in mind. But their post-apocalyptic London lacks a great deal. Trucks carry enemy troops to public executions and trains carry those with permits to the countryside. Other vaguely military-looking trucks and armored vehicles, pass in the streets in what is evidently a war zone, and unmarked helicopters hover outside of windows, but no cars are ever seen. Few spatial relationships are developed; no character is ever followed for more than ten meters' travel, and the only sightline greater than a hundred meters is a single view of a hill in the countryside; Winston and Julia first escape to this place, and it eventually becomes the setting for Smith's hallucinations in the Ministry of Truth. Space is divided between home and work, between city and country, and between the proletarian zone and the rest. Communications are impoverished as well; no telephones or mailboxes are seen in homes or on streets. If space represents freedom of movement and communication represents freedom of association, then the world of 1984 atomizes its populace by representing neither. In Enemy of the State, by contrast, space is fantastically elaborated. Indeed, the whole film is essentially one long chase, and it is most original in its use of technology to reinvent the weary conventions of the Hollywood chase. To be sure, those existing conventions are all present: early in the film, the biologist who first uncovers the Congressman's murder is chased across rooftops, runs through alleys throwing obstacles in his pursuers' paths, dodges traffic, and so on. But there is more to it: the NSA people have reserved a surveillance satellite, and are receiving real-time video of his progress. Along the way they employ a range of databases to identify the businesses that he enters, and to instruct one another as to his location. He is eventually chased to his death, but not before he slips a book-sized playback unit containing a PCMCIA card carrying digitized video of the murder into Dean's shopping bags. This initial chase seen establishes a vocabulary that will be exercised at length once the NSA conspirators manage to infer that the biologist has slipped the recording (which they always refer to as a "tape", not knowing its exact format) to Dean. Central to this vocabulary is a division of labor: beneath the NSA bureaucrat Reynolds and his lieutenant are two types of employees, whom I shall call geeks and goons. Two of each are drawn most fully as characters, but numerous others make appearances as necessary. Both are familiar Hollywood figures. The geeks, as custom dictates, are neither handsome nor athletic: one is fat and disheveled; the other is markedly thin and wears crooked yellow-tinted glasses. The goons are enormous, blond ex-military guys, one of them slightly more maniacal than the other. The geeks talk on top of one another, as do the goons. Most crucially, the chases unfold through an intricately organized real-time collaboration between the geeks, who sit at computer terminals in NSA buildings or in equipment trucks on the street, and the goons, who do the physical chasing while keeping in continuous contact through discreet microphones and earpieces. When the geeks and goons are in the same room, the dialogue emphasizes the different worlds they come from, but when the chase is under way, everyone interacts perfectly well in the stilted language of military radio. The chase sequences take place on a new terrain: one that is not just physical but informational, and whose physical and informational aspects are tightly intertwined. Every chase includes an element of "where did he go?", but here that element is greatly amplified. Having become concerned that Dean possesses the incriminating "tape", the goons are directed to vandalize his house and install miniaturized GPS tracking devices in his only remaining suit of clothes. The goons then break into his gym locker and replace his pen, cell phone, and pager with matching items that also contain tracking devices. They cannot arrest him because they are not legitimate police, and they cannot kill him because they do not know whether he has passed the information to anyone else, so they destroy his life and start to follow him. By tapping his cell phone, they learn that he plans to contact his former girlfriend, who is also his contact for Brill, at Mount Vernon Square. In a scene that plainly recalls The Conversation, the NSA conspirators deploy numerous spies with microphones, all coordinated by the geeks, to take pictures of them and record their conversations. The film cuts rapidly back and forth among the conversing pair, the geeks in the van, and the listeners on the square, with the conversation continuously audible, either in the clear or through the noise of the listening devices. The listeners' difficulties in maintaining line-of-sight for their microphone introduce the improvised and contingent nature of the surveillance work. It is then that Dean, seeking answers to his situation, makes contact with Brill. Dean fouls up the attempted contact, and Brill must rescue him, taking him at gunpoint into a hotel elevator and onto the roof. On the way, Brill proves to be a master of the new terrain. He knocks Dean to the floor, empties a foil bag of Utz potato chips onto him, removes a several tracking devices from his clothing, and places them in the bag. The geeks, meanwhile, watch their tracers go dead, infer that Dean has gotten help, and sends in a helicopter. Brill now begins to instruct Dean in the practicalities of life in the brave new world. Later, when the NSA conspirators view the satellite videos of the conversation on the roof, they note that Brill never looks up despite the approaching helicopter, and they infer that, whoever he is, he has internalized the technologies of surveillance. This theme become crucial as the action unfolds: only someone who understands the capabilities of the surveillance technologies and thoroughly incorporates them into his embodied practices can navigate intelligently on this new terrain. When the goons track him down to a particular hotel room, Dean finally understands about the tracking devices; this is when he loses his clothes and the chase is joined in earnest. Meanwhile, the geeks and goons must both escape detection themselves; after all, their activities are illicit even by the standards of the highly secret agency they work for. Some of their disguises, such astheir equipment trucks and falsified police identification, are familiar from a generation of such films. But they also frequently use pretexts to obtain information, for example from the security guard in the tunnel complex to which Dean flees from the hotel, thus illustrating both the prevailing looseness of information security practices and the wide array of information sources that the geeks are accustomed to drawing on. Many film characters have obtained information under pretexts, but the NSA geeks manage to track Dean bythis means in real time, and to use the resulting information in real time to direct the geeks toward him. Although the NSA villains successfully maintaining their disguises, their need to remain disguised can be used against them, as when Dean deliberately starts a fire in a locked supply closet in order to call attention to himself and thereby escape his pursuers in an ambulance. On another occasion soon afterward, he calls the police on a pay phone, pretends to be a local resident's son, and asks them to investigate whether the occupants of the villains' equipment van are involved in drugs. The villains naturally overhear this conversation, but this causes them to move along. The terrain upon which the villains chase Dean, then, is "new", but in a complicated way. The point is decidedly not that the surveillance apparatus is "everywhere". The apparatus has costs and limits, consequences and practicalities. Proximity is measured not just in geographic terms, but in terms of the capabilities of the technology and in terms of inference: what can be deduced from what by either party, given the full range of information sources available. In retrospect, of course, this has always been true: what technology has changed are the costs of acquiring information and making inferences. And as those costs change, so does a vast ecology of spatialized and embodied practice. 5 RESISTANCE Enemy of the State thus represents, at least one respect, an advance over the analysis of surveillance in 1984; it succeeds in making the practices visible and fracturing the sense of seamless totality in the earlier dystopian narratives. And, as de Certeau (1984) among many others have noted, these interstices are potential sites of resistance. In 1984, "the resistance" is an organized movement, probably mythical, having been wiped out by the omnipotence of the state; audiences in 1949 will have heard references to partisan resistance movements in World War II. Having been pointed informed of his cluelessness in these matters by Brill, Dean begins to figure them out for himself. When he discovers his former girlfriend dead, he once again tracks down Brill, who reluctantly agrees to take him along and decode the still-mysterious PCMCIA card. Arriving at Brill's laboratory in an industrial wasteland in south Baltimore, Dean and the audience learn who Brill really is: a former NSA employee who, working alone, applies the NSA's surveillance technology to his own ends. They view the murder video. And tapping into the NSA's database, learn that Reynolds is responsible for it. As the geeks track them down and the goons catch up with them, Brill is forced to blow up his building and the chase begins again. Brill is a logical development in a sequence that begins with John Rambo in Ted Kotcheff's First Blood (1982) and (especially) George P. Cosmatos's Rambo: First Blood, Part II (1985). James Gibson (1994, no relation to William) argues that Rambo represents a new archetype in American culture in the wake of the country's defeat in Vietnam: the wounded hero who feels betrayed by decadent institutions. At the same time, and closely related, there emerges the guerrilla computer hacker Case in William Gibson's novel Neuromancer (1984). Before these characters emerged, American culture tended to identify information technology with bureaucratic rationality, and technology workers with rational institutions for which they worked. Over the space of a few years, however, that association between technology and rationality collapsed. One contributor to the shift was the thoroughgoing failure of techno-war in Vietnam (Gibson 1986); another was the subsequent role of the virtual reality craze in shaping cultural constructions of the Internet (cf Agre 1997). Brill is located outside the institutions of power, but he appropriates the institutions' technologies for his own purposes. The tone of the film abruptly changes as Brill and Dean, having once again lost their pursuers, decide to go to war against them. Recovering the captured tracking devices from the Utz bag, they visit an electronics store and then fulfill a widespread fantasy (e.g., Brin 1998) by turning the technologies of watching against the watchers, in this case a prominent Congressional supporter of the NSA. They blackmail the Congressman, and by allowing one of their devices to be discovered they compel Reynolds to meet with them. This plan fails, but they are saved in the end by a deus ex machina involving comic-stereotype mafiosi that has been prepared at the beginning of the film. Dean's purpose in all of this, of course, is simply to get his life back. Brill, however, is more complex. Having been cast off by the NSA after its operations in Iran collapsed with the Islamic fundamentalist revolution in 1979, he surprises Dean by presenting Reynolds (whose own tenuous relation to the NSA is not clear to him) with a list of demands for back pay and a cleaned employee record. His whole life revolves around his love for the agency, and he has gone underground to prevent his past from affecting his family. The symmetry with 1984 is striking: whereas the Party members of Oceania are brainwashed and tortured into acquiring a love for Big Brother, Brill already loves the NSA; furthermore, both Brill and Reynolds are motivated principally be their attempts to compel the NSA to approve of them in turn. In the end, nobody is at war with either Big Brother or the NSA. Winston and Julia are broken by the Ministry of Love, issue their falsified confessions, affirm their love for Big Brother, and gratefully wait to be shot to death. Brill, shorn of his laboratory and no further ahead in his attempt to gain restitution from the NSA, invades Dean's television set with a video greeting card from a tropical island. And Dean resumes his real life. Whereas Winston Smith's partner in sexcrime and thoughtcrime was the cynical system-worker Julia, Dean was exposed to his wife's ACLU work and what first appears to be an apprenticeship in guerrilla warfare with Brill. Yet the film does not portray Dean as having become a guerrilla warrior in his own right. Nor has Brill been noticeably changed by the experience beyond his joy at Reynolds' fall. His blackmail against the Congressman has momentarily stalled the surveillance bill, however, and Larry King of CNN is given the last word, blandly asserting the need to balance national security against individual liberty and insisting on the sanctity of the home. The seemingly political film comes full-circle to an apolitical resolution. The display of technology without an embracing story about institutions and their motives leads to nothing but a generalized concern. 6 CONCLUSION Whatever their relationship to the opinions of any real person, these films are surely right in one central proposition: that surveillance and privacy are part of a bigger picture. They are embedded in the construction of identity, political culture, the practices of everyday life, and in forms of power and resistance. It is dangerous both intellectually and politically to abstract them from the totality of concrete experience. Yet, perhaps inevitably, this has been the dominant approach in the legal and philosophical literature. It is surely valuable to make theories of privacy (e.g., Schoeman 1984), but after a certain point these theories can become misleading unless they incorporate a substantive analysis of historically specific formations of institutionally organized embodied activity. For example, how are the practices of surveillance integrated with the equally highly-developed practices of propaganda, and of the making and destroying of reputations? At the same time, these films also inadvertently identify a tremendous gap in prevailing understandings of privacy: any worked-out conception of the strategies and motives of the surveillance state. The matter is relatively clear in the case of an openly authoritarian society, but neither popular nor scholarly imagination provides any particular guidance about the nature of the abuses that can be expected from the NSA's Echelon communications monitoring network (Campbell 1988). Finally, full stock should be taken of the cultural change that has brought us figures such as Brill. Contemporary American culture finds a character like Brill appealing, but his autonomy and freedom are bought at the price of a social isolation no less profound than that of Winston Smith. Brill offers no useful advice to citizens in a democracy, and the post-Vietnam culture that invests its hopes in him would seem to have lost hope in democratic institutions. This may well be the natural result of a national security state that operates largely outside of democratic procedures itself. But it clearly draws on deeper roots as well. To the extent that information technology is culturally bound to this abandonment of democracy, the new ways of life that it promises will be hard for free people to embrace. REFERENCES Phil Agre, The next Internet hero, Technology Review 100(8), 1997, page 61. David Brin, The Transparent Society: Will Technology Force Us to Choose between Privacy and Freedom?, Reading, MA: Addison-Wesley, 1998. Duncan Campbell, Somebody's listening, New Statesman, 12 August 1988, cover and pages 10-12. Michel de Certeau, The Practice of Everyday Life, translated by Steven Rendall, Berkeley: University of California Press, 1984. Robert C. Fuller, Naming the Antichrist: The History of an American Obsession, Oxford University Press, 1995. James William Gibson, The Perfect War: Technowar in Vietnam, Boston: Atlantic Monthly Press, 1986. James William Gibson, Warrior Dreams: Paramilitary Culture in Post-Vietnam America, New York: Hill and Wang, 1994. Stephen Greenblatt, Shakespearean Negotiations: The Circulation of Social Energy in Renaissance England, Berkeley: University of California Press, 1988. Irving Howe, ed, 1984 Revisited: Totalitarianism in Our Century, New York: Harper and Row, 1983. Ferdinand David Schoeman, ed, Philosophical Dimensions of Privacy: An Anthology, Cambridge: Cambridge University Press, 1984. end ----- Backwarded