Vogel, Kathleen M. (Author)
Dennis, Michael Aaron (Author)
With the noted intelligence failures prior to the September 11 attacks and the 2003 Iraq War, the US intelligence community has recognized the need to acquire new, outside expertise to mitigate against future intelligence breakdowns. This recent attention on intelligence outreach provides Science and Technology Studies (STS) scholars with an opportunity to consider the role they might play in these efforts, as well as the various opportunities and difficulties that can shape these relationships, and the types of knowledge that can be produced and known from engagements with these secret communities. This paper provides a reflection on how two STS scholars have attempted to intervene into intelligence and the lessons learned.
...More
Article
Brian Balmer;
(March 2017)
Shadow Values and the Politics of Extrapolation (Special Issue Commentary)
(/p/isis/citation/CBB819964335/)
Book
Rebecca Slayton;
(2023)
Arguments that Count: Physics, Computing, and Missile Defense, 1949-2012
(/p/isis/citation/CBB404848285/)
Article
Almklov, Petter G.;
Hepsø, Vidar;
(August 2011)
Between and beyond data: How analogue field experience informs the interpretation of remote data sources in petroleum reservoir geology
(/p/isis/citation/CBB837941513/)
Article
Elina I. Mäkinen;
(March 2018)
Action in the Space Between: From Latent to Active Boundaries
(/p/isis/citation/CBB718195671/)
Article
Sky Edith Gross;
Shai Lavi;
Hagai Boas;
(2019)
Medicine, Technology, and Religion Reconsidered: The Case of Brain Death Definition in Israel
(/p/isis/citation/CBB228629534/)
Article
Jakob Lundgren;
(2018)
No "Real" Experts: Unexpected Agreement Over Disagreement in STS and Philosophy of Science
(/p/isis/citation/CBB181333782/)
Article
Masco, Joseph;
(2002)
Lie detectors: On secrets and hypersecurity in Los Alamos
(/p/isis/citation/CBB001180562/)
Article
Owen Marshall;
(2022)
Un-silencing an Experimental Technique: Listening to the Electrical Penetration Graph
(/p/isis/citation/CBB827332902/)
Article
Wylie, Caitlin Donahue;
(December 2019)
Socialization through stories of disaster in engineering laboratories
(/p/isis/citation/CBB871313365/)
Article
Myanna Lahsen;
(September 2016)
Toward a Sustainable Future Earth: Challenges for a Research Agenda
(/p/isis/citation/CBB813960256/)
Article
Sara L. Ackerman;
Katherine Weatherford Darling;
Sandra Soo-Jin Lee;
(March 2016)
Accounting for Complexity: Gene–environment Interaction Research and the Moral Economy of Quantification
(/p/isis/citation/CBB257526872/)
Article
Carlo Caduff;
(March 2017)
Targets in the Cloud: On Transparency and Other Shadows (Special Issue Commentary)
(/p/isis/citation/CBB356484671/)
Article
Rebecca A. Adelman;
(May 2018)
Security Glitches: The Failure of the Universal Camouflage Pattern and the Fantasy of “Identity Intelligence”
(/p/isis/citation/CBB695441230/)
Article
Maria do Mar Pereira;
(2019)
Boundary-work that Does Not Work: Social Inequalities and the Non-performativity of Scientific Boundary-work
(/p/isis/citation/CBB949567754/)
Article
Robert G. W. Kirk;
(July 2018)
Recovering The Principles of Humane Experimental Technique: The 3Rs and the Human Essence of Animal Research
(/p/isis/citation/CBB661013428/)
Article
Alison Wylie;
(March 2017)
How Archaeological Evidence Bites Back: Strategies for Putting Old Data to Work in New Ways
(/p/isis/citation/CBB488823491/)
Article
Sarah Komasová;
(February 2022)
Airport security as translation through division and movement
(/p/isis/citation/CBB426371173/)
Article
Philippa Hellawell;
(2019)
“The Best and Most Practical Philosophers”: Seamen and the Authority of Experience in Early Modern Science
(/p/isis/citation/CBB806762885/)
Book
Joseph Masco;
(2014)
The Theater of Operations: National Security Affect from the Cold War to the War on Terror
(/p/isis/citation/CBB439511879/)
Article
Ogden, R. J.;
(2001)
Meteorological Services Leading to D-Day
(/p/isis/citation/CBB001321064/)
Be the first to comment!