1-20 of 83 Search Results for


Sort by
Journal Article
boundary 2 (2018) 45 (4): 41–63.
Published: 01 November 2018
...Ryan Bishop Polyscaler autonomous remote sensing systems are presently constituting new regimes of teleactivity for real-time surveillance and data gathering. This essay continues several ongoing projects that examine the philosophical, technological, and political ramifications of these systems...
Journal Article
boundary 2 (2024) 51 (2): 19–38.
Published: 01 May 2024
... of state‐sponsored surveillance. It extends Shaw's argument, which focuses on poetry audio in the 1960s, into the current moment to highlight how the work of digital humanists working with sound is liable to misappropriation. Machine listening, a practice used to parse thousands of hours of audio...
Journal Article
boundary 2 (2008) 35 (1): 177–195.
Published: 01 February 2008
... emergency legislation that would grant the FBI, CIA, and the newly formed Department of Homeland Security surveillance and investigative powers that had for- merly been adjudged illegal infringements on civil liberties. Behdad interprets these responses as illustrative of the pathology...
Journal Article
boundary 2 (2001) 28 (1): 91–105.
Published: 01 February 2001
... ultimately part of a discarded project. Delivered between January and March 1975, Les Anormaux is clearly a course from a crucially important time in Foucault’s career. Surveiller et punir [Discipline and Punish], the culmination of several years’ courses at the Collège, appeared about half way...
Journal Article
boundary 2 (2007) 34 (2): 105–133.
Published: 01 May 2007
... and surveillance of subject populations in the face of British administrators who “could not tell one Indian from another” (SI, 64). Inscribed in the incipient moment of the development of fingerprint biometrics is a racialized agenda driving the system’s mode of identification. I want to interlace...
Journal Article
boundary 2 (2020) 47 (1): 115–143.
Published: 01 February 2020
... (Vatu- lescu 2010: 2). Its hidden processes were designed as a fiction, as a the- ater, in this case, to be read as perpetuating power. Moreover, she notes a significant difference in the scope and purpose of surveillance and control, from the forced confessions of earlier periods...
Journal Article
boundary 2 (2008) 35 (1): 197–215.
Published: 01 February 2008
... between the literary and visual to imperial bureaucracies of surveillance. More specifically, it joins to that meditation a genealogical rhetoric that orients the novel to early twentieth-century American intellectual life, and in particular to an emergent Pragmatism...
Journal Article
boundary 2 (2007) 34 (1): 1–15.
Published: 01 February 2007
... that it has moved to constrain civil liberties to enable greater surveillance of the population as a further enhancement of the gratuitous destruction of Iraq. Katha Pollitt, in the Nation, reminds us that the term Islamic fascism goes back to 1990, when it was used to describe certain Muslim...
Journal Article
boundary 2 (2010) 37 (2): 217–225.
Published: 01 May 2010
... assault, surveillance, and land abuse at Chan- nel View Estates, criminality hidden in the light and real estate of the cop happy Southern California sun: South Central goes on being phased out as an ethnic enclave, as ruled over by a stoned Jewish developer named Mickey Wolfmann, who hangs out...
Journal Article
boundary 2 (2005) 32 (1): 117–128.
Published: 01 February 2005
... in nonmilitary cases. The enforcement of obedience in modern medical, penal, and educational organizations relies on constant supervision and surveil- lance, and, to this end, an analytical use of space, in which group concentra- tions are avoided and individuals are assigned their proper places, becomes...
Journal Article
boundary 2 (2016) 43 (1): 249–250.
Published: 01 February 2016
... of Minnesota Press, 2015. Dreyfus, Hubert, and Charles Taylor. Retrieving Realism. Cambridge, MA: Harvard University Press, 2015. Dubrofsky, Rachel E., and Shoshana Amielle Magnet, eds. Feminist Surveillance Studies. Durham, NC: Duke University Press, 2015. Engels, Jeremy. The Politics of Resentment...
Journal Article
boundary 2 (2019) 46 (1): 73–101.
Published: 01 February 2019
... College Teachers Do . Cambridge, MA : Harvard University Press . Beer David . 2016 . Metric Power . London : Palgrave MacMillan . Bogard William . 1996 . The Simulation of Surveillance: Hypercontrol in Telematic Societies . New York : Cambridge University Press...
Journal Article
boundary 2 (2016) 43 (2): 205–206.
Published: 01 May 2016
...: Slavery’s Visual Resonance in the Contemporary. Durham, NC: Duke University Press, 2015. Brown, Simone. Dark Matters: On the Surveillance of Blackness. Durham, NC: Duke University Press, 2015. Cavarero, Adriana, and Angelo Scola. Thou Shalt Not Kill: A Political and Theologi- cal Dialogue. Translated...
Journal Article
boundary 2 (2015) 42 (4): 221–222.
Published: 01 November 2015
... Human as Praxis. Edited by Katherine McKittrick. Durham, NC: Duke University Press, 2015. Zimmer, Catherine. Surveillance Cinema. New York: New York University Press, 2015. ...
Journal Article
boundary 2 (2018) 45 (1): 201–229.
Published: 01 February 2018
.... Instead of the golden sky at the end of the storm invoked in the song, we are given atomized existence in “the dawn’s zit of orange” (Gillis 2007: 14). Mass surveillance has displaced political vision in Rita Duffy’s 2006 painting Watchtower 2, which appeared in the post-­Agreement north...
Journal Article
boundary 2 (2022) 49 (2): 295–313.
Published: 01 May 2022
... by Mininger J. D. and Peck Jason Michael , 163 – 73 . London : Bloomsbury . Strittmatter Kai . 2020 . We Have Been Harmonized: Life in China's Surveillance State . New York : HarperCollins . Wark Mackenzie . 2004 . A Hacker Manifesto . Cambridge, MA : Harvard University...
Journal Article
boundary 2 (2019) 46 (1): 133–156.
Published: 01 February 2019
.../ . Angwin Julia . 2014 . Dragnet Nation: A Quest for Privacy, Security, and Freedom in a World of Relentless Surveillance . New York : St. Martins . Borsook Paulina . 2000 . Cyberselfish: A Critical Romp through the Terribly Libertarian Culture of High Tech . New York : PublicAffairs...
Journal Article
boundary 2 (2003) 30 (1): 105–130.
Published: 01 February 2003
... might find this claim somewhat surprising, given Benjamin’s frequent claim that the detective is the heir of the flaneur, taking over the persona of the former’s street-wandering idleness as a cover for his sharp-eyed surveillance...
Journal Article
boundary 2 (2015) 42 (2): 25–56.
Published: 01 May 2015
... for the surveillance and the self-­ scrutinizing of Brick Pollitt for signs of the socially contaminative figure of the homosexual menace—that it has been described as the prototypical site for the construction of Cold War masculinity.32 Indeed, the second-act­ conversation between Brick and his father, Big...
Journal Article
boundary 2 (2014) 41 (2): 18–20.
Published: 01 May 2014
... reached its pinnacle to date with the construction of 9/11 events that successfully installed a civil, military, interinstitutional, and commercial ethos of essentially impregnable global surveillance. The danger of such self-­authenticating corruption is obvious. The American empire...