Article ID: CBB548068287

Bioveillance: A Techno-security Infrastructure to Preempt the Dangers of Informationalised Biology (2020)

unapi

In 2011, a number of controversial experiments were conducted on the H5N1 flu virus. While the experiments illuminated growing biosecurity concerns regarding gain-of-function research, the controversy also signaled an evolving biosecurity threat landscape in which biological information, understood to be a latent and potential form of biological life, and the digital infrastructures that circulate this information, have also come to be seen as dangerous. This new threat landscape is informed by the technological framing of biological life as code. What kinds of biosecurity practices are called for when biological life is understood as code and what are the implications for life itself of developing such security practices? The United States has developed a techno-security infrastructure, which this article calls ‘bioveillance,’ in response to the dangers of mobile and mutable biological information. Collapsing biosecurity and cybersecurity into the emerging field of cyberbiosecurity and mirroring the networked life forms that it intends to prevent from proliferating, bioveillance is a vital component in a burgeoning global techno-security culture. The fact that biological life is not a code or information in any strict sense means that bioveillance will face significant challenges in its implementation not least because by using digital technologies to manage the communicability of informationalised biology, bioveillance also produces and proliferates that which it aims to forestall. This means that the more U.S. institutions do to generate biological information for biosecurity purposes, the more bioinsecurities they risk producing. Bioveillance and biological danger become one in the same.

...More
Included in

Article Jutta Weber; Katrin M. Kämpf (2020) Technosecurity Cultures: Introduction. Science as Culture (pp. 1-10). unapi

Citation URI
https://data.isiscb.org/isis/citation/CBB548068287/

Similar Citations

Article Patrick Petit; (2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization (/isis/citation/CBB181724884/)

Article Evan Selinger; Darrin Durant; (2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service (/isis/citation/CBB181826170/)

Article Darren Ellis; (2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia (/isis/citation/CBB734944273/)

Book Brian Hochman; (2022)
The Listeners: A History of Wiretapping in the United States (/isis/citation/CBB775086796/)

Article Silvan Pollozek; Jan-Hendrik Passoth; (2023)
Provisional by design: Frontex data infrastructures and the Europeanization of migration and border control (/isis/citation/CBB906319443/)

Article David Armstrong; (February 2019)
The social life of data points: Antecedents of digital technologies (/isis/citation/CBB757557196/)

Article Lucy Suchman; Karolina Follis; Jutta Weber; (November 2017)
Tracking and Targeting: Sociotechnologies of (In)security: (Introduction) (/isis/citation/CBB721841161/)

Article Philip Olson; Christine Labuski; (August 2018)
‘There’s always a [white] man in the loop’: The gendered and racialized politics of civilian drones (/isis/citation/CBB568832607/)

Thesis Kim, Richard S.Y.; (2010)
Cyber-Surveillance: A Case Study in Policy and Development (/isis/citation/CBB001567169/)

Book Mary F. E. Ebeling; (2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance (/isis/citation/CBB663965321/)

Article David Ribes; (2019)
STS, Meet Data Science, Once Again (/isis/citation/CBB739449022/)

Book Samuel Greengard; (2021)
The Internet of Things (/isis/citation/CBB874725102/)

Article Wyatt Dawson; Ashley Paintsil; James Bingaman; Paul R. Brewer; (February-June 2022)
CRISPR Images: Media Use and Public Opinion About Gene Editing (/isis/citation/CBB346361495/)

Article Michelle Spektor; (2020)
Imagining the Biometric Future: Debates Over National Biometric Identification in Israel (/isis/citation/CBB868369028/)

Book Andrew J. Stewart; (2021)
A Vulnerable System: The History of Information Security in the Computer Age (/isis/citation/CBB486585682/)

Authors & Contributors
Ebeling, Mary F. E.
Kämpf, Katrin M.
Brian Hochman
Petit, Patrick
James Bingaman
Labuski, Christine
Concepts
Technology and society
Surveillance
Security technologies
Technoscience; science and technology studies
Privacy
Cyberinfrastructure
Time Periods
21st century
Modern
20th century, late
20th century
19th century
18th century
Places
United States
Europe
European Union
Israel
Institutions
Amazon (Firm)
United States. National Security Agency
Comments

Be the first to comment!

{{ comment.created_by.username }} on {{ comment.created_on | date:'medium' }}

Log in or register to comment