1-20 of 30 Search Results for

Security/surveillance

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Book Chapter

By Ann Laura Stoler
Series: a John Hope Franklin Center Book
Published: 14 October 2016
EISBN: 978-0-8223-7361-2
... Sexuality and empire Torture Biopolitics Empire Security/surveillance Intimacy ...
Book Chapter

By Rachel Hall
Published: 04 September 2015
EISBN: 978-0-8223-7529-6
... airport security lateral surveillance advertising consumerism Transportation Security Administration ...
Series: a John Hope Franklin Center Book
Published: 14 October 2016
DOI: 10.1215/9780822373612-009
EISBN: 978-0-8223-7361-2
... to which designated populations have been, and continue to be, exposed. Sexuality and empire Torture Biopolitics Empire Security/surveillance Intimacy ...
Series: a John Hope Franklin Center Book
Published: 14 October 2016
EISBN: 978-0-8223-7361-2
... Security/surveillance Intimacy This chapter takes up Derek Walcott’s challenging definition of colonialism as the rot that remains when the men are gone to reckon with what endures in tangible and intangible forms. The focus is less on recognized ruins than on processes of ongoing ruination. It asks...
Published: 04 September 2015
DOI: 10.1215/9780822375296-002
EISBN: 978-0-8223-7529-6
... and confiscation of consumer items, the development of “airport-friendly” products, and the use of the airport security checkpoint as a trope of discipline and deprivation in advertising. airport security lateral surveillance advertising consumerism Transportation Security Administration ...
Published: 15 May 2015
DOI: 10.1215/9780822375463-012
EISBN: 978-0-8223-7546-3
... of the methodological as well as conceptual limits of surveillance studies, we briefly compare surveillance studies to policing studies, security studies, and intelligence studies. After raising these questions about the direction of surveillance studies and the “research methods gap” therein, we turn to a discussion...
Published: 15 May 2015
EISBN: 978-0-8223-7546-3
... of surveillance studies, we briefly compare surveillance studies to policing studies, security studies, and intelligence studies. After raising these questions about the direction of surveillance studies and the “research methods gap” therein, we turn to a discussion of the feminist work of Dorothy Smith and her...
Published: 04 September 2015
DOI: 10.1215/9780822375296-001
EISBN: 978-0-8223-7529-6
..., consent and coercion are knotted together in complex ways that are difficult to disentangle. The different types of transparency at work across security cultures of terrorism prevention are defined, including voluntary, forcible, and involuntary. Recent work in surveillance studies is critiqued...
Book Chapter

By Joshua Barker
Published: 02 August 2024
DOI: 10.1215/9781478059752-006
EISBN: 978-1-4780-5975-2
... part of a single process whose object was the deterritorialization of local security practices in a manner that was conducive to central state control. While Siskamling involved subjecting gangs, security guards, and “criminals” to surveillance, Petrus sought to symbolically appropriate for the state...
Book Chapter

By Joshua Barker
Published: 02 August 2024
EISBN: 978-1-4780-5975-2
... prongs were part of a single process whose object was the deterritorialization of local security practices in a manner that was conducive to central state control. While Siskamling involved subjecting gangs, security guards, and “criminals” to surveillance, Petrus sought to symbolically appropriate...
Series: a John Hope Franklin Center Book
Published: 14 October 2016
DOI: 10.1215/9780822373612-006
EISBN: 978-0-8223-7361-2
... displaces a crucial imperial genealogy and history of the present that forms the basis of contemporary imperial counterinsurgency, surveillance, security, and “preparedness” strategies. Here the concept work is around the sentiments and sensibilities that notions of security produce, on the subjects...
Published: 15 May 2015
DOI: 10.1215/9780822375463-008
EISBN: 978-0-8223-7546-3
... U.S. media outlets created a supportive domestic context of reception for surveillance technologies adopted in the post-9/11 era by portraying the United States’ enemies in the war on terror as the “opaque” bodies of reference from which “transparent” passenger-suspects are encouraged...
Published: 15 May 2015
EISBN: 978-0-8223-7546-3
...Biometric Technologies as Surveillance Assemblages U.S. media outlets created a supportive domestic context of reception for surveillance technologies adopted in the post-9/11 era by portraying the United States’ enemies in the war on terror as the “opaque” bodies of reference from which...
Published: 07 September 2015
DOI: 10.1215/9780822375302-005
EISBN: 978-0-8223-7530-2
... Chapter 4 examines the discretionary power wielded by Transportation Security Administration (TSA) agents and airline workers through cases mainly of black women who were subjected to invasive pat downs, hair searches, and other security measures at U.S. airports. By questioning how black women...
Published: 04 September 2015
DOI: 10.1215/9780822375296-004
EISBN: 978-0-8223-7529-6
... Screening by full-body and biometric scanners provides US citizens and others traveling within the United States and select other nations the opportunity to distinguish themselves from would-be terrorists. Surveillance technologies render passengers’ three-dimensional bodies as flat visual...
Published: 02 August 2024
DOI: 10.1215/9781478059752-007
EISBN: 978-1-4780-5975-2
... of “brothers” who shared an institutional history and collaborated in an illicit economy. Fraternities shaped how surveillance, law enforcement, and efforts to maintain territorial security were carried out at the front line of police work, bridging the gap between central state power and informal territorial...
Series: a John Hope Franklin Center Book
Published: 14 October 2016
EISBN: 978-0-8223-7361-2
... imperial genealogy and history of the present that forms the basis of contemporary imperial counterinsurgency, surveillance, security, and “preparedness” strategies. Here the concept work is around the sentiments and sensibilities that notions of security produce, on the subjects they endeavor to create...
Book Chapter

By Rachel Hall
Published: 04 September 2015
EISBN: 978-0-8223-7529-6
... trusted traveler prescreening surveillance technology performance biometrics transparency ...
Book Chapter

By Simone Browne
Published: 07 September 2015
EISBN: 978-0-8223-7530-2
... black women Pamela Z South Park TSA (Transportation Security Administration) ...
Published: 15 May 2015
EISBN: 978-0-8223-7546-3
... transparency terrorism prevention Umar Farouk Abdulmutallab Transportation Security Administration full-body scanners ...