Book Content

            The overarching theme of Technocreep: The Surrender of Privacy and the Capitalization of Intimacy is how the current digital revolution has led to an invasion of privacy in our everyday lives. The difference in Keenan’s writing is that he places much more emphasis on the term “creep”. Creep is defined as moving slowly and carefully, especially in order to avoid being heard or noticed. Often people highlight how society has voluntarily surrendered its privacy to social media websites and the larger Internet for its own benefits and to remain connected with friends. The overarching theme therefore is that much of our privacy is being breached without the user even being aware. There are many aspects of this that we are completely unaware of.
            
           The novel clearly illustrates that technocreep is all around us without our even knowing. The book begins with an introduction to the ways that technology has crept into our lives. No matter what type of technology you are using, it is most likely equipped with
some sort of feature to analyze or track you. Keenan compares the music festival Woodstock as it was in the past to what it would be like in the present. The scene he depicts is painted with a plethora of technologies to document the event, yet taking away from the experience. The first five chapters are characterized by the surveillance technologies we already know. Each type of creep he mentions is followed by a collection of anecdotes such as “Image Creep” that talks about the invention of Google glass, which allows people to “secretly take a picture, or record a video, and immediately upload it to the Internet, just by the wink of an eye or the raising of an eyebrow” (Keenan, 2014). For those unfamiliar with Google glass it is a new kind of smart eyewear, which allows users to process information faster than ever before. Although the invention appears trendy and useless it has become clear that it can lead to some creepy actions without most people knowing it. As opposed to cameras, eyewear is disguised as something seemingly harmless making it that much easier to be used for creeping purposes. Similarly, in the chapter “Sensor Creep”, Keenan mentions how “nervous moms and dads can, openly or secretly, install GPS tracking software on their children’s phones” (Keenan, 2014). Again the reader is given an example of an everyday device that can subtly track us. People have become glued to their cell phones because of its ability to keep us connected. On the other hand they also play a large role in surrendering our information. This part of the book outlines how “surveillance systems record, monitor, or trace so many of our daily activities and behaviors that, it seems, nothing we do is exempt from” (Lyon, 2007). It has become evident to most of society that we are constantly being watched in public and Keenan’s anecdotes clearly illustrate that it is prevalent even places we would not expect.
            
A major emphasis on the term creep is the fact that the invasion of privacy happens without our awareness. The middle section of the book highlights many of the subconscious ways companies prey on consumers. The chapter “Sensation Creep” describes ways that consumers are manipulated by appealing to their five senses. One of our strongest senses related to emotions and memories is our sense of smell. Many of the feelings evoked by smell are subconscious. Companies have realized this and now cater scents to trigger reactions from consumers with the hope they will buy a product. Most the time “we are often unaware how we are being manipulated by scents until we catch ourselves moving over to the more expensive products and walking like a zombie into a restaurant we had planned to pass by” (Keenan, 2014). In many instances food scents are pumped into specific areas to promote food sales and sports arenas. Even the beloved Disney World uses the technique to both enhance the theme park experience evoke food cravings while you are walking down the Main Street. Smell is not the only sense that companies attempt to cater to. Among the others Keenan presents the example of audio. Restaurants are recognized for “ the use of instantly recognizable ”sound logos” such as their five-note “I’m Lovin’ It” jingle” (Keenan, 2014). This section of the book is most intriguing because one may not be aware of these types of marketing. Technology has become so advanced that people can be tricked subliminally into buying products. This strengthens the creep argument because of how sneaky it is. People are now realizing how entitled technology feels and those who developed it to manipulate us. With the advancement of technology, the idea of automation has become prominent because people crave the convenience. Little do they realize that automation assists technology in becoming sneakier. Algorithms and technology have become “functionally automatic, to act when triggered without any regular human intervention or oversight” (Gillespie, 2014). Although this is less work for us, we have granted technology permission to act on its own and have therefore surrendered control and privacy.

          
         The last section of the book primarily discusses ways to counteract the invasion of technocreeps. It is becoming clear that due to the surge in technology and surveillance “you can find out where I live, how many houses I have, what they are worth, and so on, with very little investment of time, and without breaching any “private” databases” (Spence, 2011). Keenan exhibits his security expertise by crafting a chapter titled “Anti-creep” which outlines ways to enhance
security and protect one’s devices. The ways range from “know thine enemy” to “create another you…or many!” (Keenan, 2014). Knowing your enemy talks about concrete ways to simply strengthen your security such as installing security software on your computer and creating strong passwords to deter possible identity theft. The other categories are much more abstract. They consist of methods such as creating another identity on the Internet to throw off hackers. This may consist of creating multiple email accounts, one for personal use and one for spam. These techniques may be more work but they also increase security.

No comments:

Post a Comment