writers Flashcards
1
Q
- Risk profiling allows the WoT to be fought pre-emptively
- Biometrics allow the ‘unruly body’ to be brought into zone of calculation and manageability
- For people deemed low risk, biometrics makes the border seem even more invisible; for those considered high risk, it makes the border seem more present than ever as they are subject to invasive surveillance
- Biometrics can be seen as embracing the technologies of globalisations to tackle the risks of globalisation
- Data derivatives created by algorithms which assign risk scores to individuals
- Risk profiling a means of governing mobility in the WoT, segregating legitimate mobilities from illegitimate mobilities
A
Amoore
2
Q
- “Risk-based calculative models and practices are emerging as a key means of identifying vulnerable spaces and suspicious populations in the war on terror.”
- Automated targeting System used to identify unknown threats at borders, using commercial data and public data
- “Risk in this sense is categorically not about reducing risk, achieving control, or even about ensuring safety or security—what matters instead is that the appearance of securability and manageability is sustained”
- ‘petty sovereigns’ ie immigration officials, mid-level bureaucracies can make decisions with some objectivity and scientific certainty by using new technologies and alliances with experts
- Risk management is “a particular mode of governing - a means of making an uncertain and unknowable future amenable to intervention and management”
A
Amoore and de Goede
3
Q
- Bush administration used language to place Iraq at centre of WoT despite concrete evidence
- The ‘war’ on terror provided a legal justification for military action and ensured public support
- Terrorists treated as soldiers and given sense of legitimacy
A
Andreani
4
Q
- For risk society theorists, control is ideological and impossible to achieve so states must feign control over the uncontrollable
- Risk is a dispositf, ie a heterogenous assemblage of discursive and material elements for governing social problems
- Precautionary measures include extensive surveillance which often involves profiling of certain groups
- The exception: an explanatory tool of changes in law/governance rather than a problem that needs to be unpacked
- Doctrine of preemption continually drives expansion of governance, surveillance and interference in greater areas of social life
A
Aradau and van Munster
5
Q
- Terrorism made governable by discourses of threat and danger, and arrangement of objects
- Discourses function through language but also have rea, material effects in the world
A
Aradau et al.
6
Q
- Terrorists not financially motivated and attacks do not cost much, so freezing their assets not an effective strategy
- General lack of knowledge how to tackle terrorism so finance route chosen
- US cannot monitor all transactions so profiling used to target certain groups
- Muslim money placed in space of exception
A
Atia
7
Q
- Surveillance embedded into everyday life so people take it for granted, consider it unremarkable
- Snowden’s revelations not a concern for most people
- Fear utilised so public accept mass surveillance
- People willingly participate in surveillance because it is fun or convenient
A
Bauman et al.
8
Q
- “the hidden central issue in world risk society is how to feign control over the uncontrollable”
- Risks characterised by unpredictability, incalculability and uncontrollability
- Risks exacerbated by globalisation
- Global terror, climate change and economic meltdown constitute ‘triple axis of world risk society’
A
Beck
9
Q
- Governments use logic of the exception to justify implementing extreme liberty restrictions in name of security
- Surveillance is justified in that terrorism restricts liberties, but it guilty of this itself
- In the interest of collective security, people sacrifice their liberties to religion, speech and movement
A
Bigo and Walker
10
Q
- Performativity involves a series of performances, discursive practices that produce and reproduce over and again a series of effects
- In any discursive practice, it is always the repetition of prior established norms that mark the subject, and condition and shape the particular reality that is foregrounded
A
Butler
11
Q
- Terrorist financing as reverse money laundering, where legitimate money is acquired and then funnelled to support terrorism
- Methods used to prosecute drug lords for money laundering in war on drugs not applicable to WoT
A
Casella
12
Q
- Most counter-terrorism policies have failed to address problem because policy makers do not understand causes
- Economic globalisation has furthered the West at the expense of the developing world, leading to feelings of alienation and disenfranchisement which could fuel terrorism
- US needs to understand complex causes of terrorism to produce more sophisticated responses
A
Cronin
13
Q
- The same aspects of globalisation that contribute to security threats also offer new opportunities for economic growth and democracy
- Counterproliferation measures focus on military action but also include diplomacy, multilateral regimes, threat reductions programs and controls on exports
- Traditional methods of controlling risks needs to be adapted to a globalised world
A
Davis
14
Q
- Anticipatory security more interested in pinpointing potential dangers rather than monitoring everyone
- Hawala constructed as dark and underground to make Western banking practices seem legitimate
- Closure of Al-Barakat devastating for Somali economy
- Pre-emption not about predicting the future but about speculating multiple futures
A
de Goede
15
Q
- Pre-emptive strategies have made their way into routine security practice and bureaucratic operations
- Risk management is performative; it does not pre-exist its practice
- A security of the interstice aims to fills gaps between spaces of governance
A
de Goede et al.