Skip Nav Destination
Close Modal
Search Results for
enmity
Update search
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- Title
- Authors
- Author Affiliations
- Full Text
- Abstract
- Keywords
- DOI
- ISBN
- eISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Subjects
Book Series
Date
Availability
1-10 of 10 Search Results for
enmity
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Published: 08 August 2007
DOI: 10.1215/9780822390497-003
EISBN: 978-0-8223-9049-7
Book: Necropolitics
Series: Theory in Forms
Published: 25 October 2019
DOI: 10.1215/9781478007227-003
EISBN: 978-1-4780-0722-7
Published: 23 February 2024
DOI: 10.1215/9781478059035-004
EISBN: 978-1-4780-5903-5
... in the War on Terror. Smart borders were supposed to institute operational control through the management of enmity and other phenomena as data. Priority in data technopolitics meant that the border's emerging sociotechnical arrangement was a provisional one, a perennial prototype undergoing constant...
Published: 23 February 2024
DOI: 10.1215/9781478059035-006
EISBN: 978-1-4780-5903-5
... The geopolitical lines of territorial sovereignty in the United States follow the color line. The study of borders requires an inquiry of race and/as technology, which, since the mid-twentieth century, means data technopolitics and enmity. Data are not a singular element but an outwardly...
...The Politics of Enmity Instead of dismissing the “paranoid style” of politics, this chapter argues for the generative power of conspiracy. It traces the actions of a circle of French and Russian activists whose scheming managed to change the course of international politics and may have also...
Published: 04 March 2004
DOI: 10.1215/9780822385486-005
EISBN: 978-0-8223-8548-6
Published: 23 February 2024
EISBN: 978-1-4780-5903-5
... infrastructures of enmity ...
Published: 09 August 2024
EISBN: 978-1-4780-5979-0
... counterinsurgency populism enmity abolitionism reparation ...
Published: 09 August 2024
DOI: 10.1215/9781478059790-006
EISBN: 978-1-4780-5979-0
... manner of secretly contaminated selves, snakes who poison and wound the national body politic. The book closes with two ways of implementing its lessons in racial ensoulment: first, an abolitionist approach that dismantles the technologies of enmity and policing; and second, a reparative approach...
Published: 23 February 2024
DOI: 10.1215/9781478059035-005
EISBN: 978-1-4780-5903-5
... of relations of enmity, and the organization of the borderlands as a data-filled environment to govern. To transform existing political conditions, these actors identify, study, and test the human-machine configurations that make and enforce the border in the twenty-first century. disassembly data...