1 / 15

MA Seminar Series: BURNING ISSUES WEEK 5 TECHNOLOGY

MA Seminar Series: BURNING ISSUES WEEK 5 TECHNOLOGY. REIKO SHINDO. Introduction. The purpose of MA Seminar Series – Introducing a range of key concepts which help us to think about world politics critically (e.g. citizenship, community, resistance, sovereignty, language)

johnbenton
Télécharger la présentation

MA Seminar Series: BURNING ISSUES WEEK 5 TECHNOLOGY

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. MA Seminar Series: BURNING ISSUESWEEK 5TECHNOLOGY REIKO SHINDO

  2. Introduction • The purpose of MA Seminar Series – Introducing a range of key concepts which help us to think about world politics critically (e.g. citizenship, community, resistance, sovereignty, language) • Last week: Resistance – different features attached to resistance practices (globalisation; the role of the state; bypassing the state; political agency; ‘everyday forms of resistance’; politics of using the term, resistance) • Next week: Sovereignty and the question of humanitarian intervention • Plus a guest speaker’s talk (18:00-18:30) Mr. Mikko Lievonen: He worked at the UN Department of Peacekeeping Operations (DPKO) in New York. Soon after the independence of South Sudan, he moved to South Sudan to join the United Nations Mission for South Sudan (UNMISS).

  3. Introduction • This week: • How is technology shaping the contemporary world politics? • Drones • Biometric control of borders • What are the implications of these technologies to politics? • Permanent state of exception • Biopower

  4. Combat drones • Unmanned Combat Aerial Vehicles (UCAVs) • (e.g. US) Yemen (al-Qaeda; semi-failed states) / Western part of Pakistan (Al-Qaeda; competing fractions within Pakistan; no anti-drones technology) / Somalia (al-Shabab; failed states) • Classified operations; intelligence operations; no legal system to regulate drone attacks • War can be launched anytime and anywhere

  5. Combat drones • Carl Schmitt and his idea of state of exception • The law can be legally suspected for the purpose of preserving the state and its system of law from some grave internal or external danger. • “Permanent state of exception”? (Klem Ryan 2014) • Evaporation of the battlefields (David Grondin 2012) • The changing proximity between wars and civilians (e.g. Metadata+ / Drones+ ): secrecy of foreign policies are exposed to civilians through smartphones

  6. Group discussion • What are pros and cons of combat drones? • Do you agree with the statement that we are now living in the ‘permanent state of exception’? • In your opinion, how can a new iPhone App (such as Metadata+) change people’s perceptions of wars?

  7. Biometrics • Biometrics technology collects and processes data using specific physical or biological characteristics as a means to verify identity of an individual; it involves techniques such as fingerprinting, iris scanning, etc. • Biometric screening is designed to protect documents and to make access to particular sites easier and safer • Biometric data management has been developed alongside the integration of different databases, in order to share data and assess the riskiness of particular individuals • https://www.youtube.com/watch?v=eZTfgNIiNUA [This slide was originally prepared for the class, BO9A2 Borders and Migration]

  8. Biometrics • Unprecedented concern with Homeland Security • Intensification of restrictive border management and immigration legislation – northern and southern border focus of efforts • Smart borders: borders as filters rather than barriers, open to the peaceful and closed to terrorists, new ports of entry, delineation of ‘low risk’ passengers, accelerated identification procedures • Production of ‘buffer zones’ through expansive policing and surveillance reaching out beyond territorial borderlines; emergence of new technologies that feature as innovative filters separating desirable/undesirable migrants [This slide was originally prepared for the class, BO9A2 Borders and Migration]

  9. From security to risk • From a security to a risk-based analysis • Changing nature of security threats: diffuse and dispersed; operating at a global level (e.g. terrorism, disease, environmental issues) • Emergent technologies designed to manage risk rather than evade security threats • Preemptive management of risks • Uncertainty over threats/risks • Probabilistic methodology • Internal/external security threats seen as blurred/overlapping • Emphasis on demilitarised security practices • Catastrophic vision normalised • Perception of security no longer the primary framework of governing • Vision of managing risk imperfectly involves a vision of uncertain and catastrophic futures (Aradau and van Munster) [This slide was originally prepared for the class, BO9A2 Borders and Migration]

  10. Biometrics - case study • Case study: US Visitor and Immigration Status Indicator Technology • Risk assessment a technological/managerial tool, a dimension of liberal governmentality that profiles and codes people according to levels of riskiness – combines information e.g. from databases of biometric information, entry/exit data, passenger info, student exchange data, Interpol watch list and national crime data, benefit claimants (foreign nationals), finance, banking, education and health databases; an associational logic • From geopolitics to biopolitics: the bodies of travellers as sites of multiple encoded boundaries, emergent particularly in context of Global War on Terror; the virtual border (rather than the territorial border) • Risk profiling: separation of il/legitimate travellers; identity used as a source of prediction and prevention; private companies and Homeland Security citizens as sources of authority (petty sovereigns) • Law/expertise and the normalising society – particular forms of conduct become assumed as the norm; petty sovereigns ‘police’ these norms – the ‘Homeland Security citizen’ [This slide was originally prepared for the class, BO9A2 Borders and Migration]

  11. Biopower? • Biopolitics/biopower (HoS I; Society Must Be Defended; The Birth of Biopower) • Involves a generalised form of regulation linked directly to human biology/physical health and the body • Regulation and fostering of the life of the population (species) e.g. to foster a healthy workforce • biopolitical apparatuses of security promote the circulation of species-life (people and things) • Biopolitics occurs at threshold of modernity (Foucault); or from Medieval times (Agamben) [This slide was originally prepared for the class, BO9A2 Borders and Migration]

  12. Group discussion "Where are you from?”
 "Somalia," I reply. 
 "How did you obtain the British passport?”
 "Because I came here as an asylum seeker and applied for citizenship after five years.”
 "Okay. Interesting. When did you came here first?”
 "In May 1999.”
"Alright. So what happened when you sought asylum?”
"I had to wait a decision for a year and then I was given an indefinite leave to remain.”
 "Have you ever being in trouble with the immigration?”
 "No, except you guys bothering me all the time and you never explain to me why.”
 "Take a seat, I will be back.“ The officer then goes into an office to "verify some details" and, of course, it is a good excuse to have an unofficial coffee break. While I wait at the "humiliation chair", other officers behind the desk keep on eye on me, just in case I attempt to run away. It is unpleasant to watch other passengers passing through with no trouble and looking at you, probably thinking: "Here is a new immigrant.” (http://www.channel4.com/news/mo-farah-stopped-at-customs-hes-not-alone) [This slide was originally prepared for the class, BO9A2 Borders and Migration] Is biometric profiling a necessary and/or problematic development? Why?

  13. Criticism of biometrics • Criticisms are often made about the privacy and civil liberty implications of biometrics • Those who are critical of biometrics point to the way in which technical risk-assessments can fail (e.g. providing false positives), despite presumed certainty of identification processes • Some point out the danger of fixing identities and assuming the body as anchor without error; they argue for need to emphasis the inherent incompleteness of identity and the uncertainty of border management • Critical commentators also point to the divisive nature of biometrics and surveillance (e.g. different channels of migration, inside and outside the airport), and for the suspicious/fearful subjects that these techniques produce [This slide was originally prepared for the class, BO9A2 Borders and Migration]

  14. Summary • Technology as a means of what? • Zero casualty warfare? • Familiarising warfare? • Social sorting? • Quick and ‘smart’ border crossing? • The week after next (19 November): sovereignty • Guest speaker’s talk (18:00-18:30) • 18:30-20:00 Lecture

  15. Recommended readings • Aradau, C., Lobo-Guerrero, L., Van Munster, R. (Eds) (2008) ‘Security, Technologies of Risk, and the Political’, Special Issue Security Dialogue, 39(2-3). • Der Derian, J. (2009) Virtuous War: Mapping the Military-Industrial-Media-Entertainment Network, New York: Routledge. • Gregory, D. (2014) ‘Drone Geographies’, Radical Philosophy, 183 (Jan/Feb): 7-19. • Kroker, A., and Kroker, M. (2014) ‘Night Sky Drones’, Theory Beyond the Codes. www.ctheory.net/articles.aspx?id=732 (accessed 8 June 2015) • Andreas, P. (2003) “Redrawing the line: Borders and security in the twenty-first century”, International Security 28(2): 78-111 • Amoore, L. (2006) “Biometric borders: Governing mobilities in the war on terror”, Political Geography 25(3): 336-351 • Huysmans, J. and Squire, V. (2009) “Migration and security” in M. Dunn Cavelty and V. Mauer The Routledge Handbook of Security Studies (Abingdon: Routledge) [available online] • Pugliese, J. (2010) Biometrics: Bodies, Technologies, Biopolitics (New York: Routledge), pp. 25-79.

More Related