Inspired by taxonomist Jack Goody’s theorizing of ‘ancient lists’ as ‘intellectual technologies’, this book analyzes listing practices in modern and contemporary formations of power, and how they operate in the installation and securing of the milieus of circulation that characterize Michel Foucault’s conception of governmentality. Propelling the list’s role in the delimitation and policing of risky and threatening elements from out of history and into a contemporary analysis of power, this work demonstrates how assemblages of computer, statistical, and list technologies first deployed by the Nazi regime continue to resonate significantly in the segmenting and constitution of a critical classification of contemporary homo sapiens: the terrorist class, or homo sacer.
MULTIFILE
This study was commissioned by the European Parliament’s Policy Department for Citizens’ Rights and Constitutional Affairs at the request of the Committee on Constitutional Affairs of the European Parliament. It analyses the political and legal dynamics behind referendums on EU-related matters. It argues that we have entered a period of increasing political uncertainty with regard to the European project and that this new political configuration will both affect and be affected by the politics of EU-related referendums. Such referendums have long been a risky endeavour and this has been accentuated in the wake of the Great Recession with its negative ramifications for public opinion in the European Union. It is clear that referendums on EU matters are here to stay and will continue to be central to the EU’s future as they are deployed to determine the number of Member States within the EU, its geographical reach, its constitutional evolution and adherence to EU policies. Only now they have become an even riskier endeavour.
LINK
African citizens are increasingly being surveilled, profiled, and targeted online in ways that violate their rights. African governments frequently use pandemic or terrorism-related security risks to grant themselves additional surveillance rights and significantly increase their collection of monitoring apparatus and technologies while spending billions of dollars to conduct surveillance (Roberts et al. 2023). Surveillance is a prominent strategy African governments use to limit civic space (Roberts and Mohamed Ali 2021). Digital technologies are not the root of surveillance in Africa because surveillance practices predate the digital age (Munoriyarwa and Mare 2023). Surveillance practices were first used by colonial governments, continued by post-colonial governments, and are currently being digitalized and accelerated by African countries. Throughout history, surveillance has been passed down from colonizers to liberators, and some African leaders have now automated it (Roberts et al. 2023). Many studies have been conducted on illegal state surveillance in the United States, China, and Europe (Feldstein 2019; Feldstein 2021). Less is known about the supply of surveillance technologies to Africa. With a population of almost 1.5 billion people, Africa is a continent where many citizens face surveillance with malicious intent. As mentioned in previous chapters, documenting the dimensions and drivers of digital surveillance in Africa is
MULTIFILE