The striking commercial success of Shoshana Zuboff’s 2019 book, The Age of Surveillance Capitalism, provides us with an excellent opportunity to reflect on how the present convergence of surveillance/capitalism coincides with popular critical and theoretical themes in surveillance studies, particularly that of sousveillance. Accordingly, this piece will first analyze how surveillance capitalism has molded the political behaviors and imaginations of activists. After acknowledging the theoretically and politically fraught implications of fighting surveillance with even more surveillance—especially given the complexities of digital capitalism’s endless desire to produce data—we conclude by exploring some of the political possibilities that lie at the margins of sousveillance capitalism (in particular, the extra-epistemological political value of sousveillance).
肖珊娜·祖博夫(Shoshana Zuboff) 2019年出版的《监控资本主义时代》(The Age of Surveillance Capitalism)取得了惊人的商业成功,为我们提供了一个极好的机会,让我们反思当前监控/资本主义的融合如何与监控研究(尤其是社会监控)中流行的批评和理论主题相吻合。因此,本文将首先分析监控资本主义是如何塑造活动家的政治行为和想象力的。在承认了用更多的监视来对抗监视的理论和政治上令人担忧的含义之后——特别是考虑到数字资本主义无休止地产生数据的欲望的复杂性——我们最后探讨了一些处于监视资本主义边缘的政治可能性(特别是监视的超认识论政治价值)。
{"title":"Sousveillance Capitalism","authors":"G. Borradaile, Joshua Reeves","doi":"10.24908/ss.v18i2.13920","DOIUrl":"https://doi.org/10.24908/ss.v18i2.13920","url":null,"abstract":"The striking commercial success of Shoshana Zuboff’s 2019 book, The Age of Surveillance Capitalism, provides us with an excellent opportunity to reflect on how the present convergence of surveillance/capitalism coincides with popular critical and theoretical themes in surveillance studies, particularly that of sousveillance. Accordingly, this piece will first analyze how surveillance capitalism has molded the political behaviors and imaginations of activists. After acknowledging the theoretically and politically fraught implications of fighting surveillance with even more surveillance—especially given the complexities of digital capitalism’s endless desire to produce data—we conclude by exploring some of the political possibilities that lie at the margins of sousveillance capitalism (in particular, the extra-epistemological political value of sousveillance). ","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":"1 1","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41995154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of Low and Maguire’s Spaces of Security: Ethnographies of Securityscapes, Surveillance, and Control","authors":"J. Coaffee","doi":"10.24908/ss.v18i2.13984","DOIUrl":"https://doi.org/10.24908/ss.v18i2.13984","url":null,"abstract":"","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42152599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Introduction to Dialogue section on "The State of Sousveillance."
“Sousveillance的状态”对话部分介绍
{"title":"Introduction: The State of Sousveillance","authors":"B. Newell","doi":"10.24908/ss.v18i2.14013","DOIUrl":"https://doi.org/10.24908/ss.v18i2.14013","url":null,"abstract":"Introduction to Dialogue section on \"The State of Sousveillance.\"","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48917467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Recent technological advancements in surveillance and data analysis software have drastically transformed how the United States manages its immigration and national security systems. In particular, an increased emphasis on information sharing and predictive threat modeling following the terrorist attacks of September 11, 2001, has prompted agencies such as the Department of Homeland Security to acquire powerful data analysis software from private sector vendors, including those in Silicon Valley. However, the impacts of these private sector technologies, especially in the context of privacy rights and civil liberties, are not yet fully understood. This article interrogates those potential impacts, particularly on the lives of immigrants, by analyzing the relational database system Investigative Case Management (ICM), which is used extensively by Immigration and Customs Enforcement (ICE) to track, manage, and enforce federal immigration policy. As a theoretical framework, the we use Benjamin Bratton’s concept of the “interfacial regime,” or the layered assemblages of interfaces that exist in modern networked ICT infrastructures. By conducting a document analysis, we attempt to visually situate ICM within the federal government’s larger interfacial regime that is composed by various intertwined databases both within and outside the government’s realm of management. Furthermore, we question and critique the role ICM plays in surveilling and governing the lives of immigrants and citizens alike.
最近在监控和数据分析软件方面的技术进步极大地改变了美国管理其移民和国家安全系统的方式。特别是,在2001年9月11日的恐怖袭击之后,人们越来越重视信息共享和预测威胁建模,这促使国土安全部(Department of Homeland Security)等机构从包括硅谷在内的私营部门供应商那里购买功能强大的数据分析软件。然而,这些私营部门技术的影响,特别是在隐私权和公民自由的背景下,尚未完全了解。本文通过分析关系数据库系统调查案件管理(ICM)来探讨这些潜在的影响,特别是对移民生活的影响,该系统被移民和海关执法局(ICE)广泛用于跟踪、管理和执行联邦移民政策。作为理论框架,我们使用了本杰明·布拉顿的“界面机制”概念,或者存在于现代网络化ICT基础设施中的界面分层组合。通过进行文档分析,我们试图直观地将ICM置于联邦政府更大的接口体系中,该体系由政府管理领域内外的各种相互交织的数据库组成。此外,我们质疑和批评ICM在监视和管理移民和公民生活方面所起的作用。
{"title":"Mapping Interfacial Regimes of Control: A Qualitative Analysis of America’s Post-9/11 Security Technology Infrastructure","authors":"Emma J. Knight, A. Gekker","doi":"10.24908/ss.v18i2.13268","DOIUrl":"https://doi.org/10.24908/ss.v18i2.13268","url":null,"abstract":"Recent technological advancements in surveillance and data analysis software have drastically transformed how the United States manages its immigration and national security systems. In particular, an increased emphasis on information sharing and predictive threat modeling following the terrorist attacks of September 11, 2001, has prompted agencies such as the Department of Homeland Security to acquire powerful data analysis software from private sector vendors, including those in Silicon Valley. However, the impacts of these private sector technologies, especially in the context of privacy rights and civil liberties, are not yet fully understood. This article interrogates those potential impacts, particularly on the lives of immigrants, by analyzing the relational database system Investigative Case Management (ICM), which is used extensively by Immigration and Customs Enforcement (ICE) to track, manage, and enforce federal immigration policy. As a theoretical framework, the we use Benjamin Bratton’s concept of the “interfacial regime,” or the layered assemblages of interfaces that exist in modern networked ICT infrastructures. By conducting a document analysis, we attempt to visually situate ICM within the federal government’s larger interfacial regime that is composed by various intertwined databases both within and outside the government’s realm of management. Furthermore, we question and critique the role ICM plays in surveilling and governing the lives of immigrants and citizens alike.","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42081447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper explores the rapid deployment of police body-worn cameras (BWCs) and the subsequent push for the integration of biometric technologies (i.e., facial recognition) into these devices. To understand the political dangers of these technologies, I outline the concept of “making the body electric” to provide a critical language for cultural practices of identifying, augmenting, and fixing the body through technological means. Further, I argue how these practices reinforce normative understandings of the body and its political functionality, specifically with BWCs and facial recognition. I then analyze the rise of BWCs in a cultural moment of high-profile police violence against unarmed people of color in the United States. In addition to examining the ethics of BWCs, I examine the politics of facial recognition and the dangers that this form of biometric surveillance pose for marginalized groups, arguing against the interface of these two technologies. The pairing of BWCs with facial recognition presents a number of sociopolitical dangers that reinforce the privilege of perspective granted to police in visual understandings of law enforcement activity. It is the goal of this paper to advance critical discussion of BWCs and biometric surveillance as mechanisms for leveraging political power and racial marginalization.
{"title":"Making the Body Electric: The Politics of Body-Worn Cameras and Facial Recognition in the United States","authors":"Jacob Hood","doi":"10.24908/ss.v18i2.13285","DOIUrl":"https://doi.org/10.24908/ss.v18i2.13285","url":null,"abstract":"This paper explores the rapid deployment of police body-worn cameras (BWCs) and the subsequent push for the integration of biometric technologies (i.e., facial recognition) into these devices. To understand the political dangers of these technologies, I outline the concept of “making the body electric” to provide a critical language for cultural practices of identifying, augmenting, and fixing the body through technological means. Further, I argue how these practices reinforce normative understandings of the body and its political functionality, specifically with BWCs and facial recognition. I then analyze the rise of BWCs in a cultural moment of high-profile police violence against unarmed people of color in the United States. In addition to examining the ethics of BWCs, I examine the politics of facial recognition and the dangers that this form of biometric surveillance pose for marginalized groups, arguing against the interface of these two technologies. The pairing of BWCs with facial recognition presents a number of sociopolitical dangers that reinforce the privilege of perspective granted to police in visual understandings of law enforcement activity. It is the goal of this paper to advance critical discussion of BWCs and biometric surveillance as mechanisms for leveraging political power and racial marginalization.","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24908/ss.v18i2.13285","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42957312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
It is often said that surveillance has massively transformed our social lives (Lyon, Haggerty, and Ball 2012: 1), but this claim is weakened by the admission that its “effects are difficult to isolate or observe, as they are embedded within many normal aspects of daily life.” Picking up this analytic challenge, this paper investigates the everyday interactional practice and experience of being surveilled. To do so, it draws on Goffman’s account of the interaction order, dwelling closely on unfocused interaction in which people maintain a side-of-the-eye, half-an-ear awareness of the people, objects, and events in the space around them. After introducing key concepts from Goffman, the paper discusses three scenes of surveillance: a woman walking down a city street, two men putting up street stickers (a civil offence), and passengers being scanned at an airport (Pütz 2012). It shows how different senses of potential threat and illegality enter the experience of surveillance, and it builds a rudimentary model. This paper considers only a tiny fraction of contemporary surveillance, but it shows Goffman’s value as an analytic resource that can hold large-scale generalisations about the surveillance society to account, allowing us to see agentive responses to surveillance that are too subtle to be captured by notions like subversion and resistance. Indeed, Goffman corroborates Green and Zurawski’s (2015) suggestion that surveillance is a basic mode of the social, elaborated in different ways in different environments.
{"title":"Everyday Surveillance, Goffman, and Unfocused Interaction","authors":"Louise Eley, B. Rampton","doi":"10.24908/SS.V18I2.13346","DOIUrl":"https://doi.org/10.24908/SS.V18I2.13346","url":null,"abstract":"It is often said that surveillance has massively transformed our social lives (Lyon, Haggerty, and Ball 2012: 1), but this claim is weakened by the admission that its “effects are difficult to isolate or observe, as they are embedded within many normal aspects of daily life.” Picking up this analytic challenge, this paper investigates the everyday interactional practice and experience of being surveilled. To do so, it draws on Goffman’s account of the interaction order, dwelling closely on unfocused interaction in which people maintain a side-of-the-eye, half-an-ear awareness of the people, objects, and events in the space around them. After introducing key concepts from Goffman, the paper discusses three scenes of surveillance: a woman walking down a city street, two men putting up street stickers (a civil offence), and passengers being scanned at an airport (Pütz 2012). It shows how different senses of potential threat and illegality enter the experience of surveillance, and it builds a rudimentary model. This paper considers only a tiny fraction of contemporary surveillance, but it shows Goffman’s value as an analytic resource that can hold large-scale generalisations about the surveillance society to account, allowing us to see agentive responses to surveillance that are too subtle to be captured by notions like subversion and resistance. Indeed, Goffman corroborates Green and Zurawski’s (2015) suggestion that surveillance is a basic mode of the social, elaborated in different ways in different environments.","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24908/SS.V18I2.13346","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48565942","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Privacy scholars, advocates, and activists repeatedly emphasize the fact that current measures of privacy protection are insufficient to counter the systemic threats presented by datafication and platformization (van Dijck, de Waal, and Poell 2018: 24). These threats include discrimination against underprivileged groups, monopolization of power and knowledge, as well as manipulation. In this paper, we take that analysis one step further, suggesting that the consequences of inappropriate privacy protection online possibly even run counter to the normative principles that underpinned the standard clause for privacy protection in the first place. We discuss the ways in which attempts at protection run the risk of producing results that not only diverge from but, paradoxically, even distort the normative goals they intended to reach: informational self-determination, empowerment, and personal autonomy. Drawing on the framework of “normative paradoxes,” we argue that the ideals of a normatively increasingly one-sided, liberal individualism create complicities with the structural dynamics of platform capitalism, which in turn promote those material-discursive practices of digital usage that are ultimately extremely privacy-invasive.
隐私学者、倡导者和活动家一再强调,当前的隐私保护措施不足以应对数据化和平台化带来的系统性威胁(van Dijck, de Waal, and Poell 2018: 24)。这些威胁包括对弱势群体的歧视、对权力和知识的垄断以及操纵。在本文中,我们将这一分析进一步推进,表明不适当的在线隐私保护的后果甚至可能与最初支撑隐私保护标准条款的规范性原则背道而驰。我们讨论了保护的尝试冒着产生结果的风险的方式,这些结果不仅偏离了他们想要达到的规范目标,而且矛盾的是,甚至扭曲了这些目标:信息自决、赋权和个人自治。利用“规范悖论”的框架,我们认为,规范上日益片面的自由个人主义的理想与平台资本主义的结构动态创造了共通之处,这反过来又促进了那些最终极端侵犯隐私的数字使用的物质话语实践。
{"title":"Normative Paradoxes of Privacy: Literacy and Choice in Platform Societies","authors":"P. Helm, Sandra Seubert","doi":"10.24908/ss.v18i2.13356","DOIUrl":"https://doi.org/10.24908/ss.v18i2.13356","url":null,"abstract":"Privacy scholars, advocates, and activists repeatedly emphasize the fact that current measures of privacy protection are insufficient to counter the systemic threats presented by datafication and platformization (van Dijck, de Waal, and Poell 2018: 24). These threats include discrimination against underprivileged groups, monopolization of power and knowledge, as well as manipulation. In this paper, we take that analysis one step further, suggesting that the consequences of inappropriate privacy protection online possibly even run counter to the normative principles that underpinned the standard clause for privacy protection in the first place. We discuss the ways in which attempts at protection run the risk of producing results that not only diverge from but, paradoxically, even distort the normative goals they intended to reach: informational self-determination, empowerment, and personal autonomy. Drawing on the framework of “normative paradoxes,” we argue that the ideals of a normatively increasingly one-sided, liberal individualism create complicities with the structural dynamics of platform capitalism, which in turn promote those material-discursive practices of digital usage that are ultimately extremely privacy-invasive.","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24908/ss.v18i2.13356","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46880300","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper examines how the combined prism of contemporary art and the notion of atmosphere may offer alternative perspectives on our encounters with places and practices of surveillance. Specifically, this article investigates the atmospheres of surveillance surfacing in the video installation Safe Conduct (2016a) by British contemporary artist Ed Atkins. The artwork recreates the well-known situation of going through an airport security check. Through a combination of visual narrative and a soundscape blending the sounds of the conveyor belt and X-ray machines with heavy breathing and Ravel’s Boléro, the work builds up an uncanny anticipation of something awful. Death and violence linger at its edges, and a disquieting atmosphere fills the exhibition space. The objective of the article is twofold: First, it explores the shifting and ambiguous atmospheres produced by contemporary surveillance practices through an immersive reading of the artwork Safe Conduct. Second, and connected to the first, it offers an experimental methodology of written vignettes responding to the embodied, aesthetic experience of atmospheres of surveillance. The article concludes that being more sensitive to the atmospheres of surveillance in our environment can give us a space to think critically about how these atmospheres affect us, how they are absorbed bodily, and how they attune our being: how surveillance is “in the air.”
{"title":"Safe is a Wonderful Feeling: Atmospheres of Surveillance and Contemporary Art","authors":"Karen Louise Grova Søilen","doi":"10.24908/ss.v18i2.12756","DOIUrl":"https://doi.org/10.24908/ss.v18i2.12756","url":null,"abstract":"This paper examines how the combined prism of contemporary art and the notion of atmosphere may offer alternative perspectives on our encounters with places and practices of surveillance. Specifically, this article investigates the atmospheres of surveillance surfacing in the video installation Safe Conduct (2016a) by British contemporary artist Ed Atkins. The artwork recreates the well-known situation of going through an airport security check. Through a combination of visual narrative and a soundscape blending the sounds of the conveyor belt and X-ray machines with heavy breathing and Ravel’s Boléro, the work builds up an uncanny anticipation of something awful. Death and violence linger at its edges, and a disquieting atmosphere fills the exhibition space. The objective of the article is twofold: First, it explores the shifting and ambiguous atmospheres produced by contemporary surveillance practices through an immersive reading of the artwork Safe Conduct. Second, and connected to the first, it offers an experimental methodology of written vignettes responding to the embodied, aesthetic experience of atmospheres of surveillance. The article concludes that being more sensitive to the atmospheres of surveillance in our environment can give us a space to think critically about how these atmospheres affect us, how they are absorbed bodily, and how they attune our being: how surveillance is “in the air.”","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24908/ss.v18i2.12756","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46577483","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This article explores how criminal identification technologies evolved in Portugal since the end of the nineteenth century from anthropometric measurements to descriptive, photographic, dactyloscopic, and genetic methods. The historical trajectory of these identification technologies allows us to reflect on the continuities and discontinuities of past and current practices that aim to inscribe the individual identity as a bureaucratic category. The chronological and geographical contexts are fundamental to understanding the archival uses of different techniques that seek to document (on paper and electronically) the suspicious body. Through the collection of documentary evidence (such as case files, reports, personal records, and legislation), this historical analysis situates the use and implementation of these techniques in the Portuguese context. This article demonstrates that the need to identify the criminal and to follow technological developments has been constantly used as a political argument to legitimise the implementation of these technologies. But it also concludes that these identification procedures tend to be extended to the entire population, widening the political will to identify and monitor not only “suspicious” bodies but also those who are regarded as “respectable” citizens.
{"title":"Identifying Suspicious Bodies? Historically Tracing Criminal Identification Technologies in Portugal","authors":"Diana Miranda","doi":"10.24908/ss.v18i1.12543","DOIUrl":"https://doi.org/10.24908/ss.v18i1.12543","url":null,"abstract":"This article explores how criminal identification technologies evolved in Portugal since the end of the nineteenth century from anthropometric measurements to descriptive, photographic, dactyloscopic, and genetic methods. The historical trajectory of these identification technologies allows us to reflect on the continuities and discontinuities of past and current practices that aim to inscribe the individual identity as a bureaucratic category. The chronological and geographical contexts are fundamental to understanding the archival uses of different techniques that seek to document (on paper and electronically) the suspicious body. Through the collection of documentary evidence (such as case files, reports, personal records, and legislation), this historical analysis situates the use and implementation of these techniques in the Portuguese context. This article demonstrates that the need to identify the criminal and to follow technological developments has been constantly used as a political argument to legitimise the implementation of these technologies. But it also concludes that these identification procedures tend to be extended to the entire population, widening the political will to identify and monitor not only “suspicious” bodies but also those who are regarded as “respectable” citizens.","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.24908/ss.v18i1.12543","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46509384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Lines of Resistance is filmed at the Berlin Wall Memorial, a preserved and sealed section of the former wall and death strip. The film, informed by the narration of tour guides and visitors comments, explores their interaction with and reactions to the memorial and considers the space as a site of control.
{"title":"Lines of Resistance","authors":"R. Butler","doi":"10.24908/SS.V18I1.13529","DOIUrl":"https://doi.org/10.24908/SS.V18I1.13529","url":null,"abstract":"Lines of Resistance is filmed at the Berlin Wall Memorial, a preserved and sealed section of the former wall and death strip. The film, informed by the narration of tour guides and visitors comments, explores their interaction with and reactions to the memorial and considers the space as a site of control.","PeriodicalId":47078,"journal":{"name":"Surveillance & Society","volume":" ","pages":""},"PeriodicalIF":2.0,"publicationDate":"2020-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47268488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}