This module examines contemporary security practice through the methods they use. It introduces students to (a) the security life of methods -- how methods shape contemporary security situations -- and (b) the political controversies about their use -- the political life of methods. The module will cover a range of controversial methods, for example: the deployment of anthropological knowledge and methods in counter-insurgency, the role of algorithms in surveillance, the rise of big data in security governance, the use of visual methods in security practice and their political contestation, the rise of forensic methods in criminal investigations of war, and scenario planning and foresight in anticipating catastrophes. Students will be expected to gain an understanding of security methods and their limits, and evaluate their political and social effects.

Sorry, there are no lists here yet. You could try:

  • Clicking My Lists from the menu. Your course enrolled lists are stored here.
  • Searching for the list using the form below:

Lists linked to The Political Life of Security Methods

There are currently no lists linked to this Module.