Governing others: Anomaly and the algorithmic subject of security

被引:51
作者
Aradau, Claudia [1 ]
Blanke, Tobias [2 ]
机构
[1] Kings Coll London, Int Polit, London, England
[2] Kings Coll London, Social & Cultural Informat, London, England
关键词
Algorithms; Big Data; Security; Self/Other; Surveillance; Anomaly;
D O I
10.1017/eis.2017.14
中图分类号
D81 [国际关系];
学科分类号
030207 ;
摘要
As digital technologies and algorithmic rationalities have increasingly reconfigured security practices, critical scholars have drawn attention to their performative effects on the temporality of law, notions of rights, and understandings of subjectivity. This article proposes to explore how the other' is made knowable in massive amounts of data and how the boundary between self and other is drawn algorithmically. It argues that algorithmic security practices and Big Data technologies have transformed self/other relations. Rather than the enemy or the risky abnormal, the "other' is algorithmically produced as anomaly. Although anomaly has often been used interchangeably with abnormality and pathology, a brief genealogical reading of the concept shows that it works as a supplementary term, which reconfigures the dichotomies of normality/abnormality, friend/enemy, and identity/difference. By engaging with key practices of anomaly detection by intelligence and security agencies, the article analyses the materialisation of anomalies as specific spatial "dots', temporal spikes', and topological nodes'. We argue that anomaly is not simply indicative of more heterogeneous modes of othering in times of Big Data, but represents a mutation in the logics of security that challenge our extant analytical and critical vocabularies.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 88 条
[1]  
Aggarwal Charu C., 2013, OUTLIER ANAL, P43
[2]   A comprehensive survey of numeric and symbolic outlier mining techniques [J].
Agyemang, Malik ;
Barker, Ken ;
Alhajj, Rada .
INTELLIGENT DATA ANALYSIS, 2006, 10 (06) :521-538
[3]  
Akhgar B., 2015, APPL BIG DATA NATL S
[4]   Graph based anomaly detection and description: a survey [J].
Akoglu, Leman ;
Tong, Hanghang ;
Koutra, Danai .
DATA MINING AND KNOWLEDGE DISCOVERY, 2015, 29 (03) :626-688
[5]   Questioning security devices: Performativity, resistance, politics [J].
Amicelle, Anthony ;
Aradau, Claudia ;
Jeandesboz, Julien .
SECURITY DIALOGUE, 2015, 46 (04) :293-306
[6]  
Amoore L., 2013, POLITICS POSSIBILITY
[7]   Biometric borders: Governing mobilities in the war on terror [J].
Amoore, Louise .
POLITICAL GEOGRAPHY, 2006, 25 (03) :336-351
[8]  
[Anonymous], 2013, DATA SMART CITY SOLU
[9]   Politics of prediction: Security and the time/space of governmentality in the age of big data [J].
Aradau, Claudia ;
Blanke, Tobias .
EUROPEAN JOURNAL OF SOCIAL THEORY, 2017, 20 (03) :373-391
[10]   The (Big) Data-security assemblage: Knowledge and critique [J].
Aradau, Claudia ;
Blanke, Tobias .
BIG DATA & SOCIETY, 2015, 2 (02)