Low-tech security: (Record no. 29207)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 01760cam a2200145 4500 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | BONELLI Laurent |
245 ## - TITLE STATEMENT | |
Title | Low-tech security: |
Remainder of title | files, notes, and memos as technologies of anticipation/ |
Statement of responsibility, etc. | Laurent Bonelli |
260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
Date of publication, distribution, etc. | 2014 |
520 ## - SUMMARY, ETC. | |
Summary, etc. | When it comes to anticipating terrorism, do recent technological advancements fundamentally change the modus operandi of intelligence services? Recent scholarship has focused on the new modes of reasoning brought about by 'hi-tech' forms analysis such as data mining, graph, visualization and the algorithmic treatment of big data. While this article recognizes the increasing influence of these techniques, it argues they should not overshadow much more low-tech modalities through which a large part of counterterrorism work takes place. Low-tech counter-terrorism, based on qualitative methods and conjectural reasoning, still matters. Drawing on the case of French domestic intelligence services and based on qualitative interviews, observations and declassified documents, this article shows that the practices of security professionals, rooted in traditional institutional habituses developed over time, are largely in continuity with previous 'low-tech' forms of police work. In a context in which the uses of digital security technologies have generated discussions about politics and ethics, this article suggests that traditional techniques of intelligence gathering and processing therefore still merit a great amount of attention. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | COUNTER TERRORISM |
General subdivision | TECHNOLOGY |
700 ## - ADDED ENTRY--PERSONAL NAME | |
Personal name | RAGAZZI Francesco |
773 ## - HOST ITEM ENTRY | |
Main entry heading | Security Dialogue: |
Related parts | Vol 45, No. 5, October 2014, pp. 476-493 (47) |
856 ## - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="http://dx.doi.org/10.1177/0967010614545200">http://dx.doi.org/10.1177/0967010614545200</a> |
Public note | Click here for full text |
945 ## - LOCAL PROCESSING INFORMATION (OCLC) | |
i | 44606-1001 |
r | N |
s | Y |
Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Total checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Mindef Library & Info Centre | Mindef Library & Info Centre | Journals | 08/12/2014 | COUNTERTERRORISM | 44606-1001 | 03/01/2024 | 1 | 03/01/2024 | Journal Article |