Corpus ID: 132998324

THE IMPACTS OF THE USE OF UAVS ON THE NATURE, ORGANISATION AND REGULATION OF CANADA-U.S. BORDER SURVEILLANCE

@inproceedings{Szoo2015THEIO,
  title={THE IMPACTS OF THE USE OF UAVS ON THE NATURE, ORGANISATION AND REGULATION OF CANADA-U.S. BORDER SURVEILLANCE},
  author={Adam Szoo},
  year={2015}
}

References

SHOWING 1-10 OF 124 REFERENCES
Emerging Drone Nations
Just weeks after Nazi Germany began to use the V-1 missile to attack the United Kingdom in 1944, the United States began work on a pilotless bomber to attack targets deep inside German-held territo...
10 Things You Didn’t Know About Drones
  • Foreign Policy,
  • 2012
Surveillance and violence from afar: The politics of drones and liminal security-scapes
As surveillance and military devices, drones—or ‘unmanned aerial vehicles’—offer a prism for theorizing the technological politics of warfare and governance. This prism reveals some violentExpand
Homeland Security: Unmanned Aerial Vehicles and Border Surveillance
Congress has expressed a great deal of interest in using Unmanned Aerial Vehicles (UAVs) to surveil the United States' international land border. U.S. Customs and Border Protection (CBP) utilizesExpand
Militarization and Policing—Its Relevance to 21st Century Police
This work examines the blurring distinctions between the police and military institutions and between war and law enforcement. In this article, the author asserts that understanding this blur, andExpand
Risk and Responsibility
level. Risks only exist when there are decisions to be taken, for reasons given earlier. The idea of responsibility also presumes decisions. What brings into play the notion of responsibility is thatExpand
Surveillance, Then and now: Securing Privacy in Public Spaces
  • Technical Report
  • 2013
Unmanned Aircraft Systems: A Logical Choice for Homeland Security Support
Abstract : Unmanned aircraft systems (UAS) have been part of aviation from the beginnings of manned aviation and have become a vital tool in our overseas military and national security operations.Expand
...
1
2
3
4
5
...