archive

Woven into the surveillance state

From Behemoth, Sylvia Kuhne (Hamburg): Gambling with the “Gift”? On the Relationship between Security Technologies, Trust and Distrust: The Case of Fingerprinting; and John Philipp Baesler (SVSU): From Detection to Surveillance: U.S. Lie Detection Regimes from the Cold War to the War on Terror. Maurice Dawson (Missouri): A Brief Review of New Threats and Countermeasures in Digital Crime and Cyber Terrorism. Stephen Schulhofer (NYU): Access to National Security Information under the U.S. Freedom of Information Act. Alexandra H Perina (State): Black Holes and Open Secrets: The Impact of Covert Action on International Law. Zachary D. Clopton (Cornell): Territoriality, Technology, and National Security. Ashley Deeks (Virginia): Checks and Balances from Abroad. Nathan Alexander Sales (Syracuse): Can Technology Prevent Leaks? Stephen Humphreys (LSE): Conscience in the Datasphere. How our desires are woven into the surveillance state: Nausicaa Renner reviews Exposed: Desire and Disobedience in the Digital Age by Bernard Harcourt.