From flows towards updates: Security regimes and changing technologies for financial surveillance

نویسندگان

چکیده

Abstract ‘Follow the money’ is currently central principle of international financial security, although money itself probably one most unlikely objects to make traceable. Two recent scandals around a security unit and payment processor Wirecard show how existing systems surveillance that seek capture ‘flows’ for purposes are either enabled or frustrated. While this current regime adheres demanding free flow through infrastructures various actors intermediaries, new digital currencies build on set type ledger(s) in which stored as data. Hence, what we understand does not ‘flow’, but rather updated. This change underlying infrastructure means traceability need be enacted; it an intrinsic feature currencies. With bank (CBDC), thus changes from monitoring flows flagging (potentially) illicit transactions towards storage data (de)centralised ledgers. form transactional governance engendered by shifting geopolitical agendas increasingly rely fractured instead globalised infrastructures, making CBDCs themselves subject efforts.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

OPUS: Online Patches and Updates for Security

We present OPUS, a tool for dynamic software patching capable of applying fixes to a C program at runtime. OPUS’s primary goal is to enable application of security patches to interactive applications that are a frequent target of security exploits. By restricting the type of patches admitted by our system, we are able to significantly reduce any additional burden on the programmer beyond what w...

متن کامل

Surveillance Or Security? The Risks Posed by New Wiretapping Technologies

The United States has moved large portions of business and commerce, including the control of critical infrastructure, onto IP-based networks. This reliance on information systems leaves the U.S. highly exposed and vulnerable to cyberattack. Yet despite this, U.S. law enforcement and national security policy remain firmly focused on building wiretapping systems within communications infrastruct...

متن کامل

Metastable Regimes for multiplexed TCP flows

Consider the mean field limit of a model for multiple HTTP sources multiplexed through a drop-tail router. The limit may exhibit two stationary regimes. In the fluid regime the flows are independent, there are no packet losses and the average throughput is high. In the turbulent regime the flows are synchronized, there are periodic congestion epochs with packet losses and the average throughput...

متن کامل

Technologies of Suspicion: Coercion and Compassion in Post-disciplinary Surveillance Regimes

Drug-use surveillance systems appear in this paper as symptomatic “technologies of suspicion” that constitute a set of empirical modes for producing and interpreting “data” or test results in ways that conflate prediction with prescription, acting as technological forms of supervision, monitoring, supposed deterrence, and ultimately control. Technologies of suspicion are predicated upon a frame...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Review of International Studies

سال: 2022

ISSN: ['0260-2105', '1469-9044']

DOI: https://doi.org/10.1017/s0260210522000493