Hester, Rebecca J. (Author)
In 2011, a number of controversial experiments were conducted on the H5N1 flu virus. While the experiments illuminated growing biosecurity concerns regarding gain-of-function research, the controversy also signaled an evolving biosecurity threat landscape in which biological information, understood to be a latent and potential form of biological life, and the digital infrastructures that circulate this information, have also come to be seen as dangerous. This new threat landscape is informed by the technological framing of biological life as code. What kinds of biosecurity practices are called for when biological life is understood as code and what are the implications for life itself of developing such security practices? The United States has developed a techno-security infrastructure, which this article calls ‘bioveillance,’ in response to the dangers of mobile and mutable biological information. Collapsing biosecurity and cybersecurity into the emerging field of cyberbiosecurity and mirroring the networked life forms that it intends to prevent from proliferating, bioveillance is a vital component in a burgeoning global techno-security culture. The fact that biological life is not a code or information in any strict sense means that bioveillance will face significant challenges in its implementation not least because by using digital technologies to manage the communicability of informationalised biology, bioveillance also produces and proliferates that which it aims to forestall. This means that the more U.S. institutions do to generate biological information for biosecurity purposes, the more bioinsecurities they risk producing. Bioveillance and biological danger become one in the same.
...MoreArticle Jutta Weber; Katrin M. Kämpf (2020) Technosecurity Cultures: Introduction. Science as Culture (pp. 1-10).
Article
Silvan Pollozek;
Jan-Hendrik Passoth;
(2023)
Provisional by design: Frontex data infrastructures and the Europeanization of migration and border control
(/p/isis/citation/CBB906319443/)
Article
Evan Selinger;
Darrin Durant;
(2022)
Amazon’s Ring: Surveillance as a Slippery Slope Service
(/p/isis/citation/CBB181826170/)
Article
Katrin M. Kämpf;
(2020)
Pedophilia Screening in Technosecurity Culture The Construction of Dangerous Sub-populations in the Name of Security
(/p/isis/citation/CBB009060974/)
Article
Darren Ellis;
(2020)
Techno-Securitisation of Everyday Life and Cultures of Surveillance-Apatheia
(/p/isis/citation/CBB734944273/)
Article
Patrick Petit;
(2020)
‘Everywhere Surveillance’: Global Surveillance Regimes as Techno-Securitization
(/p/isis/citation/CBB181724884/)
Book
Brian Hochman;
(2022)
The Listeners: A History of Wiretapping in the United States
(/p/isis/citation/CBB775086796/)
Book
Ruha Benjamin;
(2019)
Captivating Technology: Race, Carceral Technoscience, and Liberatory Imagination in Everyday Life
(/p/isis/citation/CBB021638267/)
Article
Bruno Oliveira Martins;
(2023)
Security knowledges: Circulation, control, and responsible research and innovation in EU border management
(/p/isis/citation/CBB687707247/)
Article
Lucy Suchman;
Karolina Follis;
Jutta Weber;
(November 2017)
Tracking and Targeting: Sociotechnologies of (In)security: (Introduction)
(/p/isis/citation/CBB721841161/)
Article
David Armstrong;
(February 2019)
The social life of data points: Antecedents of digital technologies
(/p/isis/citation/CBB757557196/)
Article
Philip Olson;
Christine Labuski;
(August 2018)
‘There’s always a [white] man in the loop’: The gendered and racialized politics of civilian drones
(/p/isis/citation/CBB568832607/)
Book
Mary F. E. Ebeling;
(2022)
Afterlives of Data: Life and Debt under Capitalist Surveillance
(/p/isis/citation/CBB663965321/)
Thesis
Kim, Richard S.Y.;
(2010)
Cyber-Surveillance: A Case Study in Policy and Development
(/p/isis/citation/CBB001567169/)
Book
Brian Jordan Jefferson;
(2020)
Digitize and Punish: racial criminalization in the digital age
(/p/isis/citation/CBB018434400/)
Article
David Ribes;
(2019)
STS, Meet Data Science, Once Again
(/p/isis/citation/CBB739449022/)
Article
Michelle Spektor;
(2020)
Imagining the Biometric Future: Debates Over National Biometric Identification in Israel
(/p/isis/citation/CBB868369028/)
Book
Thomas S. Mullaney;
Benjamin Peters;
Mar Hicks;
Kavita Philip;
(2021)
Your Computer Is on Fire
(/p/isis/citation/CBB159272535/)
Book
Samuel Greengard;
(2021)
The Internet of Things
(/p/isis/citation/CBB874725102/)
Book
Andrew J. Stewart;
(2021)
A Vulnerable System: The History of Information Security in the Computer Age
(/p/isis/citation/CBB486585682/)
Article
David Skinner;
(2020)
Race, Racism and Identification in the Era of Technosecurity
(/p/isis/citation/CBB130537802/)
Be the first to comment!