In this hybrid workshop, FOLLOW researchers Tasniem Anwar and Marieke de Goede were joined by external experts to discuss the new research avenues to study the intersection of law and security practices. In 3 panels, they examined how the methodologies and conceptual approaches from Science-and-Technology Studies (STS) have pushed the interdisciplinary conversations between legal and security studies. In particular, the workshop investigated the new inquiries and methodological approaches that are made possible by deploying an STS approach to law and security, as well as the associated challenges. Through the extensive discussion, we explore how these interdisciplinary debates can help us to think differently about equality, justice and protection.
This hybrid workshop provides a space to explore emerging conceptual and methodological approaches to the interdisciplinary study of anti-money laundering and counter-terrorism financing regulation in the art market. In two panels, FOLLOW-members Marieke de Goede, Tasniem Anwar, Pieter Lagerwaard and Esmé Bosma are joined by Donna Yates and Christoph Rausch from Maastricht University, Saskia Hufnagel from Queen Mary University of London, and Olav Velthuis and Maja Dehouck from University of Amsterdam. The presentations are intended to foster a debate about how best to open up this emerging field conceptually. Speakers from various disciplinary backgrounds are also invited to share their relevant experiences of conducting research into and dealing with the challenges of secrecy and access.
This workshop is organised by PI of Project FOLLOW Marieke de Goede and Maja Dehouck from Project CRAAFT (Collaboration, Research & Analysis Against the Financing of Terrorism), in collaboration with Christoph Rausch and Donna Yates from MACCH (Maastricht Centre for Arts and Culture, Conservation and Heritage) at Maastricht University.
In this workshop, FOLLOW researchers came together with external experts to present and discuss findings from the FOLLOW research agenda. Empirical findings were presented and conceptual ideas were discussed to test them on an external audience and to carve out ideas for future research agendas. The meeting also addressed ethical questions around publication and research data management.
FOLLOW member Tasniem Anwar hosts Tamara Buruma and Rebecca Mignot-Mahdavi to discuss the complexity of prosecuting terrorism financing. Two decades into the War on Terror, EU member states are under pressure to realize criminal investigations and court convictions for the financing of terrorism. New EU anti-money laundering and counter-terrorism financing Directives oblige countries to convict material support for terrorist groups and individuals. However, prosecutions and trials of terrorism financing are complex and bring up fundamental questions of law in a democratic society. This webinar asks how lawyers, prosecutors and judges argue that a financial transaction is a form of terrorism financing and illustrate the social and political consequences of these court cases.
This webinar is the final event in the series ‘Money as Security Data: Surveillance, Intelligence, Evidence’. The series explores ways in which ‘money’ has become security data in the practices of counter-terrorism financing. We show, discuss and critique the digital cultures of financial surveillance and ways in which mundane financial transactions are analysed, identified, and shared. We discuss how mundane transactions data become understood as ‘intelligence’ that is shared internationally in the context of investigations. We explore how transaction data have the capacity to function as ‘evidence’ before a court of law.
FOLLOW members Pieter Lagerwaard and Rocco Bellanova host Foivi Mouzakiti and Anthony Amicelle to discuss how Financial Intelligence Units (FIUs) coordinate their operations across distance and difference. FIUs play a pivotal role in financial surveillance. They receive transaction information from commercial actors, mediate this into intelligence, and disseminate it to other security actors. FIUs need to cooperate to follow money trails across borders. However, in practice, they are considerably different organizations adapted to their national environments. This webinar asks how FIUs negate their differences, coordinate their activities, and exchange financial intelligence across the globe.
This webinar is the second webinar of the series ‘Money as Security Data: Surveillance, Intelligence, Evidence’. The series explores ways in which ‘money’ has become security data in the practices of counter-terrorism financing. We show, discuss and critique the digital cultures of financial surveillance and ways in which mundane financial transactions are analysed, identified, and shared. We discuss how mundane transactions data become understood as ‘intelligence’ that is shared internationally in the context of investigations. We explore how transaction data have the capacity to function as ‘evidence’ before a court of law.
In Amsterdam’s Hortus Botanicus, FOLLOW team members discussed their latest research projects while exploring one of the oldest botanical gardens in the world. Participants were Marieke de Goede, Esmé Bosma, Tasniem Anwar, Pieter Lagerwaard, Anneroos Planqué-van Hardeveld, Maja Dehouck and Asma Balfaqih.
FOLLOW members Esmé Bosma and Carola Westermeier host Vanessa Iofalla and Malcolm Campbell-Verduyn to discuss how banks experiment with digital technologies to detect suspicious transactions. Banks are legally obliged to conduct customer research, monitor transactions and to report transactions that are possibly related to money laundering or terrorist financing to the authorities. Because of the millions of transactions that flow daily through their databases, banks are reliant on digital technologies that filter and monitor their customers. This webinar explores how financial surveillance is characterised by processes of continuous experimentation.
This webinar is the first webinar of the series ‘Money as Security Data: Surveillance, Intelligence, Evidence’. The series explores ways in which ‘money’ has become security data in the practices of counter-terrorism financing. We show, discuss and critique the digital cultures of financial surveillance and ways in which mundane financial transactions are analysed, identified, and shared. We discuss how mundane transactions data become understood as ‘intelligence’ that is shared internationally in the context of investigations. We explore how transaction data have the capacity to function as ‘evidence’ before a court of law.
FOLLOW team members convened to discuss publication ethics and fieldwork during the pandemic in terms of challenges as well as opportunities.
On the 6th of February 2020, Marieke de Goede, Esmé Bosma and Polly Pallister-Wilkins launch their edited volume ‘Secrecy and Methods in Security Research’ in Spui 25. The book launch is part of is part of the INTERSECT workshop ‘The Future of EU Security: issues, concepts and approaches’ that will take place on the 7th of February.
What are the challenges when doing research in secretive places, like security institutions, detention centers, and digital spaces? How can students and researchers deal with those challenges? The meeting stages a discussion between some of the book’s chapter authors. Amsterdam-based artist Adzer van der Molen, who painted the cover image, will reflect on the challenge of visualizing places of violence.
The third and final INTERSECT workshop will address the topic The Future of EU Security: issues, concepts and approaches. The event will be held at the University of Amsterdam in 6-7 February 2020. The workshop will be organised in cooperation with the FOLLOW project and its main objective is to advance on a future research agenda for EU security that will unfold within the triangle of INTERSECT, i.e. within the mutual influences between technology developments, security practices, and societal change. The secondary objective is to foster dialogue between researchers, practitioners, students, and the general public.