“I Sexually Identify as an Attack Helicopter”

@article{Shalloe2019ISI,
  title={“I Sexually Identify as an Attack Helicopter”},
  author={Harper Shalloe},
  journal={TSQ: Transgender Studies Quarterly},
  year={2019}
}
  • Harper Shalloe
  • Published 1 November 2019
  • Sociology
  • TSQ: Transgender Studies Quarterly
This article jumps off and theorizes out from the viral meme “I Sexually Identify as an Attack Helicopter” to think trans as a cut across diagrams of control and counterinsurgency. Terming the set of digital and discursive technologies for capturing the threat of trans potentiality the “biopolitics of identification,” it traces spectral appearances of trans as a contrivance for violence through lived and imagined scenes of surveillance and security. 
4 Citations
Short-Circuited Trans Care, t4t, and Trans Scenes
  • Amy Marvin
  • Art
    TSQ: Transgender Studies Quarterly
  • 2022
This essay discusses short-circuited trans care by focusing on failures of t4t as an ethos both interpersonally and within particular trans scenes. The author begins by recounting an experience
Evaluating inclusive gender identity measures for use in quantitative psychological research
  • G. Fraser
  • Psychology
    Psychology & Sexuality
  • 2018
ABSTRACT Despite growing awareness of the discrimination, violence and health disparities experienced by transgender people, most researchers in psychology assess gender identity using a binary
Exploring the Potential of Apple Face ID as a Drag, Queer and Trans Technology Design Tool
TLDR
The prostheses shown in this paper are functional, and allow users to train Apple Face ID software to design their own identities connected to their name, Apple ID Number, bank account, social networks, and any other data or online activity digitally associated to this persona.

References

SHOWING 1-10 OF 12 REFERENCES
Going Stealth: Transgender Politics and U.S. Surveillance Practices
In the immediate aftermath of the fascist attack on the US capital on 6 January 2021, thousands of people across social media platforms participated in ‘open source intelligence gathering’
The Female Offender
The appearance of this series, of which this work is the pioneer, marks an epoch in the history of English penal administration. Signs are not wanting that the English public are beginning to become
Drone Disorientations
Abstract Killing with drones produces queer moments of disorientation. Drawing on queer phenomenology, I show how militarized masculinities function as spatiotemporal landmarks that give killing in
Precision Targets: GPS and the Militarization of U.S. Consumer Identity
most people in the United States, war is almost always elsewhere. Since the Civil War, declared wars have been engaged on terrains at a distance from the continental space of the nation. Until the
Surveillance and Capture: Two Models of Privacy
  • P. Agre
  • Computer Science
    Inf. Soc.
  • 1994
TLDR
Two models of privacy issues are contrasted: the surveillance model employs visual metaphors and derives from historical experiences of secret police surveillance and the less familiar capture model employs linguistic metaphors.
Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy
TLDR
Tracing the arc of a persons life, ONeil exposes the black box models that shape the authors' future, both as individuals and as a society, in this urgent and necessary book.
Control and Freedom: Power and Paranoia in the Age of Fiber Optics
How has the Internet, a medium that thrives on control, been accepted as a medium of freedom? Why is freedom increasingly indistinguishable from paranoid control? In Control and Freedom, Wendy Hui
The language of new media
"In this book Lev Manovich offers the first systematic and rigorous theory of new media. He places new media within the histories of visual and media cultures of the last few centuries. He discusses
A Prehistory of the Cloud
We may imagine the digital cloud as placeless, mute, ethereal, and unmediated. Yet the reality of the cloud is embodied in thousands of massive data centers, any one of which can use as much
...
1
2
...