Governing others: Anomaly and the algorithmic subject of security

  title={Governing others: Anomaly and the algorithmic subject of security},
  author={Claudia Aradau and Tobias Blanke},
  journal={European Journal of International Security},
  pages={1 - 21}
Abstract As digital technologies and algorithmic rationalities have increasingly reconfigured security practices, critical scholars have drawn attention to their performative effects on the temporality of law, notions of rights, and understandings of subjectivity. This article proposes to explore how the ‘other’ is made knowable in massive amounts of data and how the boundary between self and other is drawn algorithmically. It argues that algorithmic security practices and Big Data technologies… 

Designs of borders: Security, critique, and the machines

This method of data visualisation unearths the deep patterns of opposition that run across the sociotechnical universe where European borders are designed and created and indicates that the structure of European R&D in border security keeps irregularised migrants off their radars.

Automating security infrastructures: Practices, imaginaries, politics

This article contributes to emergent debates in critical security studies that consider the processes and effects that arise where new forms of automated technology begin to guide security practices.

The ontological politics of cyber security: Emerging agencies, actors, sites, and spaces

The article's main claim is that the concept of ontological politics enables an engagement with the complex and transformative dynamics of ICT and the new security actors and practices that shape security politics in the digital age.

What harms may come ? Exploring the anticipatory dimensions of surveillance resistance in an age of datafication

Through an array of technological solutions and awareness-raising initiatives, civil society mobilizes against an onslaught of surveillance threats. What alternative values, practices, and tactics

Toward a Critique of Algorithmic Violence

Questions about how algorithms contribute to (in)security are under discussion across international political sociology. Building upon and adding to these debates, our collective discussion

The algorithmic regulation of security: An infrastructural perspective

An infrastructural perspective is developed, by analyzing how algorithmic regulation is enacted through the custom‐built transatlantic data infrastructureures of the EU‐U.S. Passenger Name Records and Terrorism Financing Tracking Program programs.

On the nature and types of anomalies: a review of deviations in data

The typology facilitates the evaluation of the functional capabilities of anomaly detection algorithms, contributes to explainable data science, and provides insights into relevant topics such as local versus global anomalies.

Border security and the digitalisation of sovereignty: insights from EU borderwork

A new understanding of how the concepts of digital and sovereignty interplay is proposed: sovereignty by digital means, sovereignty of the digital, and sovereignty over the digital is proposed.

Underneath the Promise of Safety and Security in a ‘Smart City’

It is argued that the smart city technologies and algorithms risk to create, reproduce and reinforce social inequalities and discrimination, and that it is unclear who is responsible for these unanticipated consequences.



Questioning security devices: Performativity, resistance, politics

A special issue proposing an analytics of devices to examine the configuration and reconfiguration of security practices by attending to the equipment or instrumentation that make these practices possible and temporally stabilize them is introduced.

The (Big) Data-security assemblage: Knowledge and critique

This paper challenges the credibility of security professionals’ discourses in light of the knowledge that they supposedly mobilize and argues for a series of conceptual moves around data, human–computer relations, and algorithms to address some of the limitations of existing engagements with the Big Data-security assemblage.

Politics of prediction: Security and the time/space of governmentality in the age of big data

  • Computer Science
  • 2016
This paper argues that prediction with big data is underpinned by the production of a different time/space of ‘between-ness’, which reconfigures how the authors are governed today and illustrates through an analysis of how predictive policing actualises between-ness as hotspots and near-real-time decisions.

The Politics of Possibility: Risk and Security Beyond Probability

Since September 11, 2001, the imagination of "low probability, high consequence" events has become a distinctive feature of contemporary politics. Uncertain futures - devastation by terrorist attack,

Collect it all: national security, Big Data and governance

A case study of complications of Big Data, which draws from the US intelligence community, and concludes with three spaces of intervention; new critical histories of the geoweb that trace the relationship of geography and the state; and legislative and encryption efforts that enable the geographic community to participate in public debate.

Application of Big Data for National Security: A Practitioner’s Guide to Emerging Technologies

This book combines expertise from an international team of experts in law enforcement, national security, and law, as well as computer sciences, criminology, linguistics, and psychology, creating a unique cross-disciplinary collection of knowledge and insights into this increasingly global issue.

Surveillance, Snowden, and Big Data: Capacities, consequences, critique

Big Data intensifies certain surveillance trends associated with information technology and networks, and is thus implicated in fresh but fluid configurations, and the ethical turn becomes more urgent as a mode of critique.

Data Mining and Predictive Analysis: Intelligence Gathering and Crime Analysis

This revised text highlights new and emerging technology, discusses the importance of analytic context for ensuring successful implementation of advanced analytics in the operational setting, and covers new analytic service delivery models that increase ease of use and access to high-end technology and analytic capabilities.

Security expertise : practice, power, responsibility

This chapter discusses security expertise in the context of the current security environment, which has seen an increase in the number of terror attacks and the need for awareness of the role of expert opinion in these events.

Guilty Bodies, Productive Bodies, Destructive Bodies: Crossing the Biometric Borders

This article examines the forms of power brought into play by the deployment of biometrics under the lenses of Foucault's notions of discipline and biopower. These developments are then analyzed from