Security, Risk and the Biometric State

Governing Borders and Bodies

Author: Benjamin J Muller

Publisher: Routledge

ISBN: 1135161399

Category: History

Page: 160

View: 8249

DOWNLOAD NOW »

This book examines a series of questions associated with the increasing application and implications of biometrics in contemporary everyday life. In the wake of the events of 9/11, the reliance on increasingly sophisticated and invasive technologies across a burgeoning field of applications has accelerated, giving rise to the term 'biometric state'. This book explores how these ‘virtual borders’ are created and the effect they have upon the politics of citizenship and immigration, especially how they contribute to the treatment of citizens as suspects. Finally and most importantly, this text argues that the rationale of 'governing through risk' facilitates pre-emptory logics, a negligent attitude towards 'false positives', and an overall proliferation of borders and ubiquitous risk, which becomes integral to contemporary everyday life, far beyond the confined politics of national borders and frontiers. By focusing on specific sites, such as virtual borders in airports, trusted traveller programs like the NEXUS program and those delivered by airlines and supported by governmental authorities (TSA and CATSA respectively), this book raises critical questions about the emerging biometric state and its commitment and constitution vis-à-vis technology of ‘governing through risk’. This book will be of interest to students of biopolitics, critical security, surveillance studies and International Relations in general. Benjamin J. Muller is assistant professor in International Relations at Simon Fraser University, Burnaby, Canada. He completed his PhD in the School of Politics and International Studies at Queen’s University Belfast, Northern Ireland, in 2005.
Release

Transformations of Security Studies

Dialogues, Diversity and Discipline

Author: Gabi Schlag,Julian Junk,Christopher Daase

Publisher: Routledge

ISBN: 1317481046

Category: Political Science

Page: 250

View: 4695

DOWNLOAD NOW »

This volume brings together a group of distinguished scholars to engage in a dialogue on key developments in the study of security. The book provides a comprehensive overview of theoretical, empirical and methodological developments within security studies, whose political and societal importance has grown significantly in recent years. By bringing together scholars who hold differing perspectives on security, this volume provides insights into a variety of approaches and their newest developments, including ‘mainstream’ as well as heterodox perspectives on security. Thus, it aims to build bridges of communication between different ‘camps’ by initiating a dialogue on the identity and diversity of security studies. It does so in three parts: The first part of the book includes paradigmatic approaches to security that are closely connected to major debates in International Relations such as realism, institutionalism, constructivism as well as approaches to the culture, ethics of security and critical security studies. The second part places emphasis on the broadening and deepening of the concept of security in recent decades. It discusses key empirical frontiers including the continued centrality of the state, the link between democracy and security, environmental security as well as financial security. The third part of the book presents various methodological approaches to the question of security and peace. It provides an overview of new approaches such as the visual turn, quantifying security and method combinations. This book will be of much interest to students of critical security studies, international relations and research methods.
Release

Critical Security and Chinese Politics

The Anti-Falungong Campaign

Author: Juha A. Vuori

Publisher: Routledge

ISBN: 1135077002

Category: History

Page: 210

View: 9693

DOWNLOAD NOW »

This book examines how critical approaches to security developed in Europe can be used to investigate a Chinese security issue - the case of the Falungong. The past few decades have produced a rich field of theoretical approaches to ‘security’ in Europe. In this book, the security-specific notions of securitization, the politics of insecurity, and emancipation are used as analytical approaches to investigate the anti-Falungong campaign in the People’s Republic of China. This campaign, launched in 1999, was the largest security-related propaganda campaign since 1989 and was directed against a group of qigong-practitioners who were presented as a grave threat to society. The campaign had major impacts as new security legislation was established and human rights organizations reported severe mistreatment of practitioners. This book approaches one empirical case with three approaches in order to transcend the tendency to pit one approach against another. It shows how they highlight different aspects in investigation, and how they can be combined to gain more comprehensive insights, and thereby invigorate renewed debate in the field. Furthermore, this is used as a vehicle to discuss more general philosophical issues of theory, development, and theory development and will assist students to comprehend the effects research framework selection has on a piece of research. Such discussions are necessary in order to apply the frameworks in investigations that go beyond the socio-political context they were originally developed in. This book will be of interest to students of critical security studies, Chinese politics, research methods and IR in general.
Release

Securitization, Accountability and Risk Management

Transforming the Public Security Domain

Author: Karin Svedberg Helgesson,Ulrika Mörth

Publisher: Routledge

ISBN: 1136467963

Category: Political Science

Page: 192

View: 1959

DOWNLOAD NOW »

This edited volume examines the reconstitution of the public security domain since the 9/11 attacks, focusing on the banking sector and anti-money laundering (AML) activity in particular. Since the inception of the ‘Financial Action Taskforce’ (FATF) in 1989, AML has been viewed as a global problem. This text argues that the securitization of the financial sector as a result of AML has entailed the emergence of a new public security domain, which transcends the classic public-private divide. The analysis in the volume is multidisciplinary and combines concepts and theories from the literature on securitization, the public-private divide, and business/management. The authors argue that the state is under transformation and that the developments in the security field are part of an ongoing renegotiation of the relationship between the state and the business sector. Securitization, Accountability and Risk Management therefore contributes to a deeper understanding of how the power relationships have changed between the public and the private sectors after 9/11. This interdisciplinary book will be of much interest to students of critical security, risk management, business studies, critical legal studies and IR in general.
Release

Genocidal Nightmares

Narratives of Insecurity and the Logic of Mass Atrocities

Author: Abdelwahab El-Affendi

Publisher: Bloomsbury Publishing USA

ISBN: 1628920734

Category: Political Science

Page: 288

View: 5445

DOWNLOAD NOW »

This book offers a novel and productive explanation of why 'ordinary' people can be moved to engage in destructive mass violence (or terrorism and the abuse of rights), often in large numbers and in unexpected ways. Its argument is that narratives of insecurity (powerful horror stories people tell and believe about their world and others) can easily make extreme acts appear acceptable, even necessary and heroic. As in action or horror movies, the script dictates how the 'hero' acts. The book provides theoretical justifications for this analysis, building on earlier studies but going beyond them in what amount to a breakthrough in mapping the context of mass violence. It backs its argument with a large number of case studies covering four continents, written by prominent scholars from the relevant countries or with deep knowledge of them. A substantial introduction by the UN's Special Advisor on the Prevention of Genocide demonstrates the policy relevance of this path-breaking work.
Release

Biometric identifiers and the modern face of terror

new technologies in the global war on terrorism : hearing before the Subcommittee on Technology, Terrorism, and Government Information of the Committee on the Judiciary, United States Senate, One Hundred Seventh Congress, first session, November 14, 2001

Author: United States. Congress. Senate. Committee on the Judiciary. Subcommittee on Technology, Terrorism, and Government Information

Publisher: N.A

ISBN: N.A

Category: Political Science

Page: 73

View: 2460

DOWNLOAD NOW »

Release

Summary of a Workshop on the Future of Antennas

Author: National Research Council,Division on Engineering and Physical Sciences

Publisher: National Academies Press

ISBN: 0309266866

Category: Computers

Page: 29

View: 470

DOWNLOAD NOW »

The Workshop on the Future of Antennas was the second of three workshops conducted by the National Research Council's Committee for Science and Technology Challenges to U.S. National Security Interests. The objectives of the workshop were to review trends in advanced antenna research and design, review trends in commercials and military use of advanced antennas that enable improved communication, data transfer, soldier health monitoring, and other overt and covert methods of standoff data collection. The first day's sessions, consisting of five presentations and discussions on antennas and wireless communications and control, were open to committee members, staff, guests, and members of the public. The second day was a data-gathering session addressing vulnerabilities, indicators, and observables; presentations and discussions during this session included classified material and were not open to the public. The committee's role was limited to planning and convening the workshop. This report is organized by topic in the order of presentation and discussion at the workshop. For Day 1 the topics were Future of Antennas, Commercial State of the Art of Wireless Communications and Control, Military State of the Art of Wireless Communications and Control, and Future Trends in Antenna Design and Wireless Communications and Control. For Day 2 the topics were Vulnerabilities of Ubiquitous Antennas, and Indicators and Observables, followed by a wrap-up discussion. Summary of a Workshop on the Future of Antennas describes what happened at the workshop.
Release

Encyclopedia of Information Ethics and Security

Author: Quigley, Marian

Publisher: IGI Global

ISBN: 1591409888

Category: Business & Economics

Page: 696

View: 8456

DOWNLOAD NOW »

Rapid technological advancement has given rise to new ethical dilemmas and security threats, while the development of appropriate ethical codes and security measures fail to keep pace, which makes the education of computer users and professionals crucial. The Encyclopedia of Information Ethics and Security is an original, comprehensive reference source on ethical and security issues relating to the latest technologies. Covering a wide range of themes, this valuable reference tool includes topics such as computer crime, information warfare, privacy, surveillance, intellectual property and education. This encyclopedia is a useful tool for students, academics, and professionals.
Release