English [en] · PDF · 9.9MB · 2003 · 📘 Book (non-fiction) · 🚀/lgli/lgrs/nexusstc/zlib · Save
description
Prominent among the quests for post-9/11 security are developments in surveillance, especially at national borders. These developments are not new, but many of them have been extended and intensified. The result? More and more people and populations are counted as "suspicious" and, at the same time, surveillance techniques become increasingly opaque and secretive. Lyon argues that in the aftermath of 9/11 there have been qualitative changes in the security climate: diverse databases containing personal information are being integrated; biometric identifiers, such as iris scans, are becoming more popular; consumer data are merged with those obtained for policing and intelligence, both nationally and across borders. This all contributes to the creation of ever-widening webs of surveillance. But these systems also sort people into categories for differential treatment, the most obvious case being that of racial profiling. This book assesses the consequences of these trends. Lyon argues that while extraordinary legal measures and high-tech systems are being adopted, promises made on their behalf - that terrorism can be prevented - are hard to justify. Furthermore, intensifying surveillance will have social consequences whose effects could be far-reaching: the undermining of social trust and of democratic participation.
Alternative filename
lgli/Surveillance after September 11 - Lyon, David, 1948-.pdf
Alternative filename
lgrsnf/Surveillance after September 11 - Lyon, David, 1948-.pdf
Alternative filename
zlib/no-category/David Lyon/Surveillance After September 11_24596937.pdf
Alternative publisher
Wiley-Blackwell (an imprint of John Wiley & Sons Ltd)
Alternative publisher
Blackwell Publishing Limited
Alternative publisher
Blackwell Publishers
Alternative edition
Themes for the 21st century, Malden, Mass, Massachusetts, 2003
Alternative edition
Themes for the 21st century, Reprinted, Malden, Mass, 2008
Alternative edition
THEMES FOR THE 21ST CENTURY, CAMBRIDGE, Unknown, 2003
{"edition":"1","isbns":["0745631819","9780745631813"],"last_page":208,"publisher":"Polity","series":"(Themes for the 21st Century Series): Linguistics, Racial Anthropology and Genetics in the Dialectic of Volk"}
metadata comments
Includes bibliographical references (p. [167]-189) and index.
metadata comments
BSC
Alternative description
"Prominent among the quests for post-9/11 security are developments in surveillance, especially at national borders. These developments are not new, but many of them have been extended and intensified. The result? More and more people and populations are counted as "suspicious" and, at the same time, surveillance techniques become increasingly opaque and secretive. Lyon argues that in the aftermath of 9/11 there have been qualitative changes in the security climate: diverse databases containing personal information are being integrated; biometric identifiers, such as iris scans, are becoming more popular; consumer data are merged with those obtained for policing and intelligence, both nationally and across borders. This all contributes to the creation of ever-widening webs of surveillance. But these systems also sort people into categories for differential treatment, the most obvious case being that of racial profiling. This book assesses the consequences of these trends. Lyon argues that while extraordinary legal measures and high-tech systems are being adopted, promises made on their behalf that terrorism can be prevented - are hard to justify. Furthermore, intensifying surveillance will have social consequences whose effects could be far-reaching: the undermining of social trust and of democratic participation."--Jacket
Alternative description
Surveillance and social control USA Surveillance and social control Europe Governance technology worldwide Political culture USA Privacy and categorization War on terrorism, 2001.
Alternative description
The September 11, 2001 attacks on New York and Washington prompted a series of immediate responses.
Repository ID for the 'libgen' repository in Libgen.li. Directly taken from the 'libgen_id' field in the 'files' table. Corresponds to the 'thousands folder' torrents.
Repository ID for the non-fiction ('libgen') repository in Libgen.rs. Directly taken from the 'id' field in the 'updated' table. Corresponds to the 'thousands folder' torrents.
All download options have the same file, and should be safe to use. That said, always be cautious when downloading files from the internet, especially from sites external to Anna’s Archive. For example, be sure to keep your devices updated.
Support authors and libraries
✍️ If you like this and can afford it, consider buying the original, or supporting the authors directly.
📚 If this is available at your local library, consider borrowing it for free there.
📂 File quality
Help out the community by reporting the quality of this file! 🙌
A “file MD5” is a hash that gets computed from the file contents, and is reasonably unique based on that content. All shadow libraries that we have indexed on here primarily use MD5s to identify files.
A file might appear in multiple shadow libraries. For information about the various datasets that we have compiled, see the Datasets page.