Skip to main content

Research Repository

Advanced Search

Outputs (4)

Sensing, territory, population: Computation, embodied sensors, and hamlet control in the Vietnam War (2019)
Journal Article
Belcher, O. (2019). Sensing, territory, population: Computation, embodied sensors, and hamlet control in the Vietnam War. Security Dialogue, 50(5), 416-436. https://doi.org/10.1177/0967010619862447

This article analyses a mid-20th century computerized pacification reporting system, the Hamlet Evaluation System (HES), used by the US military to measure hamlet-level security and development trends in the Vietnam War. The significance of the HES w... Read More about Sensing, territory, population: Computation, embodied sensors, and hamlet control in the Vietnam War.

Hidden carbon costs of the “everywhere war”: Logistics, geopolitical ecology, and the carbon boot‐print of the US military (2019)
Journal Article
Belcher, O., Bigger, P., Neimark, B., & Kennelly, C. (2020). Hidden carbon costs of the “everywhere war”: Logistics, geopolitical ecology, and the carbon boot‐print of the US military. Transactions of the Institute of British Geographers, 45(1), 65-80. https://doi.org/10.1111/tran.12319

This paper examines the US military's impact on climate by analysing the geopolitical ecology of its global logistical supply chains. Our geopolitical ecology framework interrogates the material‐ecological metabolic flows (hydrocarbon‐based fuels, wa... Read More about Hidden carbon costs of the “everywhere war”: Logistics, geopolitical ecology, and the carbon boot‐print of the US military.

The Problem of Access: Site Visits, Selective Disclosure, and Freedom of Information in Qualitative Security Research (2019)
Book Chapter
Belcher, O., & Martin, L. (2019). The Problem of Access: Site Visits, Selective Disclosure, and Freedom of Information in Qualitative Security Research. In M. de Goede, E. Bosma, & P. Pallister-Wilkins (Eds.), Secrecy and methods in critical security research (33-47). Routledge

This chapter addresses in relation to secrecy and methods is how to examine these “postsecret” places by using a wide range of data sources, some of which may be considered unorthodox by traditional social scientific standards. It offers some guideli... Read More about The Problem of Access: Site Visits, Selective Disclosure, and Freedom of Information in Qualitative Security Research.