Notes

1 Within STS and related fields approaches like ANT or new materialism make the case that the distinction between singular objects and a broader structure of which they are part, i.e. being something or being part of something is not a pre-given quality of the actors involved but emerges out of the situated enactment – including the seemingly innocent observer (Barad 2007; Latour 1996; Mol 2002).

References

Adey, P. (2010). Vertical Security in the Megacity: Legibility, Mobility and Aerial Politics. Theory, Culture & Society 27(6): 51–67.

Amicelle, A., Aradau, C., and Jeandesboz, J. (2015). Questioning Security Devices: Performativity, Resistance, Politics. Security Dialogue 46(4): 293–306.

Amoore, L. (2006). Biometric Borders: Governing Mobilities in the War on Terror. Political Geography 25(3): 336–351.

—— (2008). Risk And The War On Terror. London; New York: Routledge.

—— (2009). Lines of Sight: On the Visualization of Unknown Futures. Citizenship Studies 13(1): 17–30.

—— (2011). Data Derivatives: On the Emergence of a Security Risk Calculus for Our Times. Theory, Culture & Society 28 (6): 24–43.

—— (2013). The Politics of Possibility: Risk and Security Beyond Probability. Durham, NC: Duke University Press.

Andrejevic, M., and Burdon, M. (2015). Defining the Sensor Society. Television & New Media 16(1): 19–36.

Aradau, C. (2010). Security that Matters: Critical Infrastructure and Objects of Protection. Security Dialogue 41(5): 491–514.

Armstrong, D. (2019). The Social Life of Data Points: Antecedents of Digital Technologies. Social Studies of Science 49(1): 102–117.

Ballestero, A., Winthereik, B. R. (2021). Experimenting with Ethnography: A Companion to Analysis. Durham, NC: Duke University Press.

Barad, K. (2007). Meeting the Universe Halfway: Quantum Physics and the Entanglement of Matter and Meaning. Durham: Duke University Press.

Barry, A. (2001). Political Machines: Governing a Technological Society. London; New York: Bloomsbury Academic.

—— (2006). Technological Zones. European Journal of Social Theory 9(2): 239–253.

Bates, J., Lin, Y.-W., and Goodale, P. (2016). Data Journeys: Capturing the Socio-Material Constitution of Data Objects and Flows. Big Data & Society 3(2): 1–12.

Beck, U. (1992). Risk Society: Towards a New Modernity. SAGE Publications.

Belcher, O. (2019). Sensing, Territory, Population: Computation, Embodied Sensors, and Hamlet Control in the Vietnam War. Security Dialogue 50(5): 416–436.

Bellanova, R., and Fuster, G. G. (2013). Politics of Disappearance: Scanners and (Unobserved) Bodies as Mediators of Security Practices. International Political Sociology 7(2): 188–209.

Bijker, W. E., Carlson, W. B., and Edwards, P. N. (1997). The Closed World: Computers and the Politics of Discourse in Cold War America. Cambridge, MA: The MIT Press.

Bijker, W. E., and Law, J. (1992). Shaping Technology/Building Society: Studies in Sociotechnical Change. Cambridge, MA: The MIT Press.

Bowker, G. C. (2014). Big Data, Big Questions: The Theory/Data Thing. International Journal of Communication 8(2043): 5.

Bowker, G. C., Baker, K., Millerand, F., and Ribes, D. (2010). Toward Information Infrastructure Studies: Ways of Knowing in a Networked Environment. In J. Hunsinger, L. Klastrup, and M. Allen (Eds), International Handbook of Internet Research. Springer, Dordrecht: Springer, pp. 97–117.

Bowker, G. C., and Star, S. L. (2000). Sorting Things Out: Classification and Its Consequences. Cambridge, MA: The MIT Press.

Broeders, D., and Hampshire, J. (2013). Dreaming of Seamless Borders: ICTs and the Pre-Emptive Governance of Mobility in Europe. Journal of Ethnic and Migration Studies 39(8): 1201–1218.

Callon, M. (1986). The Sociology of an Actor-Network: The Case of the Electric Vehicle. In M. Callon, J. Law, and A. Rip (Eds), Mapping the Dynamics of Science and Technology: Sociology of Science in the Real World (pp. 19–34). Basingstoke: Palgrave Macmillan UK.

—— (1991). Techno-Economic Networks and Irreversibility. In J. Law (Ed.), A Sociology of Monsters: Essays on Power, Technology and Domination. London: Routledge, pp.132–161.

Callon, M., and Law, J. (1989). On the Construction of Sociotechnical Networks: Content and Context Revisited. Knowledge and Society 8: 57–83.

Callon, M., and Muniesa, F. (2005). Peripheral Vision: Economic Markets as Calculative Collective Devices. Organization Studies 26(8): 1229–1250.

Collier, S. J., and Lakoff, A. (2015). Vital Systems Security: Reflexive Biopolitics and the Government of Emergency. Theory, Culture & Society 32(2): 19–51.

Collins, S. G., Durington, M., and Gill, H. (2017). Multimodality: An Invitation: Multimodal Anthropologies. American Anthropologist 119(1): 142–146.

Dijstelbloem, H., and Broeders, D. (2015). Border Surveillance, Mobility Management and the Shaping of Non-Publics in Europe. European Journal of Social Theory 18(1): 21–38.

Dumit, J. (2017). Game Design as STS Research. Engaging Science, Technology and Society 3: 603–612.

—— (2003). Picturing Personhood. Brain Scans and Biomedical Identity. Princeton, NJ: Princeton University Press.

Edwards, P. N., Mayernik, M. S., Batcheller, A. L., Bowker, G. C., and Borgman, C. L. (2011). Science Friction: Data, Metadata, and Collaboration. Social Studies of Science 41(5): 667–690.

Egbert, S. (2019). Predictive Policing and the Platformization of Police Work. Surveillance & Society 17(1/2): 83–88.

Elliott, D., and Culhane, D. (2017). A Different Kind of Ethnography: Imaginative Practices and Creative Methodologies. Toronto: University of Toronto Press.

Ezrahi, Y. (2012). Imagined Democracies: Necessary Political Fictions. Cambridge: Cambridge University Press.

Felt, U. (2015). Keeping Technologies Out: Sociotechnical Imaginaries and the Formation if Austria’s technopolitical identity. In S. Jasanoff and S.-H. Kim (Eds), Dreamscapes of Modernity: Sociotechnical Imaginaries and the Fabrication of Power. Chicago, IL: Chicago University Press, pp. 103–125.

Foucault, M. (1979). The Will to Knowledge, The History of Sexuality: Volume 1 (R. Hurley, transl.). London: Penguin.

—— (1991). Governmentality. In The Foucault effect: Studies in governmentality. Chicago, IL: University of Chicago Press, pp. 87–104.

Gabrys, J. (2014). Programming Environments: Environmentality and Citizen Sensing in the Smart City. Environment and Planning D: Society and Space, 32(1): 30–48.

—— (2016). Program Earth: Environmental Sensing Technology and the Making of a Computational Planet. Minneapolis, MN: University of Minnesota Press.

Gabrys, J., and Pritchard, H. (2018). Sensing Practices. In R. Braidotti and M. Hlavajova (Eds), Posthuman Glossary. London: Bloomsbury, pp. 394–395.

Gehl, R., and McKelvey, F. (2019). Bugging Out: Darknets as Parasites of Large-Scale Media Objects. Media, Culture & Society 41(2): 219–235.

Graham, S., and Hewitt, L. (2013). Getting off the Ground: On the Politics of Urban Verticality. Progress in Human Geography 37(1): 72–92.

Goede, M. D. (2012). Speculative Security. Minneapolis, MN: University of Minnesota Press.

Gitelman, L. (2013). Raw Data is an Oxymoron. Cambridge, MA: The MIT Press.

Graham, S. (n.d.). Foucault’s Boomerang: The New Military Urbanism. OpenDemocracy. <https://www.opendemocracy.net/en/opensecurity/foucaults-boomerang-new-military-urbanism/> [accessed 30 May 2019].

Haggerty, K. D., and Ericson, R. V. (1999). The Militarization of Policing in the Information Age. Journal of Political and Military Sociology 27(2): 233.

Hecht, G. (2006). Nuclear Ontologies. Constellations 13(3): 320–331.

Helmreich, S. (2019). Reading a Wave Buoy. Science, Technology, & Human Values, 42(5): 737-761

Hilgartner, S. (1992). The Social Construction of Risk Objects. In L. Clarke and J. F. S. Jr (Eds), Organizations, Uncertainties, And Risk. Boulder: Westview Press.

Holt, J., and Vonderau, P. (2015). ‘Where the Internet Lives’: Data Centers as Cloud Infrastructure. In L. Parks and N. Starosielski (Eds), Signal Traffic: Critical Studies of Media Infrastructures. Champaign, IL: University of Illinois Press, pp. 71–93.

Huysmans, J. (2011). What’s in an Act? On Security Speech Acts and Little Security Nothings. Security Dialogue 42(4–5): 371–383.

Jensen, C. B. (2008). Power, Technology and Social Studies of Health Care: An Infrastructural Inversion. Health Care Analysis 16(4): 355–374.

Jungnickel, K. (2020). Transmissions: Critical Tactics for Making and Communicating Research. Cambridge, MA: The MIT Press.

Klauser, F. R. (2010). Splintering Spheres of Security: Peter Sloterdijk and the Contemporary Fortress City. Environment and Planning D: Society and Space 28(2): 326–340.

Klimburg-Witjes, N. & Wentland, A (2021). Hacking Humans? Social Engineering and the Construction of the “Deficient User” in Cybersecurity Discourses. Science, Technology and Human Values. https://journals.sagepub.com/doi/full/10.1177/0162243921992844

Kim, E.-S. (2016). The Sensory Power of Cameras and Noise Meters for Protest Surveillance in South Korea. Social Studies of Science 46(3): 396–416.

Latour, B. (1987). Science in Action: How to Follow Scientists and Engineers Through Society. Cambridge, MA: Harvard University Press.

—— (1996). On Actor-Network Theory. A Few Clarifications plus more than a Few Complications. Soziale Welt 47(4): 369–381.

—— (1999). On recalling ANT. In J. Law and J. Hassard (Eds), Actor Network Theory and After. Oxford: Wiley-Blackwell, pp. 15–26.

—— (2005). Reassembling the Social: An Introduction to Actor-Network Theory. Oxford; New York: Oxford University Press.

Latour, B., and Woolgar, S. (1986). Laboratory Life: The Construction of Scientific Facts (2nd ed.). Princeton, NJ: Princeton University Press.

Latour, B., and Hermant, E. (2006). Paris: Invisible City. <http://www.bruno-latour.fr/sites/default/files/downloads/viii_paris-city-gb.pdf>.

Larkin, B (2013). The Politics and Poetics of Infrastructure. Annual Review of Anthropology 42(1): 327–343.

Law, J. (1994). Organizing Modernity: Social Ordering and Social Theory. Hoboken, NJ: Wiley-Blackwell.

—— (2009). Seeing Like a Survey. Cultural Sociology 3(2): 239–256.

—— (2002). Aircraft Stories: Decentering the Object in Technoscience. Durham, NC: Duke University Press.

Law, J., and Mol, A. (2001). Situating Technoscience: An Inquiry into Spatialities. Environment and Planning D: Society and Space,19(5): 609–621.

Leese, M. (2016). Exploring the Security/Facilitation Nexus: Foucault at the ‘Smart’ Border. Global Society 30(3): 412–429.

Le Bot, J., and M. Noel. (2016). ‘Making and Doing’ at 4S Meeting (Denver): Let’s extend the experiment! EASST Review 35(1). <https://easst.net/article/making-and-doing-at-4s-meeting-denver-lets-extend-the-experiment/> [accessed 24 March 2020].

Lyon, D. (2002). Everyday Surveillance: Personal Data and Social Classifications. Information, Communication & Society 5(2): 242–257.

Lyon, D. (2003). Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination. London; New York: Routledge.

Mackenzie, A. (2017). Machine Learners: Archaeology of a Data Practice. Cambridge, MA: The MIT Press.

Martin, L. L. (2010). Bombs, Bodies, and Biopolitics: Securitizing the Subject at the Airport Security Checkpoint. Social & Cultural Geography 11(1): 17–34.

McCosker, A., and Graham, T. (2018). Data Publics: Urban Protest, Analytics and the Courts. M/C Journal 21(3). <http://journal.media-culture.org.au/index.php/mcjournal/article/view/1427>.

Mitchell, T. (2011). Carbon Democracy: Political Power in the Age of Oil. London; New York: Verso.

Mol, A. (2002). The Body Multiple: Ontology in Medical Practice. Durham, NC: Duke University Press.

Mukerji, C. (2011). Jurisdiction, Inscription, and State Formation: Administrative Modernism and Knowledge Regimes. Theory and Society 40(3): 223–245.

Musiani, F. (2015). Practice, Plurality, Performativity, and Plumbing: Internet Governance Research Meets Science and Technology Studies. Science, Technology, & Human Values 40(2): 272–286.

Parks L. and Starosielski N. (2015) Signal Traffic: Critical Studies of Media Infrastructures. Champaign, IL: University of Illinois Press.

Poechhacker, N., and Nyckel, E.-M. (2020). Logistics of Probability. Anticipatory Shipping and the Production of Markets. In M. Burkhardt, K. Grashöfer, M. Shnayien, and B. Westerman (Eds), Explorations of Digital Cultures. Lüneburg: Meson Press.

Pelizza, A. (2016). Developing the Vectorial Glance: Infrastructural Inversion for the New Agenda on Government Information Systems. Science, Technology, & Human Values 41(2): 298–321.

Pipek, V., Karasti, H., Bowker, G. C. (2017). A Preface to ‘Infrastructuring and Collaborative Design’. Computer Supported Cooperative Work (CSCW) 26(1–2): 1–5.

Ruivenkamp, M., and Rip, A. (2014). Nanoimages as Hybrid Monsters. in C. Coopmans, J. Vertesi, M. Lynch and S. Woolgar (Eds), Representation in Scientific Practice Revisited. Cambridge, MA: The MIT Press: 177–200.

Ruppert, E. (2011). Population Objects: Interpassive Subjects. Sociology, 45(2): 218–233.

—— (2012). The Governmental Topologies of Database Devices. Theory, Culture & Society 29(4–5): 116–136.

Ruppert, E., Isin, E., and Bigo, D. (2017). Data Politics. Big Data & Society 4(2): 1–7.

Salter, M. B. (2004). Passports, Mobility, and Security: How Smart Can the Border Be? International Studies Perspectives 5(1): 71–91.

Schüll, N. D. (2014). Addiction by Design: Machine Gambling in Las Vegas. Princeton, NJ: Princeton University Press.

Serres, M. (1980). The Parasite. Grasset: Paris.

Slota, S. C., and Bowker, G. C. (2016). How Infrastructures Matter. In U. Felt, R. Fouché, C. A. Miller, and L. Smith-Doerr (Eds), The Handbook of Science and Technology Studies. Cambridge, MA: The MIT Press, pp. 529–554.

Spencer, M., Dányi, E., and Hayashi, Y. (2019). Asymmetries and Climate Futures: Working with Waters in an Indigenous Australian Settlement. Science, Technology, & Human Values 44(5): 786–813.

Star, S. L., and Ruhleder, K. (1996). Steps Toward an Ecology of Infrastructure: Design and Access for Large Information Spaces. Information Systems Research 7(1): 111–134.

Star, S. L., and Bowker, G. C. (2002). How to Infrastructure? In Leah A. Lievrouw and Sonia Livingstone (Eds), The Handbook of New Media: Social Shaping and Consequences of ICTs. London: Sage, pp. 151–162.

Star, S. L. (1995). The Politics of Formal Representations: Wizards, Gurus, and Organizational Complexity. In: S. L. Star (Ed.), Ecologies of Knowledge: Work and Politics in Science and Technology. Albany, NY: SUNY Press, pp. 88–118.

Starosielski, N. (2015). The Undersea Network. Durham, NC: Duke University Press.

Tironi, M. (2017). Regimes of Perceptibility and Cosmopolitical Sensing: The Earth and the Ontological Politics of Sensor Technologies. Science as Culture 27 (1): 1–7.

Trischler, H., and Weinberger, H. (2005). Engineering Europe: Big Technologies and Military Systems in the Making of 20th Century Europe. History and Technology 21(1): 49–83.

Tufekci, Z. (2014). Engineering the Public: Big Data, Surveillance and Computational Politics. First Monday 19(7). <https://firstmonday.org/article/view/4901/4097>.

Valkenburg, G. (2017). Security Technologies Versus Citizen Roles? Science as Culture 26(3): 307–329.

Vertesi, J. (2015). Seeing Like a Rover: How Robots, Teams, and Images Craft Knowledge of Mars. Chicago, IL: University of Chicago Press.

Walford, A. (2017). Raw Data: Making Relations Matter. Social Analysis 61(2): 65–80.

Waller, L., and Witjes, N. (2017). Sensor Publics: Report from a Workshop on the Politics of Sensing and Data Infrastructures. EASST Review 36(2). <https://easst.net/article/sensor-publics-report-from-a-workshop-on-the-politics-of-sensing-and-data-infrastructures/>.

Walters, W. (2011). Rezoning the Global: Technological Zones, Technological Work, and the (Un-)Making of Biometric Borders. In V. Squire (Ed.), The Contested Politics of Mobility: Borderzones and Irregularity. London: Routledge.

Wang, B. Y., Raymond, N. A., Gould, G. and Baker, I. (2013). Problems from Hell, Solution in the Heavens? Identifying Obstacles and Opportunities for Employing Geospatial Technologies to Document and Mitigate Mass Atrocities. Stability: International Journal of Security & Development 2: 1–18.

Weizman, E. (2002). Introduction to the Politics of Verticality. Open Democracy 23. < https://www.opendemocracy.net/en/article_801jsp/>

Winner, L. (1980). Do Artifacts Have Politics? Daedalus 19(1): 121–136.

Witjes, N., and Olbrich, P. (2017). A Fragile Transparency: Satellite Imagery Analysis, Non-State Actors, and Visual Representations of Security. Science and Public Policy 44(4): 524–534.

Ziewitz, M. (2017). A Not Quite Random Walk: Experimenting with the Ethnomethods of the Algorithm. Big Data & Society 4(2): 1–13.

Zureik, E., and Hindle, K. (2004). Governance, Security and Technology: The Case of Biometrics. Studies in Political Economy 73(1): 113–137.