The expansive understanding of borders and boundaries in recent scholarship has enriched border studies, but it has also obscured what a border is. This set of interventions is motivated by a need for a more sophisticated conceptualization of borders in light of the recent trajectories of border scholarship. In contrast to the much-feted "borderless world" of the early 1990s, the trend during the past decade has been to consider the exercise of state sovereignty at great distances from the border line itself as "bordering". Indeed, Balibar's (1998) notion that "borders are everywhere"-that the sovereign state's loci of bordering practices can no longer be isolated to the lines of a political map of states-has gained tremendous currency but it is also quite a departure from traditional border studies. Thus the broad question posed to our contributors was: Where is the border in border studies?
The full-text may be used and/or reproduced, and given to third parties in any format or medium, without prior permission or charge, for personal research or study, educational, or not-for-prot purposes provided that:• a full bibliographic reference is made to the original source • a link is made to the metadata record in DRO • the full-text is not changed in any way The full-text must not be sold in any format or medium without the formal permission of the copyright holders.Please consult the full DRO policy for further details. Neither a militarization of society, nor even a commercialization of security, then, what we are seeing is a stitching together of the mundane and prosaic calculations of business, the security decisions authorized by the state, and the mobilized vigilance of a fearful public. It is important to stress here that questioning the logic of militarization is not to underplay the acute violence inherent to this different kind of war. What I call here "algorithmic war" is one specific appearance of Foucault"s Clausewitzian inversion -the
This paper critically analyses the importance of risk management techniques in the war on terror. From the protection of borders to international financial flows, from airport security to daily financial transactions, risk assessment is emerging as the most important way in which terrorist danger is made measurable and manageable. However, we argue that the riskbased approach results in the displacement of risk onto marginal groups, while its effectiveness in the war on terror remains questionable.
Transactions after 9/11: the banal face of the preemptive strike Amoore, L.; de Goede, M. General rightsIt is not permitted to download or to forward/distribute the text or part of it without the consent of the author(s) and/or copyright holder(s), other than for strictly personal, individual use, unless the work is under an open content license (like Creative Commons). Disclaimer/Complaints regulationsIf you believe that digital publication of certain material infringes any of your rights or (privacy) interests, please let the Library know, stating your reasons. In case of a legitimate complaint, the Library will make the material inaccessible and/or remove it from the website. Please Ask the Library: http://uba.uva.nl/en/contact, or a letter to: Library of the University of Amsterdam, Secretariat, Singel 425, 1012 WP Amsterdam, The Netherlands. You will be contacted as soon as possible. Transactions after 9/11: the banal face of the preemptive strike Louise Amoore* and Marieke de Goede** This paper argues that the deployment of transactions data of many kinds has become the banal face of the war on terror's preemptive strike. Because the failure to predict and prevent 9/11 is partly thought to be a failure to 'connect the dots' of available intelligence, post 9/11 policies seek to register, mine and connect ever more 'dots', or association rules, in the form of credit card transactions, travel data, supermarket purchases and so on. We argue that it is in these ordinary transactions that another spatiality of exception is emerging, one in which the traces of habits, behaviours and past practices become the basis of security decisions to freeze assets, to apprehend, to stop and search or to deport. As such, these developments constitute a relatively unacknowledged violence in the war on terror, which is in need of critical questioning.key words war on terror transactions surveillance pre-emption political geography privacy
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.