Skip to main content

TechnoSecuritySociety: Catastrophic Futures, Pre-emptive Security & Mass Surveillance

  • Chapter
  • First Online:
TechnoScienceSociety

Part of the book series: Sociology of the Sciences Yearbook ((SOSC,volume 30))

Abstract

In the age of technoscience, science and technology have indiscriminately fused. The dominant narrative is no longer the one of knowledge and progress but rather of application and innovation. This transformation needs to be taken into account when studying security and surveillance architectures in contemporary (post-)democracies. In this chapter, we propose to understand TechnoSecurity as Culture and invite scholars of techno-science to bring their knowledge and skills to the study of security and surveillance architectures. TechnoSecurity is highly technology-oriented and driven by the Post-Newtonian rationality that is genuine to contemporary technoscience culture. The crucial epistemological and ontological difference between modern forms of security and contemporary TechnosScurity is, that contemporary security practices seek to premediate any possible future event, even highly unlikely ones, in the fear that they might turn catastrophic. We argue that to understand TechnoSecurity, it is not sufficient to study specific security technologies in isolation, but we need to situate contemporary security discourses and practices in the context of technosciences at large.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    “I will use the word technoscience from now on, to describe all the elements tied to the scientific contents no matter how dirty unexpected or foreign they seem” (Latour 1987: 174).

  2. 2.

    See Cultural Studies of Technoscience: i.a. Franklin and McNeal (1991); Haraway (1985a, b, 1997); Reid and Traweek (2000); Suchman (1987).

  3. 3.

    There are, of course, notable exceptions besides the scholars mentioned in the text, for example, Monahan (2006, 2010). Still, it is fair to claim that (techno-)security remains an underresearched topic in STS.

  4. 4.

    One may take some relief in the fact that the providers of security are very much interested in minimizing the number of false-positives. However, for a person marked as suspicious, the basic uncertainty remains. The individual may even not be aware that she is being confronted by security providers because of an alarm triggered by a technological system.

  5. 5.

    One example of the application of these techniques would be the arrests of peaceful demonstrators at the Olympic Games in London and their ban from the Olympic arena, which implies a suspension of their civil rights.

References

  • Aas, K.F., H.O. Gundhus, and H.M. Lomell, eds. 2009. Technologies of InSecurity: The Surveillance of Everyday Life. Abingdon: Routledge-Cavendish.

    Google Scholar 

  • Amoore, L., and M. de Goede, eds. 2008. Risk and the War on Terror. New York: Routledge.

    Google Scholar 

  • Anderson, B. 2010a. Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies. Progress in Human Geography 34 (6): 777–798.

    Google Scholar 

  • ———. 2010b. Security and the Future: Anticipating the Event of Terror. Geoforum 41 (2): 227–235.

    Google Scholar 

  • Andrejevic, M. 2007. ISpy: Surveillance and Power in the interactive era. Lawrence: University Press of Kansas.

    Google Scholar 

  • Aradau, C., and R. Van Munster. 2007. Governing Terrorism Through Risk: Taking Precautions, (Un)Knowing the Future. European Journal of International Relations 13 (1): 89–115.

    Google Scholar 

  • Aradau, C., L. Lobo-Guerrero, and R. van Munster. 2008. Security, Technologies of Risk, and the Political: Guest Editors’ Introduction. Security Dialogue 39: 147–154.

    Google Scholar 

  • Beck, U. 1986. Risikogesellschaft: Auf dem Weg in eine andere Moderne. Suhrkamp: Frankfurt am Main.

    Google Scholar 

  • Beck, C., and C. McCue. 2009. Predictive Policing: What Can We Learn from Wal-Mart and Amazon about Fighting Crime in a Recession? Police Chief 76 (11): 18.

    Google Scholar 

  • Belcher, O. 2013. The Afterlives of Counterinsurgency: Postcolonialism, Military Social Science, and Afghanistan 2006–2012. PhD thesis. https://circle.ubc.ca/bitstream/handle/2429/45520/ubc_2014_spring_belcher_oliver.pdf?sequence=5. Accessed 30 Dec 2015

  • Bohme, G. 2012. Invasive Technification. Trans. C. Shingleton. London: Bloomsbury.

    Google Scholar 

  • Brey, P. 2004. Ethical Aspects of Facial Recognition Systems in Public Places. Journal of Information Communication and Ethics in Society 2 (2): 97–109.

    Google Scholar 

  • Brown, F. 2006. Rethinking the role of surveillance studies in the critical political economy of communication. IAMCR Prize in Memory of Dallas W. Smythe. http://www.msu.ac.zw/elearning/material/1330622850Curran%20and%20Gurevitch.pdf. Accessed on 17 Feb 2013.

  • Chamayou, G. 2015. A Theory of the Drone. Trans. Janet Lloyd. New York: New Press.

    Google Scholar 

  • Crandall, J. 2005. Operational Media. http://www.ctheory.net/articles.aspx?id=441. Accessed on 17 Feb 2013.

  • Crogan, P. 2011. Gameplay Mode. In War, Simulation, and Technoculture. Minneapolis/London: University of Minnesota Press.

    Google Scholar 

  • Daase, C. 2012. Sicherheitskultur als interdisziplinäres Forschungsprogramm. In Sicherheitskultur. Soziale und Politische Praktiken der Gefahrenabwehr, ed. C. Daase, P. Offermann, and V. Rauer, 23–44. Frankfurt am Main/New York: Campus.

    Google Scholar 

  • De Goede, M. 2008. Beyond Risk: Premediation and the post-9/11 Security Imagination. Security Dialogue 39 (2–3): 155–176.

    Google Scholar 

  • Forman, P. 2007. The Primacy of Science in Modernity, of Technology in Postmodernity, and of Ideology in the History of Technology. History and Technology 23 (1–2): 1–152.

    Google Scholar 

  • Franklin, S., and M. McNeil. 1991. Science and technology: Questions for cultural studies and feminism. In Off-Centre. Feminsm and Cultural Studies, ed. S. Franklin, C. Lury, and J. Stacey, 129–146. London/New York: HarperCollins.

    Google Scholar 

  • Giddens, A. 1999. Risk and Responsibility. Modern Law Review 62 (1): 1–10.

    Google Scholar 

  • González, R.J. 2015. Seeing into Hearts and Minds: Part 2. ‘Big Data’, Algorithms, and Computational Counterinsurgency. Anthropology Today 31 (4): 13–18.

    Google Scholar 

  • Grusin, R. 2010. Premediation: Affect and Mediality After 9/11. New York: Palgrave Macmillan.

    Google Scholar 

  • Gutwirth, S., and M. Hildebrandt. 2010. Some Caveats on Profiling. In Data Protection in a Profiled World, ed. S. Gutwirth, Y. Poullet, and P. de Hert, 31–41. Dordrecht: Springer.

    Google Scholar 

  • Hacking, I. 1990. The Taming of Chance. Cambridge: Cambridge University Press.

    Google Scholar 

  • ———. 2006. The Emergence of Probability. Cambridge: Cambridge University Press.

    Google Scholar 

  • Hagner, M., and E. Hörl (eds.), 2008. Die Transformation des Humanen. In Zur Kulturgeschichte der Kybernetik. Frankfurt am Main: Suhrkamp.

    Google Scholar 

  • Haraway, D. 1991/1985. A cyborg manifest: Science, technology, and socialist-feminism in the late twentieth century. In Simians, Cyborgs, and Women: The Reinvention of Nature, ed. D. Haraway, 149–182. London: Routledge. First published, Haraway, D. 1985. Manifesto for cyborgs: Science, technology, and socialist feminism in the 1980s. Socialist Review 80:65–108.

    Google Scholar 

  • Haraway, D. 1985a. Manifesto for Cyborgs: Science, Technology, and Socialist Feminism in the 1980s. Socialist Review 80: 65–108.

    Google Scholar 

  • ———. 1985b. A Cyborg Manifest: Science, Technology, and Socialist-Feminism in the Late Twentieth Century. In Simians, Cyborgs, and Women: the Reinvention of Nature, ed. D. Haraway, 149–182. London: Routledge.

    Google Scholar 

  • ———. 1997. Modest Witness@Second Millenium. In Female Man Meets Oncomouse: Feminism and Technoscience. New York: Routledge Chapman & Hall.

    Google Scholar 

  • Hayles, N.K. 2003. Computing the Human. In Turbulente Körper, Soziale Maschinen: Feministische Studien zur Technowissenschaftskultur, ed. J. Weber and C. Bath, 99–118. Wiesbaden: VS Verlag für Sozialwissenschaften.

    Google Scholar 

  • Hempel, L., S. Krasman, and U. Bröckling, eds. 2010. Sichtbarkeitsregime: Überwachung, Sicherheit und Privatheit im 21 Jahrhundert. Leviathan Sonderheft 25/2010. Wiesbaden: VS Verlag für Sozialwissenschaften.

    Google Scholar 

  • Hildebrandt, M., and S. Gutwirth. 2008. Profiling the European Citizen. Cross Disciplinary Perspectives. Dordrecht: Springer.

    Google Scholar 

  • Hobbes, T. 1998. On the Citizen. Ed. and Trans. R. Tuck, and M. Silverthrone. Cambridge: Cambridge University Press.

    Google Scholar 

  • Holland, J.H. 1992. Genetic Algorithms Computer Programs That ‘Evolve’ in Ways That Resemble Natural Selection Can Solve Complex Problems Even Their Creators do Not Fully Understand. Scientific American 267: 66–72.

    Google Scholar 

  • Horn, E. 2014. Zukunft als Katastrophe. Frankfurt am Main: Fischer Verlag.

    Google Scholar 

  • IBM. 2011. Memphis PD: Keeping Ahead of Criminals by Finding the Hot Spots. https://www.ibm.com/smarterplanet/us/en/leadership/memphispd/assets/pdf/IBM_MemphisPD.pdf. Accessed on 23 July 2015.

  • Introna, L.D., and D. Wood. 2004. Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems. Surveillance and Society 2 (2–3): 177–198.

    Google Scholar 

  • Kaplan, C. 2006. Precision Targets: GPS and the Militarization of U.S. Consumer Identity. American Quarterly 58 (3): 693–714.

    Google Scholar 

  • Kaufmann, S. 2011. Zivile Sicherheit: Vom Aufstieg eines Topos. In Sichtbarkeitsregime. Überwachung, Sicherheit und Privatheit im 21. Jahrhundert, ed. L. Hempel, S. Krasmann, and U. Bröckling, 101–123. Wiesbaden: VS Verlag für Sozialwissenschaften.

    Google Scholar 

  • Kitchin, R. 2014. The Data Revolution. Big Data, Open Data, Data Infrastructures & Their Consequences. Los Angeles: Sage.

    Google Scholar 

  • Knorr-Cetina, K. 1997. Sociality with Objects: Social Relations in Postsocial Knowledge Societies. Theory, Culture and Society 14 (4): 1–30.

    Google Scholar 

  • Latour, B. 1987. Science in Action. Milton Keynes: Open University Press.

    Google Scholar 

  • ———. 1993. We Have Never Been Modern. Cambridge, MA: Harvard University Press.

    Google Scholar 

  • Lyon, D. 2008. Biometrics, Identification and Surveillance. Bioethics 22 (9): 499–508.

    Google Scholar 

  • Marx, G.T. 2001. Technology and Social Control: The Search for the Illusive Silver Bullet. International Encyclopedia of the Social and Behavioral Sciences. http://web.mit.edu/gtmarx/www/techandsocial.html. Accessed on 17 Feb 2013.

  • Mattelart, A. 2010. The Globalization of Surveillance: The Origin of the Securitarian Order. Cambridge: Polity Press.

    Google Scholar 

  • Mayer, K., and J. Weber. Under review. From Optimizing Military Operations to Targeting Terrorist Networks: Social Network analysis in Data-Driven Warfare. Science, Technology and Human Values.

    Google Scholar 

  • Molotch, H. 2012. Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger. Princeton: Princeton University Press.

    Google Scholar 

  • Monahan, T. 2006. Surveillance and Security. In Technological Politics and Power in Everyday life. New York/London: Routledge.

    Google Scholar 

  • ———. 2010. Surveillance in the Time of Insecurity. New Brunswick: Rutgers University Press.

    Google Scholar 

  • Nordmann, A. 2004. Was ist TechnoWissenschaft - Zum Wandel der Wissenschaftskultur am Beispiel von Nanoforschung und Bionik. In Bionik – Neue Forschungsergebnisse aus Natur-, Ingenieur- und Geisteswissenschaften, ed. T. Rossmann and C. Tropea. Berlin: Springer.

    Google Scholar 

  • ———. 2010. A Forensics of Wishing: Technology Assessment in the Age of Technoscience. Poiesis & Praxis 7 (1–2): 5–15.

    Google Scholar 

  • O’Malley, P. 1999. Governmentality and the Risk Society. Economy and Society 28 (1): 138–148.

    Google Scholar 

  • Pickering, A. 2002. Cybernetics and the Mangle: Ashby, Beer and Pask. Social Studies of Science 32 (3): 413–437.

    Google Scholar 

  • Power, M. 2004. The Risk Management of Everything. Rethinking the Politics of Uncertainty. London: Demos Publications.

    Google Scholar 

  • Ratcliffe, J.H. 2012. Intelligence-Led Policing. London: Routledge.

    Google Scholar 

  • Reid, R., and S. Traweek, eds. 2000. Doing Science and Culture. How Cultural and Interdisciplinary Studies Are Changing the Way We Look at Science and Medicine. New York/London: Routledge.

    Google Scholar 

  • Ruppert, E.S. 2009. Number Regimes. From Census to Metrics. Cresc Working Paper Series [Working paper No. 68]. http://hummedia.manchester.ac.uk/institutes/cresc/workingpapers/wp68.pdf. Accessed on 19 Sept 2017.

  • Salter, M. 2008. Risk and Imagination in the War on Terror. In Risk and the War on Terror, ed. L. Amoore and M. de Goede, 233–246. New York/London: Routledge.

    Google Scholar 

  • Schneier, B. 2003. Beyond Fear: Thinking Sensibly about Security in an Uncertain World. New York: Copernicus Books.

    Google Scholar 

  • Shklar, J.N. 1990. The Faces of Injustice. New Haven: Yale University Press.

    Google Scholar 

  • Singelnstein, T., and P. Stolle. 2011. Die Sicherheitsgesellschaft: Soziale Kontrolle im 21. Jahrhundert. Wiesbaden: VS Verlag.

    Google Scholar 

  • Standler, R.B. 1997. Privacy Law in the USA. http://www.rbs2.com/privacy.htm. Accessed on 30 Dec 2016.

  • Suchman, L. 1987. Plans and Situated Actions: The Problem of Human-Machine Communication. Cambridge, MA: Cambridge University Press.

    Google Scholar 

  • Wayman, J.L. 2007. The Scientific Development of Biometrics over the Last 40 Years. In The History of Information Security: A Comprehensive Handbook, ed. K. de Leeuw and J. Bergstra, 263–276. Amsterdam: Elsevier.

    Google Scholar 

  • Weber, J. 2003. Umkämpfte Bedeutungen: Naturkonzepte im Zeitalter der Technoscience. Frankfurt am Main/New York: Campus.

    Google Scholar 

  • ———. 2010. Making Worlds: Epistemological, Ontological and Political Dimensions of Technoscience. Poiesis und Praxis 7 (1–2): 17–36.

    Google Scholar 

  • ———. 2011. Techno-Security, Risk and the Militarization of Everyday Life. In The Computational Turn: Past, Presents, Futures? Proceedings of the International Association for Computing and Philosophy, MV Wissenschaft, ed. C. Ess and R. Hagengruber, 193–200. Münster: Aarhus University.

    Google Scholar 

  • ———. 2016. Keep Adding. On Kill Lists, Drone Warfare and the Politics of Databases. Environment and Planning D: Society and Space 34 (1): 107–125.

    Google Scholar 

  • Winner, L. 1978. Autonomous Technology. In Technics-Out-Of-Control as a Theme in Political Thought. Cambridge, MA/London: MIT Press.

    Google Scholar 

  • ———. 2010. Trust and Terror: The Vulnerability of Complex Socio-Technical Systems. Science as Culture 13 (2): 155–172.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Nagenborg .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Nagenborg, M., Weber, J. (2020). TechnoSecuritySociety: Catastrophic Futures, Pre-emptive Security & Mass Surveillance. In: Maasen, S., Dickel, S., Schneider, C. (eds) TechnoScienceSociety. Sociology of the Sciences Yearbook, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-43965-1_12

Download citation

Publish with us

Policies and ethics