1-20 of 743 Search Results for

surveillance technology

Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Published: 07 September 2015
DOI: 10.1215/9780822375302-004
EISBN: 978-0-8223-7530-2
... Beginning with a discussion of an 1863 carte de visite of Wilson Chinn, a branded slave, chapter 3 examines early applications of biometric surveillance and draws a link between contemporary biometric information technology and transatlantic slavery. The diary of English planter Thomas...
Published: 15 May 2015
EISBN: 978-0-8223-7546-3
... U.S. media outlets created a supportive domestic context of reception for surveillance technologies adopted in the post-9/11 era by portraying the United States’ enemies in the war on terror as the “opaque” bodies of reference from which “transparent” passenger-suspects are encouraged to...
Published: 01 January 2017
DOI: 10.1215/9780822373827-002
EISBN: 978-0-8223-7382-7
... that produce “close” knowledge of animals from a technologically mediated distance. To understand how, this chapter examines the deployment of surveillance technologies during the attempt to establish a National Animal Identification System in the United States. Rather than trying to get reacquainted...
Published: 15 May 2015
DOI: 10.1215/9780822375463-005
EISBN: 978-0-8223-7546-3
... In this chapter, the author examines the ways that surveillance technologies work to discipline different bodies paying particular attention to race and gender. The author focuses on the Shafia murders in Canada as iconized in the mainstream media as honor killings and argues that the...
Published: 15 May 2015
EISBN: 978-0-8223-7546-3
... In this chapter, the author examines the ways that surveillance technologies work to discipline different bodies paying particular attention to race and gender. The author focuses on the Shafia murders in Canada as iconized in the mainstream media as honor killings and argues that the...
Published: 15 May 2015
DOI: 10.1215/9780822375463-001
EISBN: 978-0-8223-7546-3
... contemporary developments in new technologies and the intensification of surveillance since the 1980s, tracing the history of surveillance back to organized forms of state control such as settler colonialism, the management of women's reproductive autonomy, the regulation of sexuality and the institutionalized...
Published: 28 February 2020
DOI: 10.1215/9781478007272-006
EISBN: 978-1-4780-0727-2
... terms, as we ve seen in so many other economic arenas, sage used technology to automate work that had previously been accomplished by humans. The sage system is also a paradigmatic case for understanding the auto- mation of surveillance through what has been described as screening tech- nologies.4 The...
Book Chapter

By Jie Li
Published: 13 November 2020
DOI: 10.1215/9781478012764-003
EISBN: 978-1-4780-1276-4
... remained closed to the public, the dubious and fragmentary evidence added to the controversy, raising broader questions about dossiers as a technology of surveillance and as a mediator of historical memory. Memorial museums throughout the world are devoted to the commemo- ration of mass sufering, and repre...
Published: 07 June 2019
DOI: 10.1215/9781478004493-008
EISBN: 978-1-4780-0449-3
Published: 07 June 2019
DOI: 10.1215/9781478004493-009
EISBN: 978-1-4780-0449-3
Published: 07 June 2019
DOI: 10.1215/9781478004493-012
EISBN: 978-1-4780-0449-3
Published: 06 December 2019
DOI: 10.1215/9781478007135-070
EISBN: 978-1-4780-0713-5
... therefore impor tant to consider how drone personnel s experiences with media technologies outside their work could inform their experiences at work. drone personnel suffering with psychological illness have likely en- gaged in alternative readings of drone surveillance s scopic regime readings that...
Published: 15 November 2019
DOI: 10.1215/9781478005605-019
EISBN: 978-1-4780-0560-5
... liberal discourses of national citi- zenship, multiculturalism, and social mobility, rather than through explicit modes of racial vio lence, such as systems of colonial surveillance and war- time incarceration.22 Though I situate the home movie as a racialized technology, I do not sub- scribe to an...
Published: 01 January 2019
DOI: 10.1215/9781478003410-010
EISBN: 978-1-4780-0341-0
...chapter seven Between Technology & Toy: The Talking Doll as Abject Artifact meredith a. bak Since talking dolls were commercially introduced in the nineteenth century, children have anticipated them with high hopes as animate companions promising endless fantasy play. In practice, however, talking...
Published: 22 January 2021
DOI: 10.1215/9781478012702-003
EISBN: 978-1-4780-1270-2
...1The Computational Unconscious Technology as a Racial Formation God made the sun so that animals could learn arithmetic without the succession of days and nights, one supposes, we should not have thought of numbers. The sight of day and night, months and years, has created knowledge of number, and...
Published: 04 September 2015
DOI: 10.1215/9780822375296-004
EISBN: 978-0-8223-7529-6
... Screening by full-body and biometric scanners provides US citizens and others traveling within the United States and select other nations the opportunity to distinguish themselves from would-be terrorists. Surveillance technologies render passengers’ three-dimensional bodies as flat visual...
Book Chapter

By Kath Weston
Published: 01 January 2017
EISBN: 978-0-8223-7382-7
... that produce “close” knowledge of animals from a technologically mediated distance. To understand how, this chapter examines the deployment of surveillance technologies during the attempt to establish a National Animal Identification System in the United States. Rather than trying to get reacquainted...
Published: 15 May 2015
DOI: 10.1215/9780822375463-009
EISBN: 978-0-8223-7546-3
... surrogates themselves—usually
headless or veiled images of (brown skinned, sari clad) surrogates' midsections. This chapter will draw from scholarship on ultrasonographic pregnancy surveillance and post-9/11 national surveillance practices to suggest that Western IPs are creating a cross-border cyber-nation...
Published: 06 November 2019
DOI: 10.1215/9781478002338-001
EISBN: 978-1-4780-0233-8
...i n t r o d u c t i o n Racial Trans Technologies They used to do that to us all the time, just come at the bar and the lights would go on and everybody would just stream out, . . . you knew that s what the routine was and it was just a night that it simply wasn t gonna happen. You know, . . . it s...
Published: 07 September 2015
DOI: 10.1215/9780822375234-004
EISBN: 978-0-8223-7523-4
... Las Vegas epitomizes the normalization of surveillance and the privatization of public space. The same data mining and biometric technologies used to monitor gamblers, maximize consumption, and control labor in casinos are integrated into other aspects of daily life, such as online shopping...