Abstract
In the age of technoscience, science and technology have indiscriminately fused. The dominant narrative is no longer the one of knowledge and progress but rather of application and innovation. This transformation needs to be taken into account when studying security and surveillance architectures in contemporary (post-)democracies. In this chapter, we propose to understand TechnoSecurity as Culture and invite scholars of techno-science to bring their knowledge and skills to the study of security and surveillance architectures. TechnoSecurity is highly technology-oriented and driven by the Post-Newtonian rationality that is genuine to contemporary technoscience culture. The crucial epistemological and ontological difference between modern forms of security and contemporary TechnosScurity is, that contemporary security practices seek to premediate any possible future event, even highly unlikely ones, in the fear that they might turn catastrophic. We argue that to understand TechnoSecurity, it is not sufficient to study specific security technologies in isolation, but we need to situate contemporary security discourses and practices in the context of technosciences at large.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
“I will use the word technoscience from now on, to describe all the elements tied to the scientific contents no matter how dirty unexpected or foreign they seem” (Latour 1987: 174).
- 2.
- 3.
- 4.
One may take some relief in the fact that the providers of security are very much interested in minimizing the number of false-positives. However, for a person marked as suspicious, the basic uncertainty remains. The individual may even not be aware that she is being confronted by security providers because of an alarm triggered by a technological system.
- 5.
One example of the application of these techniques would be the arrests of peaceful demonstrators at the Olympic Games in London and their ban from the Olympic arena, which implies a suspension of their civil rights.
References
Aas, K.F., H.O. Gundhus, and H.M. Lomell, eds. 2009. Technologies of InSecurity: The Surveillance of Everyday Life. Abingdon: Routledge-Cavendish.
Amoore, L., and M. de Goede, eds. 2008. Risk and the War on Terror. New York: Routledge.
Anderson, B. 2010a. Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies. Progress in Human Geography 34 (6): 777–798.
———. 2010b. Security and the Future: Anticipating the Event of Terror. Geoforum 41 (2): 227–235.
Andrejevic, M. 2007. ISpy: Surveillance and Power in the interactive era. Lawrence: University Press of Kansas.
Aradau, C., and R. Van Munster. 2007. Governing Terrorism Through Risk: Taking Precautions, (Un)Knowing the Future. European Journal of International Relations 13 (1): 89–115.
Aradau, C., L. Lobo-Guerrero, and R. van Munster. 2008. Security, Technologies of Risk, and the Political: Guest Editors’ Introduction. Security Dialogue 39: 147–154.
Beck, U. 1986. Risikogesellschaft: Auf dem Weg in eine andere Moderne. Suhrkamp: Frankfurt am Main.
Beck, C., and C. McCue. 2009. Predictive Policing: What Can We Learn from Wal-Mart and Amazon about Fighting Crime in a Recession? Police Chief 76 (11): 18.
Belcher, O. 2013. The Afterlives of Counterinsurgency: Postcolonialism, Military Social Science, and Afghanistan 2006–2012. PhD thesis. https://circle.ubc.ca/bitstream/handle/2429/45520/ubc_2014_spring_belcher_oliver.pdf?sequence=5. Accessed 30 Dec 2015
Bohme, G. 2012. Invasive Technification. Trans. C. Shingleton. London: Bloomsbury.
Brey, P. 2004. Ethical Aspects of Facial Recognition Systems in Public Places. Journal of Information Communication and Ethics in Society 2 (2): 97–109.
Brown, F. 2006. Rethinking the role of surveillance studies in the critical political economy of communication. IAMCR Prize in Memory of Dallas W. Smythe. http://www.msu.ac.zw/elearning/material/1330622850Curran%20and%20Gurevitch.pdf. Accessed on 17 Feb 2013.
Chamayou, G. 2015. A Theory of the Drone. Trans. Janet Lloyd. New York: New Press.
Crandall, J. 2005. Operational Media. http://www.ctheory.net/articles.aspx?id=441. Accessed on 17 Feb 2013.
Crogan, P. 2011. Gameplay Mode. In War, Simulation, and Technoculture. Minneapolis/London: University of Minnesota Press.
Daase, C. 2012. Sicherheitskultur als interdisziplinäres Forschungsprogramm. In Sicherheitskultur. Soziale und Politische Praktiken der Gefahrenabwehr, ed. C. Daase, P. Offermann, and V. Rauer, 23–44. Frankfurt am Main/New York: Campus.
De Goede, M. 2008. Beyond Risk: Premediation and the post-9/11 Security Imagination. Security Dialogue 39 (2–3): 155–176.
Forman, P. 2007. The Primacy of Science in Modernity, of Technology in Postmodernity, and of Ideology in the History of Technology. History and Technology 23 (1–2): 1–152.
Franklin, S., and M. McNeil. 1991. Science and technology: Questions for cultural studies and feminism. In Off-Centre. Feminsm and Cultural Studies, ed. S. Franklin, C. Lury, and J. Stacey, 129–146. London/New York: HarperCollins.
Giddens, A. 1999. Risk and Responsibility. Modern Law Review 62 (1): 1–10.
González, R.J. 2015. Seeing into Hearts and Minds: Part 2. ‘Big Data’, Algorithms, and Computational Counterinsurgency. Anthropology Today 31 (4): 13–18.
Grusin, R. 2010. Premediation: Affect and Mediality After 9/11. New York: Palgrave Macmillan.
Gutwirth, S., and M. Hildebrandt. 2010. Some Caveats on Profiling. In Data Protection in a Profiled World, ed. S. Gutwirth, Y. Poullet, and P. de Hert, 31–41. Dordrecht: Springer.
Hacking, I. 1990. The Taming of Chance. Cambridge: Cambridge University Press.
———. 2006. The Emergence of Probability. Cambridge: Cambridge University Press.
Hagner, M., and E. Hörl (eds.), 2008. Die Transformation des Humanen. In Zur Kulturgeschichte der Kybernetik. Frankfurt am Main: Suhrkamp.
Haraway, D. 1991/1985. A cyborg manifest: Science, technology, and socialist-feminism in the late twentieth century. In Simians, Cyborgs, and Women: The Reinvention of Nature, ed. D. Haraway, 149–182. London: Routledge. First published, Haraway, D. 1985. Manifesto for cyborgs: Science, technology, and socialist feminism in the 1980s. Socialist Review 80:65–108.
Haraway, D. 1985a. Manifesto for Cyborgs: Science, Technology, and Socialist Feminism in the 1980s. Socialist Review 80: 65–108.
———. 1985b. A Cyborg Manifest: Science, Technology, and Socialist-Feminism in the Late Twentieth Century. In Simians, Cyborgs, and Women: the Reinvention of Nature, ed. D. Haraway, 149–182. London: Routledge.
———. 1997. Modest Witness@Second Millenium. In Female Man Meets Oncomouse: Feminism and Technoscience. New York: Routledge Chapman & Hall.
Hayles, N.K. 2003. Computing the Human. In Turbulente Körper, Soziale Maschinen: Feministische Studien zur Technowissenschaftskultur, ed. J. Weber and C. Bath, 99–118. Wiesbaden: VS Verlag für Sozialwissenschaften.
Hempel, L., S. Krasman, and U. Bröckling, eds. 2010. Sichtbarkeitsregime: Überwachung, Sicherheit und Privatheit im 21 Jahrhundert. Leviathan Sonderheft 25/2010. Wiesbaden: VS Verlag für Sozialwissenschaften.
Hildebrandt, M., and S. Gutwirth. 2008. Profiling the European Citizen. Cross Disciplinary Perspectives. Dordrecht: Springer.
Hobbes, T. 1998. On the Citizen. Ed. and Trans. R. Tuck, and M. Silverthrone. Cambridge: Cambridge University Press.
Holland, J.H. 1992. Genetic Algorithms Computer Programs That ‘Evolve’ in Ways That Resemble Natural Selection Can Solve Complex Problems Even Their Creators do Not Fully Understand. Scientific American 267: 66–72.
Horn, E. 2014. Zukunft als Katastrophe. Frankfurt am Main: Fischer Verlag.
IBM. 2011. Memphis PD: Keeping Ahead of Criminals by Finding the Hot Spots. https://www.ibm.com/smarterplanet/us/en/leadership/memphispd/assets/pdf/IBM_MemphisPD.pdf. Accessed on 23 July 2015.
Introna, L.D., and D. Wood. 2004. Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems. Surveillance and Society 2 (2–3): 177–198.
Kaplan, C. 2006. Precision Targets: GPS and the Militarization of U.S. Consumer Identity. American Quarterly 58 (3): 693–714.
Kaufmann, S. 2011. Zivile Sicherheit: Vom Aufstieg eines Topos. In Sichtbarkeitsregime. Überwachung, Sicherheit und Privatheit im 21. Jahrhundert, ed. L. Hempel, S. Krasmann, and U. Bröckling, 101–123. Wiesbaden: VS Verlag für Sozialwissenschaften.
Kitchin, R. 2014. The Data Revolution. Big Data, Open Data, Data Infrastructures & Their Consequences. Los Angeles: Sage.
Knorr-Cetina, K. 1997. Sociality with Objects: Social Relations in Postsocial Knowledge Societies. Theory, Culture and Society 14 (4): 1–30.
Latour, B. 1987. Science in Action. Milton Keynes: Open University Press.
———. 1993. We Have Never Been Modern. Cambridge, MA: Harvard University Press.
Lyon, D. 2008. Biometrics, Identification and Surveillance. Bioethics 22 (9): 499–508.
Marx, G.T. 2001. Technology and Social Control: The Search for the Illusive Silver Bullet. International Encyclopedia of the Social and Behavioral Sciences. http://web.mit.edu/gtmarx/www/techandsocial.html. Accessed on 17 Feb 2013.
Mattelart, A. 2010. The Globalization of Surveillance: The Origin of the Securitarian Order. Cambridge: Polity Press.
Mayer, K., and J. Weber. Under review. From Optimizing Military Operations to Targeting Terrorist Networks: Social Network analysis in Data-Driven Warfare. Science, Technology and Human Values.
Molotch, H. 2012. Against Security: How We Go Wrong at Airports, Subways, and Other Sites of Ambiguous Danger. Princeton: Princeton University Press.
Monahan, T. 2006. Surveillance and Security. In Technological Politics and Power in Everyday life. New York/London: Routledge.
———. 2010. Surveillance in the Time of Insecurity. New Brunswick: Rutgers University Press.
Nordmann, A. 2004. Was ist TechnoWissenschaft - Zum Wandel der Wissenschaftskultur am Beispiel von Nanoforschung und Bionik. In Bionik – Neue Forschungsergebnisse aus Natur-, Ingenieur- und Geisteswissenschaften, ed. T. Rossmann and C. Tropea. Berlin: Springer.
———. 2010. A Forensics of Wishing: Technology Assessment in the Age of Technoscience. Poiesis & Praxis 7 (1–2): 5–15.
O’Malley, P. 1999. Governmentality and the Risk Society. Economy and Society 28 (1): 138–148.
Pickering, A. 2002. Cybernetics and the Mangle: Ashby, Beer and Pask. Social Studies of Science 32 (3): 413–437.
Power, M. 2004. The Risk Management of Everything. Rethinking the Politics of Uncertainty. London: Demos Publications.
Ratcliffe, J.H. 2012. Intelligence-Led Policing. London: Routledge.
Reid, R., and S. Traweek, eds. 2000. Doing Science and Culture. How Cultural and Interdisciplinary Studies Are Changing the Way We Look at Science and Medicine. New York/London: Routledge.
Ruppert, E.S. 2009. Number Regimes. From Census to Metrics. Cresc Working Paper Series [Working paper No. 68]. http://hummedia.manchester.ac.uk/institutes/cresc/workingpapers/wp68.pdf. Accessed on 19 Sept 2017.
Salter, M. 2008. Risk and Imagination in the War on Terror. In Risk and the War on Terror, ed. L. Amoore and M. de Goede, 233–246. New York/London: Routledge.
Schneier, B. 2003. Beyond Fear: Thinking Sensibly about Security in an Uncertain World. New York: Copernicus Books.
Shklar, J.N. 1990. The Faces of Injustice. New Haven: Yale University Press.
Singelnstein, T., and P. Stolle. 2011. Die Sicherheitsgesellschaft: Soziale Kontrolle im 21. Jahrhundert. Wiesbaden: VS Verlag.
Standler, R.B. 1997. Privacy Law in the USA. http://www.rbs2.com/privacy.htm. Accessed on 30 Dec 2016.
Suchman, L. 1987. Plans and Situated Actions: The Problem of Human-Machine Communication. Cambridge, MA: Cambridge University Press.
Wayman, J.L. 2007. The Scientific Development of Biometrics over the Last 40 Years. In The History of Information Security: A Comprehensive Handbook, ed. K. de Leeuw and J. Bergstra, 263–276. Amsterdam: Elsevier.
Weber, J. 2003. Umkämpfte Bedeutungen: Naturkonzepte im Zeitalter der Technoscience. Frankfurt am Main/New York: Campus.
———. 2010. Making Worlds: Epistemological, Ontological and Political Dimensions of Technoscience. Poiesis und Praxis 7 (1–2): 17–36.
———. 2011. Techno-Security, Risk and the Militarization of Everyday Life. In The Computational Turn: Past, Presents, Futures? Proceedings of the International Association for Computing and Philosophy, MV Wissenschaft, ed. C. Ess and R. Hagengruber, 193–200. Münster: Aarhus University.
———. 2016. Keep Adding. On Kill Lists, Drone Warfare and the Politics of Databases. Environment and Planning D: Society and Space 34 (1): 107–125.
Winner, L. 1978. Autonomous Technology. In Technics-Out-Of-Control as a Theme in Political Thought. Cambridge, MA/London: MIT Press.
———. 2010. Trust and Terror: The Vulnerability of Complex Socio-Technical Systems. Science as Culture 13 (2): 155–172.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this chapter
Cite this chapter
Nagenborg, M., Weber, J. (2020). TechnoSecuritySociety: Catastrophic Futures, Pre-emptive Security & Mass Surveillance. In: Maasen, S., Dickel, S., Schneider, C. (eds) TechnoScienceSociety. Sociology of the Sciences Yearbook, vol 30. Springer, Cham. https://doi.org/10.1007/978-3-030-43965-1_12
Download citation
DOI: https://doi.org/10.1007/978-3-030-43965-1_12
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-43964-4
Online ISBN: 978-3-030-43965-1
eBook Packages: Religion and PhilosophyPhilosophy and Religion (R0)