Race and National Security by Matiangai V. S. Sirleaf
Author:Matiangai V. S. Sirleaf
Language: eng
Format: epub
Publisher: Oxford University Press
Published: 2023-03-15T00:00:00+00:00
Biometric-Enabled Warfare and Biometric Cybersurveillance as Experiment in Sociotechnical Control and Coercion
Sociotechnical inquiries consider the interplay between human and technological systems.65 This section of this chapter turns its attention to the sociotechnical and data colonizing questions raised by the U.S. militaryâs strategy of âidentity dominanceâ in Afghanistan during its twenty-year military operation.66 The concept of identity dominance stems from a biometric-enabled warfare rationale: that national security dominance and control in counterinsurgency postures depends on fully transparent identities. Biometric-enabled warfare arguably is a technological outgrowth of a data colonialism mindset. At the earliest stages of biometric data colonialism, Afghanistan witnessed the universal beta testing of cybersurveillance tools through the attempted data colonization of the digitized bodies of almost the entire Afghan population.67
The embrace of biometric cybersurveillance technologiesâwidespread collection of scanned fingerprints and irises, facial images, and in some instances, DNAâallowed for the U.S. military to coordinate biometric collection and sharing among the military, criminal, and civil functioning of the Afghan government. Biometric surveillance tools should also be understood as racialized technologies with empirically disparate accuracy. âBiometric technologies âprivilege [W]hitenessâ (Browne, 2015) with significantly higher margins of error when measuring or verifying âothered bodiesâ whether in terms of race, ethnicity, gender, class, disability or age (Magnet, 2011).â68
The dependence of the U.S. military and other federal agencies on tech corporations has led to additional concerns of a merger between a military-surveillance and industrial-corporate colonizing project. In recent years, more attention has been given to the use of technology by the United States and other Western powers in humanitarian and military settings. Guided by concerns for national security and a desire to solve various social problems, national and international agencies often seek collaboration and support from private sector companiesâallowing already complicated motivations to be further muddled by capitalist opportunity. A common criticism is that humanitarian aid can transform into a coercive dynamicâa means of cultivating dependence and recreating colonial relationships among the beneficiary countries.69 These theories are helpful for contextualizing the discussion, but do not give as weighty a focus to the explicit military relationships that are often interwoven with the humanitarian ones. Using elements of technocolonialism theory in the humanitarian sphere, we can apply a more explicit national security framework to consider the biometric data colonialism ambitions in Afghanistan.
Colonialism is marked by power imbalances and resource extraction.70 In civil conflict and humanitarian crises, the populations involved have an added layer of vulnerability. The United States, among other nations, researched a host of new applications of biometric technology in Afghanistan, purportedly for the ultimate benefit of the Afghan people. However, questions about risk, benefit, and consent remain unanswered. In conflicts like Afghanistan, the testing of new technologyâbiometric technology in particularâcan be categorized as serving three distinct but overlapping themes: securitization, solutionism, and capitalism.
Considering securitization within a colonialist framework allows for keener interrogation of the consequences of biometric surveillance technology deployed first abroad and then stateside. During U.S. military operations in Afghanistan, biometric data and other data were collected with the aim to de-anonymize Taliban forces.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Comparative | Conflict of Laws |
Customary | Gender & the Law |
Judicial System | Jurisprudence |
Natural Law | Non-US Legal Systems |
Science & Technology |
Future Crimes by Marc Goodman(3005)
American Kingpin by Nick Bilton(2979)
The Meaning of the Library by unknow(2071)
Inside the Middle East by Avi Melamed(1945)
On Tyranny by Timothy Snyder(1861)
Why Nations Fail: The Origins of Power, Prosperity, and Poverty by Daron Acemoglu & James Robinson(1790)
Living Silence in Burma by Christina Fink(1732)
Putin's Labyrinth(1661)
The Mastermind by Evan Ratliff(1592)
Think Like a Rocket Scientist by Ozan Varol(1398)
Law: A Very Short Introduction by Raymond Wacks(1385)
The Smartest Kids in the World by Amanda Ripley(1368)
Leadership by Doris Kearns Goodwin(1349)
The Rule of Law by Bingham Tom(1319)
A Dirty War by Anna Politkovskaya(1315)
It's Our Turn to Eat by Michela Wrong(1305)
Philosophy of law a very short introduction by Raymond Wacks(1298)
Social Media Law in a Nutshell by Ryan Garcia & Thaddeus A Hoffmeister(1250)
Civil Procedure (Aspen Casebooks) by Stephen C. Yeazell(1177)