Digitization, Automation and Transnational Private Security Companies in Areas of Limited Statehood

The study of the increase in military and private security companies and electronic surveillance practices are two topics of growing debate in international relations. On the one hand, the privatization of security has effects on international security and state sovereignty. On the other hand, the e...

Descripción completa

Detalles Bibliográficos
Autor Principal: Vila Seoane, Maximiliano Facundo
Formato: Artículo (Article)
Lenguaje:Español (Spanish)
Publicado: Universidad Militar Nueva Granada 2018
Materias:
Acceso en línea:http://hdl.handle.net/10654/34785
id ir-10654-34785
recordtype dspace
institution Universidad Militar Nueva Granada
collection DSpace
language Español (Spanish)
topic Electronic surveillance
human rights
private security
technological dependence
transnational companies
Dependencia tecnológica
derechos humanos
empresas transnacionales
seguridad privada
vigilancia electrónica
spellingShingle Electronic surveillance
human rights
private security
technological dependence
transnational companies
Dependencia tecnológica
derechos humanos
empresas transnacionales
seguridad privada
vigilancia electrónica
Vila Seoane, Maximiliano Facundo
Digitization, Automation and Transnational Private Security Companies in Areas of Limited Statehood
description The study of the increase in military and private security companies and electronic surveillance practices are two topics of growing debate in international relations. On the one hand, the privatization of security has effects on international security and state sovereignty. On the other hand, the expansion of electronic surveillance practices poses new risks to human rights, such as privacy. In this context, this article explores a subject that has been little researched in areas of limited statehood: the implications of the continuous process of digitization and automation in the private security and electronic surveillance industry. The article analyzes the discourses of transnational private security and electronic surveillance companies operating in Argentina and the problems associated with these practices. Specifically, it lists the consequences of digitization and automation, such as increased technological dependence, offer of false technological solutions that do not tackle complex social problems causing insecurity, increasing vulnerability of electronic surveillance equipment to technological failures, and the new threats to human rights. Finally, the main points and recommendations for public policy to counterbalance asymmetries in favor of these transnational companies are summarized.
format Artículo (Article)
author Vila Seoane, Maximiliano Facundo
author_facet Vila Seoane, Maximiliano Facundo
author_sort Vila Seoane, Maximiliano Facundo
title Digitization, Automation and Transnational Private Security Companies in Areas of Limited Statehood
title_short Digitization, Automation and Transnational Private Security Companies in Areas of Limited Statehood
title_full Digitization, Automation and Transnational Private Security Companies in Areas of Limited Statehood
title_fullStr Digitization, Automation and Transnational Private Security Companies in Areas of Limited Statehood
title_full_unstemmed Digitization, Automation and Transnational Private Security Companies in Areas of Limited Statehood
title_sort digitization, automation and transnational private security companies in areas of limited statehood
publisher Universidad Militar Nueva Granada
publishDate 2018
url http://hdl.handle.net/10654/34785
_version_ 1712101833101541376
spelling ir-10654-347852020-01-08T19:46:58Z Digitization, Automation and Transnational Private Security Companies in Areas of Limited Statehood Digitalización, automatización y empresas transnacionales de seguridad privada en áreas con capacidad estatal limitada Digitalização, automatização e empresas transnacionais de segurança privada em áreas com capacidade estatal limitada Vila Seoane, Maximiliano Facundo Electronic surveillance human rights private security technological dependence transnational companies Dependencia tecnológica derechos humanos empresas transnacionales seguridad privada vigilancia electrónica The study of the increase in military and private security companies and electronic surveillance practices are two topics of growing debate in international relations. On the one hand, the privatization of security has effects on international security and state sovereignty. On the other hand, the expansion of electronic surveillance practices poses new risks to human rights, such as privacy. In this context, this article explores a subject that has been little researched in areas of limited statehood: the implications of the continuous process of digitization and automation in the private security and electronic surveillance industry. The article analyzes the discourses of transnational private security and electronic surveillance companies operating in Argentina and the problems associated with these practices. Specifically, it lists the consequences of digitization and automation, such as increased technological dependence, offer of false technological solutions that do not tackle complex social problems causing insecurity, increasing vulnerability of electronic surveillance equipment to technological failures, and the new threats to human rights. Finally, the main points and recommendations for public policy to counterbalance asymmetries in favor of these transnational companies are summarized. El estudio del aumento de empresas militares y de seguridad privada, junto con los estudios sobre prácticas de vigilancia electrónica son dos temas de creciente debate en el campo de las relaciones internacionales. Por un lado, la privatización de la seguridad tiene efectos en la seguridad internacional y en la soberanía estatal. Por el otro lado, la expansión de las prácticas de vigilancia electrónica son nuevos riesgos para los derechos humanos, como la privacidad. En este contexto, este artículo indaga sobre un tema poco investigado en áreas con capacidad estatal limitada: las implicancias del continuo proceso de digitalización y automatización en la industria de la seguridad privada y de la vigilancia electrónica. El artículo se basa en un análisis de los discursos de las empresas transnacionales de seguridad privada y vigilancia electrónica que operan en Argentina, y de los problemas asociados a estas prácticas. Específicamente, se detallan las consecuencias de la digitalización y automatización, como el incremento de la dependencia tecnológica, la oferta de falsas soluciones tecnológicas que no resuelven los complejos problemas sociales que provocan la inseguridad, la creciente susceptibilidad a fallas tecnológicas de los equipos de vigilancia electrónica, y su amenaza a los derechos humanos. Finalmente, el artículo concluye con una síntesis de los principales puntos y recomendaciones de política pública para contrabalancear las asimetrías en favor de estas empresas transnacionales. O estudo do aumento de empresas militares e de segurança privada, junto com os estudos sobre práticas de vigilância eletrônica, são dois temas de Crescente debate no campo das relações internacionais. Por um lado, a privatização da segurança tem efeitos na segurança internacional e na soberania estatal. Por outro, a expansão das práticas de vigilância eletrônica é um novo risco para os direitos humanos, como a privacidade. Neste contexto, o artigo indaga sobre um tema pouco pesquisado em áreas com capacidade estatal limitada: as implicâncias do contínuo processo de digitalização e automatização na indústria da segurança privada e a vigilância eletrônica. O artigo se baseia em uma análise dos discursos das empresas transnacionais de segurança privada e vigilância eletrônica que operam na Argentina, e dos problemas associados a estas práticas. Especificamente, se detalham as consequências da digitalização e automatização, como são o aumento da dependência tecnológica, a oferta de falsas soluções tecnológicas que não resolvem os complexos problemas sociais que provocam a insegurança, a crescente susceptibilidade a falhas tecnológicas dos equipamentos de vigilância eletrônica, e sua ameaça aos direitos humanos. Finalmente, conclui-se com uma síntese dos principais pontos e recomendações de política pública para contrabalançar as assimetrias favoráveis a estas empresas transnacionais. 2018-05-18 2020-01-08T19:46:58Z 2020-01-08T19:46:58Z info:eu-repo/semantics/article info:eu-repo/semantics/publishedVersion http://revistas.unimilitar.edu.co/index.php/ries/article/view/3300 10.18359/ries.3300 http://hdl.handle.net/10654/34785 spa http://revistas.unimilitar.edu.co/index.php/ries/article/view/3300/3021 http://revistas.unimilitar.edu.co/index.php/ries/article/view/3300/3036 http://revistas.unimilitar.edu.co/index.php/ries/article/view/3300/3264 /*ref*/A&S Magazine. (2017, Diciembre 16). Security 50 rankins confirm Chinese industry dominance. Recuperado de https://www.asmag.com/showpost/24137.aspx /*ref*/ADT. (2016). The ADT corporation 2015 annual report (p. 183). Florida, USA. /*ref*/Amicelle, A., Aradau, C., & Jeandesboz, J. (2015). Questioning security devices: performativity, resistance, politics. Security Dialogue, 46(4), 293–306. https://doi.org/10.1177/0967010615586964 /*ref*/Arias, P. (2009). Seguridad privada en América Latina: el lucro y los dilemas de una regulación. Santiago de Chile, Chile: FLACSO-CHILE. /*ref*/Avant, D. (2005). The market for force. The consequences of privatizing security. Cambridge, UK: Cambridge University Press. https://doi.org/10.1017/CBO9780511490866 /*ref*/Avant, D. (2007). NGOs, corporations and security transformation in Africa. International Relations, 21(2), 143–161. https://doi.org/10.1177/0047117807077000 /*ref*/Ball, K., Haggerty, K., & Lyon, D. (Eds.). (2012). Routledge handbook of surveillance studies. New York, USA: Routledge. https://doi.org/10.4324/9780203814949 /*ref*/Balzacq, T., & Dunn Cavelty, M. (2016). A theory of actor-network for cyber-security. European Journal of International Security, 1(2), 176–198. https://doi.org/10.1017/eis.2016.8 /*ref*/Bauman, Z., Bigo, D., Esteves, P., Guild, E., Jabri, V., Lyon, D., & Walker, R. B. J. (2014). After Snowden: rethinking the impact of surveillance. International Political Sociology, 8(2), 121–144. https://doi.org/10.1111/ips.12048 /*ref*/BBC. (2017, Diciembre 10). In Your Face: China's all-seeing state. Recuperado de http://www.bbc.com/news/av/world-asia-china-42248056/in-your-face-china-s-all-seeing-state /*ref*/Blázquez, S. (2015, Octubre 31). Laboratorios contra el crimen: Prosegur y Securitas dise-an el futuro de la seguridad privada en sus centros de innovación. Recuperado de https://elpais.com/economia/2015/10/29/actualidad/1446141257_470484.html /*ref*/Börzel, T. A., & Risse, T. (2010). Governance without a state: can it work? Regulation & Governance, 4(2), 113–134. https://doi.org/10.1111/j.1748-5991.2010.01076.x /*ref*/Bosch Security. (2017). About us. Recuperado de https://www.boschsecurity.com/xc/en/about-us/ /*ref*/Brooks, S. G. (2005). Producing security: Multinational corporations, globalization, and the changing calculus of conflict. New Jersey, USA: Princeton University Press. https://doi.org/10.1515/9781400841301 /*ref*/Brynjolfsson, E., & Mcafee, A. (2016). The second machine age: work, progress, and prosperity in a time of brilliant technologies. New York, USA: W.W. Norton & Company. /*ref*/Bueger, C. (2015). Making things known: epistemic practices, the United Nations, and the translation of piracy. International Political Sociology, 9(1), 1–18. https://doi.org/10.1111/ips.12073 /*ref*/Buzan, B., Waever, O., & Wilde, J. de. (1998). Security: a new framework for analysis. Boulder, Colorado, USA: Lynne Rienner Publishers. /*ref*/Castells, M., & Laserna, R. (1989). The new dependency: technological change and socioeconomic restructuring in Latin America. Sociological Forum, 4(4), 535–560. https://doi.org/10.1007/BF01115063 /*ref*/Cejas, E. B., & González, C. C. (2014). Estado de la normativa sobre video vigilancia en Argentina y su relación con la protección de datos personales. En 15° Simposio Argentino de Informática y Derecho, Buenos Aires, Argentina. /*ref*/Dahua. (2017). 2016 Annual report (二○一六年年度报告) (p. 167). Zhejiang, China. /*ref*/Eichengreen, B. (2017, Diciembre 12). Two myths about automation. Recuperado de https://www.project-syndicate.org/commentary/two-myths-about-automation-by-barry-eichengreen-2017-12 /*ref*/Fleitas Ortiz de Rosas, D. M., & Quevedo, M. V. (2011). La seguridad privada en Argentina (Documento de Trabajo) (p. 30). Fundación Arias para la Paz y el Progreso Humano. Recuperado de http://www.app.org.ar/wp-content/uploads/2011/12/Informe-sobre-Seguridad-Privada-en-Argentina-Diciembre-20111.pdf /*ref*/Fox-Brewster, T. (2017, October 23). A Massive Number Of IoT Cameras Are Hackable -- And Now The Next Web Crisis Looms. Recuperado de https://www.forbes.com/sites/thomasbrewster/2017/10/23/reaper-botnet-hacking-iot-cctv-iot-cctv-cameras /*ref*/French, S., Leyshon, A., & Wainwright, T. (2011). Financializing space, spacing financialization. Progress in Human Geography, 35(6), 1–22. https://doi.org/10.1177/0309132510396749 /*ref*/Gill, S. (2008). Power and resistance in the new world order (2nd ed.). New York, USA: Palgrave Macmillan. https://doi.org/10.1057/9780230584518 /*ref*/Gómez del Prado, J. L. (2009). Private military and security companies and the UN working group on the use of mercenaries. Journal of Conflict & Security Law, 13(3), 429–459. https://doi.org/10.1093/jcsl/krp010 /*ref*/Goold, B., Loader, I., & Thumala, A. (2010). Consuming security? Tools for a sociology of security consumption. Theoretical Criminology, 14(1), 3–30. https://doi.org/10.1177/1362480609354533 /*ref*/HIKVISION. (2017). 2016 Annual Report (p. 206). Hangzhou, China. /*ref*/Honovich, J. (2016, Noviembre 22). Hikvision removed from US embassy Afghanistan. Recuperado de https://ipvm.com/reports/hik-removed-embassy /*ref*/Human Rights Watch. (2017, Octubre 22). China: Voice Biometric Collection Threatens Privacy: Police, AI Giant Collaboration in Legal Gray Area Show More Services. Recuperado de https://www.hrw.org/news/2017/10/22/china-voice-biometric-collection-threatens-privacy /*ref*/Kessler, G. (2013). Algunas hipótesis sobre la extensión del sentimiento de inseguridad en América Latina. Cuadernos de Antropología Social, 37, 25–42. /*ref*/Knowles, G. (2016, Octubre 1). Inside China's Big Brother HQ: Its cameras monitor millions of Britons. Now undercover MoS reporters infiltrate the nerve centre of a CCTV giant that spies on its own people to root out dissidents. Recuperado de http://www.dailymail.co.uk/news/article-3817204/Inside-China-s-Big-Brother-HQ-cameras-monitor-millions-Britons-undercover-MoS-reporters-infiltrate-nerve-centre-CCTV-giant-spies-people-root-dissidents.html /*ref*/Kofman, A. (2016a, Octubre 13). LOSING FACE How a Facial Recognition Mismatch Can Ruin Your Life. Recuperado de https://theintercept.com/2016/10/13/how-a-facial-recognition-mismatch-can-ruin-your-life/ /*ref*/Kofman, A. (2016b, Octubre 18). Study: Face recognition systems threaten the privacy of millions. Recuperado de https://theintercept.com/2016/10/18/study-lack-of-face-recognition-oversight-threatens-privacy-of-millions/ /*ref*/Kruck, A. (2014). Theorising the use of private military and security companies: a synthetic perspective. Journal of International Relations and Development, 17(1), 112–141. https://doi.org/10.1057/jird.2013.4 /*ref*/Mayer, M., Carpes, M., & Knoblich, R. (Eds.). (2014). The global politics of science and technology: an introduction. En The global politics of science and technology. (Vol. 1, pp. 1–35). Berlin, Germany: Springer-Verlag. https://doi.org/10.1007/978-3-642-55007-2_1 /*ref*/Mayer-Schönberger, V., & Cukier, K. (2013). Big data. A revolution that will transform how we live, work and think. New York, USA: Houghton Mifflin Hartcourt Publishing Company. /*ref*/Morozov, E. (2011). The dark side of internet freedom. The net delusion. New York: Public Affairs. /*ref*/PROSEGUR. (2015). Informe Anual (p. 391). Madrid, Espa-a. /*ref*/Risse, T. (2011). Governance without a state?: policies and politics in areas of limited statehood. New York, USA: Columbia University Press. /*ref*/Sanger, D. E., & Perlroth, N. (2016, Octubre 22). A New Era of Internet Attacks Powered by Everyday Devices. Recuperado de https://www.nytimes.com/2016/10/23/us/politics/a-new-era-of-internet-attacks-powered-by-everyday-devices.html?_r=0 /*ref*/SECURITAS. (2015). Annual Report (p. 128). Stockholm, Sweden. /*ref*/Taureck, R. (2006). Securitisation theory and securitisation studies. Journal of International Relations and Development, 9(1), 53–61. https://doi.org/10.1057/palgrave.jird.1800072 /*ref*/Van Steden, R., & de Waard, J. (2013). "Acting like chameleons": On the McDonaldization of private security. Security Journal, 26(3), 294–309. https://doi.org/10.1057/sj.2013.18 /*ref*/Waever, O. (1995). Securitization and Desecuritization. In On Security (pp. 46–86). New York, USA: Columbia University Press. /*ref*/White, A. (2011). The new political economy of private security. Theoretical Criminology, 16(1), 85–101. https://doi.org/10.1177/1362480611410903 /*ref*/Zedner, L. (2006). Liquid security: managing the market for crime control. Criminology & Criminal Justice, 6(3), 267–288. https://doi.org/10.1177/1748895806065530 Derechos de autor 2018 Revista Relaciones Internacionales, Estrategia y Seguridad https://creativecommons.org/licenses/by-nc-nd/4.0 application/pdf application/xml application/vnd.openxmlformats-officedocument.wordprocessingml.document Universidad Militar Nueva Granada Revista Relaciones Internacionales, Estrategia y Seguridad; Vol 13 No 2 (2018): REVISTA DE RELACIONES INTERNACIONALES, ESTRATEGIA Y SEGURIDAD; 247-272 Revista Relaciones Internacionales, Estrategia y Seguridad; Vol. 13 Núm. 2 (2018): REVISTA DE RELACIONES INTERNACIONALES, ESTRATEGIA Y SEGURIDAD; 247-272 1909-7743 1909-3063
score 12,131701