O'Reilly logo

Emerging Trends in ICT Security by Hamid R. Arabnia, Babak Akhgar

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 32

Surveillance without Borders

The Case of Karen Refugees in Sheffield

Geff Green and Eleanor Lockley,    Sheffield Hallam University, Sheffield, UK

This chapter presents a case study of the Sheffield Karen community’s experience of surveillance and cyber conflict. It outlines how “local” conflicts can be manifested at great distances, targeting social media and phone hacking. In this case, a local conflict originated in a completely different locality. It also moved into a virtual world, one characterized by an “inverse reach,” allowing the oppressors to reach out and touch the oppressed by appropriating their channels of communication and using information gained though surveillance to attack them in specific ways that referenced aspects ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required