Notes

1 ‘“Monte Carlo simulation” refers to a category of algorithms that calculate their results using random numbers. First, a domain of possible inputs is determined and a series of random numbers from this domain is generated; a deterministic calculation is then conducted using the random numbers and, finally, the individual results are combined.’ (Reiss 2010: 2458b). See also Edwards (1996) on the role of the computer during the Cold War.

3 ‘Precaution’ and ‘preemption’ are key terms in the discourse around unlikely but fatal events. These terms have been extended in the current debate by a new one, namely, ‘premediation’ (de Goede 2008, Grusin 2010).

4 On controversies between traditional military personnel with experience in warfare and the scenario-oriented military strategists, see Ghamari-Tabrizi (2000).

5 At the same time, however, the issue of social security has largely disappeared (until recently?) from the political agenda.

6 Germany’s BKA (Federal Criminal Police Office) had become aware of sociologist Dr. Andrej Holm when searching the Internet: he had allegedly used similar vocabulary (gentrification, precariousness, reproduction) as that used by the ‘militant group’ they had been investigating. After a year of observation, he was arrested in July 2007. Apart from the keywords he had used, conspiratorial meetings with other purported members of the group as well as not taking his cell phone with him to various meetings were taken to be further indications of his membership in the group. He was released three weeks later as a result of national and international protests – Richard Sennett and Saskia Sassen spoke of ‘Guantanamo in Germany’. Court proceedings against Holm were finally dropped in 2010 (see Leistert 2013).

References

Aas, K. F., Gundhus, H. O., and Lomell, H.M. (Eds) (2009). Technologies of inSecurity: the Surveillance of Everyday Life. Abingdon; New York: Routledge-Cavendish.

Akrich, M. (1992). The De-Scription of Technical Objects. In W. E. Bijker and J. Law (Eds), Shaping Technology/Building Society: Studies in Sociotechnical Change. Cambridge, MA: The MIT Press, pp. 205–224.

Allison, G., and Kokoshin, A. (2002). The New Containment: An Alliance Against Nuclear Terrorism. The National Interest 69 (Fall 2002): 35–43.

Amoore, L., and de Groede, M. (Eds) (2008). Risk and the War on Terror. New York: Routledge.

Auffermann, Burkhard and Hauptman, Aharon (2012) “FESTOS – Foresight of Evolving Security Threats Posed by Emerging Technologies, in” European Foresight Brief. 2012

Beck, U. (1986). Risikogesellschaft: Auf dem Weg in eine andere Moderne. Frankfurt a.M., Germany: Suhrkamp.

Bigo, D., and Jeandesboz, J. (2009). Border Security, Technology and the Stockholm Programme. INEX Policy Brief No. 3, November 2009. Archive of European Integration. <http://aei.pitt.edu/14993/>.

Bogard, W. (2012). Simulation and Post-Panopticism. In K. Ball, K. Haggerty, and D. Lyon (Eds). Routledge Handbook of Surveillance Studies. New York: Routledge, pp. 30–37.

Bowker, G. C, and Star, S. L. (2000). Sorting Things Out: Classification and its Consequences. Cambridge, MA: The MIT Press.

Bowker, G., Baker, K., Millard, F., and Ribbes, D. (2009). Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment. In J. Hunsinger, L. Klastrup, and M. Allen (Eds), International Handbook of Internet Research. Dordrecht, Germany: Springer Science+Business Media, pp. 97–117.

Boyle, P., and Haggerty, K. D. (2012). Planning for the Worst: Risk, Uncertainty and the Olympic Games. The British Journal Of Sociology 63(2): 241–59.

Bröckling, U. (2012). Dispositive der Vorbeugung: Gefahrenabwehr, Resilienz, Precaution. In C. Daase, P. Offermann, and V. Rauer (Eds), Sicherheitskultur, soziale und politische Praktiken der Gefahrenabwehr. Frankfurt a. M.; New York: Campus, pp. 93–108.

Bundesministerium für Bildung und Forschung. (German Federal Ministry of Education and Research) (2014). Bewilligte Projekte der Programmlinien >>Szenariorientierte Sicherheitsforschung<<. Funded projects of the research program >>Scenario-oriented Security Research<<. <http://www.bmbf.de/de/12876.php>.

Clarke, L. (1999). Mission Improbable: Using Fantasy Documents to Tame Disaster. Chicago, IL: University of Chicago Press.

Cohn, C. (1987). Sex and Death in the Rational World of Defense Intellectuals. Signs: Journal of Women in Culture and Society 12(4): 687–718.

Daase, C. (2012). Sicherheitskultur als interdisziplinäres Forschungsprogramm. In C. Daase, P. Offermann, and V. Rauer (Eds). Sicherheitskultur. Soziale und politische Praktiken der Gefahrenabwehr (pp. 23–44). Frankfurt a.M., Germany, and New York, NY: Campus.

Daase, C., and Kessler, O. (2007). Knowns and Unknowns in the ‘War on Terror’: Uncertainty and the Political Construction of Danger. Security Dialogue 38(4): 411–34. <http://dx.doi.org/10.1177/0967010607084994>.

De Goede, M. (2008). Beyond Risk: Premediation and the Post-9/11 Security Imagination. Security Dialogue 39(2–3): 155–76. <http://dx.doi.org/10.1177/0967010608088773>.

DeWar, J. A. (2015). The Importance of Wild Card Scenarios. Air University. <http://www.au.af.mil/au/awc/awcgate/cia/nic2020/dewar_nov6.pdf>.

Edwards, P. N. (1996). The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, MA, and London, England: The MIT Press.

European Commission (2013). Vorschlag für eine Verordnung des europäischen Parlaments und des Rastes über ein Einreise-/Ausreisesystem (EES) zur Erfassung der Ein- und Ausreisedaten von Drittstaatsangehörigen an den Außengrenzen der Mitgliedstaaten der Europäischen Union. EUR-Lex. <http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=COM:2013:0095:FIN:DE:PDF>.

Foresight of evolving security threats posed by emerging technologies, TU Berlin. (2012). Foresight of evolving security threats posed by emerging technologies. <http://www.tu-berlin.de/ztg/menue/forschungprojekte/projekte_-_abgeschlossen/foresight_of_evolving_security_threats_posed_by_emerging_technologies_festos>.

Ghamari-Tabrizi, S. (2000). Simulating the Unthinkable: Gaming Future War in the 1950s and 1960s. Social Studies of Science 30 (April 2000): 163–223.

—— (2005). The Worlds of Herman Kahn: The Intuitive Science of Thermonuclear War. Cambridge, MA, and London, England: Harvard University Press.

Giddens, A. (1999). Risk and Responsibility. Modern Law Review 62(1): 1–10. <http://dx.doi.org/10.1111/1468-2230.00188>.

Givens, G., Beveridge, R., Draper, B. A., Grother, P., and Philips, P. J. (2004). How Features of the Human Face Affect Recognition: A Statistical Comparison of Three Face Recognition Algorithms. IEEE Computer Society Conference On Computer Vision And Pattern Recognition 2: 381–388.

Graham, S. (2006). Surveillance, Urbanization and the US ‘revolution in military affairs’. In D. Lyon (Ed.), Theorizing Surveillance. The Panopticon and Beyond. Devon, England: Willian, pp. 247–270.

Graham, S. (2012). Olympics 2012 Security. City: Analysis of Urban Trends, Culture, Theory, Policy, Action 4: 446–451.

Grunwald, Armin (2012). Technikzukünfte als Medium von Zukunftsdebatten und Technikgestaltung. Karlsruher Studien Technik und Kultur 6. Karlsruhe: KIT Scientific Publishing.

Grusin, R. (2010). Premediation: Affect and Mediality After 9/11. New York: Palgrave Macmillan.

Gugerli, D. (2009). The Culture of the Search Society. Data Management as a Signifying Practise. Institute of Network Cultures. <http://www.networkcultures.org/public/The_Culture_of_the_Search_Society_DavidGugerli.pdf>.

Haraway, D. (1985). Manifesto for Cyborgs: Science, Technology, and Socialist Feminism in the 1980s. Socialist Review 80: 65–108.

Hiltunen, E. (2006). Was it a Wildcard or Just Our Blindness to Gradual Change? Journal of Futures Studies 11(2): 61–74.

Homeland Security (2009). Testimony of Deputy Assistant Secretary for Policy Kathleen Kraninger, Screening Coordination, and Director Robert A. Mocny, US-VISIT, National Protection and Programs Directorate, Before the House Appropriations Committee, Subcommittee on Homeland Security, ‘Biometric Identification. <http://www.dhs.gov/ynews/testimony/testimony_1237563811984.shtm>.

Horn, E. (2014). Zukunft als Katastrophe. Frankfurt a.M.: Fischer.

iKnow (n.d.). iKnow Community. <http://community.iknowfutures.eu>.

Kahn, H. (1960). On Thermonuclear War. Princeton, NJ: University Press.

—— (1962). Thinking About the Unthinkable. New York: Horizon Press.

Kaplan, F. (1983). The Wizards of Armageddon. New York: Simon and Schuster.

Kaufmann, S. (2011). Zivile Sicherheit: vom Aufstieg eines Topos. In L. Hempel, S. Krasmann, and U. Bröckling (Eds), Sichtbarkeitsregime. Überwachung, Sicherheit und Privatheit im 21. Jahrhundert. Wiesbaden: VS Verlag für Sozialwissenschaften, pp. 101–123.

Lash, S. (2007). Power After Hegemony: Cultural Studies in Mutation? Theory, Culture & Society 24(3): 55–78. <http://dx.doi.org/10.1177/0263276407075956>.

Leistert, O. (2013). From Protest to Surveillance – The Political Rationality of Mobile Media. Modalities of Neoliberalism. Frankfurt a.M.; Berlin; Bern; Bruxelles; New York; Oxford; Vienna: Peter Lang.

Lyon, D. (Ed.) (2003). Surveillance as Social Sorting: Privacy, Risk, and Digital discrimination. London, England, New York, NY: Routledge.

Manovich, L. (2001). The Language of New Media. Cambridge, MA: The MIT Press.

Marx, G. T. (2001). Technology and Social Control: The Search for the Illusive Silver Bullet. International Encyclopedia of the Social and Behavioral Sciences. <http://web.mit.edu/gtmarx/www/techandsocial.html>.

Mattelart, A. (2010). The Globalization of Surveillance: The Origin of the Securitarian Order. Cambridge: Polity.

Menand, L. (2005). Fat Man. Herman Kahn and the Nuclear Age. The New Yorker, 27 June, Books. <http://www.newyorker.com/archive/2005/06/27/050627crbo_books?currentPage=all>.

Mendonça, S., Cunha, M. P., Kaivooja, J., and Ruff, F. (2004). Wild Cards, Weak Signals and Organisational Improvisation. Futures. The Journal of Policy, Planning and Future Studies 36(2): 201–218.

Möchel, E. (2014). Whistleblower: NSA hat sich selbst ausgeschaltet. FM4 ORF. <http://fm4.orf.at/stories/1744256/>.

Monahan, T. (2009). Dreams of Control at a Distance: Gender, Surveillance, and Social Control. Cultural Studies <=> Critical Methodologies 9(2): 286–305.

Mythen, G., and Walklate, S. (2008). ‘Terrorism. Risk and International Security: The Perils of Asking ‘What If?’ Security Dialogue 39(2–3): 221–242.

O’Malley, P. (1999). Governmentality and the Risk Society. Economy and Society 28(1): 138–48.

Pany, T. (2016). Zwei Jahre Haft für den Besuch von Djihad Webseiten. Heise, Politik, 10 August. <http://www.heise.de/tp/artikel/49/49089/1.html>.

Peperhove, R. (2012). Die dunkle Seite neuer Technologien – Projektbericht FESTOS. Zeitschrift Für Zukunftsforschung 1: 64–78.

Petersen, J. (2000): Out of the Blue. Wild Cards and Other Future Surprises. How to Anticipate Big Future Surprises. Long Island City, NY: Madison Books.

Pias, C. (Ed.) (2008). Herman Kahn – Szenarien für den Kalten Krieg. Zürich; Berlin: Diaphanes.

Pias, C. (2009). One-Man Think Tank. Hermann Kahn, oder wie man das Undenkbare denkt. Zeitschrift Für Ideengeschichte 3: 5–16.

Reiss, J. (2010). Simulation. In H. J. Sandkühler (Ed.), Enzyklopädie Philosophie. Hamburg: Felix Meiner.

Salter, M. (2008). Risk and Imagination in the War on Terror. In L. Amoore and M. de Goede (Eds), Risk and the War on Terror. New York; London: Routledge, pp. 233–46.

Solana, J. (2003). Ein sicheres Europa in einer besseren Welt. Europäische Sicherheitsstrategie. European Council. <http://consilium.europa.eu/uedocs/cmsUpload/031208ESSIIDE.pdf>.

Steinmüller, K., and Steinmüller, A. (2004). Wild Cards. Wenn das Unwahrscheinliche eintrifft. Hamburg: Murmann.

Weber, J. (2016). Keep Adding. Kill Lists, Drone Warfare and the Politics of Databases. Environment And Planning D. Society And Space 34(1): 107–125.

Weber, J. (2003). Umkämpfte Bedeutung: Naturkonzepte im Zeitalter der Technoscience. Frankfurt a.M.; New York: Campus.

Wright, D., Friedwald, M., Schreurs, W., et al. (2008). The Illusion of Security. Communications of The ACM 51(3): 56–63.

Zedner, L. (2007). Pre-Crime and Post-Criminology? Theoretical Criminology 11(2): 261–281. <http://dx.doi.org/10.1177/1362480607075851>.