From flows towards updates: Security regimes and changing technologies for financial surveillance
نویسندگان
چکیده
Abstract ‘Follow the money’ is currently central principle of international financial security, although money itself probably one most unlikely objects to make traceable. Two recent scandals around a security unit and payment processor Wirecard show how existing systems surveillance that seek capture ‘flows’ for purposes are either enabled or frustrated. While this current regime adheres demanding free flow through infrastructures various actors intermediaries, new digital currencies build on set type ledger(s) in which stored as data. Hence, what we understand does not ‘flow’, but rather updated. This change underlying infrastructure means traceability need be enacted; it an intrinsic feature currencies. With bank (CBDC), thus changes from monitoring flows flagging (potentially) illicit transactions towards storage data (de)centralised ledgers. form transactional governance engendered by shifting geopolitical agendas increasingly rely fractured instead globalised infrastructures, making CBDCs themselves subject efforts.
منابع مشابه
OPUS: Online Patches and Updates for Security
We present OPUS, a tool for dynamic software patching capable of applying fixes to a C program at runtime. OPUS’s primary goal is to enable application of security patches to interactive applications that are a frequent target of security exploits. By restricting the type of patches admitted by our system, we are able to significantly reduce any additional burden on the programmer beyond what w...
متن کاملSurveillance Or Security? The Risks Posed by New Wiretapping Technologies
The United States has moved large portions of business and commerce, including the control of critical infrastructure, onto IP-based networks. This reliance on information systems leaves the U.S. highly exposed and vulnerable to cyberattack. Yet despite this, U.S. law enforcement and national security policy remain firmly focused on building wiretapping systems within communications infrastruct...
متن کاملMetastable Regimes for multiplexed TCP flows
Consider the mean field limit of a model for multiple HTTP sources multiplexed through a drop-tail router. The limit may exhibit two stationary regimes. In the fluid regime the flows are independent, there are no packet losses and the average throughput is high. In the turbulent regime the flows are synchronized, there are periodic congestion epochs with packet losses and the average throughput...
متن کاملTechnologies of Suspicion: Coercion and Compassion in Post-disciplinary Surveillance Regimes
Drug-use surveillance systems appear in this paper as symptomatic “technologies of suspicion” that constitute a set of empirical modes for producing and interpreting “data” or test results in ways that conflate prediction with prescription, acting as technological forms of supervision, monitoring, supposed deterrence, and ultimately control. Technologies of suspicion are predicated upon a frame...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Review of International Studies
سال: 2022
ISSN: ['0260-2105', '1469-9044']
DOI: https://doi.org/10.1017/s0260210522000493