2013
DOI: 10.1177/0967010613484955
|View full text |Cite
|
Sign up to set email alerts
|

Engaging the limits of visibility: Photography, security and surveillance

Abstract: In this article, we introduce selected photographs in order to engage with their capability for questioning the representational codes dominant in the visualization of security policy and surveillance. We argue that the intangible, abstract workings of state power in connection with security, surveillance and current forms of warfare can aptly be represented and challenged by means of photography. By engaging the limits of visibility, the selected photographs explore the limits of photojournalism and security … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
17
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
5
5

Relationship

0
10

Authors

Journals

citations
Cited by 36 publications
(17 citation statements)
references
References 30 publications
0
17
0
Order By: Relevance
“…For cybersecurity, the first crucial question is to what extent practices that are, in Andersen and Möller's (2013) terms, "at the limit of visibility" can be incorporated into visual analyses. Due to its relative novelty and digital basis, many concepts and objects in cybersecurity have no obvious visual association, and so even though images are used powerfully in other security domains to frame issues in certain ways, the scope for doing so in cybersecurity is much wider.…”
Section: Visual Styles and Imagesmentioning
confidence: 99%
“…For cybersecurity, the first crucial question is to what extent practices that are, in Andersen and Möller's (2013) terms, "at the limit of visibility" can be incorporated into visual analyses. Due to its relative novelty and digital basis, many concepts and objects in cybersecurity have no obvious visual association, and so even though images are used powerfully in other security domains to frame issues in certain ways, the scope for doing so in cybersecurity is much wider.…”
Section: Visual Styles and Imagesmentioning
confidence: 99%
“…William Mitchell (2011) has argued that threatening phenomena that cannot be seen is more powerful than that which can be seen, on the basis that these kinds of unseen threats possess greater potential to activate the imagination (see also Andersen and Moller 2013). To elucidate this point, consider the example of a horror film, in which representational codes render the threat comprehensible as a result of its status as being hidden.…”
Section: Understanding Violence In Fibre-optic Cablesmentioning
confidence: 99%
“…Still, in/visibility implicitly affects the way in which scholars apprehend surveillance technologies and practices: most of their attention rests indeed on what is exposed and securitised (Bigo 2014;Peoples and Vaughan-Williams 2010;Zureik and Salter 2005). Critical security studies, nevertheless, also provides useful insights about the fascination of security policies for the production of visibilities (Amoore 2007), alternative forms of visibility as a critique of security representations (Andersen and Möller 2013) or the crucial, and often unnoticed, contribution of mundane and material elements in the securitisation process (Huysmans 2011).…”
Section: Articlementioning
confidence: 99%