258
Views
0
CrossRef citations to date
0
Altmetric
Articles

Wolves in the airport: Jesus’ critique of purity as a challenge to twenty-first-century surveillance

References

  • ACLU. 2017. Bad Trip: Debunking the Tsa’s ‘Behavior Detection’ Program. New York: American Civil Liberties Union.
  • Araiza, Karen. 2015. “ Philly Passengers Pulled Off Flight for Speaking Arabic.” Updated November 19, 2015. Accessed February 12, 2016. http://bit.ly/1NiFrdF.
  • Ariel, Courtney. 2017. For Our White Friends Desiring to Be Allies. Updated August 16, 2017. Accessed December 4, 2017. https://sojo.net/articles/our-white-friends-desiring-be-allies.
  • Bauman, Zygmunt. 2001. Community. Cambridge: Polity Press.
  • Borg, Marcus J. 1998. Conflict, Holiness and Politics in the Teachings of Jesus. London: Continuum.
  • CFR. 2017. Code of Federal Regulations, Part 1540, Civil Aviation Security.
  • Chandrasekhar, Charu A. 2003. “Flying While Brown: Federal Civil Rights Remedies to Post-9/11 Airline Racial Profiling of South Asians.” Asian American Law Journal 10 (2): 215–252.
  • Church and Society Council. 2017. Surveillance and Social Justice. Edinburgh: Church of Scotland.
  • Cook, Anthony E. 2004–05. “Encountering the Other: Evangelicalism and Terrorism in a Post 911 World.” Journal of Law and Religion 20 (1): 1–30. doi: 10.2307/4144682
  • Corrigan, Ray. 2015. “ Mass Surveillance Not Effective for Finding Terrorists.” New Scientist. Accessed June 30, 2017. https://www.newscientist.com/article/dn26801-mass-surveillance-not-effective-for-finding-terrorists.
  • Douglas, Mary. 1966. Purity and Danger: An Analysis of the Concepts of Pollution and Taboo. London: ARK Paperbacks.
  • Ekman, Paul. 2003. Emotions Revealed: Recognizing Faces and Feelings to Improve Communication and Emotional Life. 1st ed., xvii, 267 pages. New York: Times Books.
  • Ekman, Paul. 2006. “How to Spot a Terrorist on the Fly.” Washington Post. Updated October 29, 2006. Accessed July 5, 2017. http://www.washingtonpost.com/wp-dyn/content/article/2006/10/27/AR2006102701478.html.
  • Ewald, François. 1993. “Two Infinities of Risk.” In Politics of Everyday Fear, edited by Brian Massumi, 221–228. Minneapolis: University of Minnesota Press.
  • Fortner, Robert S. 1989. “Privacy Is Not Enough: Personhood and High Technology.” Conrad Grebel Review 7 (2): 159–177.
  • Graham, Franklin. 2016. “ Facebook Post, 31 July 2016.” Accessed July 7, 2017. https://www.facebook.com/FranklinGraham/posts/1211701438886035.
  • Greenwald, Glenn. 2014. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. New York: Picador.
  • Greenwald, Glenn, and Ewen MacAskill. 2003. “NSA Prism Program Taps in to User Data of Apple, Google and Others.” June 7, 2013.
  • Hall, Rachel. 2015. The Transparent Traveler: The Performance and Culture of Airport Security. Durham, NC: Duke University Press.
  • Harris, David A. 1997. “Driving While Black and All Other Traffic Offenses: The Supreme Court and Pretextual Traffic Stops.” Journal of Criminal Law and Criminology 87 (2): 544–582. doi: 10.2307/1143954
  • Introna, Lucas D., and David Wood. 2004. “Picturing Algorithmic Surveillance: The Politics of Facial Recognition Systems.” Surveillance & Society 2 (2/3): 177–198.
  • ISC. 2015. “ Privacy and Security: A Modern and Transparent Legal Framework.”
  • Jeffress, Robert. 2015. “Dr Robert Jeffress Addresses Paris Attacks (11/15/15).” Accessed July 7, 2017. https://www.youtube.com/watch?v=vvjMUrPUfC4.
  • Jenkins, Richard. 2000. “Categorization: Identity, Social Process and Epistemology.” Current Sociology 48 (3): 7–25. doi: 10.1177/0011392100048003003
  • Kleiner, Yevgenia S. 2010. “‘Racial Profiling in the Name of National Security: Protecting Minority Travelers’ Civil Liberties in the Age of Terrorism.” Boston College Third World Law Journal 30 (1): 103–144.
  • Levine, Timothy, Steven A. McCornack, and Hee Sun Park. n.d. “ Deception Research at Michigan State University.” Accessed July 5, 2017. https://msu.edu/~levinet/deception.htm.
  • Lyon, David. 1995. “Whither Shall I Flee? Surveillance, Omniscience and Normativity in the Panopticon.” Christian Scholars Review 14 (3): 302–312.
  • Lyon, David. 2014. “Surveillance and the Eye of God.” Studies in Christian Ethics 27 (1): 21–32. doi: 10.1177/0953946813509334
  • Lyon, David. 2015. Surveillance after Snowden. Cambridge: Polity Press.
  • Majority Report. 2015. “ Pat Robertson: Your Muslim Neighbors Are Trying to Kill You.” Accessed July 7, 2017. https://www.youtube.com/watch?v=a9UmnZbopOI.
  • Muers, Rachel. 2004. Keeping God’s Silence: Towards a Theological Ethics of Communication. Oxford: Blackwell.
  • National Council of Churches. 2017. “ President Trump: Renounce the Anti-Muslim Retweets.” Updated December 1, 2017. Accessed December 4, 2017. http://nationalcouncilofchurches.us/president-trump-renounce-the-anti-muslim-retweets/.
  • Patel, Tina G. 2013. “Ethnic Deviant Labels Within a Terror-Panic Context: Excusing White Deviance.” Ethnicity and Race in a Changing World 4 (1): 34–49. doi: 10.7227/ERCW.4.1.3
  • Pattison, Stephen. 2000. Shame: Theory, Therapy, Theology. Cambridge: Cambridge University Press.
  • Press, William. 2010. “To Catch a Terrorist: Can Ethnic Profiling Work?” Significance 7 (4): 164–167. doi: 10.1111/j.1740-9713.2010.00452.x
  • Pugliese, Joseph. 2006. “Asymmetries of Terror: Visual Regimes of Racial Profiling and the Shooting of Jean Charles De Menezes in the Context of the War in Iraq.” Borderlands 51. Accessed July 2, 2017. http://www.borderlands.net.au/vol5no1_2006/pugliese.htm.
  • Ramirez, Deborah A., Jennifer Hoopes, and Tara Lai Quinlan. 2003. “Defining Racial Profiling in a Post-September 11 World.” American Criminal Law Review 40: 1195–1233.
  • Religions for Peace USA. 2017. “ A Statement by US Religious Leaders, on Behalf of the Council of Presidents and Executive Council of Religions for Peace USA. August 14, 2017. Regarding the ‘Unite the Right’ Gatherings in Charlottesville, Virginia.” Accessed December 4, 2017. https://www.episcopalchurch.org/posts/eir/regarding-unite-right-gatherings-charlottesville-virginia.
  • Sa'di, Ahmad H. 2012. “Colonialism and Surveillance.” In Routledge Handbook of Surveillance Studies, edited by Kirstie Ball, Kevin D. Haggerty, and David Lyon, 151–158. London: Routledge.
  • Sadler, Rodney S., Jr. 2006. “Can a Cushite Change His Skin? Cushitees, ‘Racial Othering,’ and the Hebrew Bible.” Interpretation 60 (4): 386–403. doi: 10.1177/002096430606000403
  • Smith, Jonathan Z. 1987. To Take Place: Toward Theory in Ritual. Chicago: University of Chicago Press.
  • Soyinka, Wole. 2004. “ The Changing Mask of Fear – Reith Lecture 1.” Accessed July 5, 2017. http://www.bbc.co.uk/radio4/reith2004/lecture1.shtml.
  • Stoddart, Eric. 2011. Theological Perspectives on a Surveillance Society: Watching and Being Watched. Aldershot: Ashgate.
  • Stoddart, Eric. 2014. “(In)Visibility Before Privacy: A Theological Ethics of Surveillance as Social Sorting.” Studies in Christian Ethics 27 (1): 33–49. doi: 10.1177/0953946813509335
  • Tajfel, Henri. 1981. Human Groups and Social Categories: Studies in Social Psychology. Cambridge: Cambridge University Press.
  • United Presbyterian Church in the U.S.A. 1974. “Right of Privacy and Its Protection.” Church & Society 65 (2): 4–49.
  • Walklate, Sandra, and Gabe Mythen. 2008. “How Scared Are We?” British Journal of Criminology 48: 209–255. doi: 10.1093/bjc/azm070
  • Wigorts Yngvesson, Susanne. 2013. “To See the World As It Appears: The Look, the Camera and the Flesh.” In Living in Surveillance Societies: The State of Surveillance, edited by William R. Webster, Gemma Galdon Clavell, Nils Zurawski, Kees Boersma, Bence Ságvári, Christel Backman, and Charles LeLeux. 314–323. CreateSpace Independent Publishing Platform.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.