• Nathaniel O’Grady


Pursued in part through an anecdotal story of my time with an FDNY firefighter, the book starts with a review of literature on risk and a thorough conceptualisation of the book’s central concept: lived relations to risk. The chapter then moves to situate fire governance in its contemporary moment through elaborating on the transformations that digital technologies and the broader security context have affected upon it. A more detailed account of the actual case researched and the methods used then follows. Here, the chapter describes in depth the UK Fire and Rescue Service (FRS), the digital infrastructure upon which it relies and the use of ethnography, interviews and textual analysis to explore this infrastructure. The chapter concludes with an outline of chapters to come.


  1. Adey, P., & Anderson, B. (2011). Event and Anticipation: UK Civil Contingencies and the Space-Times of Decision. Environment and Planning A, 43, 2878–2899.CrossRefGoogle Scholar
  2. Adey, P., & Anderson, B. (2012). Governing Events and Life: Emergency in UK Civil Contingencies. Political Geography, 31, 24–33.CrossRefGoogle Scholar
  3. Amoore, L. (2006). Biometric Borders: Governing Mobilities in the War on Terror. Political Geography, 25(3), 336–351.CrossRefGoogle Scholar
  4. Amoore, L. (2013). The Politics of Possibility: Risk and Security Beyond Probability. Durham: Duke University Press.CrossRefGoogle Scholar
  5. Amoore, L., & de Goede, M. (Eds.). (2008). Risk and the War on Terror. Oxon: Routledge.Google Scholar
  6. Anderson, B. (2010). Preemption, Precaution, Preparedness: Anticipatory Action and Future Geographies. Progress in Human Geography, 34, 777–798.CrossRefGoogle Scholar
  7. Aradau, C., & Blanke, T. (2015). The (Big) Data-Security Assemblage: Knowledge and Critique. Big Data & Society, 2(2), 1–12.CrossRefGoogle Scholar
  8. Aradau, C., & Van Munster, R. (2011). Politics of Catastrophe: Genealogies of the Unknown. London: Routledge.Google Scholar
  9. Ash, J. (2015). The Interface Envelope: Gaming, Technology, Power. London: Bloomsbury.Google Scholar
  10. Barad, K. (2003). Posthumanist Performativity: Toward an Understanding of How Matter Comes to Matter. Signs: Journal of Women in Culture and Society, 28(3), 801–831.CrossRefGoogle Scholar
  11. Bellanova, R. (2017). Digital, Politics, and Algorithms: Governing Digital Data Through the Lens of Data Protection. European Journal of Social Theory, 20(3), 329–347.CrossRefGoogle Scholar
  12. Bickerstaff, K., & Simmons, P. (2009). Absencing/Presencing Risk: Rethinking Proximity and the Experience of Living with Major Technological Hazards. Geoforum, 40(5), 864–872.CrossRefGoogle Scholar
  13. Brassett, J., & Vaughan-Williams, N. (2015). Security and the Performative Politics of Resilience: Critical Infrastructure Protection and Humanitarian Emergency Preparedness. Security Dialogue, 46(1), 32–50.CrossRefGoogle Scholar
  14. Chandler, D. (2014). Resilience: The Governance of Complexity. London: Routledge.Google Scholar
  15. Coaffee, J. (2013). Terrorism, Risk and the Global City: Towards Urban Resilience. London: Routledge.Google Scholar
  16. Collier, S. J., & Lakoff, A. (2008). Distributed Preparedness: The Spatial Logic of Security in the United States. Environment and Planning D: Society and Space, 26, 7–28.CrossRefGoogle Scholar
  17. Cooper, M. (2006). Pre-empting Emergence: The Biological Turn in the War on Terror. Theory, Culture & Society, 23(4), 113–135.CrossRefGoogle Scholar
  18. Cowen, D. (2014). The Deadly Life of Logistics: Mapping Violence in Global Trade. Minnesota: Minnesota Press.CrossRefGoogle Scholar
  19. Department of Local Communities and Government. (2003). Our Fire and Rescue Service.Google Scholar
  20. Deleuze, G. (1991). Bergsonism. London: Zone Books.Google Scholar
  21. Deleuze, G. (1994). Difference and Repetition. New York: Columbia University Press.Google Scholar
  22. de Goede, M. (2012). Speculative Security: The Politics of Pursuing Terrorist Monies. London: University of Minnesota Press.CrossRefGoogle Scholar
  23. Dunn Cavelty, M. (2013). From Cyber-Bombs to Political Fallout: Threat Representations with an Impact in the Cyber-Security Discourse. International Studies Review, 15(1), 105–122.CrossRefGoogle Scholar
  24. Evans, B., & Reid, J. (2014). Resilient Life: The Art of Living Dangerously. London: Wiley.Google Scholar
  25. Foucault, M. (1984). Polemics, Problematizations and Politics. In P. Rabinow (Ed.), Michel Foucault: Ethics, Subjectivity and Truth. London: Penguin.Google Scholar
  26. Foucault, M. (1991). Nietzsche, Genealogy and History. In P. Rabinow (Ed.), The Foucault Reader. Harmondsworth: Penguin.Google Scholar
  27. Galloway, A. (2012). The Interface Effect. London: Polity Press.Google Scholar
  28. Grove, K. (2012). Preempting the Next Disaster: Catastrophe Insurance and the Financialization of Disaster Management. Security Dialogue, 43(2), 139–155.CrossRefGoogle Scholar
  29. Grove, K. (2014). Agency, Affect, and the Immunological Politics of Disaster Resilience. Environment and Planning D: Society and Space, 32(2), 240–256.CrossRefGoogle Scholar
  30. Hookway, B. (2014). Interface. Cambridge: MIT Press.Google Scholar
  31. Kitchin, R., & Dodge, M. (2011). Code/Space: Software and Everyday Life. Cambridge: MIT Press.CrossRefGoogle Scholar
  32. Law, J. (2002). Aircraft Stories: Decentering the Object in Technoscience. Durham: Duke University Press.CrossRefGoogle Scholar
  33. Leese, M. (2014). The New Profiling: Algorithms, Black Boxes, and the Failure of Anti-Discriminatory Safeguards in the European Union. Security Dialogue, 45(5), 494–511.CrossRefGoogle Scholar
  34. Lupton, D. (Ed.). (1999). Risk and Sociocultural Theory: New Directions and Perspectives. Cambridge: Cambridge University Press.Google Scholar
  35. Massumi, B. (2007). Potential Politics and the Primacy of Preemption. Theory and Event, 10(2).Google Scholar
  36. Massumi, B. (2011). Semblance and Event: Activist Philosophy and the Occurrent Arts. Cambridge: MIT Press.Google Scholar
  37. Negri, A. (2013). Spinoza for Our Time: Politics and Postmodernity. New York: Columbia University Press.Google Scholar
  38. November, V. (2008). The Spatiality of Risk. Environment and Planning A, 40(7), 1523–1527.CrossRefGoogle Scholar
  39. O’Grady, N. (2017). Mobility, Circulation and Homeomorphism: Data Becoming Risk Information. In M. Leese & S. Wittendorp (Eds.), Mobility/Security: Politics of Movement. Manchester: University of Manchester Press.Google Scholar
  40. Salter, M. (2013). To Make Move and Let Stop: Mobility and the Assemblage of Circulation. Mobilities, 8(1), 7–19.CrossRefGoogle Scholar
  41. Simon, S., & de Goede, M. (2015). Cybersecurity, Bureaucratic Vitalism and European Emergency. Theory, Culture & Society, 32(2), 79–106.CrossRefGoogle Scholar
  42. Starosielski, N. (2015). The Undersea Network. Durham: Duke University Press.CrossRefGoogle Scholar
  43. Thrift, N. (2006). Re-inventing Invention: New Tendencies in Capitalist Commodification. Economy and Society, 35(2), 279–306.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  • Nathaniel O’Grady
    • 1
  1. 1.Geography and Environmental ManagementUniversity of the West of EnglandBristolUK

Personalised recommendations