In this Book

Surveillance in the Time of Insecurity
buy this book Buy This Book in Print
summary
Threats of terrorism, natural disaster, identity theft, job loss, illegal immigration, and even biblical apocalypse—all are perils that trigger alarm in people today. Although there may be a factual basis for many of these fears, they do not simply represent objective conditions. Feelings of insecurity are instilled by politicians and the media, and sustained by urban fortification, technological surveillance, and economic vulnerability.Surveillance in the Time of Insecurity fuses advanced theoretical accounts of state power and neoliberalism with original research from the social settings in which insecurity dynamics play out in the new century. Torin Monahan explores the counterterrorism-themed show 24, Rapture fiction, traffic control centers, security conferences, public housing, and gated communities, and examines how each manifests complex relationships of inequality, insecurity, and surveillance. Alleviating insecurity requires that we confront its mythic dimensions, the politics inherent in new configurations of security provision, and the structural obstacles to achieving equality in societies.

Table of Contents

  1. Cover
  2. restricted access Download |
  1. Title Page, Copyright
  2. restricted access Download |
  1. Contents
  2. p. v
  3. restricted access Download |
  1. Figures and Tables
  2. p. vii
  3. restricted access Download |
  1. Acknowledgments
  2. pp. ix-x
  3. restricted access Download |
  1. Introduction
  2. pp. 1-12
  3. restricted access Download |
  1. Part One - Security Cultures
  2. p. 13
  3. restricted access Download |
  1. Chapter 1. Securing the Homeland
  2. pp. 15-25
  3. restricted access Download |
  1. Chapter 2. Twenty-Four-Hour Exceptions
  2. pp. 26-36
  3. restricted access Download |
  1. Chapter 3. Situational Awareness of the Security Industry
  2. pp. 37-49
  3. restricted access Download |
  1. Chapter 4. Vulnerable Identities
  2. pp. 50-63
  3. restricted access Download |
  1. Chapter 5. Leaving Others Behind
  2. pp. 64-78
  3. restricted access Download |
  1. Part Two - Surveillance Infrastructures
  2. p. 79
  3. restricted access Download |
  1. Chapter 6. Residential Fortification
  2. pp. 81-98
  3. restricted access Download |
  1. Chapter 7. Controlling Mobilities
  2. pp. 99-112
  3. restricted access Download |
  1. Chapter 8. Masculine Technologies
  2. pp. 113-127
  3. restricted access Download |
  1. Chapter 9. Countersurveillance
  2. pp. 128-144
  3. restricted access Download |
  1. Conclusion
  2. pp. 145-150
  3. restricted access Download |
  1. Notes
  2. pp. 151-175
  3. restricted access Download |
  1. Bibliography
  2. pp. 177-197
  3. restricted access Download |
  1. Index
  2. pp. 199-211
  3. restricted access Download |
Back To Top

This website uses cookies to ensure you get the best experience on our website. Without cookies your experience may not be seamless.