skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Geopolitics of security and surveillance in Nepal and Afghanistan: A comparative analysis
This article examines the geopolitics and geo-economics of security and surveillance. We comparatively focus on the effects of geopolitically powerful states – China and the United States – and their influence over the use of surveillance technologies in the name of spatial security in relatively weaker states – Nepal and Afghanistan. We use these two areas of comparison to address the similarities in security logics across disparate spaces and to highlight the everyday experiences and responses to both outside influence from powerful states and national security regimes. Through interview data from our respective qualitative research in Afghanistan and Nepal, we show how the logics of security situates particular racialized and gendered bodies as suspicious and examine how individuals living in these spaces experience, understand, and challenge these security regimes. We conclude by arguing for more comparative studies of security technologies and surveillance regimes. Additionally, we view these spaces of heightened security as potential sites for increased violence, rather than security.  more » « less
Award ID(s):
1759701
PAR ID:
10386691
Author(s) / Creator(s):
;
Date Published:
Journal Name:
Environment and Planning C: Politics and Space
ISSN:
2399-6544
Page Range / eLocation ID:
239965442211159
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Adversarial computations are a widely studied class of computations where resource-bounded probabilistic adversaries have access to oracles, i.e., probabilistic procedures with private state. These computations arise routinely in several domains, including security, privacy and machine learning. In this paper, we develop program logics for reasoning about adversarial computations in a higher-order setting. Our logics are built on top of a simply typed λ-calculus extended with a graded monad for probabilities and state. The grading is used to model and restrict the memory footprint and the cost (in terms of oracle calls) of computations. Under this view, an adversary is a higher-order expression that expects as arguments the code of its oracles. We develop unary program logics for reasoning about error probabilities and expected values, and a relational logic for reasoning about coupling-based properties. All logics feature rules for adversarial computations, and yield guarantees that are valid for all adversaries that satisfy a fixed resource policy. We prove the soundness of the logics in the category of quasi-Borel spaces, using a general notion of graded predicate liftings, and we use logical relations over graded predicate liftings to establish the soundness of proof rules for adversaries. We illustrate the working of our logics with simple but illustrative examples. 
    more » « less
  2. Increased use of technology in schools raises new privacy and security challenges for K-12 students---and harms such as commercialization of student data, exposure of student data in security breaches, and expanded tracking of students---but the extent of these challenges is unclear. In this paper, first, we interviewed 18 school officials and IT personnel to understand what educational technologies districts use and how they manage student privacy and security around these technologies. Second, to determine if these educational technologies are frequently endorsed across United States (US) public schools, we compiled a list of linked educational technology websites scraped from 15,573 K-12 public school/district domains and analyzed them for privacy risks. Our findings suggest that administrators lack resources to properly assess privacy and security issues around educational technologies even though they do pose potential privacy issues. Based on these findings, we make recommendations for policymakers, educators, and the CHI research community. 
    more » « less
  3. Abstract ‘Big Data’ digital technologies are beginning to make inroads into peasant agriculture in the Global South. Of particular importance is the subset of technologies that appropriate agricultural decision‐making, here theorized as surveillance agriculture. These technological regimes aspire to not only remove decision‐making from the farmer, but eventually to replace the farmer with, for instance, ‘autonomous’ tractors. This paper looks ahead to ask what a technological trajectory that aspires to autonomy for the tractor may portend for autonomy for the peasant farmer. It compares surveillance agriculture to other forms of surveillance capitalism, noting that it shares a will to not only sell products and services but to manipulate behaviour but differs in that the behaviour being manipulated is professional productive behaviour. The paper surveys the vested interests of the entities behind surveillance agriculture and asks how informational relations of production may be changed between farmers and these entities. It then examines the informational relations of production among peasant farmers that may be interdicted by surveillance agriculture, especially the group‐level decision‐making dynamics that make ‘individual autonomy’ a misnomer. But surveillance agriculture is resolutely individualized, which raises concerns for peasant decision‐making autonomy. 
    more » « less
  4. Baym, Nancy; Ellison, Nicole (Ed.)
    Abstract The future of work increasingly focuses on the collection and analysis of worker data to monitor communication, ensure productivity, reduce security threats, and assist in decision-making. The COVID-19 pandemic increased employer reliance on these technologies; however, the blurring of home and work boundaries meant these monitoring tools might also surveil private spaces. To explore workers’ attitudes toward increased monitoring practices, we present findings from a factorial vignette survey of 645 U.S. adults who worked from home during the early months of the pandemic. Using the theory of privacy as contextual integrity to guide the survey design and analysis, we unpack the types of workplace surveillance practices that violate privacy norms and consider attitudinal differences between male and female workers. Our findings highlight that the acceptability of workplace surveillance practices is highly contextual, and that reductions in privacy and autonomy at work may further exacerbate power imbalances, especially for vulnerable employees. 
    more » « less
  5. In the last few years, Cloud computing technology has benefited many organizations that have embraced it as a basis for revamping the IT infrastructure. Cloud computing utilizes Internet capabilities in order to use other computing resources. Amazon Web Services (AWS) is one of the most widely used cloud providers that leverages the endless computing capabilities that the cloud technology has to offer. AWS is continuously evolving to offer a variety of services, including but not limited to, infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service. Among the other important services offered by AWS is Video Surveillance as a Service (VSaaS) that is a hosted cloud-based video surveillance service. Even though this technology is complex and widely used, some security experts have pointed out that some of its vulnerabilities can be exploited in launching attacks aimed at cloud technologies. In this paper, we present a holistic security analysis of cloud-based video surveillance systems by examining the vulnerabilities, threats, and attacks that these technologies are susceptible to. We illustrate our findings by implementing several of these attacks on a test bed representing an AWS-based video surveillance system. The main contributions of our paper are: (1) we provided a holistic view of the security model of cloud based video surveillance summarizing the underlying threats, vulnerabilities and mitigation techniques (2) we proposed a novel taxonomy of attacks targeting such systems (3) we implemented several related attacks targeting cloud-based video surveillance system based on an AWS test environment and provide some guidelines for attack mitigation. The outcome of the conducted experiments showed that the vulnerabilities of the Internet Protocol (IP) and other protocols granted access to unauthorized VSaaS files. We aim that our proposed work on the security of cloud-based video surveillance systems will serve as a reference for cybersecurity researchers and practitioners who aim to conduct research in this field. 
    more » « less