Tag Archives: state surveillance

Xinjiang: Several Anecdotes (Part Two)

This is my second post to Socionocular on the topic of Xinjiang, a far-western region of China where I lived for 18 months. For a very basic overview on Xinjiang and China’s internet and social media landscape, please see here.

What follows are several anecdotes from my year and a half in China regarding the topic of internet (and other) censorship and the atmosphere of distrust and paranoia it fosters.

In my first year in Ürümqi I regularly attended a weekly English club with a close network of Chinese professionals. We ate in a private dining room at a small mom-and-pop restaurant, and it was an intimate-enough group that sometimes conversations turned political. There were a small few who spoke without hesitation, but without fail somebody would get up to close the door before having their say.

I remember it was during one of these conversations that a relative newcomer to the group asked me out of the blue if I ever called home to Canada.

“No,” I told him, “I just use the internet.”

“Good,” he replied, “Someone might listen, if you called.”

This sort of caught me by surprise, so I probed him: “What, like American spies?”

He shook his head no, but then thought about it. “Maybe them too. But I mean the Chinese police.”

There was also a (in my opinion) completely reasonable belief among many of the foreigners that many of our apartments might be bugged as well. A friend who attended college in China over a decade ago says he was told flat-out that the foreign student dormitory was being recorded, but not monitored. “If something happens,” he was told, “They can go back and review the recordings.”

I visited another friend’s apartment once, and it came up in conversation that he believed his place was definitely bugged. When I asked him how he knew, he said that another foreigner had lived in it before; he had been friends with him and spent a lot of time visiting. One day a young policeman in the neighborhood warned him to be careful what he said when he visited. Despite the ominous warning, he liked the neighborhood and tried to rent an apartment nearby, but was blocked by the police. I know others who were barred from this neighborhood as well. Finally, though, after his friends moved to a new home he contacted their landlord and inquired about their old apartment. He was given permission to move in by the same police who had told him it was impossible before. The popular opinion was that they probably approved it because they wouldn’t need to go through the trouble of re-bugging the place.

Again, it isn’t to say that everyone’s apartment is bugged. But it’s very telling to me that whenever the topic came up, the usual verdict was usually ‘Yeah, could be,’ and never ‘No, stop being paranoid.’

It isn’t just the foreigners who are so concerned, either. In fact, many locals are subject to more immediate, more real, and more invasive surveillance. Early in my stay in Xinjiang I made friends with a university student who offered to show me around the city. We kept in contact and enjoyed chatting from time to time. On our third or fourth meeting he confessed to me that he was a practitioner of an illegal religion. He said he was never worried about telling foreigners this, because foreigners never seemed to care. “But,” he gestured to the students sitting at the table next to ours “If I told you this in Chinese I might get in trouble.” He recommended some reading materials I should look up, and then spent some time laying out his burdens: at college many of his classmates regularly had their phones confiscated and searched. He showed me both of his phones: one for storing his religious materials, and the other one ‘clean’ so he could hand it over to be searched without worry.

For all the presumed monitoring and censorship, the most people I associated with largely got on with their lives without worrying about it too much. It was occasionally a topic of conversation, or a bit of a game (such as conspicuously whispering pro-China slogans into lamps), but it became a more immediate personal concern in the summer of 2015.

I only briefly mentioned the “Great Firewall” before this, partly because its reputation precedes itself. What some people don’t realize, though, is that most of the time it isn’t terribly difficult to circumvent. There are multiple free Virtual Private Network (VPN) options that will allow one to access Facebook and Youtube, and most foreigners I know made use of one or two VPNs regularly. Some Chinese people I knew also made use of VPNs, but others considered them too much of a hassle for too little benefit (I was once told “Why pay go through so much trouble to use the foreign internet? The Chinese internet has everything I want.”). Word started to circulate that China Mobile, one of the larger cellular carriers, was shutting down service to those running VPNs on their phones. One night at a regular foreigner hang-out, a friend told me about his  experience. He had his phone service cut, went to China Mobile to have it reconnected,  but was referred to the Public Security bureau. The PSB  instructed them to delete all “foreign communication apps” including Facebook and Skype, and submit their phones for inspection before they could be re-activated.

It was clear that the network could tell if a phone was making use of a VPN, but the shut-downs seemed random. A little less than half of my friends got shut down, and I myself continued to use my phone without issue for another six or seven months after that. At the end of January 2016, though, my phone service finally stopped without warning or explanation. At first I thought I had just run out of credit, so I sank some money into my account to put myself back in the black. This didn’t work, so I told my company’s foreigner-handler that I had been shut down. She took me to the Public Security Bureau where they asked me to hand over my phone so they could have a look. I had changed my SIM over from my iPhone to the cheap Nokia phone I had bought in my first week in China. They observed that there were no foreign apps and told me my phone would be re-activated in two weeks. The whole visit took less than fifteen minutes.

They must have figured out I was being less than honest, though, because two months later my phone still hadn’t been reactivated. Otherwise they lost the paperwork or some other institutional failure caused a problem. In any case, I gave up on getting my phone service for a time, and satisfied myself with hopping from wifi hotspot to wifi hotspot around the city for a few months.

Though there are others, these anectdotes are roughly representative of my experience in China. I’ve avoided providing too much biographical info, and/or changed a few details where they are inconsequential, to guard against an unlikely situation where post blips on the Chinese radar.

I will conclude in a third and final post to discuss one last anecdote concerning a personal vice of mine, and the lasting echo of censorship that rings even after leaving China.

Flight of the Drones: UAVs and public space

Unmanned aerial vehicles (UAVs), otherwise known as ‘drones’ have increased in popularity over the past decades for recreational and commercial purposes. The amount of drone purchases has risen dramatically and it is projected to continually rise in the years to come. And this is due in part of the technology being affordable for purchase, ranging anywhere from $20.00 to $1000.00 depending on the size and capabilities of the quadcopter.

This technology has been showcased in providing vital aerial perspectives for photography, which has begun to be used by real estate agencies and freelance videographers. Other prominent groups within society have begun to incorporate drone use within their repertoire.

Companies such as Amazon seek to use drones for package delivery; law enforcement agencies have begun to see the benefits of using drones, especially when it comes to crime scene photography and search and rescue missions; and now journalists have also begun to use drones in their arsenal for better reporting of events.

The potential benefits of this technology are almost limitless but this can also be said for its potential consequences.

To begin with, it helps to understand what ‘drones’ really are. Fundamentally, the technology is just a platform with propellers, because of this it can be fitted for just about any task and the aerial movement provides advantageous in accomplishing the job.

Since 1911, humanity has witnessed the power and control that comes with air superiority. Left unchallenged and unchecked, control of the skies allows for an unhindered use of drone technology. It will be done by those with the power to do so, allowing for their superiority to be better represented by those subjected to the drone’s presence, all the while being able to operate the device at a safe secure location, often away from the scene.

Though it may seem that this technology is relatively new, it has been around since the late 1800s with air balloons being used to as bombs to target enemy cities. Though the technology really got going during World War I by Dr. Elmer Ambrose Sperry who invented the gyroscope, thereby allowing for more precise targeted missile strikes. The technology subsided for a while and was picked up again in the 1950s, this time serving as surveillance and recon for military operations.

As they’ve continued to develop, drones have transformed into hunter-killer devices in wartime settings and are now being operated for police surveillance in domestic areas. However, the lineage of these devices is not so clear cut, as the influence by remotely piloted airplanes by hobbyists has also been attributed to this sudden rise in this technology in a recreational setting.

Now, technology itself is neither good or bad, it is typically taken as neutral. What is important is who is using the technology and for what purpose, coupled with the perception of the drone by the intended target. In this is where the debate and controversy lies. With the constant maneuverability and over encompassing visual surveillance that drones are capable of—questions emerge: who really benefits from this technology when it is in use? Which groups benefit when the police use them? When corporations use them? When journalists use them?


With the emerging trend of police drones, it will be of no surprise to see security rhetoric being used as a tool to influence the populace into believing that we need drone surveillance as a way to feel safer and for it to be easier to catch the ‘criminal.’ Which was exactly what was done with the implementation of CCTV (closed circuit television) cameras. When in reality, it may be used as a tool of control that will benefit the rich and powerful and will be used on the disenfranchised resulting in particular communities and populations being disproportionately exposed to police surveillance.

In addition to providing a hindrance and an interpretation of a violation of our privacy rights.

Drone technology has the capacity to violate our privacy rights. However, this violation can become obscured by the shaping of public understanding mentioned above. This illusion of security is known as ‘security theater,’ a concept coined by Bruce Schneier as a way to explain the countermeasures that are set in place to provide the feeling of improved security while doing little or nothing to actually achieve it.

And what is surprising about all this, is that this is already happening, just on another medium, data collection is routinely gathered on everyone—government and corporate agencies can easily identify your behaviors and whereabouts stored in carefully constructed profiles, all by analyzing the data from your phone or computer.

A drone’s visceral appearance amplifies how we perceive drones and their impact on our privacy. The thought of being watched and the loss of control over surveillance puts individuals in a state of unease. It’s right there, potentially watching you and it may require a lot of effort to do something about it.

The drones are here and their flight has begun. However, it will be important to note who’ll be using the devices and for what purposes. The use of such technologies are often a reflection of its users.


Xinjiang: Internet Censorship Laboratory (Part One)

I recently completed eighteen months of living in China’s far-western province of Xinjiang. As part of the coming-home process I contacted Kyle and offered to write a brief account of my experience in the ‘internet censorship laboratory of the world.’ What follows is a whirlwind of thoughts, opinions, and personal anecdotes that I will be the first to admit require much fact-checking and cross-referencing. Please consider them pages torn from my personal journal and shared with readers of Socionocular for their curiosity value.

One random day in mid-2014 three of my soon-to-be coworkers received text messages from the propaganda bureau of Ürümqi, the capital of Xinjiang Uyghur Autonomous Region in far western China. The messages reminded them that foreigners weren’t to be trusted, and that they must not share secrets with outsiders.

Which foreigners were these good Chinese citizens supposed to be wary of? And what secrets did three English teachers possess that could possibly compromise the safety of the nation? When later I asked these questions I betrayed my newcomer status. I would eventually conclude that all foreigners are suspect, especially in Xinjiang, and that the point is not so much to safeguard secrets as much as it’s to maintain the atmosphere of low-grade xenophobia.

The question that possessed my local friends was more pointed: why them? Broadcast text messages signed by the propaganda bureau weren’t uncommon, but this message was specific in its content and its recipients. For one, even though there were numerous foreigners working out of that office, only three of the more than two dozen Chinese staff got this particular message. As they chatted about it over lunch, they tried to work it out. One girl was dating a foreigner; the other was sleeping with one; the third was very close to a foreigner in a chaste, conservative Christian un-relationship that everyone could see through. But other staff had been so close with foreigners before. Besides, who would have been interested but inconspicuous enough to report these various liaisons to the propaganda bureau? And why would they bother?

The conclusion they eventually arrived at was that all three had used their ID cards to buy a SIM card for ‘their’ foreigner. That was the link.

And the phone company and Propaganda Bureau were evidently watching closely enough to notice.

To sign up for social media in China, most popular services require authentication using a mobile phone. In order to get a mobile number, one must register their government ID with the phone company before being given an activated SIM card. If the pieces fit together correctly anonymity is impossible on the Chinese internet. While I have friends who assure me that one can sever a link in this chain elsewhere in China, it’s much more difficult in Xinjiang.

The reason is, I suspect, that the stakes are higher in Xinjiang for the government, and so the fist is a little tighter. Like Tibet, Xinjiang is an autonomous region principally populated by China’s minorities, not the majority-everywhere-else Han. The Uyghurs who lend their name to the Xinjiang Uyghur Autonomous Region are a majority-muslim turkic ethnic group who share neither language nor culture with Beijing. The history of the region is complex, and contested, and supporting the wrong narrative or questioning the ‘right’ one is considered subversion.

20th century Xinjiang has been marked by episodes of pan-turkic, and separatist thought. There were two abortive independent states declared in the past century, both called East Turkestan. Both collapsed quickly. In the 21st century Beijing has bundled separatism with extremism and terrorism, labeling them ‘The Three Evils‘ which must be opposed at every level of society. The official line, packaged with China’s notorious control over the mainstream media has had the result of conflating each of the three evils with each-other.

The result of the party’s stranglehold on most of the news-media in China (if you’re curious, read The Party Line by Doug Young) is that the really interesting stuff is happening online. In China, the internet and social media have become somewhat of a haven for off-message thinking, mostly in the form of jokes. As mentioned, true anonymity is difficult on Chinese social media, but the Chinese language’s rich ability to cast puns has been used as a tool to avoid automated censorship, and make subtle jabs at those in power.

But the government has some surprisingly grassroots-seeming tactics of it’s own, such as its ability to rouse patriots to comment on the internet to support the party (mostly in Chinese, but also in other language). The use of paid government commenters is also an open secret. These paid internet posters are derogatorily called 五毛 (‘wǔmáo’), meaning ‘five mao’ (a unit of currency) because that is supposedly the going rate for one internet post (.5is about $.07 USD).

Ultimately, though, China is also willing to throw the switch completely. Similar to how Egypt did in the wake of protests in early 2011, China took all of Xinjiang offline in 2009 for 10 months in the wake of the Urumqi riots.

I’m sure you can imagine that in this atmosphere it’s impossible to take others at face-value unless you are very close with them. Very often people will claim apathy or ignorance when asked uncomfortable questions, or echo the official line even if they roll their eyes while doing so. Contrary opinions are not shared easily, and paranoia is pervasive.

There is much I haven’t even touched on, some of which has been discussed at length by others (such as the Great Firewall blocking Chinese citizens’ access to many foreign websites). Instead of repeating myself (or others), I’ll conclude this introduction to the situation here. Shortly I will follow up with another post containing a series of anecdotes which touch on this self-censorship and paranoia.


Snowden visits campus via live feed: NSA whistleblower addresses a packed Grant Hall


Queen’s International Affairs Association’s (QIAA) hosted a video conference with Edward Snowden on Thursday in Grant Hall.
Queen’s International Affairs Association’s (QIAA) hosted a video conference with Edward Snowden on Thursday in Grant Hall. Photo: Arwin Chan

Originally appeared in the Queen’s Journal on November 13th, 2015.

“I am just a citizen.  I was the mechanism of disclosure. It’s not up to me to say what the future should be — it’s up to you,” NSA whistleblower Edward Snowden told a packed house in Grant Hall.

Snowden — a polarizing figure globally — was invited as the keynote speaker for Queen’s Model United Nations Invitational (QMUNi) for the Queen’s International Affairs Association’s (QIAA).

As the talk commenced at 6:30 p.m., Snowden was met with applause.

The buzz surrounding Snowden’s Google Hangout talk on Thursday at Grant Hall started early, as crowds started lined up to enter the Grant Hall. The building quickly hit capacity.

Snowden began with a discussion of his motivations to disclose countless NSA confidential documents. He told the audience that he once believed wholeheartedly that mass surveillance was for the public good.

He came from a “federal family”, he said, with relations to both politics and military.  He said once he reached the peak of his career in government intelligence — when he received the highest security clearance — he saw the depth of the problem.

After that realization came the release of classified documents to journalists in 2013, his defection from the NSA and his indefinite stay in Russia.

“Progress often begins as an outright challenge to the law. Progress in many cases is illegal,” he said.

However, he has made himself into more than just a whistleblower. Snowden has continued to push for and encourage discussion about mass surveillance.

“Justice has to be seen to be done,” he said.

“I don’t live in Russia, I live on the Internet,” he said at another point during the talk.

When asked about Bill C-51 — the controversial terror bill in Canada — Snowden said “terrorism is often the public justification, but it’s not the actual motivation” for the bill.

He continued to say that if you strip the bill of the word “terrorism”, you can see the extent to which the bill makes fundamental changes that affect civil rights.

Snowden’s talk was intended to encourage discussion about mass surveillance. QIAA had initially contacted Snowden’s lawyer and publishers, who handle Snowden’s public affairs, and after a long process of back-and-forth negotiations they secured Snowden as a keynote speaker.

Dr. David Lyon, director of the Surveillance Studies Center and author of the recent publication Surveillance After Snowden, acted as the moderator for the talk.

David Lyon, right, mediated Thursday night’s question and answer period with Edward Snowden. (Photo by Arwin Chan)

There were mixed opinions among audience members about Edward Snowden and his mass disclosures of National Security Agency (NSA) intelligence documents to journalists in 2013.

Some students, like Mackenzie Schroeder, Nurs ’17, say Snowden’s actions were gutsy, but had good intentions.

Another guest, Akif Hasni, a PhD student in political studies, said he thought Snowden’s actions were important, despite the problems associated with publishing that information.

Other guests at the event didn’t completely agree with Snowden’s whistleblowing.

“It’s a dangerous thing to tell newspapers about. The thing about guys like Edward Snowden is that no one is going to know if what he did was good, while the action itself may be,” Sam Kary, ArtSci ’15, said.

Kary referred to John Oliver’s Snowden interview, where Oliver highlighted damages to national security caused by careless redacting of leaked documents by The New York Times.

The failure to properly redact leaked documents revealed the name of an NSA agent along with information on how the US government was targeting al-Qaeda operatives in Mosul in 2010.

— With files from Kate Meagher 


Spaces of Exterminability: Israel-Palestine, Precarity and the Capital-Nation-State


In the last few days I had the pleasure of attending a series of talks hosted by the Surveillance Studies Center at Queen’s University. It was the most inspiring and emotionally stirring talks I’ve ever seen. Dr. Nadera Shalhoub-Kevokian from the faculty of Law-Institute of Criminology and the School of Social Work and Public Welfare at the Hebrew University of Jerusalem spoke passionately, in an academic manner about surveillance issues. More particularly, she was speaking, from what she had called a new lens of analysis, through the perspective of children effected by militarized surveillance in East Jerusalem. From this standpoint she expanded her discourse on settler-colonial violence and the racialized, systemic and systematic extermination of the Palestinian people at the hands of the Israel state. I would like to state before I get into my own analysis of these talks that I am no expert on the Israel-Palestine conflict. However, I was stirred to write something about it as the issues are incredibly real, terrifying, and in need of visibility in the Western world.

This is a complicated and nuanced conflict to which I have no expertise or experience—with that said, after (or before) reading this response to Dr. Shalhoub-Kevokian’s talk please Google this topic thoroughly. In this response, I will talk about the work Dr. Shalhoub-Kevokian is conducting and then I will add a few thoughts that have been burning inside me which will extend her work and theoretical orientation. Also, if you are more interested. She’s published a book recently, check it out here. I only ask that we don’t engage in polarizing this conflict—as Dr. Lyon had mentioned in one of our lectures—it is a very complex conflict that includes the life worlds of so many millions of people. In what I talk about, and what Dr. Shalhoub-Kevokian very aptly asserted, these are systemic processes and social structures. Not necessarily the crimes of individual people.

Dr. David Lyon, director of the Surveillance Studies Center, gave an introduction to Dr. Shalhoub-Kevokian at the beginning of the first event. Notably, he added a very important thread of information that served as a backdrop for the talk. Dr. Lyon reminded the audience that most of the world’s surveillance technology comes out of Israel. He further asserted, that the testing of these technologies occurs on Palestinians in East Jerusalem. A terrifying notion. However, an important point of to bear in mind as we sift through this incredibly heavy, dense discourse.

Dr. Shalhoub-Kevokian (2015) began her talk with an assertion that the conflict between settler-colonialists and the Israel government and the Palestinian natives is not an event, but rather a structure and a process. It is a very real structure that uses the power of the state to discipline, control and torture the very real bodies and life-worlds of Palestinian people. This process is conducted through militarized surveillance (that which sorts, categorizes and regulates people for the purpose of control) which exposes Palestinian people to disproportionate amounts of violence and oppression. Further, as mentioned above, she studies this phenomenon through the lens of children impacted by this systemic and systematic violence. She then expands from children to the lives of Palestinian people in general.

Like many other colonial-indigenous relations, Dr. Shalhoub-Kevokian illustrates how this process of violence and surveillance is becoming an atmosphere of constant disappearance—where indigenous people, objects, and culture are devastatingly impacted. She describes three main fundamental issues with settler-colonialism: Colonialism is not an event but a structure; settlers indigenize themselves, removing the natives from their home; and the structure of settler-colonialism is based on the “logic of elimination”—cultural, historical and physical. This is empirically demonstrated by Dr. Shalhoub-Kevokian by way of illustrating how the Israel government uses bureaucratic measures to demolish homes, exposing Palestinian families to disproportionate homelessness and loss of citizenship. Dr. Shalhoub-Kevokian introduces a concept she calls exterminable spaces. This can be understood as both actual geographies in East Jerusalem and metaphorically referring to the disappearance (extermination) of social and cultural life-worlds. I will return to this concept to discuss it in light of Judith Butler’s discussion on citizenship and illegal immigrants shortly. Dr. Shalhoub-Kevokian uses this concept to understand the experiences of Palestinian children, she says, “Children are heavily racialized and mediated by racialized bureaucracies in these exterminable spaces”. The life-worlds, the everyday experiences of these children become saturated in fear. Fear of the settlers, fear of the police, and fear of the military. Back dropped with constant militarized surveillance and enforcement of brutal punishments.

There was much in this talk that I do not have the space to discuss (which you can explore through her book)—however, I would like to mention one more important point that she explored in her talk. The legal status of children (and adults). Dr. Shalhoub-Kevokian explains a fundamental point—children do not receive the status of citizen or permanent residence automatically. These children must apply for it under particularly narrow conditions. As a direct result of this, there are over 10 000 unregistered children. Because they have no papers or places to belong, they are exposed to disproportionate rates of state violence and arrest. As well as homelessness. They are directly placed into exterminable space.

This is where I would like to break off from Dr. Shalhoub-Kevokian and expand on two points in particular that were on my mind as I listened to her theory and her story. The first a political economic discussion of Kojin Karatani’s (2014) “capital-nation-state” trinity as it relates to the state and corporate violence against the Palestinian nation. The second is Judith Butler’s concept of precarity as it relates to the illegal ‘other’ in the “capital-nation-state”.  I feel that these two theories provide an interesting insight into the situation occurring in Israel.

Karatani (2014) takes on the task of reinterpreting the ebbs and flows of the model of world history Karl Marx devised in his work on Capital. Instead of a focus on the mode of production (as Marx bases his entire approach on), he instead approaches world history from modes of exchange. In doing this, Karatani levels out the field for the concepts of capital, nation, and state. Marx had assumed that nation and state emerged from capital (mode of production)—however, Karatani argues that capital, nation, and state are tied into trinity. The three primary modes of exchange, throughout all of history, had been linked together in some way or form to produce social relations.  This removes the privilege afforded to capital as the preconceived superior mode of exchange.

The capital-nation-state trinity is incredibly important, in my opinion, to understanding the friction between Israel and Palestine. Capital is the process and flow of money to make more money (Harvey 2010:40). State is a sort of rationalized, legal body with a “monopoly on violence” (as Weber would say) (Frankel 2001).  Nation is a community, or a group of human beings who share common historical and cultural practices (Connor 2001). It is important to note that sometimes, as Connor discusses, nation and state become conflated as nation-state. There is an important distinction because more times than not there are several nations under one state—and usually one nation dominating that state. This typically has terrible consequences to every other nation not associated with the priorities of the nation-state.  In the case of Israel and Palestine, the state is under the control of the Judaist nation.  Further, the interests of private corporations developing surveillance technology are enabled and encouraged by this state to test on the people of Palestine.  So there is a connection between state (those who monopolize violence), nation (the Zionist belief that Jerusalem is a city and land for the Judaist people), and capital (the production and commodity exchange of surveillance technology). This makes up the capital-nation-state apparatus. But in order for this to exist—a group(s) must be excluded. In this case, it is the Palestinian people.

Judith Butler (2009) talks about her concept of precarity and performativity in the contexts of gender and citizenship.  This theory, augmented with the work of Karatani offers some interesting insights.  Butler describes precarity as,

“…(Precarity) designates that politically induced condition in which certain populations suffer from failing social and economic networks of support and become deferentially exposed to injury, violence, and death. Such populations are at heightened risk of disease, poverty, starvation, displacement, and of exposure to violence without protection. Precarity also characterizes that politically induced condition of maximized vulnerability and exposure for populations exposed to arbitrary state violence and to other forms of aggression that are not enacted by states and against which states do not offer adequate protection” (ii).

I feel that precarity is an important concept in light of Dr. Shalhoub-Kevokian’s “spaces of exterminability” which throw the life-worlds of real human beings into disproportionate exposure to violence at the hands of state and settler. Butler continues to discuss the issue of who is and who is not considered a subject, in other words, a person (iii).  The nation-state has the power, through bureaucracy and the monopoly on violence, to impose citizenship.  In this way, the nation-state is able to regulate and sort desirable people from undesirable people.

Notably, Butler incorporates the work of Hannah Arendt who says that the nation-state structurally excludes and produces stateless persons (vi). But she also notes that those stateless people are able to resist their forced lack of personhood (vi). In other words, exercising personhood and the right to have rights is a sort of performance that can be conducted with or without citizenship.  When those who are not citizens engage in the performativity of personhood–their situation is much more precarious (vi).  However, in the case of Israel and East Jerusalem, there is a utilization of state violence to systemically and systematically remove and harm entire ethnic groups. Dr. Shalhoub-Kevokian asserts that the state military and police use techniques such as technologies of surveillance and security check points to control the mobility of Palestinians and “fragment” their ability to form cohesive communities. This separates family, friend and community from each other because the ability to travel (or exercise mobility) requires citizenship and permits which are easily revoked and heavily regulated. The Palestinians are not only rendered nonpersons and thrown into exterminable space, but they are also a stateless nation with very little chance of challenging the current regime or engaging meaningfully with the capital-nation-state.

I found this method of understanding the conflict very engaging. However, more important than any academic discourse on this incredibly terrible but very interesting topic is what can we do about it. I asked Dr. Shalhoub-Kevokian in the conclusion of her last talk about how someone who is so far removed from such conflicts (most Canadians) could practically help the situation. She replied with two things. The first, which was followed by chuckling from the audience, is to elect a new government. The Harper regime has been very unhelpful and mostly unproductive and problematic when approaching this conflict (I will leave qualifying this for another blog on another day). The second was to amplify the message that emerges from her academics and her politics. Before I explain this, I would like to remind you that this is not a conflict to be polarized. There are likely structural causes to the violence that is occurring in this country. We can’t play the ethnic blaming game. But we can raise the public alarms about the role of the Israel State in this very subtle form of genocide. So I implore you: blog, discuss, debate, disseminate, analyze, speak out, and for the love of god, VOTE.


Butler, Judith. 2009. “Prefromativity, Precarity and Sexual Politics.” Revista de Antropología Iberoamericana 4(3):i-xiii.

Connor, Walker. 2011. “nation-state.” Pp. 417-418 in The Concise Encyclopedia of Sociology, edited by G. Ritzer and J.M. Ryan. Malden MA: Blackwell Publishing Ltd.

Frankel, Boris. 2011. “state.” Pp. 609-611 in The Concise Encyclopedia of Sociology, edited by G. Ritzer and J.M. Ryan. Malden MA: Blackwell Publishing Ltd.

Karatani, Kojin. 2014. The Structure of World History: From Modes of Production to Modes of Exchange. Durham and London: Duke University Press. .

Shalhoub-Kevokian, Nadera. 2015. “Militarized Surveillance and Palestinian Childhood”. Surveillance Studies Centre Seminar Series. Queen’s University. Lecture.

Shalhoub-Kevokian, Nadera. 2015. “Security Theology, Surveillance and the Politics of Fear”. Surveillance Studies Centre Seminar Series. Queen’s University. Lecture.

Surveillance Studies Centre Seminar Series Presents…


If you are in Kingston, ON or have a way to get here, this is definitly a seminar that is worth checking out.

Info below from the Surveillance Studies Centre event page:



‘Militarized Surveillance and Palestinian Childhood’

TUESDAY, SEPTEMBER 22, 12:30-2:00pm

Jeffrey 234

Nadera Shalhoub-Kevorkian

“Through an examination of the trapped condition of colonized childhood in historic Palestine, the presentation conceptualizes Palestinian childhood within a settler colonial framework and considers the particular and distinctly territorialized, spatial, and biopolitical relationships between state criminality and Palestinian childhood. The talk traces the ongoing targeting of Palestinian childhood through different geographical spaces and historical periods. Considering the fragmentation of Palestinian geographies— via borders, checkpoints, walls, settler violence and other militarized restrictions of movement — a spatio-temporal emphasis is key to understanding how the targeting of children and the maintenance of various punitive measures within spaces of exterminability serves colonial interests.

About the speaker: Professor Nadera Shalhoub-Kevorkian is a longtime anti-violence, native Palestinian feminist activist and the director of the Gender Studies Program at Mada al-Carmel, the Arab Center for Applied Social Research in Haifa. Her research focuses on law, society and crimes of abuse of power. She studies the crime of femicide and other forms of gendered violence, crimes of abuse of power in settler colonial contexts, surveillance, securitization and social control, and trauma and recovery in militarized and colonized zones. Shalhoub-Kevorkian’s most recent books are: Security Theology, Surveillance and the Politics of Fear, Cambridge University Press, April 2015 and Militarization and Violence Against Women in Conflict Zones in the Middle East: The Palestinian Case Study, Cambridge University Press, 2010. She has published articles in multi-disciplinary fields including British Journal of Criminology, International Review of Victimology, Feminism and Psychology, Middle East Law and Governance, International Journal of Lifelong Education, American Behavioral Scientist Journal, Social Service Review, Violence Against Women, Journal of Feminist Family Therapy: An International Forum, Social Identities, Social Science and Medicine, Signs, Law & Society Review, and more. As a resident of the old city of Jerusalem, Shalhoub-Kevorkian works to end the inscription of power over Palestinian children’s lives, spaces of death, and women’s birthing bodies and lives.

Dr. Nadera Shalhoub-Kevorkian has been brought to Queen’s through the Principal’s Development Fund International Visitors Program.

This talk is co-presented by Sociology, Faculty of Law, Global Development Studies, and Gender Studies


Digital binary code on computer screen, pen pointing out "we're watching you" surveillance breach in red characters.

Colombian “Shadow State”: The blending of public and private sectors in mass surveillance

Digital binary code on computer screen, pen pointing out "we're watching you" surveillance breach in red characters.
Adobe stock image

The deployment of surveillance in the 21st century digital (shit-show) of a society we live in carries some especially decentralized features. We can no longer look at the state as a central apparatus from where surveillance emerges and is conducted. And we also can’t assume that surveillance has shifted to a new center in the private industry. This “blurring of sectors” is one of the main trends in Canadian (and certainly, global) surveillance reported by Transparent Lives: Surveillance in Canada. Read this particular chapter of the report for free here. This is an interesting meditation on these important, and really complex, issues in light of the development of a “total” surveillance program in Colombia.

According to a report released by Privacy International –the Colombian state has, over the past few decades, constructed a vast surveillance net that borders on total surveillance. An apparatus that has, in fact, been used on political opponents, leftist Guerrillas, and activists in the past. This is what Vice News refers to as the “Shadow State”. A story that is shaping up to look like some sort of dystopian sci-fi. This could also be a case study in the dangers of unimpeded surveillance for state or private interest.

Let’s look at a quick recap of its development (according to Vice News)! In the 1990s, the Colombian state invested in a surveillance system called “Esperanza”. In sociology, there is this concept called surveillance creep which essentially means that once surveillance system is set up, it continues to grow and eventually take on tasks that were never its initial intention (Lyon 52). In the case of Esperanza, it was expanded over the next few decades until a new program was developed. PUMA was developed in 2007, and through surveillance creep was later upgraded to super-PUMA through a multimillion dollar investment. These systems now have the capacity to track and log phone calls and conversations to government servers to create profiles on all citizens. Much of this work is done without warrant or heed to the established laws governing intelligence agencies or state surveillance. For a much more detailed description of the story—visit the VICE article.

What I found interesting was the focus of the article on the centrality of the state government in the construction and implementation of their “shadow state”. They do discuss the private industry in the article. However, not mentioned is that there is likely to be a thin veil of separation between the involved capitalists and the state.

   “Surveillance is big money,” explained Rice. “If you sell people guns, they may come back for more guns someday, but if you sell surveillance, you immediately start providing customer support, IT services, and upgrades.”

VICE News.

To only focus on the use of surveillance to reproduce and safe guard state power is to ignore many of the other contributing factors and risky slopes that exist in these situations. One being, that a collection of private interest corporations are cashing in big time on the suffering and repression of an entire nation. Of course, this cash grab is obscured and made opaque by discourses of terrorism and crime. So not only is the state as a result becoming more powerful through draconian and cloak and dagger strategies—but a slurry of private corporation is also filling its coffers.

According to the VICE news article:

“The dozens of documents reviewed by Privacy International show that the Israeli companies Verint Systems and NICE Systems have been especially crucial in building Colombia’s electronic spying capabilities. Both have helped steadily expand the country’s “network” surveillance system, which uses a series of probes to latch on to Internet servers and collect data from 3G phone networks.”

These private corporations, I would speculate, also have access to the collected data in aggregate of an entire country’s population. The Transparent Lives report writes,

“The blurring between these agencies may be illustrated in many ways, but the effect of driving more surveillance is common to each case. Public and private bodies have different mandates and different modes of accountability, and personal data become vulnerable to misuse and abuse as the data streams flow in new directions.”

So even though abuse from the Colombian state is actually terrifying—there is at least, even if they are not always followed, a set of governing laws. Which is sometimes not the case of a private industry that is mandated to swing large profits. But the likely case seems that there is probably quite a lot of overlap between these surveillance corporations and the state interests.

It is increasingly important to see surveillance as a process that transcends traditional boundaries between public and private sectors. As these sectors, in an age of global capitalism are beginning to merge in many complicated ways.