432
Views
4
CrossRef citations to date
0
Altmetric
Articles

Everyday rules and embodied information: anti-money laundering/counter-terrorist financing practices and radio frequency identification tags as security politics

Pages 169-186 | Received 27 May 2015, Accepted 27 Feb 2016, Published online: 25 Apr 2016
 

Abstract

We are attached to ‘our’ information: height, weight, income, address, profession, location, friends, purchases, and more. This embodied information, data that inhere in and adhere to our bodies, can be misappropriated, misused, or accidentally disclosed. Unwanted information can be forced onto us. Yet the mundane nature of moving information around occludes the potential for harm. To uncover the way ordinary practices lead to everyday insecurities, I examine embodied information flows, power, and rules. I conceptualize power as the ability to control the flow of information, defined as its content, its velocity (speed and direction), and access to it. Rules, which are essential to understanding how this power manifests, are analyzed in terms of rule form (discursive or constructed), deontological category (rules that are obligatory, optional, or prohibited), and relation to subject (rules regulating information flows into or out from the subject’s body). I draw on this analytical framework to explore two examples (anti-money-laundering/counter-terrorist financing [AML/CTF] and radio frequency identification [RFID] tags) to illustrate the vulnerabilities arising from the control of the flow of embodied information or, more precisely, from individuals’ inability to control the flow of their embodied information. Ironically, these practices developed for purposes of increasing national security (AML/CTF) and for improving economic efficiency (RFID tags) reduce individual security. Everyday practices of controlling information flows create this insecurity both intentionally and incidentally, which further complicates the political context.

Acknowledgements

My thanks, first of all, to Cerelia Athanassiou, Anna Maria Friis Kristensen, and Moran Mandelbaum for their exceptionally constructive critique and encouragement. The anonymous reviewers provided truly insightful comments that helped me improve the manuscript significantly. Many colleagues and students have provided criticism, suggestions, and corrections. Kavi Abraham, Scott Gerber, Yehonatan Abramson, and José Luís Rodríguez Aquino deserve special mention. The errors are, of course, wholly mine.

Notes

1. This article focuses on vulnerability and control of information flow. An alternate story would emphasize how control of information flows provides a means of enhancing security (for example, Mancini and O’Reilly Citation2013).

2. News reports (e.g., Press Citation2013) and analyses in the scholarly literature (e.g., Solove Citation2002) have pointed to the vulnerability of people, corporate entities, and states to harm.

3. Hansen and Nissenbaum define everyday security as ‘the way in which securitizing actors, including private organizations and businesses, mobilize ’normal‘ individuals’ experiences in two ways: to secure the individual’s partnership and compliance in protecting [cyber] network security, and to make hypersecuritization scenarios more plausible by linking elements of the disaster scenario to experiences familiar from everyday life’ (Citation2009, 1165). ‘The International as Everyday Practice’ is the subject of a forum in International Political Sociology (Guillaume et al. Citation2011). Other examples include Corrin (Citation2003), Ryan (Citation2009), Rowley and Weldes (Citation2012), and Blanchard (Citation2003).

4. Kinds of information flows include, but certainly are not limited to, surveillance (discussed below), advertising, computer hacking, and viral videos.

5. AML/CTF practices are examples of surveillance. RFID tags are sometimes used for surveillance, other times for alternative forms of information flow.

6. On the risks to privacy see, for example, Bennett (Citation2011), Bennett and Raab (Citation2006), Boyd and Crawford (Citation2012), Newman (Citation2008), and Marlin-Bennett (Citation2004).

7. Surveillance practices can empower individuals in some circumstances, as Monahan (Citation2011) and Raab, Jones, and Székely (Citation2015) note.

8. See also Floridi (Citation2011), Chapman (Citation2011), and Shannon (Citation1948).

9. Contrast Bourdieu (Citation1988, 785, n. 5) and Connolly (Citation2013, 7). More simply, I envision a dynamic field of overlapping and interconnected social networks in which information flows continually and spontaneously arise.

10. In the field of surveillance studies, the unproblematic term, ‘personal data’, is generally used. (See Marx Citation2002 and Lyon Citation2002 as examples.) I refer to ‘embodied information’ to link to philosophical investigations about the relationship between data (datum understood as ‘a lack of uniformity’ [Floridi Citation2011, 85]) and information and to connect with the international relations literature on embodiment.

11. Among these are Pettman (Citation1997), Neumann (Citation2008), Fierke (Citation2012), Sjoberg (Citation2012), Reid (Citation2014), and Wilcox (Citation2015). Coole (Citation2007) addresses embodiment and democratic theory.

12. Material conditions can be interpreted as constructed rules. See below.

13. My approach has some common ground with that of Steele (Citation2010), whose concept of counterpower addresses how agents that are not states can, in an unexpected way, create insecurities by using available technologies to spread messages. His focus is on the aesthetics of such messages and how they act on national self-images.

14. The rule is that which is generally complied with. Routinely violated ‘rules’ cease being rules; rules also drift into new meanings through practices.

15. I thank Scott Gerber for this insight.

16. In the case of ‘coordination rules’ (Stein Citation1982), security politics may be less evident. However, choosing one standard over another may advantage one agent over another.

17. The list includes: depository institutions (banks), casinos and card clubs, money services businesses, brokers or dealers in securities, mutual funds, commodities and futures dealers (including futures commission merchants and introducing brokers in commodities), insurance companies, dealers in precious metals, precious stones, or jewels, and mortgage companies and mortgage brokers.

18. Examples of international relations scholarship on AML/CTF include Amicelle (Citation2011), Amoore and de Goede (Citation2005), Andreas and Nadelmann (Citation2006), De Goede (Citation2005, Citation2007), Drezner (Citation2005), Favarel-Garrigues, Godefroy, and Lascoumes (Citation2011), FitzGerald (Citation2004), Gardner (Citation2007), Hampton and Levi (Citation1999), Levi (Citation2002), Liss and Sharman (Citation2015), Serrano and Kenny (Citation2003), Sharman (Citation2008), Tsingou (Citation2010), and Vlcek (Citation2015). See also the master’s thesis by Showell, a knowledgeable practitioner (Showell Citation2007).

19. Identifying suspicious business entities may be difficult as shell corporations are easily established – including in the United States (Sharman Citation2011).

20. Instructions and examples can be seen on the website of the US FIU, www.fincen.gov.

21. A compliance officer I interviewed several years ago noted that the tendency to over-report is higher in the US than in the UK because of differences in regulatory guidance provided by the respective FIUs (Compliance Officer of a large bank (anonymous) Citation2008).

22. Originally from the Texas Instruments webpage, http://www.ti.com/rfid/f, aqs.shtml#Gone, accessed June 4, 2013 (no longer available). The same text is posted at http://lux-ident.com/technology/ (accessed April 19, 2015).

23. Examples include laws in the United States (National Conference of State Legislatures Citation2015) and the European Union (European Union Citation2007).

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 135.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.