The
overarching theme of Technocreep: The
Surrender of Privacy and the Capitalization of Intimacy is how the current
digital revolution has led to an invasion of privacy in our everyday lives. The
difference in Keenan’s writing is that he places much more emphasis on the term
“creep”. Creep is defined as moving slowly and carefully, especially in order
to avoid being heard or noticed. Often people highlight how society has
voluntarily surrendered its privacy to social media websites and the larger
Internet for its own benefits and to remain connected with friends. The
overarching theme therefore is that much of our privacy is being breached
without the user even being aware. There are many aspects of this that we are
completely unaware of.
The novel
clearly illustrates that technocreep is all around us without our even knowing.
The book begins with an introduction to the ways that technology has crept into
our lives. No matter what type of technology you are using, it is most likely
equipped with

some sort of feature to analyze or track you. Keenan compares the
music festival Woodstock as it was in the past to what it would be like in the
present. The scene he depicts is painted with a plethora of technologies to
document the event, yet taking away from the experience. The first five
chapters are characterized by the surveillance technologies we already know.
Each type of creep he mentions is followed by a collection of anecdotes such as
“Image Creep” that talks about the invention of Google glass, which allows
people to “secretly take a picture, or record a video, and immediately upload
it to the Internet, just by the wink of an eye or the raising of an eyebrow”
(Keenan, 2014). For those unfamiliar with Google glass it is a new kind of
smart eyewear, which allows users to process information faster than ever
before. Although the invention appears trendy and useless it has become clear
that it can lead to some creepy actions without most people knowing it. As
opposed to cameras, eyewear is disguised as something seemingly harmless making
it that much easier to be used for creeping purposes. Similarly, in the chapter
“Sensor Creep”, Keenan mentions how “nervous moms and dads can, openly or
secretly, install GPS tracking software on their children’s phones” (Keenan,
2014). Again the reader is given an example of an everyday device that can
subtly track us. People have become glued to their cell phones because of its
ability to keep us connected. On the other hand they also play a large role in
surrendering our information. This part of the book outlines how “surveillance
systems record, monitor, or trace so many of our daily activities and behaviors
that, it seems, nothing we do is exempt from” (Lyon, 2007). It has become
evident to most of society that we are constantly being watched in public and
Keenan’s anecdotes clearly illustrate that it is prevalent even places we would
not expect.

A major
emphasis on the term creep is the fact that the invasion of privacy happens
without our awareness. The middle section of the book highlights many of the
subconscious ways companies prey on consumers. The chapter “Sensation Creep”
describes ways that consumers are manipulated by appealing to their five
senses. One of our strongest senses related to emotions and memories is our
sense of smell. Many of the feelings evoked by smell are subconscious.
Companies have realized this and now cater scents to trigger reactions from
consumers with the hope they will buy a product. Most the time “we are often
unaware how we are being manipulated by scents until we catch ourselves moving
over to the more expensive products and walking like a zombie into a restaurant
we had planned to pass by” (Keenan, 2014). In many instances food scents are
pumped into specific areas to
promote food sales and sports arenas. Even the
beloved Disney World uses the technique to both enhance the theme park
experience evoke food cravings while you are walking down the Main Street.
Smell is not the only sense that companies attempt to cater to. Among the
others Keenan presents the example of audio. Restaurants are recognized for “
the use of instantly recognizable ”sound logos” such as their five-note “I’m
Lovin’ It” jingle” (Keenan, 2014). This section of the book is most intriguing
because one may not be aware of these types of marketing. Technology has become
so advanced that people can be tricked subliminally into buying products. This
strengthens the creep argument because of how sneaky it is. People are now
realizing how entitled technology feels and those who developed it to
manipulate us. With the advancement of technology, the idea of automation has
become prominent because people crave the convenience. Little do they realize
that automation assists technology in becoming sneakier. Algorithms and
technology have become “functionally automatic, to act when triggered without
any regular human intervention or oversight” (Gillespie, 2014). Although this
is less work for us, we have granted technology permission to act on its own
and have therefore surrendered control and privacy.
The last
section of the book primarily discusses ways to counteract the invasion of
technocreeps. It is becoming clear that due to the surge in technology and
surveillance “you can find out where I live, how many houses I have, what they
are worth, and so on, with very little investment of time, and without
breaching any “private” databases” (Spence, 2011). Keenan exhibits his security
expertise by crafting a chapter titled “Anti-creep” which outlines ways to
enhance
security and protect one’s devices. The ways range from “know thine
enemy” to “create another you…or many!” (Keenan, 2014). Knowing your enemy
talks about concrete ways to simply strengthen your security such as installing
security software on your computer and creating strong passwords to deter
possible identity theft. The other categories are much more abstract. They consist
of methods such as creating another identity on the Internet to throw off
hackers. This may consist of creating multiple email accounts, one for personal
use and one for spam. These techniques may be more work but they also increase
security.
No comments:
Post a Comment