Leaky Apps and Data Shots: Leakage and Insertion in NSA-surveillance
| Authors | |
|---|---|
| Publication date | 2015 |
| Journal | Surveillance & Society |
| Volume | Issue number | 13 | 2 |
| Pages (from-to) | 182-196 |
| Organisations |
|
| Abstract |
The NSA disclosures have put the issue of surveillance at center stage, and with that, a range of technologies by which data are captured. This article aims to break up devices for data collection by discussing devices that leak data versus devices that are inserted into computers or networks in order to capture data. Taking a post-Foucauldian trajectory within surveillance theory as a point of reference, in which conceptual frameworks tended to emphasize data bodies and data flows, this article argues that the leaks potentially open new conceptual repertoires and research sites. Amongst other things, we might want to start focusing on devices that ‘get close’.
|
| Document type | Article |
| Language | English |
| Published at | http://library.queensu.ca/ojs/index.php/surveillance-and-society/article/view/snowden_leakage |
| Downloads |
5315-12423-1-PB
(Final published version)
|
| Permalink to this page | |