Query Result Set
Skip Navigation Links
   ActiveUsers:591Hits:19896626Skip Navigation Links
Show My Basket
Contact Us
IDSA Web Site
Ask Us
Today's News
HelpExpand Help
Advanced search

  Hide Options
Sort Order Items / Page
LIMITS OF VISIBILITY (1) answer(s).
 
SrlItem
1
ID:   121822


Engaging the limits of visibility: photography, security and surveillance / Andersen, Rune S; Moller, Frank   Journal Article
Moller, Frank Journal Article
0 Rating(s) & 0 Review(s)
Publication 2013.
Summary/Abstract In this article, we introduce selected photographs in order to engage with their capability for questioning the representational codes dominant in the visualization of security policy and surveillance. We argue that the intangible, abstract workings of state power in connection with security, surveillance and current forms of warfare can aptly be represented and challenged by means of photography. By engaging the limits of visibility, the selected photographs explore the limits of photojournalism and security alike. First, they operate by making visible what is normally invisible, though they also blur the boundaries of the seen and the unseen. Second, they function outside the discursive-representational regime within which photojournalism, based on a powerful tradition, operates, and within which media and security professionals visualize security. By so doing, they avoid involuntary incorporation into and support of this very regime that simultaneously they help understand. Third, they visualize structures and institutions rather than people, thus avoiding ethical dilemmas in connection with representations of people in pain. Discussing selected photographs by Trevor Paglen and Simon Norfolk, we show what these photographs do to alter the discursive frame within which the politics of security is understood. Such alteration facilitates understanding of the extent to which current societies are penetrated by the ideas and practices of security and surveillance, and furthers investigation of the discursive structures that enable such penetration.
Key Words Security  Surveillance  Photography  Limits of Visibility 
        Export Export