Role of Technology in Enhancing National Security Paper

User Generated

yvivat_yrtraq23

Humanities

Description

My question is for the final paper, where i have to use al of the reading material and outside scholars resource. This longer paper is to be an analysis of a researched current crisis or conflict. It can be a political, economic or social conflict/crisis either within any country in the region, or between countries. Your paper should be around 10 pages (double-spaced), and there should be at least 10 sources used. The sources should be a mixture of media, government, academic journals, and books, and international organizations. 

The paper should have a title that indicates or hints at the central problem or thesis, and must cover the following points: background to the problem or thesis - this would include history, going only as far back as necessary to explain the current issue the main perspectives, sides, including scholarly research application of a theory, policy approach, framework, etc. from the development literature, or other stream of academic literature, that seems relevant to the issue (and if you are in program other than GTD, please feel free to explore and use concepts from you discipline) a strong conclusion in which the author provides an analysis(not opinion!) of the issue and the role of international institutions within it.The ideas presented in the reading thus far needs to be shown, understood and analyzed. This includes all the articles, I’ve sent you thus far. good topic that uses IOs, things about security , civil society within development, national and global security regime, role of technology within security?

Unformatted Attachment Preview

583039 research-article2015 SDI0010.1177/0967010615583039Security DialogueGrove Special issue on Questioning security devices: Performativity, resistance, politics The cartographic ambiguities of HarassMap: Crowdmapping security and sexual violence in Egypt Security Dialogue 2015, Vol. 46(4) 345­–364 © The Author(s) 2015 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav DOI: 10.1177/0967010615583039 sdi.sagepub.com Nicole Sunday Grove University of Hawaiʻi at Manoa, USA Abstract In December 2010, HarassMap was launched as a Cairo-based interactive online mapping interface for reporting and mapping incidents of sexual harassment anonymously and in real time, in Egypt. The project’s use of spatial information technologies for crowdmapping sexual harassment raises important questions about the use of crowdsourced mapping as a technique of global human security governance, as well as the techno-politics of interpreting and representing spaces of gendered security and insecurity in Egypt’s urban streetscape. By recoding Egypt’s urban landscape into spaces subordinated to the visual cartography of the project’s crowdsourced data, HarassMap obscures the complex assemblage that it draws together as the differentially open space of the Egyptian street – spaces that are territorialized and deterritorialized for authoritarian control, state violence, revolt, rape, new solidarities, gender reversals, sectarian tensions, and class-based mobilization. What is at stake in my analysis is the plasticity of victimage: to what extent can attempts to ‘empower’ women be pursued at the microlevel without amplifying the similarly imperial techniques of objectifying them as resources used to justify other forms of state violence? The question requires taking seriously the practices of mapping and targeting as an interface for securing public space. Keywords Egypt, gender, human security, intervention, securitization, sexual violence, Crowdmapping Introduction In December 2010, HarassMap was launched as a Cairo-based interactive online mapping interface for the anonymous reporting and mapping of incidents of sexual harassment in real time, in Egypt. Going public concomitantly with the beginning of the mass demonstrations that have since come to be known as the January 2011 Egyptian Revolution placed the project in a timely position to address the issue of gendered sexual violence and assault. In the days leading up to former president Hosni Mubarak’s ouster, numerous accounts of Egypt’s popular protests were presented alongside reports of forced ‘virginity tests’ and women being insulted, beaten, and raped (Amnesty Corresponding author: Nicole Sunday Grove, Department of Political Science, University of Hawai’i at Manoa, 2424 Maile Way, Saunders Hall 608, Honolulu, HI, 96822, USA. Email: nsgrove@hawaii.edu 346 Security Dialogue 46(4) International, 2013). The issue received heightened international attention with the high profile assault of CBS reporter Lara Logan, with media coverage of the incident emphasizing culturalist interpretations of mob-style attacks on women protestors and accounts of the ‘Arab street’ teeming with hyper-sexualized, hyper-masculinized mobs of young Arab men (Amar, 2011a). In subsequent months, HarassMap received worldwide media attention for addressing the issue of sexual harassment in the country, which has increasingly been portrayed as an endemic problem ‘deeply rooted’ in Egyptian society (Chick, 2010; Bell, 2012). HarassMap uses the Ushahidi open source crowdmapping platform and FrontlineSMS to create a cartographic representation of incidents of sexual assault that are reported through multiple channels and data streams, including SMS texting, email, Twitter and the HarassMap website (Ushahidi. org, 2014; HarassMap, 2014). Ushahidi uses the Google Maps application programming interface (API), which allows Google Maps to be embedded as a base map into the websites of third party developers. As a Ushahidi implementation for geocoding and georeferencing incidents of harassment, HarassMap presents geovisualized data points that represent spaces of violence which are geolocated through positional information reported, for instance, as text within an SMS report. The project’s use of web-based spatial information technologies for crowdmapping instances of sexual harassment in Egypt presents a unique prism for theorizing about the increased interest in and adoption of Google’s mapping applications for disaster management, conflict response, and other forms of humanitarian and human security intervention, including those related to gendered sexual violence. My interest in this project focuses on how crowdmapping – understood here as a networked assemblage of technological devices including global positioning and imaging technologies, mobile phones, and Ushahidi software – is used to produce a particular biopolitical configuration of the Egyptian street. Like Bennett (2010), I am drawn to Deleuze and Guattari’s notion of assemblage in my thinking of the relay between these different devices as ‘ad hoc groupings of diverse elements… that function despite the persistent presence of energies that confound them from within’ (Bennett, 2010: 23–34). Alone these technological devices are not necessarily biopolitical, but as they work together to aggregate data about sexual violence, they create the conditions of possibility for forms of population management through the ‘targeting’ of dangerous people, dangerous streets, and dangerous neighborhoods. My reading does not attempt to analyze the impact of the program’s mapping and communication campaigns in terms of policy implementation or shifts in general sentiment on the ground with regard to perceptions or experiences of gendered sexual violence. Rather, I am interested in how HarassMap’s specific configuration of data collection, processing, and representation produce a particular knowledge of targeting that resonates with other projects of securitization. As such, the project has more in common with forms of scopic engagement imbued in unmanned aerial vehicles (UAVs) than, for instance, how the same technologies are used for commercial purposes. Scholarship on the ethics of precision in contemporary war, specifically aerial warfare, is helpful for thinking about HarassMap’s use of crowdmapping for generating criminalized subjects and spaces in need of intervention. Zehfuss (2011: 544) argues that precision targeting has made warfare more ethically acceptable because precision targeting is assumed to incur less collateral damage. The acceptability of intervention is justified by the ability of precision weapons to identify, locate, and ‘hit’ particular targets with accuracy while minimizing incidental damage. I suggest that a similar ethics of precision is evident in narratives that celebrate HarassMap’s use of technology and its ability to target both individual harassers, whose pictures are uploaded to the site via smartphone cameras, and in the visual and statistical identification of ‘hotspots’ on the harassment map. As with any evaluation of precision targeting, one needs to consider the question of incidental violence. The incidental violence of HarassMap turns on what I call the plasticity of victimage. To Grove 347 the extent that HarassMap seems unequivocally positive, its location of the problem of gendered violence in Arab culture, its reliance on the trope of victimhood, and its appeal to both international organizations and local law enforcement are implicated in a project of population management that works through an assemblage of actors, objects, and affects that animate colonial archives of sexuality and ‘Arabness’. As these archives resonate with new techniques of mapping and targeting, the project produces a series of tensions through demands for the expansion of the state’s policing powers, more punitive sanctions for harassers amidst crackdowns on anti-government and antimilitary sentiment, new prohibitive laws on public assembly, and the sexual torture of women and men arrested for protesting while in state custody. This article presents an alternative reading of HarassMap that considers how the project presents a ‘vertical solution’ (Weizman, 2002; Crampton, 2010; Graham, 2004, 2011; Graham and Hewitt, 2013; Elden, 2013) to the problem of gendered human security through a series of technological interventions that attempt to create new forms of public consciousness in the presentation of targets. As a Ushahidi implementation, HarassMap’s interfacing with Google Maps allows the project to engage in a kind of aerial targeting of harassment, creating a domain of intervention that is atmospheric, grounded, networked, and global. By recoding Egypt’s urban landscape into spaces subordinated to the visual cartography of the project’s crowdsourced data, HarassMap recodes the complex assemblage that it draws together as the differentially open space of the Egyptian street – spaces that are territorialized and deterritorialized for authoritarian control, state violence, revolt, rape, new solidarities, gender reversals, sectarian tensions, and class-based mobilization. Leszczynski and Elwood (2015: 15) accurately note that HarassMap highlights how the spatial navigation of urban life is never a frictionless terrain of movement for women, but is always gendered and sexualized and must therefore be negotiated to minimize the possibility of violence. My analysis asks us to consider how the HarrassMap’s representation of space is also racialized, and how the project is skewed toward a particular internationalist interpretation of gendered space that relies on a liberal ‘rule of law’ framework, one that is highly problematic given the role of the Egyptian state in the creation of a climate of sexual terror as a form of political retribution and intimidation. Without discounting the potential ameliorative effects of HarassMap or dismissing the intentions of its founders and participants, I wish to highlight how HarassMap appeals to culturalist explanations of sexual violence in the Arab world that resonate with an ethics of precision that has filtered into the realms of human security and public consumption as satellite and imaging technologies become part of our everyday experience of other spaces. What is at stake in my analysis is this: To what extent can attempts to empower women be pursued at the microlevel without amplifying the similarly imperial techniques of objectifying them as a resource used to justify other forms of state violence? The question calls for a close analysis of the practices of mapping and targeting as interfaces for securing public space. Ultimately, we must consider the degree to which seemingly progressive uses of these technologies can exceed the martial logic of their origin. By considering the relays between bodies and technologies in this context, I seek to develop what Law (2004) refers to as a ‘sensibility to materiality, relationality and process’ to show how methods are performative in the production of political effects through the enactment of particular forms of knowledge (Aradau and Huysmans, 2014: 598). I experiment with different languages and disciplines for thinking about modes of agency that exceed liberatory projects, but also agencies that exceed explanations for effects and events that take only human action into account. I reflect upon the kinds of political projects presupposed and constructed by certain digital communicative practices, and suggest that there is a political valence to fields of practice, that in excess of any intentionality, work to transform the basis upon which different kinds of politics are envisioned and practiced by women and men on the ground. My 348 Security Dialogue 46(4) aim is to highlight not only what these practices mean, but also the subtle work that digital cartographic representations of sexual violence do to the experience of subjectivity, attachment, and community. Specifically, I am interested in the discursive representations of gender and race via HarassMap, the pragmatic effects of the technologies that make up the project, and the interaction between the two. The original research for this article is based on an evaluation of 449 reports posted in English and 252 reports posted in Arabic, including pictures and video, to the HarassMap website between October 2004 and April 2014; two annual reports produced by the project; approximately three hours of video published on the HarassMap website; as well as several articles about and previously published interviews with members of HarassMap staff. Rather than explore the use of HarassMap as a strategy that either ‘works’ or doesn’t, or make claims about any number of reports representing epistemic breaks in practices of human security, I propose an engagement with the project from within the globalizing networks whereby bodies and data travel together to think about what it might represent in terms of incipient shifts in biopolitical logics of securitization. In other words, I explore how the concept of HarassMap is outpacing its application. The primary focus of the article is how the project makes sensible the targeting of space, and the emergence of new forms of intervention that point to larger systems of biopolitical ordering that may mutate and transform at rates often too slow to be seen. In what follows, I consider the project’s specific policing techniques in the context of what I identify as an incipient merger between UN gender discourses on sexual security and the use of crowdsourced data for human security governance. I then argue that HarassMap employs a particular territorial strategy to capture and redefine the policing of urban sociality as a three-dimensional space, where planar perspectives on territory representing the so-called ‘reality’ of sexual violence on the ground are dependent upon a material assemblage of technologies, from satellites to mobile handheld devices, that make visible particular kinds of targets through the project’s mapping interface. Finally, I pose the question of whether or not sexual violence is best addressed through more totalizing forms of surveillance and paradigms of risk management that seek to order populations into profiles and probabilities as part of an internationalist and interventionist project of human security governance. Security, devices, and the government of things While spatial information technologies have deeply militarized roots, they are, like all technologies, ambivalent and contingent in how they organize knowledge (Coutard and Guy, 2007: 714; Burns, 2014). This is evidenced in the increasing public use of these technologies through platforms like Google Earth and Google Maps. A growing number of scholars have begun to consider the use of geospatial technologies and mapping platforms in theorizations of geopolitics and visuality (Weizman, 2002), urban life (Graham and Hewitt, 2013), critical geography (Elden, 2009, 2013; Crampton, 2010), and humanitarian intervention (Parks, 2009; Crutcher and Zook, 2008). Burns (2014: 52) defines digital humanitarianism as ‘the enacting of social and institutional networks, technologies and practices that enable large unrestricted numbers of remote and on-theground individuals to collaborate on humanitarian management through digital technologies’. Writing about the use of GIS in digital humanitarianism, Burns argues that the reliance on remote processing, aggregation, and the representation of user generated data results in each program or project also producing its own form of knowledge politics (Burns, 2014: 52; see also Zook et al., 2010; Brabham, 2008). For example, Lisa Parks’ (2009: 537) essay on Google Earth’s ‘Crisis in Darfur’ project shows how mapping platforms mediate affective visual-cartographic arrangements of satellite imagery, war photography, graphic narratives, and human rights monitoring meant to Grove 349 provoke particular responses and preface particular geopolitical agendas. The use of Google Earth in creating both a knowledge politics about Darfur and the publics for this information is an example of what Burns calls ‘moments of closure’ in which certain forms of knowledge politics become temporarily ‘fixed’ in the software, hardware, and social practices of particular technologies (Burns, 2014: 52). This scholarship presents a challenge to the idea of spatial information technologies as purely instrumental, instead attending to the social, historical, and political contingency of technical devices and platforms, and to how the functionalities of these devices shape human action and the representation of data to present a particular picture of the world. Focusing on the instrumentality of the devices employed in the production and distribution of HarassMap’s crowdsourced data provides insights into how the project reorganizes concerns about development and modernization toward a gendered security paradigm invested in both feminist internationalism and free-market transnationalism. By feminist internationalism, I mean the move toward defining universal and measurable criteria to improve the conditions for women globally in a range of areas including health, education, and economic opportunity. These criteria, in particular those related to sexual violence, are increasingly being thought of in terms of surveillance and policing in UN gender discourses. As Foucault (2007) recounts through the work of Guillaume de La Perrière, policing requires the right disposition of people and things within a network of contingent interventions, technological innovations, and spatial arrangements, where life and the living are organized in such a way as to achieve these criteria. Free-market transnationalism, which I borrow from Sparke (2006: 153), is defined as ‘the incorporation of economic imperatives that involve increasingly transnational capitalist interdependencies and the associated entrenchment of transnational capitalist mobility rights through various forms of free-market re-regulation’. Here neoliberalism is described as a set of contingent practices of free-market governance, which often incorporate illiberal forms of political management (Sparke, 2006: 153). I am interested in how the confluence of these two interests resonates with security as a form of governance, and how the goals of the advancement of women and the expansion of market reason come to inhabit the practices of sexual security. Critical feminist engagements with human security have raised important concerns about gendered, racial, and class-based exclusions produced in the construction of universal notions of human values, instead highlighting the ambiguity of ‘security’ and arguing for an emphasis on relationality and context in how security is conceived and operationalized (Hudson, 2005; Christie, 2010; Wibben, 2011; Marhia, 2013). The study of HarassMap contributes to this literature in two ways. First, it brings feminist security studies into conversation with feminist geographic research and postcolonial cartography engaging GIS technologies (Kwan, 2002; McLafferty, 2005; Radcliffe, 2009) to look at how the project’s use of crowdsourcing and crowdmapping produces racial and class-based exclusions in the interest of sexual security. Second, it suggests an incipient shift in how the use of crowdsourcing and crowdmapping by international organizations is reorganizing the locus of human security from the individual to what Deleuze (1990) terms the ‘dividual’. Williams (2005) explains dividuals as embodied human subjects that are ‘endlessly divisible and reducible to data representations via modern technologies of control’, where information about ourselves can be separated from us and resynthesized in ways over which we have no control. As women who are subjected to sexual violence are encouraged to identify themselves as targets of intervention via HarassMap, their experiences are aggregated at the intersections of class, age, race, and gender to demonstrate large quantities or patterns of violence. Once this happens, it is no longer a particular person’s experience or life that is to be secured. Instead, aggregate sums of experiences replace any one woman’s life to determine the success or failure of an intervention, as well as indexing the targets of those operations. Spaces 350 Security Dialogue 46(4) and lifeworlds are thus decontextualized and made sensible to a quantitative index used to determine how liberal or illiberal a neighborhood, city, or even an entire region is. Here, the streets of Cairo become a space in which the highly sexualized bodies of Egyptian women and men are tracked, tagged, and coded in ways that seem innocuous, but in fact fall into a dispositif of security that renders all data useful in ‘manipulating, maintaining, distributing, and re-establishing relations of force’ (Foucault 2007: 312). Within this dispositif, security is no longer strictly disciplinary, but is dispersed along and within multiple layers and strategies of power whose project is to ‘make life live’ (see Dillon and Lobo-Guerrero, 2008; Muller, 2008). Thus HarassMap cannot help but produce new data streams about the Egyptian population that can be redeployed by the matrix of liberal feminism and neoliberalism. Paul Amar (2013: 214) describes this phenomenon of UN-affiliated non-governmental organizations (NGOs) working locally on the issue of harassment within ‘a middle-class, law enforcement-centered rescue-protection framework’. My reading of HarassMap pushes Amar’s analysis further into the ‘government of things’, and specifically toward what Aradau (2010) identifies as the performative role of material objects in practices of securitization. The devices I am engaging in this article are performative in that they produce particular frameworks for security that privilege Western international norms and a middle-class and consumerist understanding of public space. We can neither graft Foucault’s account of 18th-century France onto the streets of contemporary Cairo, nor declare these new technological assemblages as unprecedented. Instead, what I am arguing is that innovative techniques of governmentality mobilize and mutate older epics of racial and sexual knowledge. Following this, technological devices, crowdsourcing, private enterprises such as mobile phone companies, datasets, satellite imaging, and international organizations become imbued with colonial legacies and the particularities of the Egyptian urban milieu to define a unique repertoire of human security interventions where social, political, and cultural life can be reduced to a set of calculations and codes. HarassMap, crowdmapping, and laboratories of securitization Amar (2013: 204) argues that the spaces in which gendered human security regimes operate in Egypt form ‘a crucial laboratory’ for experiments with an assortment of emancipatory and repressive securitization practices that shape what he calls ‘contemporary gender-sensitive security states’. I draw on this idea of the laboratory for thinking about HarassMap in light of the emerging alliance between UN gender norms as a human security priority, and the increasing move toward crowdsourced mapping by international institutions as a strategy for disaster management and human security governance. These systems work together at the intersection of technology, calculation, and affect to produce two separate yet interfacing configurations of security governance. The first relates to the production of a particular kind of cultural security and social hierarchy that marginalizes class-based mobilization, and instead highlights the proper female citizen as a law-enforcement centered and gendered consumer marked by class (Amar, 2013: 128). The second form of ordering relates to the creation of what Jasbir Puar (2007: 107) terms ‘data bodies’, or bodies materialized through algorithms, statistics, and data streams that are racialized and sexualized through the information they assemble. Originally created for the purpose of mapping reports of violence in the aftermath of the 2008 Kenyan elections, Ushahidi has since been used by numerous organizations to collect information about and create cartographic representations of crowdsourced reports on various issues, including those related to sexual violence and assault. In what appears to be a growing trend, other organizations have adopted the Ushahidi platform specifically for georeferencing crowdsourced data on gendered violence, including the Women’s Media Center’s ‘Women Under Siege’ (2014) website, Grove 351 which documents reports of sexual assault in Syria, Geographies of Violence Delhi (2014), and the Open Institute for Gender Based Violence in Cambodia (2014). The idea for HarassMap was developed in 2005 by two women working for the Egyptian Center for Women’s Rights (ECWR) in Cairo: Rebecca Chiao, an American graduate of the Johns Hopkins University, Paul H. Nitze School of Advanced International Studies (SAIS), who currently acts as director of the project, and Engy Ghozlan, an Egyptian women’s right activist (Tavaana.org, 2013). Both women recall experiencing daily sexual harassment on the streets of Egypt as a motivating factor in the project’s beginning stages. As part of their work for ECWR, Ghozlan and Chiao began developing an anti-harassment campaign and communicating with other organizations and NGOs addressing the issue. It was at this time that they met two of the other core members of the HarassMap team: Sawsan Gad, a geographic information systems (GIS) data analyst, and Amal Fahmy, who had worked for the United Nations Population Fund (Tavaana.org, 2013; HarassMap. org). The harassment map was conceived in part with technical assistance from NiJeL, a group that partners with other organizations to create custom systems for data visualization and analysis (Nijel.org, 2014). Nahdet El Mahrousa, an incubator focusing on ‘social entrepreneurship,’ currently provides a legal umbrella for the organization to operate within the country. Since its initial launch, HarassMap has received a two-year grant from Canada’s International Development Research Centre (IDRC), and has raised more than US$25,000 from a 2013 Indiegogo crowdfunding campaign. The project has also received several international awards including the 2012 World Summit Youth Award, which acknowledges organizations working toward the United Nations Millennium Development Goals, the 2012 Deutsche Welle Award for best use of technology for social good, and a certificate of recognition from the Association of American Geographers ‘My Community, Our Earth’ partnership. HarassMap has both an Arabic and English language interface for reporting incidents of sexual harassment. Individuals are prompted to assign the incident to a particular category of harassment provided by the site (touching, rape, catcalls, etc.), the location of the incident, and a summary of what happened along with a series of demographic indicators including age, gender, and level of education (HarassMap). These reports are reviewed by the HarassMap team and then geovisualized as a geographical data point over Google Maps in the form of a red dot that can be aggregated or individuated depending on the position of the zoom toggle (Figure 1). Its multiple filtering options for refining the presentation of data reinforces the perception of the map as both totalizing and infallible in terms of its ability to penetrate a particular space. HarassMap’s research team regularly reviews the map to identify ‘hotspots’ where community organizers deploy communications campaigns aimed at encouraging action against sexual harassment in accordance with a series of guidelines provided by the organization (Rissman, 2014). Chiao states that the outreach program takes what she calls a ‘social approach’ to addressing harassment: ‘We do direct interventions to rescue the women, but in our normal long-term work we target bystanders to intervene’ (Tillet, 2013). HarassMap has 10 full-time employees, at the time of writing, and claims over 1000 volunteer members for its community outreach program (Rissman, 2014). These volunteers are trained to speak with ‘locals’ and those with a visible presence on the street, and printouts of the map are distributed to demonstrate ‘proof’ of the problem as endemic to a particular area (HarassMap, 2014). Those with whom HarassMap makes contact are asked to sign an agreement that they will intervene when acts of harassment occur according to the guidelines provided, and in instances where people are reluctant to sign a document, HarassMap reads this contract to them, asks them for a verbal agreement, and signs it on their behalf (Rissman, 2014). HarassMap also encourages shop owners who have signed the pledge to put stickers in their windows indicating their support for the project, presumably with the promise of potential revenue generation, and as a visual marker of HarassMap’s presence on the street. 352 Security Dialogue 46(4) Figure 1. HarassMap – http://HarassMap.org/en/what-we-do/the-map. Source: HarrassMap (2014), author screenshot (accessed 2 May 2014). The techniques described here allow us to situate HarassMap within a particular system of UN-recognized feminist campaigns identified by Amar (2013: 204) that emerged between 2003 and 2010. These campaigns rejected class-conscious movements for social change and instead focused on cultural explanations for gendered sexual violence. Organizations working within this framework called for an intensification of policing on the streets to combat harassment, and promoted campaigns geared toward ‘social respectability’ that facilitated ‘securitized and militarized appropriations of internationalist gender and security interventions’ (Amar, 2013: 204). For example, HarassMap’s 2010–2012 annual report, despite acknowledging that some instances of sexual violence reported to the site were committed by Egyptian security forces, focuses its criticism of the police and military solely in terms of a lack of presence or a lack of willingness to intervene (Gad and Hassan, 2012: 6, 9). Chiao has also advocated in numerous interviews for increased policing on Egypt’s streets as part of an integrated campaign to fight sexual harassment: ‘We’re also going to give the map to the police, who want to increase their activities against sexual harassment but still don’t have a system for finding out exactly where the incidents tend to happen. The map will reinforce the protection of women, especially in so-called “hot spots” ’ (Shibib, 2011). This position ignores how the Egyptian security state has institutionalized sexual violence against women and men as a way to undermine political dissent (Amar, 2013; Slackman, 2005; Allam, 2014). Amar traces the development of the legislative language around sexual harassment as a human security priority within UN gender discourses back to October 2000 with the UN Security Council (UNSCR) Resolution 1325 on ‘Women, Peace and Security’, which was designed to ‘mainstream gender’ into practices of peace and security among member states (Amar, 2013: 205). UNSCR 1325 was incorporated into the 2005 United Nations Development Program’s ‘Arab Human Development Report’, which identified the problem of sexual harassment and the discriminatory dispositions of Arab men as a human security concern. The Egyptian government also used UNSCR 1325 in 2009 as a precedent for consolidating executive powers and increasing security during Grove 353 civil unrest, supposedly to protect women from street harassment (Amar, 2013: 205). Referencing Sally Merry (2003: 943), Amar describes the Convention on the Elimination of All forms of Discrimination Against Women (CEDAW) as: a cultural system whose coin is admission into the international community of human-rights compliant states. At the heart of this legal process of monitoring this international human rights convention is the cultural work of altering the meanings of gender and of state responsibility for gender equality [through which] national and international NGOs . . . shame noncompliant governments [whose] sovereignty was increasingly defined as contingent on its human rights performance. (Merry cited in Amar, 2013: 206) HarassMap draws directly on these UN gender doctrines and CEDAW institutions, funds, discourses and legal-juridical mobilizing strategies; two of its four core members have worked for the UN, and the project has a standing relationship with the UN’s Safe Cities project. This research provides a valuable context for considering the use of geo-spatial technologies in the ordering and management of urban Arab populations, and how crowdsourced mapping is emerging as a preferred technique within global human security governance. UN General Assembly Resolution 61/110 established the UN platform for Space-based Information for Disaster Management and Emergency Response (UN-SPIDER) on December 14, 2006 (UN, 2014). The stated goal of UN-SPIDER is to provide ‘universal access to all countries and all relevant international and regional organizations to all types of space-based information and services relevant to disaster and disaster risk management’ (UN-SPIDER, 2014). In 2011 the UN General Assembly Committee on the peaceful uses of outer space released report AC105/1007, which emphasized the importance of crowdsourced mapping facilitated by spatial technologies, satellite imagery, telecommunications satellites, and global navigation satellite systems for disaster management, and acknowledged the importance of collaborative ventures between UN-SPIDER and its Volunteer and Technical Communities (V&TCs) including Ushahidi, Google Mapmaker, OpenStreetMap, and CrisisMappers (UN, 2011). Ushahidi is an example of how advances in software, mobile technologies, and geo-spatial data collection and interpretation have facilitated the move of geodata collection from commercial uses to crowdsourcing data for human security governance. Crowdmapping has become increasingly popular for addressing what Ushahidi co-founder Erik Hersman calls the problem of ‘wasted crisis information’, which he explains as an ability to ‘produce’ crowdsourced reports in excess of the ability to ‘consume’ them (TED, 2009). We can infer here that Hersman means the data collected via crowdsourcing often exceeds the ability to use it for disaster response, but his language of production and consumption is also telling. Crowdsourcing, which was born in user-generated advertising content and online commercial competitions, speaks to a particular kind of relationship between space and calculation that contributes to a phenomenon Crampton and Elden (2006: 681) call the ‘mathematization of the subject’. Following Osborne and Rose (2004), they argue that a model of population management based on ordering, ranking and measuring relies on a mode of rationality that makes space ‘amenable to thought’. Consider this insight in the context of HarassMap’s ability to differentiate between types of harassment and their degrees of violence in order to manage the level of response. The coding of the different types of sexual harassment (catcalls, comments, facial expressions, stalking, etc.), of the number of incidents, and of their precise location speaks to HarassMap’s own projection of the relationship between space and calculation that allows the project to produce through crowdmapping a particular visualization of urban life in Egypt. Here geo-spatial technologies become tools for HarassMap’s unique form of population management around statistical inferences about sexual violence that remain distinct from questions of economics, inequality, austerity policies, geopolitical relations, international arms trade, and fiscal policy. 354 Security Dialogue 46(4) The illusion of transparent space and an all-seeing vision has been described elsewhere by Donna Haraway as the ‘view from nowhere’ (1988; see also Rose, 1997). Given that sexual violence is not the traditional way political geography situates knowledge, HarassMap does appear to present a feminist cartography via crowdmapping. However, the project does not appear to engage working-class Arabs, alternative feminist movements within the country, or movements mobilized around religion or class in the building of categories and the assignment of names in the process of mapping. Mapping gender securitization in the volume The notion of terrain as volumetric is incorporated in a provocative range of scholarship on the vertical dimensions of security (Adey et al., 2011; Elden, 2013; Graham and Hewitt, 2013; Williams, 2007; Zehfuss, 2011) and on the more overtly militaristic control of aerial space (Williams, 2007; Gregory, 2011; Adey, 2010a; Adey, 2010b). However, the aerial politics of domination are not always overtly militaristic. The use of mapping and geo-positioning technologies also engage the vertical dimensions of territory and security, highlighting new spheres for intervention and new spaces of vulnerability. HarassMap uses mapping as a territorial strategy to capture and redefine the policing of urban sociality as a three-dimensional space. The ability for HarassMap to approach the problem of sexual harassment from a multi-scalar perspective is dependent upon an assemblage of devices that are atmospheric, grounded, and networked. Here, the securitization of feminist internationalism dovetails with practices of aerial targeting (of individuals, neighborhoods, even whole ‘cultures’) not dissimilar from what Wall and Monahan (2011: 239) call the ‘drone stare’, or a form of surveillance that abstracts life on the ground and reduces difference, variation, and ‘noise’ in an effort to achieve a strategic advantage through systems of verticality. Graham and Hewitt’s (2013) work on ‘Google Earth urbanism’ highlights a series of useful vantage points from which to consider HarassMap’s ‘vertical solution’ to the problem of sexual violence. In their account, global satellite imagery, digital cartography, geo-spatial data collection, street level digital imagery, social media, and other data and software that make up Google’s mapping interface are combined as an ‘always on’ interactive datascape. These platforms become ‘a flexible and multiscaled portal through which urban life can be enacted, mediated and experienced in profoundly new and important ways’ (p. 75; citing Scott, 2010). The increasing public access to these technologies is reshaping our relationship to the world as one that is becoming ‘radically accessible, zoomable and pannable in a myriad of mobile and (near) real-time ways’. The fact that Google does not produce any of its own aerial images, instead acquiring them through various commercial entities and governments that produce satellite imagery (Parks, 2009; Kurgan, 2013), does not diminish the fact that ‘any distinct spatial patterns within uploaded information have the potential to become real and reinforced as Google is continually relied on as a true representation of the offline world’ (Graham and Zook, 2011: 115). Roger Stahl’s (2010: 67) discussion of aerial representations facilitated by Google Earth provide some insight into how aerial representations of space produced through the Google Maps API create a new kind of public consciousness through a particular ‘aesthetics of visibility’ that make certain kinds of knowledge visible while obscuring others. Following Stahl, the layered regimes of visibility, access, and control embedded in these interfaces speak to HarassMap’s use of geospatial data for targeting, as well as the use of the harrassment map as irrefutable evidence that sexual violence is happening in a particular locale. As co-founder Rebecca Chaio notes, ‘It’s so easy to zoom in … make a printout of the map and bring it to people in the streets and show them, this is our neighborhood’ (emphasis mine; IDRC, 2013). Crowdmapping, together with the delegation of on-the-ground outreach activities, makes visible a particular interpretation of Egyptian urban sociality that is not only reflected in, but also defined by, different interfacing technologies, aerial images, and digital representations of Grove 355 Figure 2. HarassMap.org/en. Source: HarrassMap (2014), author screenshot (accessed 12 April 2014). violence. Hence, more than a digital depiction of an existing reality on the ground, HarassMap aims to shape the spaces it claims to represent. HarassMap as a tool for mapping sexual violence in real time is only possible because of today’s real-time zoom, from the entire surface of the Earth to a single individual on the ground. Through its interfacing with the Ushahidi platform, the website is able to present a totalizing picture of incidents of sexual violence from 2004 to the present day as a comprehensive and filterable set of geo-spatial data points organized along a uniform spectrum that smoothes over the varying origins, sources, motivations, and contexts that belong to the patchwork of individual reports and news items compromising its archeological record. HarassMap claims to represent the material conditions of sexual violence and assault on the ground through its ability to zoom in and out of a series of frames that present a ‘view from above’ of incidents of harassment. The zooming function of Google Maps creates the aesthetic experience of sliding along a scale by constructing an uninterrupted flow between different spatial planes whereby sexual harassment is captured from the air to the ground target and then back again into the Earth’s atmosphere at a scale of 1 pixel to 111 meters. This experience of scale is illustrated in Figure 3, which depicts four different zoom positions, from the global to the street level, on a single reporting map. At its maximal aerial 356 Security Dialogue 46(4) Figure 3. Four different zoom positions on a single reporting map. Source: HarrassMap (2014), HarassMap.org/en/submit-report, author screenshot (accessed 12 April 2014). vantage point (Figure 2), the red dot representing instances of harassment and sexual violence in Egypt visually dwarfs the entire country, spreading into Turkey, Iraq, Saudi Arabia, Sudan, and Libya. The number of reports (1272 on April 12, 2014) mostly originating from Cairo vastly overshadows the single digit reports made in the United States (two reports) and those made in Europe (three reports). Applying Kurgan’s (2013) engagement with Google Earth to the Google Maps interface, we can see how the political, economic, and security stakes that underwrite the creation of the map disappear (p. 21). All that remain are the markers of sexual violence as time stamps and a series of coordinates (p. 21) made available for public view. Certainly it could be argued that HarassMap’s efforts are focused primarily on Egypt’s urban areas and not on the United States or Europe. The program’s target areas notwithstanding, global surveillance is a specter residing within the combination of Google Maps satellite imagery and the international purview of the UN gender conventions and norms cited on the HarassMap website. The assemblage of interfaces that make up the harassment map generate a visual representation of the project’s global jurisdiction, as well as a visual representation of its crowdsourced data. Kurgan (2013: 20) draws our attention to the ‘radically decentering’ effect of the seemingly ‘uninterrupted flow’ of the map as one moves smoothly from one scale to another. The combination Grove 357 Figure 4. Image of harassers, accompanying a report dated 21 March 2014. Source: http://HarassMap.org/en/what-we-do/the-map/. HarrassMap (2014), author screenshot (accessed 7 May 2014). of interfaces that make up the harassment map do not give preference to any particular scale, as there is no ‘natural or logical starting or stopping point for the zoom’. As Kurgan notes about the decentering effect of the zoom toggle more generally, the scale is ‘relativized by its proximity to and distance from the next’. The map is not bound to any particular location or scale, ‘least of all the human scale’ (Kurgan, 2013: 20), which is where HarassMap identifies the emergence of the subject as victim or perpetrator. This creates a visual representation of HarassMap’s jurisdiction as global, a presentation that works concomitantly with the project’s promotion of UN gender norms. As such, Egyptian urban sociality and sexuality appear as a series of flattened and homogenous images that can be evaluated and monitored at the minutest level. Targeting chains and the plasticity of victimage HarassMap points to how advances in mobile technology have deterritorialized the capacity for aerial surveillance from overhead images produced by military-grade satellites to quotidian ground-level mobile communications devices for capturing video, photographs, and other forms of data. The complex interfacing between practices, technologies, people, and policies creates a ‘target-chain’ used to direct HarassMap’s management of Egypt’s urban spaces. My use of the term ‘target-chain’ is inspired by Derek Gregory’s (2011: 196) theorizing of the ‘kill-chain’ in his discussion of more overt forms of violence related to drone warfare and unmanned aerial vehicles (UAVs). In Gregory’s description, a ‘kill-chain’ is the dispersed apparatus of networked actors, affects, objects, discourses and practices that produce targets as these elements pass through the chain. This process of passing through creates particular kinds of subjects when bureaucratic 358 Security Dialogue 46(4) practices and acute forms of violence are brought together in the creation of targets. For Gregory, what is unique about the late modern kill-chain is that it must contend with mobile targets, which requires the rapid processing of information. This results in an experience of time–space compression that draws more dispersed elements within the apparatus closer to the visual field of the ‘killing space’ (Grant, 2008 cited in Gregory, 2011: 196). A less overtly militaristic yet similar organization of actants and processes can be found in HarassMap’s geospatial interventions. These interventions are also comprised of an assemblage of disparate and dispersed elements, including Egyptian women, NGOs, liberal international discourses on human rights, smartphones, GIS software, the Ushahidi platform, local shop keepers, international donors, images of young Arab men in moving cars, and security states that are drawn together in the creation of decisive objects for aerial targeting. Through its community mobilization campaigns, HarassMap engages everyday citizens in the practice of targeting (on the street when asked to ‘speak out’ against the harasser, in uploading reports, in taking photos of harassers with mobile devices, in identifying target areas for community intervention), creating a target-chain comprised of nodes and links that engage other areas of social, legal and political life. We should give closer consideration to the networked engagements between ground and air surveillance that make it possible for HarassMap to act on real objects and complex urban environments, where the violence of such interventions has otherwise become increasingly abstract and obscured. This is in part, I think, a result of crowdmapping’s so-called utility, as well as the discourses of innovation and progress that filter into HarassMap’s use of imagery and navigation to be able to intervene on victims’ behalf with increasing precision. It is here that we find the answer to the ethico-political problem of sexual harassment in Egypt – in discourses about Western technological superiority and a market-based ethics that sees life as enhanced through its subjection to free-market governance. Yet HarassMap’s ability to hit its specific target is, as Zehfuss (2011: 551) has argued about targeting precision more generally, not the same as not hitting anything else. The targets visualized through the HarassMap interface are also more than just marks on the map representing an ogler, toucher, or rapist. In fact, it might be more accurate to say that HarassMap produces a series of interfacing targets. There is the materiality of the targets themselves, which are actual people, objects, and environments that can be acted upon immediately, decisively, and with such speed that the violence of these interventions often appear abstract. Within this material and holographical target space are racialized and sexualized women who themselves become targets for rescue operations. There is also Egypt’s cultural acceptability of harassment as a target, which plays into culturalist explanations of sexual violence that rely on Orientalist tropes of unchecked masculine aggression and the ‘predatory sexuality’ of the so-called Arab street, which, as Amar (2011b) argues, resonate with a commonly accepted presumption that Egypt needs an authoritarian government to keep its politics and population in order. More importantly, the idea that the proliferation of sexual violence emerged as a result of the power vacuum left by Mubarak’s ouster is factually inaccurate. Sexual violence committed by security forces, police, and hired ‘thugs’[baltagiya] was a frequently used element of Mubarak’s repertoire of political intimidation tactics. One of the more notable examples is the event known as Black Wednesday, when in May 2005 security forces held back crowds so that plainclothes policemen could beat and sexually assault four women, including journalists, who called for a boycott of a constitutional amendment that would strengthen Mubarak’s position in government and solidify the succession of his son, Gamal (Ahram.org, 2013; Slackman, 2005). Mubarak’s government also used sexual violence and harassment as a justification for mass arrests of presumed political dissidents. This move was seen as a victory among many women’s groups demanding more police intervention on the street. In another example, in November 2008 Egyptian security forces arrested Grove 359 400 young males between the ages of 15 and 17 for ‘flirting offenses’ according to Cairo police director Faruq Lashin (Amar 2011a: 319). A similar culture of sexual terror continues under al-Sisi’s rule despite recent overtures to international demands for more government response to the issue. Egypt signed the United Nations Declaration of Commitment to End Sexual Violence in Conflict in 2013, and in 2014 made sexual harassment a criminal offense with a punishment of up to five years in jail and fines ranging from E£ 400–7000 (US$52–US$917) (Allam, 2014). It seems clear that the enforcement of sexual harassment law seems highly selective at best, and at worst has been used as a justification for extending political brutality and the mass arrests of protestors. In October 2012, another 172 men were arrested during the first two days of the Eid al-Adha [Feast of the Sacrifice] holiday (Egypt Independent, 2012). There have also been widespread reports of women being assaulted while in custody after they have been arrested to ‘protect’ them from harassment while engaging in demonstrations. Male dissidents are also regularly raped and tortured while detained by security forces (Kingsley, 2014). If, according to government figures, more than 16,000 people have been arrested for political dissent between July 2013 and April 2014 (Kingsley, 2014), it is daunting to consider the number of incidents of rape and assault committed by security forces that have gone unreported. HarassMap has almost nothing to say about the role of the Egyptian government and Egyptian security forces in directly perpetuating a culture of sexual terror among its citizens. When explaining why they think sexual harassment has become so common in Egypt, they argue that there is no data that exists to explain this phenomenon, but that based on their experiences it seems reasonable to attribute it to a form of ‘general aggression, power, and violence’ (Harassmap, 2015) within Egyptian society. Women are more likely to be attacked, in their explanation, because they occupy a lower position within society, and the government’s passive attitude toward the problem of sexual harassment seems to be exacerbating the issue (HarassMap, 2014). However, the examples of state-sanctioned violence illustrated here seem anything but passive. Bringing Zehfuss’ (2011) discussion of precision back in, these examples also ask us to consider what else might lie within the ‘radius of the blast’ of HarassMap’s targeting campaign. Do the HarassMap team and its volunteers consider those who might not otherwise become targets of the state – for instance women who are ‘protectively detained’ (Amar, 2011a: 319) from harassment during protests? Are these women simply considered ‘collateral damage’ in the overall appeal for more policing of sexual harassment? Does the program offer justifications for its own ‘casualty levels’ that also rise as sexual harassment becomes targeted more decisively by security and legal apparatuses? As Zehfuss (2011: 553) points out, ‘technological advances might lead to an increasing – or at least different – exposure of civilians, as did the possibility of aerial warfare in the first place’. In this instance, faith in precision may also encourage engaging targets in new ways and in more problematic environments. Could the problem of sexual violence be considered in other ways? And more specific to this analysis, could the map itself be used and interpreted in a different way? Given the prevalence of the state’s use of sexual violence against political dissidents, is it possible that ‘hotspots’ might also reflect areas where class-based mobilizations against Egypt’s politico-military infrastructure are gaining traction, and thus where ‘thugs’ and other plainclothes police might be deployed to do their dirty work? Where do lesbian, gay, bisexual, and transgender (LGBT) communities fit, or alternative forms of public sexuality? And how might HarassMap be used to reduce state intervention in political publics rather than increase it? Rebecca Chiao has stated that she and her team are not academics, from which I infer that she means the program is more interested in putting ‘boots on the ground’ (or eyes in the air) than speculating about the political, legal, and juridical spaces that the map creates, as well as the consequences, intended or not, of its framing. 360 Security Dialogue 46(4) Conclusion This article has shown how HarassMap’s use of crowdsourced data for mapping sexual harassment helps us to think about both technological contributions to securitization and the hidden violence of feminist humanitarianism that translates Arab bodies, Arab streets, and Arab cities into targets for remote monitoring and intervention. The militarized systems and market rationalities from which these technologies have emerged cannot be entirely separated from the techniques of ordering and targeting that they make possible in the context in which I have described. While I readily acknowledge the variation and diversity in reports and in the emerging community responses within and across these security-scapes, the map’s resonances with other forms of aerial targeting reveal broader patterns that depoliticize class-based politics around the issue of harassment, as well as promote increased state security presence without acknowledging the violence inherent therein. Aerial targeting via crowdmapping and online mapping applications attempts to subject whole populations to scrutiny and intervention, and treats them as targets that can, without careful scrutiny, be abstracted from political, cultural, and geographical contexts, thereby reducing difference that might otherwise highlight the moral and political ambiguity of the map. The combination of UN gender norms and the turn to crowdmapping for the purpose of human security governance normalizes the ongoing subjugation of those who find themselves outside of these international norms and legal regulations, becoming racialized and sexualized targets for discriminatory observation and intervention. However, aerial observations and interventions operate on multiple discursive and affective registers where the categories and identities they create are far from objective (Wall and Monahan, 2011: 250). In the present context, these identities include but are not limited to baltagiya and civilians, women and middle-class consumers, and working-class youth and the ‘Arab street’. The use of HarassMap as evidence of gendered sexual violence blurs how these categories are constructed and conflated, flattening their nuance into a calculative set of variables that can be mapped, ordered, and filtered into zones of security and insecurity. These zones are then constructed as the differential borders between the powerful discursive tropes of developed and undeveloped, between civilized and backward, and so forth. Campaigns like HarassMap reveal what Wall and Monahan (2011: 251) call ‘an unstable fault line’ within societies in which the control of individual behavior is subordinated to the preemptive imperatives of risk and preemption. This targeted control is diffuse and can work in multiple directions, for instance in the hands of state security forces for the purpose of obstructing other forms of anti-government political mobilization. If we take HarassMap, which makes claims about the moral significance of its precision technology, at its word, how can such technology be used in a way to help stop gendered sexual violence against women without depoliticizing the strivings of working-class Arab youth, or obscuring other extant attempts to combat gendered sexual violence? I concede that the Ushahidi platform works very differently when it is used, for instance, to locate individuals and communities in need of provisions after a tsunami or an earthquake, than when it attempts to locate ‘hotspots’ of sexual violence. Also, the targeting logics that organize the HarassMap project may work differently in Egypt than they do in other locations. The geo-spatial technologies that HarassMap uses in the biopolitical management of Egyptian urban sociality remain open to experimentation, and offer the possibility of becoming a tool for bringing a heightened awareness to other types of violence with certain categorical adjustments and visual reorientations. What might the same technologies being used to police young Arab men do if they were redirected, for example, at Egypt’s security forces and its implementation of statesanctioned violence against women to thin their presence on the street? This potential resides in the realm of speculation for now. Still, we should be wary of the idea that better, more total surveillance will produce accurate depictions of the environment of gendered sexual violence. We should Grove 361 also be critical of paradigms of risk management that seek to sort whole populations into ‘profiles and probabilites’ (Wall and Monahan, 2011: 251) as part of a feminist internationalist organization of security governance in Egypt. Acknowledgments The author would like to thank Jane Bennett, Waleed Hazbun, Jairus Grove, Alexis Henshaw, four anonymous reviewers , and the editorial committee at Security Dialogue for their thoughtful comments on drafts of this article. Funding This research received no specific grant from any funding agency in the public, commercial or not-for-profit sectors. References Adey P (2010a) Vertical security in the megacity: Legibility, mobility and aerial politics. Theory, Culture & Society 27(6): 51–67. Adey P (2010b) Aerial Life: Spaces, Mobilities, Affects. Oxford: Wiley-Blackwell. Adey P, Whitehead M and Williams AJ (2011) Introduction: Air-target distance, reach and the politics of verticality. Theory, Culture & Society 28(7–8): 173–187. Ahram.org (2013) Activists commemorate eighth anniversary of ‘Black Wednesday’. Ahram Online, 25 May. Available at: http://english.ahram.org.eg/NewsContent/1/64/72300/Egypt/Politics-/Activistscommemorate-eighth-anniversary-of-Black-.aspx (accessed 14 May 2014). Allam R (2014) Excuse us for being sceptical. Daily News Egypt, 21 June. Available at: http://www. dailynewsegypt.com/2014/06/21/excuse-us-sceptical/ (accessed 29 September 2014). Amar P (2011a) Turning the gendered politics of the security state inside out? Charging the police with sexual harassment in Egypt. International Feminist Journal of Politics 13(3): 299–328. Amar P (2011b) Middle East masculinity studies: Discourses on ‘men in crisis’, industries of gender in revolution. Journal of Middle East Women’s Studies 7(3): 36–70. Amar P (2013) The Security Archipelago: Human-security States, Sexuality Politics, and the End of Neoliberalism. Durham, NC: Duke University Press. Amnesty International (2013) Egypt: Impunity fuels sexual violence. Available at: http://www.amnesty. org/en/news/egypt-impunity-fuels-sexual-violence-2013–02–06 (accessed 10 May 2014). Aradau C (2010) Security that matters: Critical infrastructure and objects of protection. Security Dialogue 41(5): 491–514. Aradau C and Huysmans J (2014) Critical methods in international relations: The politics of techniques, devices and acts. European Journal of International Relations 20(3): 596–619. Bell B (2012) Egypt’s sexual harassment of women ‘epidemic’. BBC, 3 September. Available at: http:// www.bbc.com/news/world-middle-east-19440656 (accessed 5 May 2014). Bennett J (2010) Vibrant Matter: A Political Ecology of Things. Durham: Duke University Press. Brabham D (2008) Crowdsourcing as a model for problem solving: An introduction and cases. Convergence 14(1): 75–90. Burns R (2014) Moments of closure in the knowledge politics of digital humanitarianism. Geoforum 53: 51–62. Chick K (2010) In Cairo, an effort to put sexual harassment on the map – via Twitter and Text. The Christian Science Monitor, 23 November. Available at: http://www.csmonitor.com/World/Middle-East/2010/1123/In-Cairo-aneffort-to-put-sexual-harassment-on-the-map-via-Twitter-and-text (accessed 5 May 2014). Christie R (2010) Critical voices and human security: To endure, to engage or to critique? Security Dialogue 41(2): 169–190. Coutard O and Guy S (2007) STS and the city: Politics and practices of hope. Science, Technology, and Human Values 32(6): 713–734. 362 Security Dialogue 46(4) Crampton J (2010) Cartographic calculations of territory. Progress in Human Geography 35(1): 92–103. Crampton J and Elden S (2006) Space, politics, calculation: An introduction. Social and Cultural Geography 7(5): 681–685. Crutcher M and Zook M (2008) Placemarks and waterlines: Racialized cyberscapes in post-Katrina Google Earth. Geoforum 40: 523–534. Deleuze G (1990) Postscript on control societies. In: Negotiations 1972–1990. New York, NY: Columbia University Press, 177–182. Dillon M and Lobo-Guerrero L (2008) Biopolitics of security in the 21st century: An introduction. Review of International Studies 34: 265–292. Egypt Independent (2012) 172 arrested on sexual harassment charges; still not enough, say activists. Egypt Independent, 28 October. Available at: http://www.egyptindependent.com/news/172-arrested-sexualharassment-charges-still-not-enough-say-activists (accessed 5 May 2014). Elden S (2009) Terror and Territory: The Spatial Extent of Sovereignty. Minneapolis, MN: University of Minnesota Press. Elden S (2013) Secure the volume: Vertical geopolitics and the depth of power. Political Geography 34: 35–51. Foucault M (2007) Security, Territory, Population: Lectures at the Collège de France, 1977–1978. New York, NY: Picador. Gad S and Hassan R (2012) HarassMap Annual report: December 2010–March 2012. English. Cairo: HarassMap.org. Geographies of Violence Delhi (2014). Available at: https://govdelhi.crowdmap.com (accessed 3 May 2014). Graham M and Zook M (2011) Visualizing global cyberscapes: Mapping user-generated placemarks. Journal of Urban Technology 18(1): 115–132. Graham S (2004) Vertical geopolitics: Baghdad and after. Antipode 36(1): 12–23. Graham S (2011) Cities Under Siege: The New Military Urbanism. New York, NY: Verso. Graham S and Hewitt L (2013) Getting off the ground: On the politics of urban verticality. Progress in Human Geography 37(1): 72–92. Grant R (2008) The all-seeing Air Force. Air Force Magazine, September, 2008. Gregory D (2011) From a view to a kill: Drones and late modern war. Theory, Culture & Society 28 (7–8): 188–215. HarassMap (2014). What We Do, The Map. Available at: http://HarassMap.org/en/what-we-do/the-map (accessed 3 May 2014). HarassMap (2015). Why is sexual harassment so prevalent in Egypt? Frequently Asked Questions. Available at: http://harassmap.org/en/news/press-kits/harassmap-frequently-asked-questions/ (accessed June 29, 2015). Haraway D (1988) Situated knowledges: The science question in feminism and the privilege of partial perspective. Feminist Studies 14(3): 575–599. Hudson H (2005) ‘Doing’ security as though humans matter: A feminist perspective on gender and the politics of human security. Security Dialogue 36(2): 155–174. Human Rights Watch (New York) (2013) Egypt: Epidemic of sexual violence. Human Rights Watch, 3 July. International Development Research Centre (IDRC) Lecture with Rebecca Chiao (2013, February 6). HarassMap: Social mapping sexual harassment and violence in Egypt. Video available at: https://www. youtube.com/watch?v=hLq7fCUQANM (accessed 3 May 2014). Kingsley P (2014) Egyptian police ‘using rape as a weapon’ against dissident groups. The Guardian, 12 April. Available at: http://www.theguardian.com/world/2014/apr/12/egypt-police-rape-dissidentscrackdown-16000-arrested (accessed 29 September 2014). Kurgan L (2013) Close Up at a Distance: Mapping, Technology, and Politics. Cambridge, MA: Zone Books. Kwan M (2002) Feminist visualization: Re-envisioning GIS as a method in feminist geographic research. Annals of the Association of American Geographers 92(4): 645–661. Law J (2004) After Method: Mess in Social Science Research. New York: Routledge. Leszczynski A and Elwood S (2015) Feminist geographies of new spatial media. The Canadian Geographer 59(1): 12–28. Grove 363 McLafferty S (2005) Women and GIS: Geospatial technologies and feminist geographies. Cartographica 40(4): 37–45. Marhia N (2013) Some humans are more human than others: Troubling the ‘human’ in human security from a critical feminist perspective. Security Dialogue 44(1): 19–35. Merry SE (2003) Constructing a global law: Violence against women and the human rights system. Law & Social Inquiry 28(4): 941–977. Muller B (2008) Securing the political imagination: Popular culture, the security dispositif and the biometric state. Security Dialogue 39(2–3): 199–220. Nijel.org (2014) Your data, transformed. Available at: http://nijel.org/why-nijel/transformed (accessed 3 May 2014). Ó Tuathail G (2004) Geopolitical structures and cultures: Towards conceptual clarity in the critical study of geopolitics. In: Tchantouridze L (ed.) Geopolitics: Global Problems, Regional Concerns. Winnipeg: University of Manitoba Press, 75–102. Open Institute for Gender Based Violence in Cambodia (2014) Gender Based Violence (GBV) project in Cambodia. Available at: http://www.open.org.kh/en/gender-based-violence-gbv-project#.U2X1s8ZSy2w (accessed 3 May 2014). Osborne T and Rose N (2004) Spatial phenomenotechnics: Making space with Charles Booth and Patrick Geddes. Environment and Planning D: Society and Space 22(2): 209–228. Parks L (2009) Digging into Google Earth: An analysis of ‘crisis in Darfur’. Geoforum 40(4): 535–545. Puar J (2007) Terrorist Assemblages: Homonationalism in Queer Times. Durham, NC: Duke University Press. Radcliffe S (2009) National maps, digitalization and neoliberal cartographies: Transforming nation-state practices and symbols in postcolonial Ecuador. Transactions of the Institute of British Geographers 34(4): 426–444. Rissman J (2014) Interview: HarassMap founder Rebecca Chiao. Openideo, 25 February. Available at: http:// www.openideo.com/challenge/womens-safety/research/interview-HarassMap-founder-rebecca-ch (accessed 3 May 2014). Rose G (1997) Situating knowledges: Positionality, reflexivities and other tactics. Progress in Human Geography 21(3): 305–320. Scott F (2010) Foreword: Making data speak. In: Wilkins G (ed.) Distributed Urbanism: Cities after Google Earth. Abingdon: Routledge, xi–xiv. Shibib N (2011) Interview with Rebecca Chiao: Breaking women’s isolation with HarassMap. Qantara.de. Available at: http://en.qantara.de/content/interview-with-rebecca-chiao-breaking-womens-isolationwith-HarassMap (accessed 3 May 2014). Slackman M (2005) ‘Assault on women at protest stirs anger, not fear, in Egypt.’ New York Times, 10 June. Available at: http://www.nytimes.com/2005/06/10/international/africa/10egypt.html?pagewanted=all&_ r=0 (accessed 29 September 2014). Sparke M (2006) A neoliberal nexus: Citizenship, security and the future of the border. Political Geography 25(2): 151–180. Stahl R (2010) Becoming bombs: 3D animated satellite imagery and the weaponization of the civic eye. Media Tropes 2(2): 65–93. Tavaana.org (2013). Taking back Egypt’s streets: The HarassMap campaign to end sexual harassment. Available at: https://tavaana.org/en/content/taking-back-egypts-streets-harassmap-campaign-end-sexualharassment#_edn12 (accessed 3 May 2014). TED Talk with Erik Hersman (2009) Reporting crisis via texting. Available at: http://www.ted.com/talks/erik_ hersman_on_reporting_crisis_via_texting (accessed 3 May 2014). Tillet S (2013) Sexual harassment is not a disease, but it surely is an epidemic. The Nation, 30 July. Available at: http://www.thenation.com/blogs/salamishah-tillet (accessed 11 May 2014). United Nations (2011) Committee on the Peaceful Uses of Outer Space: Space-based Information for Crowdsource Mapping. General Assembly, 6 December 2011, Resolution 61/110. United Nations Platform for Space-based Information for Disaster Management and Emergency Response (UN-SPIDER) (2014). Available at: http://www.un-spider.org (accessed 3 May 2014). Ushahidi.org (2014) About Us. Available at: http://ushahidi.com (accessed 3 May 2014). 364 Security Dialogue 46(4) Wall T and Monahan T (2011) Surveillance and violence from afar: The politics of drones and liminal security-scapes. Theoretical Criminology 15(3): 239–254. Weizman E (2002) Introduction to the politics of verticality. Open Democracy. Available at: http://www .opendemocracy.net/ecology-politicsverticality/article_801.jsp (accessed 3 May 2014). Wibben A (2011) The state of feminist security studies: A conversation. Politics and Gender 7(4): 590–595. Williams AJ (2007) Hakumat al Tayarrat: The role of air power in the enforcement of Iraq’s boundaries. Geopolitics 12(3): 505–528. Williams AJ (2011) Enabling persistent presence? Performing the embodied geopolitics of the unmanned aerial vehicle assemblage. Political Geography 30(7): 381–390. Williams R (2005) Politics and self in the age of digital re(pro)ducibility. Fast Capitalism 1(1). Available at: http://www.uta.edu/huma/agger/fastcapitalism/1_1/williams.html (accessed 17 January 2015). Women’s Media Center’s Women Under Siege (2014) Documenting sexualized violence in Syria. Available at: https://womenundersiegesyria.crowdmap.com (accessed 3 May 2014). Zehfuss M (2011) Targeting: Precision and the production of ethics. European Journal of International Relations 17(3): 543–566. Zook M, Graham M and Shelton T (2010) Volunteered geographic information and crowdsourcing disaster relief: A case study of the Haitian earthquake. World Health and Medical Policy 2(2): 7–33. Nicole Sunday Grove is an assistant professor of political science at the University of Hawai ʻi at Manoa. Her research examines the racial and gendered dynamics of digital knowledge production about sexual violence, human security, and women’s rights in the Middle East. O ri g in a l A r ti c le Neoliberalism, the homeland security state, and the authoritarian turn A l f o n s o Go n z a l e s University of Texas, Austin Abstract This article interrogates the writings of Milton Friedman and Samuel Huntington to theorize the cultural and ideological processes that gave rise to the homeland security state, a complex and integral configuration of the modern capitalist state that has come to police migrants in multiple realms. Though I discuss some of the major policies and institutional shifts that were central to the forging of the homeland security state from the 1980s to the early twenty-first century, I argue that such policies could not be separated from the authoritarian turn in civil society; that is a cultural and ideological tendency to support the use of violence and repression to deal with dissent and social problems writ large. I also argue that the authoritarian turn should be viewed as the civil society-based cultural and ideological counterpart of “authoritarian statism,” a concept developed by the Greek political theorist Nicos Poulantzas to characterize a repressive form of governance that can exist within the legal framework of a constitutional democracy. The article concludes with some notes about what the authoritarian turn and statism means for the migrant rights movement and parallel social movements in light of President Obama’s Deferred Action for Parental Accountability. Latino Studies (2016) 14, 80–98. doi:10.1057/lst.2015.52 Keywords: neoliberalism; Latino politics; migration control; authoritarian statism; precarious legality; immigrant rights movement Mexicans immigrating over the border is a good thing! It’s a good thing for the illegal immigrants, it’s a good thing for the United States, it’s a good thing for the citizens of the country. But it is only good so long as it’s illegal! © 2016 Macmillan Publishers Ltd. 1476-3435 Latino Studies www.palgrave-journals.com/lst/ Vol. 14, 1, 80–98 Neoliberalism and the authoritarian turn That is an interesting paradox to think about: make it legal and it’s no good. Why? Because as long as it’s illegal, the people who come in do not quality for welfare, they don’t qualify for Social Security. – Milton Friedman State and society have been marked by two seemingly contradictory trends over the last thirty-five years: the retreat of the welfare state and the expansion of the state’s repressive apparatus. The general trend since the 1980s has been for policymakers to cut services to the poor and working classes in the form of social programs, housing subsidies and education while they expand the state’s repressive capabilities (with important exceptions). There has been an attack on public-sector jobs, cuts in social spending and a wave of privatizations in state services, from the subcontracting of city services to charter schools. Throughout the 1990s the US government pursued free trade policies through treaties such as the North American Free Trade Agreement as the United States Congress reformed our public welfare system. Such policies have continued well into the twenty-first century. For instance, the 113th Congress has slashed unemployment benefits and allocated less money for food stamps. Such policies are not limited to Congress; President Barack Obama is at the time of this writing pursuing two of the largest free trade agreements in history, the Trans-Pacific Partnership and the Transatlantic Trade and Investment Partnership. In contrast to the dismantling of the welfare state and the promotion of free trade agreements, there has been a fortification of the state’s repressive institutions in the realm of social control and migration control. As I have described in Reform without Justice, migration control over the last decade and half has been characterized by the emergence of the homeland security state, a concept that for the purposes of this article will refer to the US government apparatus for migration control and its cultural and ideological underpinnings in civil society (Gonzales 2014). Under the homeland security state, there has been a dramatic increase in what the Department of Homeland Security calls “removals,” that is, formal deportations that carry the consequence of migrants being charged with “illegal reentry” if they return unlawfully to the United States. The number of removals rose from 18,846, per year in fiscal year 2000 to 438,421 in fiscal 2013 (Department of Homeland Security 2013). Deportations declined in 2014 when the DHS removed 414,481 people (Department of Homeland Security 2014). Even though some expect deportation numbers to decline in the coming years, billions of dollars are still being invested in building up the detention and deportation infrastructure of the homeland security state. In June 2014, President Obama unsuccessfully requested US$3.7 billion in emergency funds to stop an influx of Central American asylum seekers (White House 2014). The president and many of the leading Democrats, including Hillary Clinton, have been advocates of detaining Central Americans, including women and children, in makeshift detention centers and putting them in rapid deportation proceedings – even though many of them should have been granted © 2016 Macmillan Publishers Ltd. 1476-3435 Latino Studies Vol. 14, 1, 80–98 81 Gonzales international protection. The administration detained them based on the argument that the women and children posed a national security risk. As a result of such policies there has been a dramatic expansion of migrant detention. According to the Detention Watch Network Immigration, migrant detention grew by 1200 per cent from June to August 2014 alone (Detention Watch Network 2014). This has been especially so in Texas, the state that has seen the most growth in family detention centers, which are the new horizon of authoritarian state practices. In February 2015, the president requested $41.2 billion for the Department of Homeland Security for fiscal year 2016 (Department of Homeland Security 2015). The budget request earmarked $3.3 billion for DHS operations; $691.9 million for care and transportation of unaccompanied children and families with children – something that takes place in privately owned detention centers; $373.5 million for Customs and Border Enforcement; $94.5 million for expanding detention beds for “high risk” individuals; and $86.7 million for enhancing the Secret Service among other earmarks. Such a massive increase in funds will be used to expand the reach and effectiveness of the homeland security state. Given these apparently contradictory developments, I seek to theorize the following: What is the relationship between the ascendency of neoliberalism and the emergence of the homeland security state? How do we make sense of the buildup of the homeland security state with the dismantling of the welfare state? What are the prospects for the Latino migrant movement and its allies to carve out democratic spaces under these conditions? To begin with, I argue that the apparent paradox – that is, of the slow and steady dismantling of the welfare state and the concomitant rise of the homeland security state – is intimately bound up with the rise of neoliberalism. Neoliberalism is the ideology of free market capitalism that reduces the role of the state to enforcing laws and justifies severe inequality and class polarization under the idea of meritocracy. It applies an economic logic and market metrics to nearly every aspect of human life, politics, education, jurisprudence, and social networking, among other realms of human activity (Brown 2015). This economic logic applied to the realm of government has resulted in the dismantling of the welfare state and the fortification of the institutions of social control amidst heightened racial inequality and class polarization. The neoliberal restructuring of the state could not be understood in isolation from important changes in the culture of civil society that I conceive of as the authoritarian turn. I use this term to refer to the cultural and ideological inclination toward adopting authoritarian solutions to deal with a range of social problems in the United States, including crime control and discipline in public schools, labor, academia and, of course, migration. Multilayered, symbiotic and too complex to be identified with a facile start date marked by the adoption of one law or policy, this authoritarian turn is a cultural and ideological phenomenon that emerged gradually and concomitantly with neoliberalism and the racially 82 © 2016 Macmillan Publishers Ltd. 1476-3435 Latino Studies Vol. 14, 1, 80–98 Neoliberalism and the authoritarian turn charged backlash against the civil rights movement in the early 1980s. Although there have always been elements of racially authoritarian practices in the United States, the authoritarian turn is unique because it came about after the civil rights movement, at a time when the United States had legally disavowed racial violence. Yet despite claims about living in a post-racial order, the authoritarian turn is most evident in the growing clamor for violence against Black and Latino dissenters and a heightened sense of intolerance for the rights of minorities, refugees, women and the LGBT community in nearly every realm of civic life and culture. This authoritarian tendency prepares civil society for the rise of politicians such as Donald Trump, and it empowers his supporters to spit on Latino migrant activists, to assault Black Lives Matter activists, and to make popular legislation that allows for civilians to carry concealed weapons – even on college campuses – in states such as Texas and elsewhere. The authoritarian turn sets the cultural and ideological terrain in civil society for the dialectical configuration of the modern capitalist state similar to what the Greek political theorist Poulantzas (1978) described as authoritarian statism. Authoritarian statism refers to a situation in which the advanced democracies maintain the formalities of a constitutional democracy but curtail civil liberties as they increase the repressive power of their police, carceral and juridical institutions. In this scenario, the state’s repressive and economic institutions are insulated from meaningful democratic controls. Under such a configured state, the ability to negotiate trade agreements or establish fiscal policy may be insulated from Congress or certain constitutional rights may be suspended under emergency powers. Another characteristic of authoritarian statism is that the state takes steps to demobilize social movements through a continuum of tactics ranging from consensual forms of domination to outright domination without consent. Poulantzas theorized that states adopt this configuration to manage the contradictions produced by what we now call neoliberalism. Authoritarian statism continues to deepen in profound ways that not even Poulantzas could have fathomed before his tragic death in 1979. Although the authoritarian turn in the cultural and ideological terrain of civil society and its dialectical counterpart in the realm of governance are dominant trends, they are uneven and contradictory. The authoritarian impulse is not as strong in all parts of the country in a uniform way. Just as some states and regions have been more repressive toward immigrants such as Arizona and Texas, there have been important state and local efforts at immigration integration in California and Illinois and in cities like San Francisco, Los Angeles, New York and others. The authoritarian turn, and the state policies that it helps to sustain, is contradictory because though the general trend in policy is to adopt more draconian migration control policies, there are institutional spaces within the state that seek to integrate immigrants, such as Deferred Action for Parental Accountability (DAPA). This is a program that could have potentially granted temporary relief from deportation to as many as four million undocumented © 2016 Macmillan Publishers Ltd. 1476-3435 Latino Studies Vol. 14, 1, 80–98 83 Gonzales adults who have been in the United States since 1 January 2010, and who have a US citizen or Legal Permanent Resident child and have met other requirements. Despite its unevenness and contradictions, the authoritarian turn is the dominant ideological current in the United States to be sure. Efforts to create democratic spaces are constantly under attack by anti-migrant forces and their allies. The authoritarian turn and the efforts to counter it, or at least aspects of it, are the product of real and dynamic struggles between racialized class forces with different conceptions of the world. Thus, it is possible for migrant activists to open up democratic spaces but these are always liminal victories. This is evidenced by the injunction placed on DAPA in April of 2015 by Andrew S. Hanen, a federal judge in Brownsville, Texas, after twenty-six states filed a lawsuit against the president’s program. But there are many examples of democratic openings being shut down, such as Texas Governor Greg Abott refusing to provide access to certain state funds to counties that refuse to cooperate with ICE, or the federal government curtailing the length of time it will hold families in migrant detention only to place ankle bracelets on them upon release. Victories, if not carefully thought out and defended, are easily turned into defeats under the authoritarian turn and statism. Drawing on the dialectical relationship between the authoritarian turn in civil society and authoritarian statism, I make my argument first by elaborating on the development of neoliberalism as a dominant ideology primarily in the United States (and to a lesser extent in Chile in the 1970s), then by discussing neoliberalism’s inherent authoritarian tendencies. I follow this section with a detailed discussion of the homeland security state and its development through major immigration policies starting in 1986 up to President Obama’s announcement of DAPA. Finally, I conclude by discussing the role of the migrant movement and its allies in the United States as a democratizing force. Thinking of migration control in the context of the authoritarian turn complements and enriches the critical scholarship on this topic. Most of the early literature on migration control was focused on border enforcement, and later scholars began to write about immigration propositions, and state and local enforcement. They undertook this using traditional disciplinary lenses, and few attempted to critically theorize the nature of the contemporary migration control regime as a state project. Scholars working at the intersection of Latinos studies and traditional disciplines such as anthropology, sociology and political science, however, have come to understand the politics of migration control as corresponding to a new logic of governance. There are a handful of scholars working from such a critical approach, such as De Genova (2004), Dowling and Inda (2013), Rosas (2012), Rodriguez (2014), Golash-Boza (2012); Arnold (2011) and others. Both building upon and departing from this literature, I adopt an explicitly neo-Gramscian/Poulantzian approach. This approach to migration control conceptualizes it as being part of the modern capitalist state, with deep cultural and ideological underpinnings in civil society, which has undergone a 84 © 2016 Macmillan Publishers Ltd. 1476-3435 Latino Studies Vol. 14, 1, 80–98 Neoliberalism and the authoritarian turn very specific configuration by a complex and contradictory bloc of actors to deal with the conflicts brought about by neoliberalism. One of the conceptual contributions to be made to the critical literature on migration control by this approach is that it allows us to understand how the battle of ideas and the cultural-ideological terrain play a major part in structuring state policy. Moreover, this approach allows for an analysis that could account for the centrality of social movements to carve out democratic spaces within the state and for the saliency of cultural and ideological production that could counter the authoritarian turn. T h e A ut h o r i t a r i a n an d N e o l i b e r a l Ro o t s o f t he H o m e l a n d Security State Neoliberalism has been the dominant ideology of the United States for the last thirty-five years. Although there are many neoliberal thinkers, the ideology’s most influential representative was Milton Friedman, a professor of economics at the University of Chicago. Friedman’s (1962) seminal book Capitalism and Freedom was to the dominant fractions of capital what Acuña’s (1972) Occupied America was to Chicano activists of the 1970s: a key text by an intellectual organically linked to his or her fundamental social group. Friedman gave his social group selfawareness, an ideology and a philosophy that in this case justified a new round of capital accumulation – later known as neoliberal globalization – that would change the world. Friedman argued against state intervention in the economy and held that those who seek to use the state to “do good” ultimately do more harm. The market, he argued, is the road to freedom, whereas collective forms of social and economic organization are its antithesis. Greed and competitive individualism should therefore be encouraged. Applied to the realm of government policy, neoliberalism dictates that the market should reign supreme and the state’s role should be reduced to facilitating the growth of capitalism instead of providing a social safety net or organizing society toward any lofty goal such as equality, social justice, or protecting the environment. By the 1980s, neoliberalism had become the dominant theoretical framework guiding government and economic policy in the United States and Britain. Friedman played a direct role in this, serving as an adviser to both Ronald Reagan and Margaret Thatcher. Friedman was writing at a time when the US economy was guided by policies based on the ideas of British economist John Maynard Keynes, whose work dominated academic and policy circles in the aftermath of World War II through the 1970s. The US government heavily subsidized large sectors of the economy, and the state played a major role in development through urban-renewal programs, agricultural subsidies, military spending, and investments in research © 2016 Macmillan Publishers Ltd. 1476-3435 Latino Studies Vol. 14, 1, 80–98 85 Gonzales and development. The government also maintained a welfare state that was robust in comparison with what it is today. Billions of dollars were poured into the economy in the middle of the Cold War. Friedman argued that such Keynesian policies stifled freedom, which according to neoliberal thinkers, is not measured by access to social justice and the protections of rights but by the pursuit of private ends. Indeed, Friedman and his contemporaries, such as Friedrich A. Hayek, argued that only capitalism could bring about the cornucopia of market choices needed for a free society to flourish. Neoliberal economics were first tested in Chile under the military dictatorship of General Pinochet. Recent scholarship has sought to distance Hayek and to a lesser extent Friedman from the Pinochet regime (Caldwell and Montes 2015). While it is debatable how much Friedman actually endorsed the Pinochet regime’s violent tactics, there is no denying that Friedman and his colleagues at the University of Chicago provided the ideological groundwork for advancing neoliberalism in Chile. As Friedman noted in his memoir, by the time of Pinochet’s coup in 1973, his Chicago University colleagues had assembled diagnoses and proposals known as El Ladrillo, or the Brick, which they gave to the generals. The document laid out Chile’s transition from a Keynesian economy to a full-fledged neoliberal one and would serve as the guiding paradigm of the regime’s economic policy. “In 1975,” Friedman and Friedman (1999) wrote, “when inflation still raged and a world recession triggered a depression in Chile, General Pinochet turned to the ‘Chicago Boys’… and appointed several of them to powerful positions in the government” (398). Scholars have long known about the links between Friedman, the Chicago Boys and the Pinochet dictatorship. While it is easy to point to the authoritarian practices that were used to usher in neoliberalism in South and Central America, scholars rarely point to the authoritarian practices used in the United States. Yet the rise of neoliberalism in the United States has a similar, albeit less violent, history. Indeed it is one intimately connected to the backlash against the civil rights movement and the rise of neoconservatism. Perhaps no other political scientist had more of a hand in advancing the authoritarian turn that emerged with neoliberalism than Samuel Huntington. I do not refer to Huntington’s (2004) infamous, well-critiqued essay “The Hispanic Challenge” per se. “The Hispanic Challenge” is part of a broader theme about the declining authority in the West that runs through Huntington’s long and distinguished career. We must look instead at Huntington’s writings from the mid-1970s. He was one of three of the world’s leading conservative political scientists who were commissioned to write a study for the Trilateral Commission on Democracy and Governability in the United States, Japan and Western Europe. The study, titled The Crisis of Democracy, was written in the aftermath of the watershed year of 1968, when youth, students and racial minorities had risen up against governments in both the United States and Europe to denounce war and social inequality and to demand full inclusion. The Trilateral Commission is an 86 © 2016 Macmillan Publishers Ltd. 1476-3435 Latino Studies Vol. 14, 1, 80–98 Neoliberalism and the authoritarian turn organization comprised of leaders from strategic fractions of global capital and of leading intellectuals that came together in 1973 to study the challenges facing capitalism in the United States, Western Europe and Japan, which continues to meet and has since expanded membership to select members in the developing world. In the introduction of The Crisis of Democracy, the authors lament the rise of “oppositional intellectuals” and “youth” who seek to challenge the authority of governments in the West and make the case for reestablishing authority in order to save democracy. In the chapter on the United States, written exclusively by Huntington, he argues that the crisis in question is one of too much democracy. Huntington (1975) was concerned with the rise of “marches, demonstrations, protest movements and cause organizations” (61). Particularly troubling to Huntington were the demands being made on the welfare state by these groups. All this was a product of a “democratic surge” that had engulfed the United States in the 1960s and 1970s (62). Huntington was keen to the reality that there were “markedly higher levels of self-consciousness among Blacks, Indians, Chicanos, white ethnic groups, students and women” and of “unionism” (61). Huntington also laments that the 1960s brought “the reassertion of the primacy of the goal of equality in social and political life” (62). The consequence of social movements, Huntington argued, was a crisis of authority of the welfare state. He noted that as minorities, women and other groups sought to democratize the United States, authority declined. In the report, Huntington recommends the use of deceit, repression and espionage to deal with such movements. Moreover, Huntington justifies racial domination and the exclusion of minorities from full membership in society – arguing that all great societies have historically had an excluded segment – and advocates cutting government services and social programs. In other parts of the report, the authors argue that the only way to overcome the crisis of democracy and the underlying crisis of profits at the time is to expand markets abroad. It is uncommon to think of Huntington and Friedman in the same vein. The former thinker represents a neoconservative type of political rationality that seeks to conserve a static vision of national identity and the latter represents a neoliberal rationality that seeks to transform all that is public into the market sphere. Nonetheless their type of political rationality laid the foundation for a particular brand of authoritarian neoliberalism in the United States. This brand of neoliberalism had to garner support among factions of the Right, including social conservatives who resented the gains made by minorities and women, and among fractions of capital that primarily cared about expanding markets. In a case of what may appear to be strange bedfellows, Huntington’s ideas found a powerful audience among the most powerful multinational corporations, which sought to save “democracy” from the masses of historically excluded groups by adopting authoritarian policies and opening up world markets. The ideas of Friedman and Huntington had more impact on the long-term development of capitalism and racial politics in the United States than the physical violence © 2016 Macmillan Publishers Ltd. 1476-3435 Latino Studies Vol. 14, 1, 80–98 87 Gonzales of police and state agents during the 1970s. Together, their ideas became a material force in the form of authoritarian governance and in free markets. As Marx (1978) wrote, “The ideas of the ruling class are in every epoch the ruling ideas, i.e. the class which is the ruling material force of society, is at the same time its ruling intellectual force” (172). The Trilateral report, financed by the leading corporate powers at the time, was a precursor to globalization and should be seen as a response to the uprisings of its time and as a turning point in world history toward a more conservative and authoritarian set of political arrangements alongside the diffusion of neoliberal ideas in the United States and the world. Both Friedman and Huntington became advisers to the Reagan administration, and Friedman and his students became advisers to many governments including those in Chile and in the United Kingdom. Beyond their actual direct advising, however, they made their mark on history through their writings and students, who have advanced the dominant ideological strands that continue to deepen the authoritarian turn. Nonetheless we see that free market capitalism did not deepen democracy or lead to greater freedom as neoliberal policy advocates promised. On the contrary, the r...
Purchase answer to see full attachment
Explanation & Answer:
10 Pages
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Role of Technology in Enhancing National Security – Outline
Thesis Statement: Technology is enhancing national security by improving how mapping and
surveillance are done. Furthermore, the technological tools are more effective in conducting risk
assessment. This is because they capture accurate data or information. Biometrics is one the
technological tools that United States is using to boost its national security.
I.
II.

Introduction
Biometric Technology

III.

Verification

IV.

Identification

V.

Surveillance

VI.

Risk Assessment

VII.

Social Profiling

VIII.
IX.
X.
XI.
XII.

Intelligence Monitoring
Data Tracking
Virtual Emergency Centers
GPS Technology
Conclusion


Running head: TECHNOLOGY AND SECURITY

Role of Technology in Enhancing National Security
Name
Institution

1

TECHNOLOGY AND SECURITY

2

Role of Technology in Enhancing National Security
Introduction
National security is concerned with the protection of a state from actual and perceived
threats. These threats can be either within or outside the state. The highly increasing immigration
in the Southern border is one of the greatest threats to U.S. national security. The high population
crossing the border overwhelms the workers at the immigration offices at Southern boarder's a
result; most of the immigrants who cross the border illegally do so. Indeed, this threatens both
national and homeland security. To counter these threats, the U.S. Department of Defense has
tried to build a wall across the border. The rationale for doing this is that the Southern border
will become less porous. However, even after a wall was erected, the crisis continued. More
illegal immigrants entered the United States. Immigration has been one of the sources of security
threats in the United States. Even the event of 9/11 was associated with immigration. The
terrorists who conducted this attack entered the U.S. as immigrants. Unknown to the immigration
officers, they were armed with explosives. The poor security devices that were used during that
time could not detect this. Subsequently, they established networks with other criminal
organizations in America. This enabled them to execute a deadly terrorist attack.
The Southern border crisis has changed how the United States perceived national
security. Before then, the national security maintenance efforts focused on internal security. The
law enforcement agencies mainly focused on identifying and counteracting on internal threats.
As a result, the United States heavily invested in homeland security department. Unfortunately,
this approach was based on a narrow definition of national security. Certainly, the 9/11 events
were least expected. The attack caught the security apparatus in America in shock. They had not
perceived the threat despite doing extensive surveillance (Brown & Kirsten, 2009; 59).

TECHNOLOGY AND SECURITY

3

Essentially, national security is one of the dimensions of good governance. Nation-states that are
nationally secure are governed well. The increase of the threats to national security has of late
become a crucial subject in the security discourse. The United States is heavily investing in
security in a bid to improve its national security. Technology is enhancing national security by
improving how mapping and surveillance are done. Furthermore, technological tools are more
effective in conducting a risk assessment. This is because they capture accurate data or
information. Biometrics is one of the technological tools that the United States is using to boost
its national security. It has been using this technology from the time of 9/11 to the time of the
Southern Border Crisis.
Biometric Technology
Biometrics identifies individuals automatically using their behavioral and physiological
characteristics. Every individual has unique physiological attributes. These attributes include
fingerprint, face, voice, hand, hair, iris, and human tissues, among others (Elia & Karenm, 2004;
116). The biometric technology allows the recording and storage of these attributes. Biometric
has become common in modern times. It is used for border control, physical access control,
information security, and even for financial privacy safeguards. Primarily, the biometric data is
captured for civil use (Gonzales, 2014; 86). As a result, the government will have information
pertaining to the identities of every individual. This includes the physical location of each
person. With this, it is easier to track the specific location of every individual. Using other
technologies, the government will match the little information it has with the one that is in its
biometrics (Castellss, 2014; 83). Once a pattern is established, the owner of the threats is
identified. Subsequently, risk mitigation strategies are taken. Fundamentally, the biometric data
in real-time. Hence, it is more accurate. Since the biometric information of every individual is

TECHNOLOGY AND SECURITY

4

accessible, the possibilities of making an error during the identification and verification of
individuals are limited.
Verification
In essence, biometric technology promotes individual identity checks. In this regard, the
government uses biometric technology to confirm the place where the threat is coming from as
well as the people who come with this threat (Mann, 2015; 9). Biometric technology helps to
carry out verification of the sources of threats. The first step in guaranteeing national security
knows the specific location where the threat is emanating from. This gives the security team the
basis of preparing a strategy to counter the threat. Verification is essential since it provides
information about the group that threatens national security (Mann, 2015; 10). However, during
verification, only the identity of the group is revealed. This includes the location where that
group operates in. For example, if a terror attack happens like that of 9/11, the state does not
have to wait until the terrorist organization claims their responsibility. Using the biometric
technology, the state can know which group conducted the attack. Indeed, they would be known
even before they execute their attack. In light of this, the security apparatus will be able to
mitigate the security threat.
Identification
Biometric technology promotes the identification of individuals who are a threat to
national security. This includes those who are planning the attack and those who have executed
an attack. In identification, the specific person who threatens national security is known (Elia &
Karenm, 2004; 117). This is because biometric technology is primarily based on pattern
recognition. Certainly, pattern recognition converts the images that it has collected into binary

TECHNOLOGY AND SECURITY

5

codes. It uses an algorithm to do this. The information on suspected individuals is often
collected. This information includes images, identification cards, or biometric data like hair, eye,
hand, and fingertips, among others. Subsequently, it is entered into the verification system. The
system compares the information entered to it with the none in the reference templates. If the
information matches (Grove, 2015; 355). The individual is identified. However, it is not a must
of individuals to submit their identifier information. Alternatively, their data, such as that of hair
and fingerprints, can be used. Once they are entered into the verification system, they will match
with the existing biometric data of their owner. As a result, individuals will be identified.
Certainly, there cannot be negative matching since people do not share biometric data (Elyachar,
2003; 577). Indeed, the information generated using biometric technology is now admissible as
evidence. Its quality of evidence is higher than that of eye-witness testimony or even the physical
evidence.
Surveillance
Surveillance is considered as one of the best ways to counter security threats. However,
the way it was traditionally conducted made people and government authorities to distrust it.
This is because minimal information uses to be collected throughout the entire surveillance
process. Furthermore, traditional surveillance was expensive (Gordillo, 2002; 58). This is
because it involved police patrols, both in vehicles and also in planes. Instead of collecting the
intelligence information, those who carried out surveillance scared the perpetrators of crime.
Surveillance was also distrusted because it could not collect accurate information from people.
Hence, the wrong people ended up being punished. Today, biometric technology is increasingly
used in surveillance. It is more trusted because it has the ability to capture people's biological
identifiers. For this reason, law enforcement agencies are frequently using it to identify

TECHNOLOGY AND SECURITY

6

individuals who are a threat to national security (Grove, 2015; 353). Essentially, biometric
technology is used in surveillance indirectly. In this regard, biometrics and genetic profiling are
incorporated into surveillance technologies. Fundamentally, carrying out surveillance using
biometric technology happens in such a way that it is easy for people to find out. As a result, the
information is captured as raw as it is without any alteration. In light of this, security threats are
identified and forthwith dealt with. The good with the biometric technologies is that it has both
face and voice recognition (Ferguson & Gupta, 2002; 965). So, in case the voice was not clear,
and it did not help to identify a person correctly, the face will do. Some surveillance devices
have secret cameras. They compliment the biometric technology in collecting the biometric data
of individuals. Furthermore, these cameras have the ability to collect high quality pictures. They
are able to regulate light properly. This enables them to collect physiological features more
accurately. However, many people are challenging biotechnology surveillance because it
disregards the privacy of people (Weiss & Wilkinso, 2014; 217). Certainly, the information
collected during biometric technology surveillance is very personal. Nonetheless, the accuracy of
the information collected using this technology makes people trust it.
Risk Assessment
Risks are inevitable. In a country like the United States, where the rate of immigration is
high, risks will always be present. Terrorists might take advantage of immigration to execute
their terrorist missions. Proper risk management is required. However, successful risk
management requires a proper risk assessment. The biometric technology can enhance risk
assessment. Some high tech devices will be used to detect the biodata of individuals (Weiss &
Wilkinso, 2014; 215). Following the change in the patterns of immigration, the government of
the United States installed detectors that are computerized with the personal information of its

TECHNOLOGY AND SECURITY

7

citizens. This is especially in airports and public places. These detectors have the ability to
identify people carrying explosives from far. Subsequently, it sends this data to various centers
for verification and identification. The centres then serve this data to the law enforcement
agencies near those places. In case verification and identification shows that the suspected
individuals had a terrorist or security threading motive, the law enforcement officers arrest them.
Subsequently, there are interrogated. As a result, the risk is managed adequately before
something bad happens.
Social Profiling
Biometric technology records all the personal information of individuals. Anything
wrong that an individual does is attached to his or her personal information. It acts as a footprint.
Wherever the person goes, those details follow him or her, and they cannot be deleted (Bexell,
Tallberg & Uhlin, 2010; 87). In this regard, if a person commits a crime in the Middle East and
then travel to the United States, the biometric technology will reveal what the person had done.
For this reason, people will fear to do crimes that may result in social profiling. Unlike in the
past, when a person could commit a crime and then vanish from that place, today, this is not
possible (Barnetatn & Finnemore, 1999; 675). A person is identified as a criminal at the airport
even before boarding a plane. The systems at the airport are computerized in the sense that they
are able to identify individuals with criminal records. Forthwith, they bar them from traveling.
There is no way an individual would be able to sneak. Therefore, the biometric technology
enhances the national security of the United States by ensuring that criminals are not allowed to
enter the borders of the United States.

TECHNOLOGY AND SECURITY

8
Intelligence Monitoring

The rate of immigration in the United States has been increasing every day. This has
raised the threats to national security. The collection of intelligence has become difficult in the
U.S. borders. Certainly, this increases the possibility of criminals coming to America. For
instance, the crime rate in the areas near the Southern Border has consistently been high (Chin,
2019; 677). This is because the criminals cross the border with ease. They are hardly detected
even when they carry explosives. However, technology can potentially change this. The
intelligence monitoring devices are installed on buildings. This is especially in the buildings
along the road where traffic is high. These devices use biometric technology. Furthermore, they
can perform voice and face recognition. In case an individual is carrying dangerous weapons that
can threaten national security, the intelligence monitoring device recognizes the faces or the
voice of those individuals. Subsequently, they alert the inspection officers at the border. Besides,
these intelligence monitoring devices are able to find the identity of the suspects. Using
biometric technology, these devices matches the face or voice that has been captured with the
biodata available in the systems (Cavelty & Wenger, 2019; 10). Consequently, the identity of the
suspect is known. In this regard, investigations have become easier. Nonetheless, intelligent
monitoring is expensive to install. Furthermore, they may provide overlapping denies or
information in case there is high traffic. This is because it cannot manage to capture the voices or
faces of individuals in the crowd.
Data Tracking
Despite the high influx of immigrants at the Southern border, the data of immigrants is
not mixed. Every individual has a separate data file. In this regard, when a person moves from
one location to another, he or she moves with his or her data file. Certainly, data is trackable. In

TECHNOLOGY AND SECURITY

9

this regard, the movements of individuals can be traced by tracking the movement of their data
file (Chin, 2019; 677). This is possible in modern times when nearly everyone has a phone.
Those phones have networks that enable the users to call or message the people they want. To
track the data, the security apparatus need to liaise with the network providers. These network
centers show how phone users have been moving from one location to another. Moreover, they
even reveal the messages that are sharing. Nonetheless, the revelation of the messages that
people have been sharing by the network provider is only done in an adverse condition
(Congressional Research Service, 2019; 29). This is because the network providers do not want
to infringe on the privacy and confidentiality of the users or network subscribers. With this
information, it is possible to mitigate the threats to national security as soon as they emerge.
Using biometric technology, it is possible to track the data of individuals. The biometric data
reveals the personal contacts of individuals (Cavelty & Wenger, 2019; 9). Subsequently, the
inspection officers request the network providers to provide them with the information showing
the movement of the owner of those contacts. Therefore, data tracking helps to mitigate threats to
national security by showing how the owners of mobile devices have been communicating.
Virtual Emergency Centers
Numerous technological devices in the security field have been invented. Furthermore,
new discoveries continue to be made every day. One of the most important technologies that
have been discovered recently is virtue operation emergency centers (Congressional Research
Service, 2019; 27). Traditionally, emergency security issues were handled from physical
locations. In this regard, citizens would report an emergency issue for the security officers to
respond. These centers were less efficient since a lot of time was wasted during reporting and
recording of the security issues. This is because the people who reported the emerging issues had

TECHNOLOGY AND SECURITY

10

to take transport in order to get to these centers. Because of this, the response used to be slow,
given that there would be many people in the centers reporting either the same issue or different
ones. The virtual operation emergency centers came to replace these physical centers. Now, the
centers where the people make alerts of emergency security issues are online or in air. In this
regard, any security threat is promptly reported. Individuals usually send the signals to the virtue
centers. Subsequently, the law enforcement officers get the information from the virtue centers
and act on it. In this regard, response to emerging security issues is quick because no time is used
traveling as it is the case with physical centers (Cavelty & Wenger, 2019; 7). Furthermore, there
is no redundancy of alerts. This is because the virtual center collects the data in terms of signals.
Moreover, only a single signal can be received at a time. Certainly, the virtual emergency centers
make coordination of inspection in U.S. borders easy. In regard to this, the Southern Border
crisis will not prevail for so long.
GPS Technology
Biometric technology improves mapping in an area. The main reason why it has not been
easy to control the Southern Border crisis is the failure to carry out effective mapping. To
contain the crisis, it is important to establish the various points along the border that the
immigrants use that are seemingly more porous (Hampton, 2016; 35) Certainly, the Southern
Border crisis has been made worse by having some immigrants crossing the border using other
district locations other than the recognized points. Immigrants do this so as to bypass verification
and identification processes at the border. Nonetheless, using GPS technology, it is possible to
identify all the points along the borders that the immigrants use. In this regard, the porous points
will no longer exist. The GPS technology shows the movement of people across the bordering
light of this; it is easy to identify the illegal immigrants who pose a threat to national security

TECHNOLOGY AND SECURITY

11

(Council on Foreign Relations, 2019; 40). More importantly, GPS devices use biometric
technology. This enables them to produce the personal information of the people who are using
various points of the border. In this regard, the people crossing the border at wrong locations are
considered as illegal immigrants. Forthwith, their motives are identified as threatening. The GPS
then sends alerts to the authorities for them to inspect the matter more. As a result, national
security is enhanced.
Conclusion
Technology has remarkably improved the national security of various states. America has
installed security devices nearly everywhere. This includes CCTV cameras. These devices carry
out surveillance and monitoring throughout the United States. Fundamentally, the devices use
biometric technology. In this regard, they capture information in terms of images and then
process it. During the processing, they compare the information collected with the biometric data
that is in referential plates. Consequently, threats to national security are successfully detected.
This enables the security apparatus to mitigate the threat effectively. Additionally, biometric
technology promotes social profiling. Individuals who commit any crime are socially profiled.
As a result, they are considered a threat wherever they go. In light of this, the movements of
criminals are restricted. Immigration has been one of the routes that terrorists use to conduct
terrorist attacks. Thus, an increase in immigration threatens national security. However, with
biometric technology, these threats are minimized. Immigration can take place normally. In light
of technological advancement, inspection has become easier. Through GPS, it is now possible to
identify the locations where people who are threats to national security are. Indeed, more
information is collected when GPS technology is supplemented with biometric technology. This
is because both the people posing a threat to national security are revealed. The biometric

TECHNOLOGY AND SECURITY
technology will significantly help to contain the Southern Border crisis. Effective mapping and
data tracking will be done.

12

TECHNOLOGY AND SECURITY

13
References

Barnetatn, M.N., & Finnemore, M. (1999). The Politics, Power, and Pathologies of International
Organization. International Organization, 53 (4), 699-732.
Bexell, M., Tallberg, J., & Uhlin, A. (2010).Democracy in Global Governance: The Promises
and Pitfalls of Transnational Actors. Global Governance, 16(1), 81-101.
Brown, C., & Kirsten, A. (2009). Understanding International Relations. Palgrave Macmillan.
Castellss, M. (2014). The New Public Sphere: Global Civil Society, Communication Networks,
and Global Governance. The Annals of American Academy.

Cavelty, M. D., & Wenger, A. (2019). Cyber security meets security politics: Complex
technology, fragmented politics, and networked science. Contemporary Security Policy,
41 (1), 5-32.

Chin, W. (2019). Technology, war and the state: past, present and future. International Affairs,
95(4),765–783.

Congressional Research Service. (2019, November 21). Artificial Intelligence and National
Security. Retrieved from https://fas.org/sgp/crs/natsec/R45178.pdf.
Council on Foreign Relations. (2019, October 15). Innovation and National Security. Retrieved
from https://www.newswise.com/articles/innovation-and-national-security.
Elia, Z., & Karenm, H. (2004) Governance, Security and Technology: the Case of Biometrics.
Studies in Political Economy, 73(1), 113-137.

TECHNOLOGY AND SECURITY

14

Elyachar, J. (2003). Mappings of Power: The State, NGOs, and International Organizations in
the Informal Economy of Cairo. Comparative Studies in Society and History, 45(3), 571605.
Ferguson, J., & Gupta, J. (2002). Spatializing states: toward an ethnography of neoliberal
governmentality. American Ethnologist, 29(4),981 -10.
Gonzales, A. (2014). Neoliberalism, the homeland Security state, and the authoritarian turn.
Latino Studies, 14(1), 80–98.
Gordillo, T. (2002). the breath of the devils: memories and places of an experience of terror.
American Ethnologist, 29(1), 33-57.
Grove, N.S. (2015). The cartographic ambiguities of HarassMap: Crowdmapping security and
sexual violence in Egypt. Security Dialogue, 46(4) 345–364.
Hampton, J. (2016, January 24). Space Technology Trends and Implications for National
Security. Kennedy School Review. Retrieved from
https://ksr.hkspublications.org/2016/01/24/space-technology-trends-and-implications-fornational-security/.
Man, G. (2015). From Empires to NGOs in the West African Sahel: The Road to Non
governmentality. New York: Cambridge University Press.
NGOs and International Organizations in the Informal Economy of Cairo. Society for
Comparative Study of Society and History, 571-599.
Weiss, T.G., & Wilkinso, R. (2014). Rethinking Global Governance? Complexity, Authority,
Power, Change. International Studies Quarterly, 58, 207–215.

TECHNOLOGY AND SECURITY

15

Attached.

Running head: TECHNOLOGY AND SECURITY

Role of Technology in Enhancing National Security
Name
Institution

1

TECHNOLOGY AND SECURITY

2

Role of Technology in Enhancing National Security
Introduction
National security is concerned with the protection of a state from actual and perceived
threats. These threats can be either within or outside the state. The highly increasing immigration
in the Southern border is one of the greatest threats to U.S. national security. The high population
crossing the border overwhelms the workers at the immigration offices at Southern boarder's a
result; most of the immigrants who cross the border illegally do so. Indeed, this threatens both
national and homeland security. To counter these threats, the U.S. Department of Defense has
tried to build a wall across the border. The rationale for doing this is that the Southern border
will become less porous. However, even after a wall was erected, the crisis continued. More
illegal immigrants entered the United States. Immigration has been one of the sources of security
threats in the United States. Even the event of 9/11 was associated with immigration. The
terrorists who conducted this attack entered the U.S. as immigrants. Unknown to the immigration
officers, they were armed with explosives. The poor security devices that were used during that
time could not detect this. Subsequently, they established networks with other criminal
organizations in America. This enabled them to execute a deadly terrorist attack. The Southern
Border crisis have increased the level of drug trafficking in America. There is a positive
relationship between drug use and crime. Technology will help to mitigate crime in United
States. Consequently, the national security will improve.
Background
The Southern border crisis has changed how the United States perceived national
security. Before then, the national security maintenance efforts focused on internal security. The

TECHNOLOGY AND SECURITY

3

law enforcement agencies mainly focused on identifying and counteracting on internal threats.
As a result, the United States heavily invested in homeland security department. Unfortunately,
this approach was based on a narrow definition of national security. Certainly, the 9/11 events
were least expected. The attack caught the security apparatus in America in shock. They had not
perceived the threat despite doing extensive surveillance (Brown & Kirsten, 2009; 59).
Essentially, national security is one of the dimensions of good governance. Nation-states that are
nationally secure are governed well. The increase of the threats to national security has of late
become a crucial subject in the security discourse. The United States is heavily investing in
security in a bid to improve its national security. Technology is enhancing national security by
improving how mapping and surveillance are done. Furthermore, technological tools are more
effective in conducting a risk assessment. This is because they capture accurate data or
information. Biometrics is one of the technological tools that the United States is using to boost
its national security. It has been using this technology from the time of 9/11 to the time of the
Southern Border Crisis.
Literature Review
Biometrics identifies individuals automatically using their behavioral and physiological
characteristics. Every individual has unique physiological attributes. These attributes include
fingerprint, face, voice, hand, hair, iris, and human tissues, among others (Elia & Karenm, 2004;
116). The biometric technology allows the recording and storage of these attributes. Biometric
has become common in modern times. It is used for border control, physical access control,
information security, and even for financial privacy safeguards. Primarily, the biometric data is
captured for civil use (Gonzales, 2014; 86). As a result, the government will have information
pertaining to the identities of every individual. This includes the physical location of each

TECHNOLOGY AND SECURITY
person. With this, it is easier to track the specific location of every individual. Using other
technologies, the government will match the little information it has with the one that is in its
biometrics (Castellss, 2014; 83). Once a pattern is established, the owner of the threats is
identified. Subsequently, risk mitigation strategies are taken. Fundamentally, the biometric data
in real-time. Hence, it is more accurate. Since the biometric information of every individual is
accessible, the possibilities of making an error during the identification and verification of
individuals are limited.
In essence, biometric technology promotes individual identity checks. In this regard, the
government uses biometric technology to confirm the place where the threat is coming from as
well as the people who come with this threat (Mann, 2015; 9). Biometric technology helps to
carry out verification of the sources of threats. The first step in guaranteeing national security
knows the specific location where the threat is emanating from. This gives the security team the
basis of preparing a strategy to counter the threat. Verification is essential since it provides
information about the group that threatens national security (Mann, 2015; 10). However, during
verification, only the identity of the group is revealed. This includes the location where that
group operates in. For example, if a terror attack happens like that of 9/11, the state does not
have to wait until the terrorist organization claims their responsibility. Using the biometric
technology, the state can know which group conducted the attack. Indeed, they would be known
even before they execute their attack. In light of this, the security apparatus will be able to
mitigate the security threat.
Biometric technology promotes the identification of individuals who are a threat to
national security. This includes those who are planning the attack and those who have executed
an attack. In identification, the specific person who threatens national security is known (Elia &

4

TECHNOLOGY AND SECURITY

5

Karenm, 2004; 117). This is because biometric technology is primarily based on pattern
recognition. Certainly, pattern recognition converts the images that it has collected into binary
codes. It uses an algorithm to do this. The information on suspected individuals is often
collected. This information includes images, identification cards, or biometric data like hair, eye,
hand, and fingertips, among others. Subsequently, it is entered into the verification system. The
system compares the information entered to it with the none in the reference templates. If the
information matches (Grove, 2015; 355). The individual is identified. However, it is not a must
of individuals to submit their identifier information. Alternatively, their data, such as that of hair
and fingerprints, can be used. Once they are entered into the verification system, they will match
with the existing biometric data of their owner. As a result, individuals will be identified.
Certainly, there cannot be negative matching since people do not share biometric data (Elyachar,
2003; 577). Indeed, the information generated using biometric technology is now admissible as
evidence. Its quality of evidence is higher than that of eye-witness testimony or even the physical
evidence.
Surveillance is considered as one of the best ways to counter security threats. However,
the way it was traditionally conducted made people and government authorities to distrust it.
This is because minimal information uses to be collected throughout the entire surveillance
process. Furthermore, traditional surveillance was expensive (Gordillo, 2002; 58). This is
because it involved police patrols, both in vehicles and also in planes. Instead of collecting the
intelligence information, those who carried out surveillance scared the perpetrators of crime.
Surveillance was also distrusted because it could not collect accurate information from people.
Hence, the wrong people ended up being punished. Today, biometric technology is increasingly
used in surveillance. It is more trusted because it has the ability to capture people's biological

TECHNOLOGY AND SECURITY

6

identifiers. For this reason, law enforcement agencies are frequently using it to identify
individuals who are a threat to national security (Grove, 2015; 353). Essentially, biometric
technology is used in surveillance indirectly. In this regard, biometrics and genetic profiling are
incorporated into surveillance technologies. Fundamentally, carrying out surveillance using
biometric technology happens in such a way that it is easy for people to find out. As a result, the
information is captured as raw as it is without any alteration. In light of this, security threats are
identified and forthwith dealt with. The good with the biometric technologies is that it has both
face and voice recognition (Ferguson & Gupta, 2002; 965). So, in case the voice was not clear,
and it did not help to identify a person correctly, the face will do. Some surveillance devices
have secret cameras. They complement the biometric technology in collecting the biometric data
of individuals. Furthermore, these cameras have the ability to collect high quality pictures. They
are able to regulate light properly. This enables them to collect physiological features more
accurately. However, many people are challenging biotechnology surveillance because it
disregards the privacy of people (Weiss & Wilkinso, 2014; 212). Certainly, the information
collected during biometric technology surveillance is very personal. Nonetheless, the accuracy of
the information collected using this technology makes people trust it.
Risks are inevitable. In a country like the United States, where the rate of immigration is
high, risks will always be present. Terrorists might take advantage of immigration to execute
their terrorist missions. Proper risk management is required. However, successful risk
management requires a proper risk assessment. The biometric technology can enhance risk
assessment. Some high-tech devices will be used to detect the biodata of individuals (Weiss &
Wilkinso, 2014; 213). Following the change in the patterns of immigration, the government of
the United States installed detectors that are computerized with the personal information of its

TECHNOLOGY AND SECURITY

7

citizens. This is especially in airports and public places. These detectors have the ability to
identify people carrying explosives from far. Subsequently, it sends this data to various centers
for verification and identification. The centers then serve this data to the law enforcement
agencies near those places. In case verification and identification shows that the suspected
individuals had a terrorist or security threading motive, the law enforcement officers arrest them.
Subsequently, there are interrogated. As a result, the risk is managed adequately before
something bad happens.
Biometric technology records all the personal information of individuals. Anything
wrong that an individual does is attached to his or her personal information. It acts as a footprint.
Wherever the person goes, those details follow him or her, and they cannot be deleted (Bexell,
Tallberg & Uhlin, 2010; 87). In this regard, if a person commits a crime in the Middle East and
then travel to the United States, the biometric technology will reveal what the person had done.
For this reason, people will fear to do crimes that may result in social profiling. Unlike in the
past, when a person could commit a crime and then vanish from that place, today, this is not
possible (Barnetatn & Finnemore, 1999; 675). A person is identified as a criminal at the airport
even before boarding a plane. The systems at the airport are computerized in the sense that they
are able to identify individuals with criminal records. Forthwith, they bar them from traveling.
There is no way an individual would be able to sneak. Therefore, the biometric technology
enhances the national security of the United States by ensuring that criminals are not allowed to
enter the borders of the United States.
The rate of immigration in the United States has been increasing every day. This has
raised the threats to national security. The collection of intelligence has become difficult in the
U.S. borders. Certainly, this increases the possibility of criminals coming to America. For

TECHNOLOGY AND SECURITY

8

instance, the crime rate in the areas near the Southern Border has consistently been high (Chin,
2019; 677). This is because the criminals cross the border with ease. They are hardly detected
even when they carry explosives. However, technology can potentially change this. The
intelligence monitoring devices are installed on buildings. This is especially in the buildings
along the road where traffic is high. These devices use biometric technology. Furthermore, they
can perform voice and face recognition. In case an individual is carrying dangerous weapons that
can threaten national security, the intelligence monitoring device recognizes the faces or the
voice of those individuals. Subsequently, they alert the inspection officers at the border. Besides,
these intelligence monitoring devices are able to find the identity of the suspects. Using
biometric technology, these devices matches the face or voice that has been captured with the
biodata available in the systems (Cavelty & Wenger, 2019; 10). Consequently, the identity of the
suspect is known. In this regard, investigations have become easier. Nonetheless, intelligent
monitoring is expensive to install. Furthermore, they may provide overlapping denies or
information in case there is high traffic. This is because it cannot manage to capture the voices or
faces of individuals in the crowd.
Case Presentation
Despite the high influx of immigrants at the Southern border, the data of immigrants is
not mixed. Every individual has a separate data file. In this regard, when a person moves from
one location to another, he or she moves with his or her data file. Certainly, data is trackable. In
this regard, the movements of individuals can be traced by tracking the movement of their data
file (Chin, 2019; 677). This is possible in modern times when nearly everyone has a phone.
Those phones have networks that enable the users to call or message the people they want. To
track the data, the security apparatus needs to liaise with the network providers. These network

TECHNOLOGY AND SECURITY

9

centers show how phone users have been moving from one location to another. Moreover, they
even reveal the messages that are sharing. Nonetheless, the revelation of the messages that
people have been sharing by the network provider is only done in an adverse condition
(Congressional Research Service, 2019; 29). This is because the network providers do not want
to infringe on the privacy and confidentiality of the users or network subscribers. With this
information, it is possible to mitigate the threats to national security as soon as they emerge.
Using biometric technology, it is possible to track the data of individuals. The biometric data
reveals the personal contacts of individuals (Cavelty & Wenger, 2019; 9). Subsequently, the
inspection officers request the network providers to provide them with the information showing
the movement of the owner of those contacts. Therefore, data tracking helps to mitigate threats to
national security by showing how the owners of mobile devices have been communicating.
Numerous technological devices in the security field have been invented. Furthermore,
new discoveries continue to be made every day. One of the most important technologies that
have been discovered recently is virtue operation emergency centers (Congressional Research
Service, 2019; 27). Traditionally, emergency security issues were handled from physical
locations. In this regard, citizens would report an emergency issue for the security officers to
respond. These centers were less efficient since a lot of time was wasted during reporting and
recording of the security issues. This is because the people who reported the emerging issues had
to take transport in order to get to these centers. Because of this, the response used to be slow,
given that there would be many people in the centers reporting either the same issue or different
ones. The virtual operation emergency centers came to replace these physical centers. Now, the
centers where the people make alerts of emergency security issues are online or in air. In this
regard, any security threat is promptly reported. Individuals usually send the signals to the virtue

TECHNOLOGY AND SECURITY

10

centers. Subsequently, the law enforcement officers get the information from the virtue centers
and act on it. In this regard, response to emerging security issues is quick because no time is used
traveling as it is the case with physical centers (Cavelty & Wenger, 2019; 7). Furthermore, there
is no redundancy of alerts. This is because the virtual center collects the data in terms of signals.
Moreover, only a single signal can be received at a time. Certainly, the virtual emergency centers
make coordination of inspection in U.S. borders easy. In regard to this, the Southern Border
crisis will not prevail for so long.
Analysis
Biometric technology improves mapping in an area. The main reason why it has not been
easy to control the Southern Border crisis is the failure to carry out effective mapping. To
contain the crisis, it is important to establish the various points along the border that the
immigrants use that are seemingly more porous (Hampton, 2016; 35) Certainly, the Southern
Border crisis has been made worse by having some immigrants crossing the border using other
district locations other than the recognized points. Immigrants do this so as to bypass verification
and identification processes at the border. Nonetheless, using GPS technology, it is possible to
identify all the points along the borders that the immigrants use. In this regard, the porous points
will no longer exi...


Anonymous
Great study resource, helped me a lot.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4
Similar Content
Related Tags