GREEN, Geff and LOCKLEY, Eleanor (2012). Surveillance without borders : the case of Karen refugees in Sheffield. In: The Fifth Biannual Surveillance and Society Conference: "Watch This Space: Surveillance Futures", Sheffield University and Kenwood Hall Hotel, Sheffield, 2-4 April 2012. (Unpublished)Full text not available from this repository.
This paper presents a recent case study of the Sheffield Karen community’s experience of surveillance and cyber conflict. It outlines and discusses how ‘local’ conflicts can be manifested at great distance, aided by ‘guerrilla’ surveillance, targeting social media and ‘phone hacking’. In this case we encountered a local conflict which occurred in a completely different locality from the place of origin. It also moved into a virtual world, one which was characterised by an ‘inverse reach’ allowing the 'oppressors' to reach out and touch the 'oppressed' through appropriating their channels of communication and using information gained though surveillance to attack them in specific ways which referenced aspects of the real conflict. Not only did this provide insight into how new media is being used in cyber warfare, but it also highlighted existing dynamics and divisions which are part of the real conflict of which this has now become a part. This account also recognises how trauma and fear can be reignited far from its place of origin and the powerful emotional impact which is gained through exploiting people's fears and paranoia in this way. This is done through attacking their sense of identity and status and referencing their direct experience of conflict with a regime more powerful than themselves. A key background activity to this work is understanding the pre-existing ethnic sensitivities and constructions of identity, but also those which are articulated through online media by both sides in the conflict. An account is provided from a participant observer's view point of view which explores the background and the anatomy of one particular cyber-attack. The nature of the attack and its responses will be discussed, including exploring, not only the online dimension to the attack, but also the more reified aspects of the way in which the community responded.
|Item Type:||Conference or Workshop Item (Paper)|
|Research Institute, Centre or Group:||Cultural Communication and Computing Research Institute > Communication and Computing Research Centre|
|Depositing User:||Geff Green|
|Date Deposited:||18 Jun 2012 12:35|
|Last Modified:||04 Mar 2014 16:25|
Actions (login required)
Downloads per month over past year