Going Stealth 副本
Going Stealth 副本
Going Stealth 副本
- . . T
V
1 ● ' e
Going Stealth
Going Stealth
TOBY BEAUCHAMP
Acknowledgments vii
Notes 141
Bibliography 173
Index 185
A C K N O W L E D G M E N T S
IHAVE MANY TO THANK for the care and feeding of this book, and my per¬
son, over the long period of its development. In its earliest incarnation as a
dissertation, this project found guidance in an ideal constellation of faculty
mentors. Then as now, Caren Kaplan’s enthusiasm, insightful critiques, and
commitment to ethical, collaborative research profoundly inform my work
as scholar and teacher. Istrive always to emulate and pay forward the bal¬
ance of generosity and rigor that she models. Gayatri Gopinath provided
steadfast mentorship during grad school and beyond, and she offered crucial
support during the challenging period when Iwas grasping for the early ker¬
nels of this project. Colin Milburn was an utterly dependable source of cheer
and encouragement and agenerous reader whose observations unfailingly
pushed me to think in new ways.
Among the many other supportive faculty members Ifirst met at UC
Davis, Ithank Kathleen Frederickson, Beth Freeman, Cathy Kudlick, Juana
Maria Rodriguez, Eric Smoodin, and Julie Wyman. It was my incredible
good fortune to be part of the Graduate Group in Cultural Studies at UC
Davis, which taught me the lasting value of truly collaborative work. Among
my fellow Cult Studs, Iam especially grateful to Santiago Castellanos, Mari-
sol Cortez, Sandy Gomez, Cathy Hannabach, Valerie Kim-Thuy Larsen,
Sarah McCullough, Christina Owens, Terry Park, and Magali Rabasa; and
to Davis grads from other departments, including Clara V. Z. Boyle, Ryder
Diaz, Ryan Fong, Carmen Fortes, Matt Franks, Catherine Fung, and Van¬
essa Rapatz. At the UC Davis LGBT Resource Center, Iparticularly thank
Sheri Atkinson and remember Angelina Malfitano with atang-y apprecia¬
tion. My work with Queers for Public Education—and related collective
endeavors oriented toward the public good—indelibly shaped my political
sensibilities.
The UC President’s Postdoctoral Fellowship Program provided crucial
material and intellectual support as Ibegan the long task of turning adisser¬
tation into abook. Iwill always feel lucky to have spent those postdoctoral
years at UC San Diego with exceptionally generous colleagues including Lisa
Cartwright, Kirstie Dorr, Fatima El-Tayeb, Kelly Gates, Nitin Govil, Todd
Fdenry, Sara Clarke Kaplan, Roshy Kheshri, David Serlin, Nayan Shah, and
Kalindi Vora. Iam grateful to Ari Ideinrich for reading drafts and for shar¬
ing so much through written words. Many of the first revisions were accom¬
plished during writing dates at Twiggs coffeehouse with Lauren Berliner,
whose good humor and encouragement kept me going. Patrick Anderson
provided many meaningful points of connection in both scholarship and
friendship, and he remains acontinual source of warmth.
Ithank my colleagues in the English department and Gender and Wom¬
en’s Studies program at Oklahoma State University, particularly the junior
faculty writing group: Kate Hallemeier, Jeff Menne, Seth Perlow, and Graig
Uhlin. Many other people Imet through OSU provided important support
and friendship, including Irene Backus, Lu Bailey, Caetlin Benson-Allot,
Jennifer Borland, Ron Brooks, Jonathan Gaboury, Cristina Gonzalez, Car¬
rie Kim, Jen Macken, Shaila Mehra, Carol Moder, Charissa Prchal, Louise
Siddons, Scott St. Pierre, and Stacy Takacs. One of Oklahoma’s greatest gifts
to me is afriendship with Angie Piehl, whose thoughtfulness, wit, and queer
camaraderie continue to delight.
It has been ajoy to work alongside my brilliant, funny, indefatigable col¬
leagues in the Department of Gender and Women’s Studies at the Univer¬
sity of Illinois at Urbana-Champaign, including Teresa Barnes, Jodi Byrd,
C. L. Cole, Samantha Frost, Pat Gill, Maryam Kashani, and Vicki Ma-
haffey. Thanks to the Hip Hop and Punk Feminisms crew—Ruth Nicole
Brown, Karen Flynn, Fiona Ngo, and Mimi Thi Nguyen—for so imme¬
diately welcoming me into the fold. Chantal Nadeau and Stephanie Foote
provided much-needed mentoring during their respective tenures as depart¬
ment chair. Iam continually grateful for Siobhan Somerville’s steadfast
support and warm presence, and her writing has long been amodel for my
own. Though it will sound hyperbolic, it is simply factual that Mimi Thi
Nguyen’s generosity is unmatched; for reading draffs, for calming nerves,
for neighborly care, and for showing me chat it is indeed possible to be rad
and ethical every day, Ithank her in perpetuity. The dedicated adminis¬
trative staff at GWS, Jacque Kahn and Virginia Swisher, deserve my grati-
viii ACKNOWLEDGMENTS
tude always. Ihold sincere appreciation for my students, especially those in
my transgender studies and disability studies courses at UIUC, for creating
spaces of generosity and curiosity in which to think together. Many other
colleagues across campus have enriched my life and work at UIUC, including
Ben Bascom, Onni Gust, David Hays, Kathryn LaBarre, Mireya Loza, Mar¬
tin Manalansan, Jennifer Monson, Ghassan Moussawi, K. R. Roberto, San¬
dra Ruiz, Carol Tilley, and participants in the First Book Writing Group.
Jenny Davis and Laura Davies Brenier arrived at Illinois just when Idid, and
Iam lucky to know their capacity for kindness and to benefit from their ex¬
cellent senses of humor. Silas Cassinelli’s good company and compassion as
awriting buddy eased the revision process on many occasions. Iam graceful
CO Deke Weaver for his gentle friendship and for inviting me into the weird
and beautiful worlds he creates, and to Jennifer Allen for her own energy
and for her care of mine. Naomi Paik is arighteous force of nature with an
enormous heart; she brings good food and good humor into our home each
week, and her straightforward pep calks make all things possible.
Colleagues elsewhere have shared with me their valuable time, advice,
and many small kindnesses along the way. Any list will surely be incom¬
plete, but Iwish to especially thank Aren Aizura, Simone Browne, Mel
Chen, Deborah Cohler, Deb Cowen, Lezlie Frye, Inderpal Grewal, Chris¬
tina Hanhardt, Ronak Kapadia, Greta LaFleur, Eithne Luibheid, Minda
Martin, Carol Mason, Robert McRuer, Nick Mitchell, Sima Shakhsari,
and Susan Stryker. Jennifer Terry opened new ways of thinking for me at
acritical early stage. Erica Rand has been awilling reader and enthusiastic
collaborator, as well as friend. Dean Spade gave generously of his time to read
and reread drafts and to offer generative questions and insights. Comrades in
the Writing Every Day group freely dispensed optimism and unconditional
encouragement. For their help in researching public accommodations policy
for chapter 3, Ithank Paisley Currah, Lisa Mottet, Alex Sheldon and the
Movement Advancement Project, and the Champaign Public Library. Iam
graceful beyond measure to those who invited me to present portions of the
book in progress, particularly to thoughtful audiences at UC Santa Barbara,
CSU Fullerton, Rutgers University, Sonoma State University, University of
Kentucky, University of Pittsburgh, and Illinois State University.
Ken Wissoker’s steadfast commitment to this project, and to guiding me
through the publishing process with minimal anxiety, made him truly agift
of an editor. Among the many other people at Duke University Press who
ACKNOWLEDGMENTS ix
made this book possible, Iam especially grateful to Oliva Polk for patiently
answering the endless questions of afirst-time author, and to Mary Hoch,
Jade Brooks, and Susan Albury. Anitra Grisales helped me articulate the
goals of this work in its earliest stages. Ithank wholeheartedly the anon¬
ymous reviewers at Duke and at NYU Press for the time they invested to
provide exceptionally thorough, generative, and encouraging criticism; this
book and my brain are all the better for it.
An incredible network of people gave personal support to me over the
long course of this book’s development, and here too, no list could encom¬
pass all who have done so. Across many different forms of relationship and
types of care, Iparticularly thank Nimmy Abiaka, Keight Bergmann, Laura
Fisher, Yumi Lee, Lauren Jade Martin, Bob Meyers, Joan Meyers, Eli Og-
burn, Ali Qadeer, Jane Reid, and Jen Walter-Ballantyne. Yasmine Orangi is
abright source of reassurance and solidarity for whom Iam truly grateful.
Iam thankful for the time Iwas given with Bryn Kelly and Elissa Nelson.
Several nonhuman animals contributed snuggles and companionship: Ol¬
ive, Pirn, and Pepper, and the still much-missed Frieda and Skye. For their
deep kindness and generosity Ithank the extended Degnan family, suppor¬
tive throughout. Iam also grateful to aset of people who are not only those
most readily marked as family, but who have deliberately remained so in
their caring relationships with me: my mother, Terry Beauchamp, who can
at long last add this book to her treasured collection; Paula Mekdeci, Ben
Coppel, and Emily Coppel; my remarkable sister Lauren Marlowe, Jordan
Marlowe, and my imaginative, effervescent niblings, Emma Jane Marlowe
and Eogan Marlowe; and my Nana, Betty Scott, whose love and support I
will carry with me always.
The friendships Icultivated in graduate school remain some of my most
meaningful and trusted, providing intellectual, political, and emotional sus¬
tenance across this project’s life span and beyond. More than once, Tallie
Ben Daniel’s encouragement and compassion have been abalm for the com¬
plicated feelings that this research provoked in me. Abbie Boggs is amodel
for the pursuit of critical, responsible engagement with the university and as
such has provided genuinely constructive feedback at many stages; Iwould
be remiss to not also thank her for supplying cocktails in both good times
and bad. As colleague, collaborator, and friend, Benjamin D’Ffarlingue has
quite literally been on this scholarly endeavor with me from day one; Iam
inspired by his political and intellectual commitment, and can only hope
X A C K N O W L E D G M E N T S
this book does the unit proud. Tristan Josephson, stalwart companion in
transgender studies, has helped me better understand the field and my place
in it. Liz Montegary is aconsummate reader of drafts, asource of thought¬
fulness and humor in equal measures, and the best storyteller Iknow. No
one has borne witness to this book’s rollercoaster of joys and frustrations
like Cynthia Degnan, who willingly joined me for the ride. She read every
word across the many drafts, endured my most anxious moments, shared
wholeheartedly in the unexpected delights of this research, challenged my
chinking, and ensured that Ihad access to good food and quiet spaces, even
when the latter meant my absence from her. Iam truly grateful for her hon¬
esty and boundless support, which each day help me take risks chat prove
transformative. There’s no one Iwould rather share atent with.
ACKNOWLEDGMENTS xi
I N T R O D U C T I O N
SUSPICIOUS VISIBILITY
ON APRIL 17, 2007, the day after the shootings at Virginia Tech, aparent
at Cranbrook Kingswood School near Detroit, Michigan, phoned police
to report seeing aman on campus wearing ablonde wig, high heels, and
lipstick. The private high school was placed in lockdown for more than an
hour while campus security and local police searched the grounds and each
room of the school, ultimately finding no one matching the description. A
spokesperson for the Department of Public Safety told reporters that the
parent who first saw the “suspicious” person “thought it was kind of strange,
so she called the police” and noted, “In the wake ofwhat happened yesterday
”1
in Virginia, it’s better to be safe than sorry.
Public discourse about the Cranbrook lockdown, limited mostly to lo¬
cal Michigan news outlets and some transgender blogs, typically conveyed
asense of regret that an individual had been unfairly targeted. But these
discussions also tended to rationalize the police response by positioning
the Virginia Tech shootings as an understandably and singularly anxious
moment for the entire United States. The reports suggest that given this
broader context, afigure that visually transgresses otherwise clear gender
norms justifies heightened scrutiny from both security personnel and the
general public. The hour-long lockdown and meticulous search of the cam¬
pus took place in the absence of any alleged criminal act. Even trespassing
was not an issue, since the school grounds are open to the public and con¬
nected to anumber of public tourist sites, including museums and nature
trails. Rather than suggesting that the lockdown could have been justified
as aresponse to aspecific crime such as trespassing, this additional infor¬
mation should clarify the extent to which suspicion attaches to particular
people: the lockdown occurted not in response to just any stranger on cam-
pus, but to avery particular person perceived as strange and threatening.
When asked if the person had done anything illegal, for example, one de¬
tective agreed with reporters that they had not, but added, “If you’re aman,
you don’t hang around aschool dressed as awoman.”^ The detective relies
on acommonsense understanding that gender nonconformity—here, aman
wearing clothingthat men ought not to wear—itself indicates the likelihood
of dangerous behavior, rationalizing both policing and panic by imagining
that agender-nonconforming individual fundamentally has something to
hide.^ This statement—and the surveillance practices mobilized through
its logic—helps construct the gender-nonconforming figure as an inherently
deceptive object of state and public scrutiny.
This book argues that surveillance is acentral practice through which
the category of transgender is produced, regulated, and contested. It works
against the idea that surveillance measures simply spring up in times of
crisis—such as after the Virginia Tech shootings or in the wake of 9/11—and
also against the notion that transgender people exist as areadily recognizable
population to be assessed by such measures. Instead, it aims to unravel these
assumptions, taking alonger view of surveillance and security to illustrate
how they produce the very categories and figures of gendered deviance that
they purport to simply identify. In examining arange of practices—both
formally undertaken by and spilling beyond U.S. state agencies, both ex¬
plicitly citing and never mentioning the term transgender—I consider here
how the category of transgender simultaneously coheres and further frac¬
tures through surveillance. Tracing the political and cultural histories of
seemingly new surveillance practices opens space for understanding gender
noncompliance through race, citizenship, sexuality, and disability; in this
way, the book pushes at the edges of the category of transgender and seeks
to expand the scope of transgender studies.
Although it made only afaint blip on the national radar and may seem
disconnected from what is generally considered post-9/11 surveillance, the
Cranbrook lockdown illustrates the central questions driving this book.
The case offers an opportunity to consider public and state scrutiny of
gender nonconformity in the broader context of historical anxieties about
gendered deception; forms of deviance read through race, citizenship, and
disability; and seemingly exceptional moments of national security crisis.
Cranbrook was not the only school to increase security and policing directly
after the Virginia Tech shootings; news outlets reported that schools in at
1 I N T R O D U C T I O N
least twenty-seven states had closed, canceled classes, or otherwise imple¬
mented new security measures in response to threats or perceived threats
during the week following the shootings. Cranbrook officials consistently
referenced the events at Virginia Tech when explaining their decision to
lock down their school. Transgender-related blogs and other media discuss¬
ing the lockdown generally tended to acknowledge this political context as
well, while still criticizing the fact that agender-nonconforming person was
singled out as dangerous based only on appearance. Agroup of concerned
Cranbrook community members created awebsite that specifically called
attention to the implications of the lockdown for transgender and queer
people connected to the school, and they too pointed out the air of tension
already present in the immediate aftermath of Virginia Tech.^
Using the shootings to contextualize the lockdown, news reports repeat¬
edly cited officials’ explanations that “it’s better to be safe than sorry,” de¬
spite the fact that at least one law enforcement officer admitted, “We’re not
even sure what gender the person is—it could be atall, muscular woman.”^
This statement serves as an important reminder that surveillance of gender
deviance is not limited to those who are transgender-identified, though it
may appear as most visible and overt when enacted against such individuals.
Although the officer’s admission suggests that atall, muscular woman is
more likely to be deemed innocent than aman dressed as awoman, neither
case negates school and law enforcement officials’ refrain of “better safe than
sorry.” The phrase depends on aconception of safety as something that re¬
quires losing—or willingly giving up—privacy. Surveillance studies scholar
Torin Monahan calls attention to this logic when he notes that questions of
surveillance are typically framed as trade-offs, such that more of one thing
(security) necessarily means less of another (privacy). Asking how much of
one we have to give up to get the other, Monahan argues, is the wrong ques¬
tion. He suggests instead that we pursue questions about how surveillance
practices organize our social lives and produce new, or reconsolidare exist¬
ing, power relations.*^ This reframing must also counter the persistent belief
that privacy is already distributed equally such that anyone might choose to
relinquish or retain it. As scholarship and activism in areas such as reproduc¬
tive justice and disability justice maintain, and as the chapters in this book
show, privacy is not adefault status but an exceptional one, granted largely
on the basis of wealth and racial privilege.^
Acase like the Cranbrook lockdown cannot be understood as an isolated
SUSPICIOUS VISIBILITY 3
incident, then, but rather as aconstellation of representations, policies, and
material practices entangled in broad historical and social contexts. As Inote
above, almost every media response to the Cranbrook lockdown explained it
as aresult of anxiety about Virginia Tech. But certainly other factors created
ageneral feeling of high alert, afeeling cultivated on anational scale and
intensifying over the previous several years. By April iooy, Congress had
not only passed but reauthorized the USA PATRIOT Act, the Department
of Homeland Security was well established, and the Guantanamo Bay deten¬
tion facility had been operating for five years. Furthermore, by the time the
Cranbrook parent phoned local police, authorities had already identified the
shooter at Virginia Tech as aSouth Korean immigrant who had been diag¬
nosed with mental illnesses. Although much public discourse framed Seting-
Hui Cho as shockingly exceptional, it also relied on an easy recognition
of the monstrous and dangerous figure regularly woven into antiterrorism
rhetoric, immigration debates, and medical classifications of abnormality.
The Virginia Tech case also rests on acomplex set of racialized gender
and sexual norms that contribute to both U.S. national identity and concep¬
tions of citizenship, which resonate in the Cranbrook lockdown. As Jigna
Desai and Amy Brandzel point out in their discussion of the Virginia Tech
shootings, within dominant frameworks, Asian American men are already
outside the boundaries of proper masculinity, “evoking the historical threat
of the ‘yellow peril’ ready to harm white femininity with contamination
and miscegenation by [their] uncontrolled nonnormative sexuality.”* They
explain that public discourse about Cho tended either to position him as
aviolent exception to the assimilated model minority (in contrast to the
expectation of terrorism commonly attached to South Asian and Arab im¬
migrant groups) or to fold him into abroad perception of all immigrants as
potential terrorists. In these ways, Cho readily appears as adangerous fig¬
ure, failing or refusing to adhere to the intertwining norms of race, gender,
sexuality, ability, and citizenship that mark out health and safety. Although
public narratives of the Virginia Tech shootings build on post-9/11 security
anxieties, they reverberate far more deeply, drawing on decades of Oriental¬
ist discourse and racialized gender relations. One prominent response to the
shootings, Desai and Brandzel note, was acall for increased state profiling
measures, not simply in routine policing practices, but specifically in the are¬
nas of mental health and immigration, aresponse that indicates how these
various narrative strands converge through surveillance.
4INTRODUCTION
The panic at Cranbrook was not produced merely through temporal
proximity to an individual violent event. In part, this is because even the
shootings at Virginia Tech—and subsequent interpretations of them—
cannot be isolated from the longer histories that inform them. Those histo¬
ries therefore also resonate in the Cranbrook lockdown, setting acontext in
which certain bodies or behaviors appear as strange and suspicious threats
even in the absence of any actual misconduct. Moreover, to explain the lock-
down as either about the tension produced by recent events or about apar¬
ticular individual turns attention away from the larger forces at work. Desai
and Brandzel point our that Cho’s case did not prompt prolonged public
discussion about what influenced his actions in the ways that young white
school shooters’ cases did, as with the many investigations into violent video
games and youth alienation that followed the shootings at Columbine High
School. They suggest that Virginia Tech did not draw this kind of investi¬
gation because delving into the broader racialized and gendered aspects of
Cho’s case “could force us to interrogate whiteness and the ways in which
U.S. citizenship continues to rely on Orientalist discourses.”^ Centraliz¬
ing the strange individual thus allows larger structures of power to escape
examination.
Working against this tendency, GoingStealth aims to turn back the scru¬
tinizing gaze of science, medicine, and law, attending not so much to the
gender-nonconforming figure that is positioned as dangerous as to the un¬
even relations of power that produce that figure and its accompanying threat.
It is tempting to read the Cranbrook lockdown as primarily about panic cre¬
ated by the Virginia Tech shootings, as local law enforcement describes it, or
as primarily about anti-transgender bias, as many transgender media outlets
see it. But this book argues that incidents like the lockdown can never be ex¬
plained simply as basic transphobia or as overzealous security. Instead, such
events should prompt critical analysis of the ways that gender deviance is
produced, coded, and monitored not only in these spectacular moments, but
also in the everyday. Likewise, the surveillance practices at work in this case
emerged not merely in direct response to the Virginia Tech shootings, but
through long histories of nationalist sentiments, racialization processes, and
medicolegal taxonomies of bodily difference. This book insists that the two
seemingly separate explanations for cases like Cranbrook—the particular
targeting of gender nonconformity as dangerous and the explicit increases
in security during times of perceived crisis—must be understood as ftinda-
SUSPICIOUS VISIBILITY 5
mentally entwined. Although one news outlet reported that the Cranbrook
school practices lockdowns twice ayear, community members noted that
the last real lockdown of the campus occurred in response to the events of
September ii, 2.001. That the sighting of “a man in adress” might prompt
the same security protocol as for the events that have come to define terror¬
ism in the U.S. speaks to some of the links between gender deviance, racial
anxieties, and national security that Iam concerned with here.
6 I N T R O D U C T I O N
lustrate the persistent relationship between the concept of national security
and state regulation of transgressive gender. Iask how such regulation might
be displaced onto gender-nonconforming subjects, thus appearing nonexis¬
tent or inapplicable to those perceived as (or those understanding themselves
as) normatively gendered. In this way, the book challenges the very category
of transgender and the scope of transgender studies, engaging the fact that
bodies, identities, and behaviors may be read as gender deviant in relation
to perceived or actual racial identity, religious affiliation, nationality and
citizenship status, class status, disability, or sexuality. Relatedly, Ianalyze
the ways that certain transgender-identified persons, able to comply with
dominant standards of appearance and behavior (themselves grounded in
ideals of whiteness, U.S. citizenship, able-bodiedness, and compulsory het¬
erosexuality), may be legible to surveillance mechanisms not as transgender
but as properly gendered and thus nonthreatening.
These inquiries create what Ihope is aproductive tension that runs
throughout the book: Iattend to the specific and ovett policing of trans¬
gender-identified subjects, yet am equally concerned with the ways that
such scrutiny works more pervasively, regulating gender in subtler ways and
positioning avariety of bodies, behaviors, and identities—not only those
explicitly identified as transgender—as gender-nonconforming. In doing
so, Ibuild on scholarship and activism that pushes the relatively new field
of transgender studies to expand its scope and vision. In his lengthy dis¬
cussion of the field’s formation, David Valentine suggests that in the most
basic sense, transgender studies has been constituted through “the idea that
there is alarge group of people who can be understood through the category
transgender.”*° Much work in transgender studies has been concerned with
documenting social histories that take transgender as afairly bounded and
preexisting category, aiming to uncover and report knowledge about the
people identified within that categoty. In many cases, this work has implic¬
itly taken white, class-privileged, U.S.-based transgender-identified people
as its subjects." Valentine notes that several scholars associated with the
field have expressed wariness about taking such aneatly contained category
for granted, and he writes that his own concern “is still that the increasing
use of‘transgender’ as aterm to order knowledge produces the possibilities
whereby certain subjects become appropriated into areading of transgender
that obscures the complexities of their identification and experience.”" Nev¬
ertheless, he suggests that transgender studies might offer amore expansive
SUSPICIOUS VISIBILITY
way to think through multiple figurations of gender in relation to sexuality,
race, class, nationality, and ability.
Dean Spade engages these possibilities when he asks us to consider how
medical and legal surveillance of transgender-identified people actually
functions to discipline all gendered subjects toward anormative gender that
appears natural and healthy when viewed in opposition to those particular
bodies and identities designated as transgender.'^ Spade is interested in the
ways that medicine and law demand from transgender people normalizing
measures that uphold the status quo rather than resist or change it, but he
also gestures at the ways that this process enforces normative gender for all
people. In other words, it may seem that only certain bodies, those that can¬
not or will not conform to normative gender standards, are subject to sur¬
veillance and scrutiny. It may appear that only transgender people have to
alter their gender presentations, for example, while non-transgender people
have gender presentations that are naturally, effortlessly normative. In this
way, gender regulation can appear displaced onto only the transgender-
identified, such that other bodies and identities can seem naturally gender
normative and free from scrutiny. Of course, as Judith Butler explains, all
gendered subjects emerge through regulatory power: “persons are regulated
by gender, and ... this sort of regulation operates as acondition of cultural
intelligibility for any person.”''* Yet these regulatory norms often play our in
more mundane and subtle ways than the explicit medicolegal policies set up
for transgender people.
Consider, for example, an American Express national advertising cam¬
paign launched in mid-2.008. In response to other companies’ turns to con¬
sumer-chosen designs for credit cards, the campaign sought to showcase the
professional look of American Express Business Gold cards. To this end, one
commercial features awhite man dressed in asuit, who approaches an airline
ticker counter for abusiness trip to San Francisco and presents acredit card
adorned with images of kittens. The ticket agent looks at him suspiciously,
confirms that this is abusiness trip, and motions to two security personnel,
who immediately flank the customer from behind. The Black male security
guard asks the customer to come with them, and the white woman snaps on
alatex glove. As they whisk this customer away, another white man steps
to the counter, also requests aticket for aSan Francisco business trip, and
presents his professional American Express Gold card, which creates no
disturbance.
8 I N T R O D U C T I O N
In this case, aperson not specifically marked as transgender is nonetheless
subject to gender regulation because of the ways his gender is interpreted
through consumer objects. The introduction of alatex glove (notably edited
out of later versions of the commercial) suggests that this person is also sub¬
ject to aphysical form of state violence for his gender transgressions. That
the security guard wearing the glove is awoman adds another gendered
layer to this scene: in response to public anxieties about inappropriate and
nonconsensual physical contact during security checks, government officials
have repeatedly issued assurances that physical searches will be conducted
by an officer of the same gender as the individual being searched. Along
with the too-feminine credit card design, the gloved search conducted by a
woman positions this airline customer as breaking from normative gender
in ways that provoke (and, the commercial implies, justify) serious scrutiny.
Importantly, the second customer—the man with the properly professional
and masculine credit card—is also part of this system, as is the at-home
viewer, for whom these regulatory practices may be internalized. Here, the
privileges of good citizenship are arrived at through normative gendering,
which is read in part through class status and consumer practices. The polic¬
ing of gender transgression, though often occurring most overtly in relation
to transgender-identified people, casts amuch wider net. At the same time,
those transgender-identified people who can comply with the regulatory
norms of race, class, ability, and citizenship through which proper, non¬
threatening gender is read may escape these most obvious forms of scrutiny.
Acentral argument running throughout this book, then, is that surveil¬
lance of gender-nonconforming people centers less on their identification
as transgender per se than it does on the perceived deception underlying
transgressive gender presentation. Just as the telling of alie and the omis¬
sion of information are two different forms of deception, Imove between
an interrelated set of terms to show how this broad link between gender
nonconformity and deception manifests: through accusations of fraud,
through claims that certain bodies or identities do not match as they ought
to, and through demands for disclosure or transparency, among others.
State and public actors may justify surveillance practices by focusing on a
specific form of deception, according to which form best supports the goal
of maintaining normative gender. For instance, claims of fraud—a form of
deception linked to personal or financial gain by taking something from an¬
other person—appear repeatedly in debates about identification documents.
SUSPICIOUS VISIBILITY 9
particularly regarding the use of false ID to gain citizenship or voting rights,
which conservative discourse frames as stealing from true citizens. Yet the
rationale for intensified airport security screenings more often rests on the
language of concealment, which can discursively merge concealed weapons
with concealed sex or gender under the rubric of public safety that justifies
airport surveillance.
Crucially, the implicit anxieties about terrorism in the American Ex¬
press commercial suggest that nonnormative gender presentation is cause
for alarm and suspicion on the level of national safety. Indications that .some¬
thing is amiss or doesn’t match up increasingly signal amuch larger danger,
producing anxieties fueled by public safety campaigns like the directive, “If
you see something, say something,” circulating widely in public transit sta¬
tions and airports. Against the cultural and political backdrop of the war
on terror, government policy and public discourse produce an atmosphere
casting full disclosure as the primary avenue to security and safety: only the
duplicitous terrorist would balk at providing information to state agencies,
and citizens with nothing to hide have nothing to fear from intensified gov¬
ernment sutveillance and military presence.
But the panic at Cranbrook and the anxieties conveyed in the American Ex¬
press commercial—as well as the gendered and racialized contours of surveil¬
lance practices ranging from biometric identification to airport screenings—
illustrate that the perception of fraud clings more tightly to some than
others. Although this perception undoubtedly creates matetial problems for
many transgender-identified people, the appearance of gendered duplicity
can be exacerbated or mitigated according to the ways that categories in¬
cluding race, class, citizenship, sexuality, and disability mutually constitute
gender and various readings of it. That is to say, state actors and policies may
interpret transgender people as threats to national health and safety, often
in ways that connect to broad anxieties about terrorism and immigration,
but such an interpretation of gendered deception extends far beyond the
transgender-identified, as the early chapters of this book demonstrate.
Ihavethereforehadtomakesomecomplicatedchoicesaboutthelanguage
used to describe gendered bodies, identities, and practices that transgress
dominant standards. It is partly because surveillance practices apprehend a
wide range of gendered subjects as transgressive—whether such subjects are
intentionally breaking from gendered norms or not—that simply defaulting
to transgender as acatchall term cannot suffice. Where Iuse transgender in
lO INTRODUCTION
this book, Irefer to those bodies and subjects that identify or are identified
in ways that exceed normatively bounded categories of man and woman.
Relatedly, Iuse transgender-identified to mark the ways that people identify
themselves or are identified by others, denoting aspecific claim to transgen¬
der itself as an identity category.'^ In general, Iavoid the term transsexual,
which is rooted in and still typically associated with Western medicolegal
classifications; where this term does appear here, it references its particular
employment by certain scholars or its specific use as acodified medical or
legal category. Most often, Irely on gender nonconforming abroader term
encompassing many (though certainly not all) transgender subjects as well as
those bodies and subjects that break from idealized gender binaries or are in¬
terpreted as breaking from them because of the ways gender norms are read
through mutually constitutive categories such as race, class, sexuality, reli¬
gion, disability, and citizenship. Roughly, then, in this book transgender gts-
tures more toward identity and identification, vdnctttLSgender nonconforming
addresses arelation to norms that may involve but need not rest on identity
and identification.'^ These broader and less rigid terms are useful precisely
because surveillance measures produce and affect not only those specifically
identified as transgender but awide range of gendered practices, identities,
and bodies beyond that formal category.
The term cisgender, increasingly used to mark non-transgender identity,
poses related problems for this book. First introduced in the early 1990s,
the term draws on use of the cis- prefix in the biological sciences to des¬
ignate something that does not change property or orientation; applied to
gender, in abasic sense it describes remaining aligned with assigned gender/
sex designations and related boundaries rather than changing or crossing
them as the trans- prefix indicates. Although cisgender has recently gained
quite abit of purchase in transgender scholarship and activist discourse, and
although it can do important work in denaturalizing normative gender, I
do not employ it here for several reasons. The term’s reliance on biological
frameworks—both the biological definition fueling the prefix itself and the
implicit investment in abiological grounding for gender—limits its useful¬
ness for aproject intent on exploring the ruptures and contingencies of those
frameworks themselves. Following A. Finn Enke’s analysis of the term, Ialso
question the mechanisms by which trans- is distinguished from cis-, and
how this additional dichotomy may close down new avenues rather than
opening them up.'^ For instance, how might the circulation of cisgender as
SUSPICIOUS VISIBILITY
an identity category further naturalize and stabilize the categories of man
and woman, even as it may be intended to highlight their constructed na¬
ture? Might cisgender status simply become equivalent to normative gender,
and, if so, which transgender-identified people might it include, if any (i.e.,
once identified as transgender, must one always remain in that category)?’*
Meanwhile, as Che Gossett succinctly argues, the term cisgender “can’t really
account for how the gender binary was forcibly imposed on black and native
people through slavery and settler colonialism. In American society, black
people have always been figured as gender transgressive.”’^ Inasmuch as the
term centralizes aform of gender privilege that emerges through normative
race, class, sexuality, and ability, but generally fails to name these relation¬
ships, can cisgender properly attend to the nuances of gender difference and
the complexities of gender transgression? Because these questions are central
to my examination of the surveillance mechanisms that assess gendered bod¬
ies, identities, and behaviors, cisgender cannot serve as useful shorthand in
this project. Likewise, Iavoid naming particular groups non-transgender, ex¬
cept when doing so indicates the particular assumption of non-transgender
status within surveillance practices and discourses.
Rather than attempting to collect knowledge about aparticular iden¬
tity category or bounded group of people, this book engages the transgender
of transgender studies as amode of critique. Idraw here in part on Susan
Stryker’s explanation of atransgender critique as one that “takes aim at the
modernist epistemology that treats gender merely as asocial, linguistic, or
subjective representation of an objectively knowable material sex. Episte¬
mological concerns lie at the heart of transgender critique T
arnsgender
phenomena, in short, point the way to adifferent understanding of how
bodies mean, how representation works, and what counts as legitimate
knowledge.”^® Building on this, Stryker and Aren Aizura forward an in¬
tellectual approach that uses the critical lens of transgender studies to put
“as much pressure on the categories of man, woman, and homosexuality, as
on transgender" cautioning that “those terms are no less constructed than
transgender itself, and they circulate transnationally in discourse and analy¬
sis with no less risk of being conceptually colonizing.”^’ In these senses, a
transgender critique is concerned less with producing knowledge about a
particular class of people identified as transgender and more with under¬
standing the social, political, and material conditions through which those
identifications emerge and that knowledge itself is produced.
11 INTRODUCTION
Nor is atransgender critique limited to aclearly circumscribed category
called transgender. Rather, it is most useful when leveraged to unseat those
categories of gender and sexuality that might be normalized and taken for
granted through their assumed contrast to ttansgender. When taken up as
an analytic rathet than as abounded identity category, transgender can also
usefully intervene into the natutalization of race, disability, and citizenship.
The ttvm gender-nonconforming ptavti especially productive for this work,
by moving away from an analysis of identities themselves (which would risk
further naturalizing those identities) and toward an analysis of the produc¬
tion of, investments in, and breaks from those identity categories and related
regulatory norms. In this book, atransgender critique enables an analysis of
gendernonconformitythatmayormaynotbe(orbeperceivedas)transgender-
identified, and it provides acritical framewotk for examining relationships
between many different gendet-nonconforming practices, bodies, and iden¬
tities, and the knowledge frameworks and institutions through which they
ate produced.
In her classic essay “Punks, Bulldaggers, and Welfare Queens,” Cathy
Cohen obsetves that queer political wotk thus far has failed to enact trans¬
formational politics in large part because it has telied on anarrow under¬
standing oiqueer that tutns on sexual identity rather than on shared polit¬
ical commitments and connected relationships to heteronormativity. While
she does not advocate eliminating identity categories, she argues that “it is
the multiplicity and interconnectedness of our identities that provide the
most promising avenue for the destabilization and radical politicization of
these same categories.”^^ In this book, Ido not discount the material effects
of sutveillance on transgender people, but Iam primarily concerned with
tracing the ways that diffetent sutveillance ptactices directly or indirectly
rely on agender-nonconforming figure that, as Ishow, may well not cot-
respond to attansgender-identified subject. In this way, Ialso follow what
certain queer and ethnic studies scholars have called a“subjectless critique,”
■23
which “disallows any positing of apropet subject of or objectfor the field.’
Likewise, my approach is indebted to queer of color critique, which Rod¬
erick Ferguson describes as amode of analysis that “extends women of color
feminism by investigating how intersecting racial, gender, and sexual prac¬
tices antagonize and/or conspire with the normative investments of nation¬
states and capital.”^'* Acritical lens that situates queet studies as inseparable
from processes of radalization and the uneven ttansnational circulation
SUSPICIOUS VISIBILITY 13
oi bodies, capital, and knowledge, queer of color critique approaches ques¬
tions of gender and sexuality not through narrow conceptions of identity
but as political and cultural formations mutually constituted with race,
nationalism, and global structures of power. Accordingly, while this book
examines surveillance enacted by U.S. government agencies and segments
of the U.S. public, it does not suggest abounded United States operating in
isolation. On the contrary, the surveillance practices examined here emerge
and proliferate in relationship to racism, colonialism, and border anxieties,
particularly (but not only) as they structure the war on terror.^’ Relatedly,
the question of citizenship animates many of the forms of surveillance that
this book considers. Acontested term encompassing many interrelated
definitions, citizenship can be aformal legal status, amechanism through
which to access rights, adescriptor of morality and productivity (as in “good
citizenship”), or a“range of everyday activities through which people claim
political and social belonging within the national territory they inhabit” (as
in cultural citizenship).^'^ This book engages each of these meanings, which
both overlap and contradict one another, indicating one reason that surveil¬
lance measures are so frequently instituted to regulate citizenship.
Drawing on Ferguson, Gayatri Gopinath explains that queer of color
critique “enables us to trace the convergence of what seem to be radically
distinct and disparate ideologies as they shore up heteronormativity.”^” Ap¬
plying this intellectual practice to transgender studies makes it possible for
this book to investigate awide range of regulatory mechanisms producing
gender, even—or perhaps especially—if at first gender does not appear
central to their workings. Thus the book critically addresses dichotomous
frameworks not only concerning male/female and man/woman, or even
transgender/non-transgender, but also deviant/normative, terrorist/citizen,
security/insecurity, and us/them. Atransgender critique, as Ipursue it here,
offers away to read various anxieties about gender nonconformity with a
particular focus on their relationship to racism, xenophobia, ableism, and
securitization.
Navigating Visibility
If, following Michel Foucault, power is not simply repressive but is produc¬
tive of knowledge and categories of identity that work to manage life and
regulate behaviors, then this book understands transgender not as aprede-
14 INTRODUCTION
termined category into which identities or bodies are slotted, but as ashift¬
ing discursive category produced in part through practices of surveillance.
In this sense, it is not that surveillance identifies bodies or subjects that are
already inherently deviant, but that surveillance is one mechanism through
which gender nonconformity is produced as such. This theoretical approach
usefully moves away from medical, legal, and cultural frameworks that have
often sought to determine the truth of transgender identities and bodies; it
asks instead how the very notion of transgender enters into discourse and
why its ttuth becomes important.
Key to both the form and content of this book is Foucault’s argument
in Discipline and Punish that the institutionalization of examinations and
inspections—through spaces such as the school, the hospital, or the military
—transformed mechanisms of power beginning in the late eighteenth cen¬
tury. These meticulous and obligatory examinations mark ashift away from
sovereign power, which made itself most visible, to disciplinary power, which
Foucault contends “is exercised through its invisibility; at the same time it
imposes on those whom it subjects aprinciple of compulsory visibility. In
discipline, it is the subjects who have to be seen. Their visibility assures the
hold of the power that is exercised over them. It is the fact of being con¬
stantly seen, of being able always to be seen, that maintains the disciplined
'28
individual in his subjection.’
Much scholarship regarding transgender people has sought to make them
more visible, to investigate the truths of transgender lives and bodies, and
to promote recognition and legibility of transgender individuals. Work in
fields including psychology, law, sociology, and anthropology has aimed to
discover and articulate what transgender bodies, communities, and identi¬
ties entail. Such scholarly endeavors occur alongside rransgender representa¬
tion in popular culture: mystery novels, medical dramas, and daytime talk
shows regularly position transgender people as hiding adramatic secret that
audiences are meant to uncover, often in the most literal sense of the word.
We might say, in fact, that one of the most common charactetistics of work
on transgender topics is the framing of transgender bodies and identities as
opportunities to make visible what is otherwise tantalizingly hidden.
Although visibility projects can create spectacles and further marginalize
gender nonconformity, in many cases these efforts are intended as beneficial
steps towatd social change. But as Evelynn Hammonds reminds us, “an ap¬
peal to the visual is not uncomplicated or innocent. As theorists we have to
SUSPICIOUS VISIBILITY 15
ask how vision is structured, and, following that, we have to explore how
difference is established, how it operates, how and in what ways it constitutes
subjects who see and speak in the world.”^’ These tasks are crucial to acritical
engagement of surveillance practices—practices that should remind us that
30
visibility is not apanacea but rathet, as Foucault famously remarked, atrap.
This is in part because one’s visibility to surveillance mechanisms can allow
those mechanisms to work more effectively. At times this can even seem de¬
sirable, as when individuals enroll in preferred customer tracking programs
or register as precertified travelers under new airline screening policies; these
sutveillance practices may not even tegister as surveillance, but rathet as con¬
venient privileges for the compliant consumer-citizen. Heightened visibility
of some populations, particularly those marked as deviant or undesirable,
can also allow others to feel or appear untouched by surveillance (even if this
is not actually the case). All of these instances tend to focus on the problem
bodies that must be overtly scrutinized and deflect attention away from sur¬
veillance practices themselves, much as Foucault notes that visibility shifts
away from the workings of disciplinary power and onto those subjects being
disciplined. David Lyon explains this in the context of increasingly auto¬
mated and digital sutveillance technologies: “Surveillance practices enable
fresh forms of exclusion that not only cut off certain tatgeted groups from
social participation, but do so in subtle ways that are sometimes scarcely
visible. Indeed, the automating of surveillance permits adistance to be main¬
tained between those who are privileged and those who are poor, those who
are ‘safe’ and those who are ‘suspect.’”^'
With these concerns in mind, this book seeks not to uncover particular
information or truths about transgender subjects, but to understand how
these subjects, and the shifting category of transgender, are produced in
concert with arange of nonconforming gender practices and made visible
through modes of surveillance that may never even name transgender as a
category of concern. If, as Foucault argues, power is exerted not in aone-
directional, top-down manner but through diffuse networks, then this book
is concerned with the ways that practices of surveillance extend far beyond
their most obvious forms—the USA PATRIOT Act, the National Security
Agency—into the mote quotidian aspects of our lives. These surveillance
and security practices of the everyday produce and refine normative gendet
even when they may appear disconnected from it, as the first two chapters
make clear.
i6 INTRODUCTION
Likewise, although this book pays special attention to U.S. state surveil¬
lance, it does not assume that surveillance practices originate in the state or
that the state itself can be considered astable and unified entity. Rather, in
Wendy Brown’s terms, we might best understand the state as “a significantly
unbounded terrain of powers and techniques, an ensemble of discourses,
rules, and practices, cohabiting in limited, tension-ridden, often contradic¬
tory relation with one another,” and yet despite this somewhat unwieldy
and shifting set of practices, also as “a vehicle of massive domination.”^^ In
this framework, surveillance can be analyzed as aconstellation of mecha¬
nisms that may support but also exceed state power, while also illustrating
the incoherence of and fractures in what we call the state. By addressing
state sutveillance, this book seeks to understand how surveillance practices
move through and beyond formal state apparatuses and to explore how those
practices put the state itself in question. Thus as Margot Canaday writes,
“the state does not just direct policy at its subjects; various state arenas are
themselves sites of contest over sex/gender norms, and therefore structured
by those norms.”^^ Accordingly, while Iexamine the ways that U.S. state sur¬
veillance works to tegulate gender, Ialso address these practices as fraught
struggles over the very gendered categories that such surveillance claims to
bring under control.
Because surveillance practices proliferate to pervade all aspects of our
lives, extending well beyond those specific measures that state agencies lay
claim to, the scope of my primary source material here is necessarily both
broad and incomplete. In many cases Ilook to facets of surveillance clearly
connected to specific government agencies, such as congressional hearings
and formal legislation, that set in motion and maintain security mecha¬
nisms. But Ialso take seriously Foucault’s caution against conceiving of the
state and civil society as adichotomous and “antagonistic pair” in which
the former is domineering while the latter is “something good, lively, and
warm.”’'* If power has no single origin or hierarchy, but consists of “the
manifold relationships of force that take shape and come into play in the
machinery of production, in families, limited groups, and institutions,” then
my archive also traces surveillance through capillary networks of power not
confined to the arenas commonly associated with the state itself, as the third
chapter particularly illustrates.^^ But it is also for this reason—that power
“is produced from one moment to the next, at every point, or rather in every
relation from one point to another”—that the archive must always be par-
SUSPiCIOUS VISIBILITY 17
Ibring together acombination of formal and informal surveillance
mechanisms, tracing their connections through the everyday to better un¬
derstand how surveillance, the state, and the category of transgender come
to seem legible and stable through one another.
Ialso consider transgender advocacy organizations’ responses to U.S.
surveillance practices, responses that reflect atension between these organi¬
zations’ different political frameworks. Aligned with amode of scholarship
that promotes visibility and recognition, some organizations have urged a
rather patriotic compliance with state policy while seeking to reform se¬
curity measures to more accurately and sensitively address transgender-
identified people. This strategy emerges out of alarger investment in existing
institutions such as the legal and penal systems, understood here as granting
rights and protection, provided they can be taught to properly account for
and include transgender-identified people. Although intended to alleviate
particular harms, these inclusion campaigns rest on claims of good citizen¬
ship that both presume equal access to that status and help legitimate sur¬
veillance practices by working within the frameworks they provide. Asjasbir
Puar argues, the queer subject is often incorporated into normative white
citizenship through the production of acontrasting racialized figure of ter¬
ror, creating figures that appear both exceptional and binarily oppositional.
But crucially, these figures can work together to deflect attention from the
ways that queerness is thoroughly entangled in and produced through the
37
biopolitics of war, militarism, and security.
Working against that problem, other transgender advocacy and activist
organizations begin not by attempting to fold more genders into surveillance
systems but by questioning instead the very terms on which those systems
operate. Structured by frameworks of racial and economic justice—and
understanding these as central to transgender politics—these groups fol¬
low what Dean Spade has desctibed as a“trickle-up” model of social jus¬
38
tice, which ptioritizes the needs and leadetship of those most vulnerable.
Through this lens, greater recognition of transgender people from police,
prisons, or biometric screening technologies exacerbates rather than miti¬
gates harm: many transgender and gender-nonconforming people are al¬
ready made visible—and thus vulnerable—to surveillance mechanisms, as
this book shows, and campaigns for greater recognition tacitly support the
continuation of those systems.
Two organizations’ approaches to hate crimes legislation can illustrate
INTRODUCTION
these different advocacy approaches. The National Center for Transgender
Equality (ncte), perhaps the most prominent transgender-specific lobby¬
ing and policy organization in the United States, offers aresource manual
titled “Responding to Hate Crimes.” Last updated in 2,009—the year that
U.S. federal hate crimes law was expanded to include sexual orientation,
gender, and gender identity—the manual provides extensive information
about the parameters of hate crimes laws, responding to harms considered
hate crimes, and working with law enforcement. In the section regarding law
enforcement, NCTE begins with ashort paragraph noting restorative justice
programs before describing at length how to best interact with law enforce¬
ment personnel: for instance, the manual encourages readers to remind po¬
lice officers chat “criminal law protects and applies to transgender people in
the same way that it protects and applies to non-cransgender people.”’’ Also
in 2009, the Sylvia Rivera Law Project (SRLP)—a New York-based collec¬
tive providing free legal services for low-income transgender, intersex, and
gender-nonconforming people—released astatement regarding the federal
hate crimes law expansion. Explicitly marking the disproportionate target¬
ing of marginalized communities, the statement denounces such legislation
as a“counterproductive response to the violence faced by LGBT people,” not¬
ing that “this system itself is amain perpetrator of violence against our com¬
munities” and recommitting SRLP to creating “systems of accountability
” 4 0
that do not rely on prisons or policing.
The statement by SRLP explicitly recognizes that greater transgender in¬
clusion and legibility in the criminal legal system intensifies harm for many
and reinforces the status of law enforcement as our primary recourse for
addressing violence, and it emphasizes avision for responding to harm that
does not depend on this system. The NCTE manual briefly mentions re¬
storative justice programs as “relatively rare” in the United States, and fore¬
grounds instead adetailed set of suggestions for assisting and educating law
enforcement that naturalizes reliance on “law and order.” By presuming a
universal and equally accessible protection granted by the criminal legal sys¬
tem, the manual elides the profoundly uneven ways that criminalization and
incarceration play out; it positions that system as aremedy in itself, if one
in need of education regarding transgender-identified people. Going Stealth
explores the contours of these different advocacy frameworks as enacted by
avariety of organizations and considers the relationship of such responses
to specific surveillance practices. Efforts toward more recognition of trans-
SUSPICIOUS VISIBILITY 19
gender identities and bodies within surveillance systems may reduce harm
for certain individuals, yet they also facilitate the workings of surveillance,
bringing those identities and bodies more efficiently under biopolitical man¬
agement. To return to Hammonds’s concerns with visibility, then; “in over¬
turning the ‘politics of silence’ the goal cannot be merely to be seen: visibility
in and of itself does not erase ahistory of silence nor does it challenge the
structure of power and domination, symbolic and material, that determines
what can and cannot be seen.”'*'
10 INTRODUCTION
to produce legible and fixed gender identities, and even when security poli¬
cies seem utterly unconcerned with transgender people. This chapter also
considers several transgender advocacy organizations’ responses to the new
forms of document regulation; Ishow how the strategies proposed by some
of these groups bolster U.S. nationalism and fail to attend to the broader po¬
licing and classification of bodies deemed deviant or dangerous, particularly
in terms of race and citizenship status.
Government efforts to screen, identify, and track people have perhaps
been most noticeable and contested in that space at which travel, borders,
and bodies regularly converge: the airport. In the context of wide public ap¬
prehension about the potential for recently installed X-ray screening systems
to impinge on travelers’ bodily privacy, chapter iexamines the particular
concern that certain bodily technologies, such as the prosthetics used by
some transgender people and people with disabilities (among others), may
be misinterpreted as weapons rather than as medically necessary technolo¬
gies. Drawing on disability studies, Isketch acultural history of the X-ray
itself to understand its emergence in militarized contexts as atechnology
that simultaneously heals and harms. And Iconsider how chose areas of the
body understood as especially private—the genitals in particular—are his¬
torically suffused with public anxiety in ways that overtly link gender, race,
and national security. In this way, Iintervene into the frameworks used by
some transgender and disability advocacy groups, which call for stronger
privacy measures and more accurate screenings by which to distinguish safe
bodies from dangerous ones. Analyzing the airport security screening as a
particularly fraught microcosm of these interconnecting debates, Iargue for
amore complex understanding of privacy, health, and violence.
In chapter 3, Itake up that space of bodily privacy that is perhaps the
most commonly discussed site of surveillance for gender transgression: the
public bathroom. Rather than focusing on accessibility concerns, Iaddress
the regulation of bathrooms and the bodies that move through them as a
method for producing citizenship and determining national belonging. This
chapter considers legislation regulating gendered bathrooms in the context
of anti-immigrant policies and discourse. Isuggest that public bathroom
scrutiny (which increasingly names transgender people and their bodies as
threats)isonecomponentoftheU.S.government’sinvestmentinthephysi¬
cal body as proof of good citizenship and spatial belonging, and Itherefore
argue that the surveillance practices represented by the bathroom bills are
SUSPICIOUS VISIBILITY ii
part of arenewed emphasis on biometric identification following 9/11. At the
same time, Idemonstrate the ongoing role that the space of the bathroom
plays in creating U.S. national identity through structures of race and gen¬
der, in turn positioning its regulation as fundamental to the national project
and the maintenance of good citizenship.
The final chapter turns to an instance in which the explicitly transgen¬
der figure appears utterly central to surveillance. Here Iconsider the case
of Chelsea Manning, accused of undermining national security by send¬
ing classified U.S. military and government materials to the whistle-blower
website WikiLeaks in zoio. Manning’s legal defense rested in part on her
apparent struggle with gender identity, suggesting that the emotional bur¬
den of hiding atransgender identity influenced her decision to leak sensitive
documents. Examining the trial transcripts—which reflect the concealment
not only of military actions but also of the conditions of Manning’s pretrial
incarceration and even the trial itself— Iargue that court and media scrutiny
of Manning’s gender identity deflects attention from U.S. military actions
while simultaneously rationalizing intensified surveillance over Manning as
an exceptional, deceptive individual. This chapter shows how overt atten¬
tion to transgender identity can work to obscure and thus enable broader
surveillance practices.
Most of the research and writing of Going Stealth took place during the
George W. Bush and Barack Obama administrations, but Icompleted the fi¬
nal revisions after Donald Trump’s election in November 1016. In the book’s
brief conclusion, Icarry forward the central contentions that current surveil¬
lance practices are not unprecedented and that these practices do not simply
identify aready-made set of transgender-identified people. These arguments
remain in the Trump era, even as our political context undergoes significant
changes. In looking ahead, Iexamine the Trump administration’s rescind¬
ing of federal guidelines that govern treatment of transgender students in
public schools and the announcement that the zozo U.S. census will not
collect data specific to LGBT identities. The book closes by returning to the
seductive appeal of visibility and by considering the political possibilities
that may yet arise in the enduring relationship between surveillance and
gender nonconformity.
Ihave at times wryly remarked that this is atransgender studies book
that is not terribly interested in transgender people; instead, it considers sur¬
veillance practices through atransgender crititjue to explore that category’s
INTRODUCTION
edges and its complicated interactions with racialization, citizenship, dis¬
ability, and militarism. But Ialso write with adeep investment in transgen¬
der politics and with an interest in the particular material and ideological
relationships that transgender people and social movements may develop
with government policies and practices. Too often, the state’s regulatory gaze
can appear either as an impervious and inescapable force or as the key to a
liberating form of recognition. By examining the normative assumptions
used to analyze and interpret—as well as to produce—gendered bodies and
identities. Going Stealth illustrates ruptures in surveillance frameworks and
complicates aspirations of legibility and visibility. In this way the book aims
not to clearly define the category of transgender or to perfectly trace the
workings of surveillance practices, but rather to refocus our energies on the
fraught negotiations between them. It is in these struggles and fractures that
new political possibilities can emerge.
SUSPICIOUS VISIBILITY 23
CHAPTER ONE
DECEPTIVE DOCUMENTS
race, gender, sexuality, and citizenship that form the impetus for state-
regulated identity documents. Ishow how gender-nonconforming bodies and
identities reveal inconsistencies in the U.S. government’s control of identity,
even as certain state-assigned documents produce transgender identity as a
recognizable category. This process of recognition and legitimation marks
other forms of gender transgression as deviant against the legal classification
of transgender. In considering different transgender advocacy organizations’
responses to increased state regulation of identification documents, then, I
demonstrate how many of these strategies reconsolidate U.S. nationalism
and facilitate the increased policing of deviant bodies and identities.
Producing Contradictions
16 CHAPTER ONE
and sorting, to determine which Chinese immigrants were in the country
legally (having entered prior to this legislation) and which were not. Notably,
the act depended on paternity and marital status as key factors for determi¬
nation of citizenship, with women and children receiving the classification
assigned to their husbands or fathers.
But the provisions for identification proved difficult to maintain. The
strategic use of “paper sons,” by which Chinese immigrants reported false
family ties to obtain citizenship papers, demonstrates one of the many ways
in which documents could be manipulated. The inclusion of photos on iden¬
tity documents served as apreventative measure against illegal selling and
trading of IDs, yet in order to gain entry into the United States, Chinese
immigrants often altered their identification photographs. As aresult, what
government officials initially considered clear evidence of identity came to
expose the subjective nature of visual identification, prompting officials to
more strictly regulate the types of allowable photos and the conditions under
which they could be taken.
Current debates about the role of identity documents in immigration
regulations and antiterrorism measures incorporate the notion that false
documents reflect afundamentally deceptive personality and that this per¬
sonality trait is shared across certain marginalized groups, ideas that can
be traced back to some of the earliest uses of identification documents in
the United States. Government officials came to believe that Chinese im¬
DECEPTIVE DOCUMENTS 17
in government-issued identification documents. In June Z013, the U.S. Su¬
preme Court struck down Section 4of the Voting Rights Act, which had
required states and counties with ahistory of discriminatory practices to
be approved at the federal level before making changes to their voting laws.
Progressivemediaoutletsandracialjusticeorganizations,amongothers,ar¬
gued that this legal change creates (or, perhaps more accurately, re-create.s)
severe vulnerability for many people in terms of both the denial of their
right to vote and the broader effects of gerrymandering.'" Within two days
of the Court’s decision, six of the nine states directly affected by the tuling
had already put forward new voter ID legislation, rationalized as amethod
for reducing voter fraud."
Restrictions based on identification documents most severely affect mar¬
ginalized populations, for whom obtaining state-tecognized identification
can be asignificant burden, if it is possible to begin with. Many people who
rely on public services—often including poor people, veterans, people with
disabilities, people of color, and seniors—do not have approved identifica¬
tion such as adriver’s license, passport, or college ID, and encounter substan¬
tial difficulties when they attempt to obtain such documents. Several wit¬
nesses in the loii case against Pennsylvania’s voter ID policy explained that
even their requests for their birth certificates were futile; one witness said of
her failed birth certificate request, “They say Idon’t exist.”'^ Such cases high¬
light the material effects of state agencies’ reliance on documents to prove
identity, showing how that reliance creates hardships for particular groups.
At the same time, these debates also throw into relief government agencies’
own inability to comply with their policies for documentation. For instance,
the identification requirement in Pennsylvania obliges that state to provide
free photographic voter ID for any resident without another approved form
of identification. Yet the state “can only loosen its rules but so much without
breaching federal and state security concerns,” creating acontradiction in
which Pennsylvania must provide the voter ID card to anyone who needs it,
yet cannot do so unless applicants provide other official documents attesting
to their identity, such as birth or marriage certificates.'^
Moreover, if identification documents help produce identities rather than
merely recording them, then the voter ID cases helpfully illustrate how docu¬
ments produce certain groups as recognized, legitimate citizens, while other
groups appear simply not to exist. In this sense, missing or incorrect identity
documents suggest not only fraudulence but also acertain impossible sub-
18 CHAPTER ONE
Figure i.i Portion of cover art from True the Vote’s loiz observer training
manual for Virginia.
jecc. Consider, for example, materials published in zoiz by True the Vote, an
organization emerging out of alocal Texas Tea Party group in zoo8, which
describes itself as training “average, everyday citizens to research the voter
rolls in their home districts and to report inaccuracies to their County and
State, to identify instances of vote fraud,” and to act as observers at polls.
As part of the organization’s nationwide outreach duringthe loiz elections.
True the Vote’s Virginia observer training manual featured acartoon draw¬
ing of abroad-shouldered figure with facial and body hair wearing adress
and carrying apurse, pictured next to avoter ID card for afigure with a
feminine name (Maryjane Jones) and no facial halt (figure i.i). The drawing
urges trainees to “Prevent voter fraud!,” which is signaled here by gendered
disguise.
The National Center for Transgender Equality (ncte), self-defined as
“the nation’s leading social justice advocacy organization” that is focused
o n
ending discrimination and violence against transgender people,” con¬
structed aformal response to this page of the manual.'’ The organization
asserts that “until this point, the concerted effort by right-wing, tea party
groups to restrict voting rights with new Voter ID laws only inadvertently
affected transgender voters. Only days away from Election Day, the discov¬
ery of True the Vote’s training manual marks ashift by right-wing groups to
explicitly target transgender people and deny them aright to vote.”"’ Given
the heightened scrutiny of identification documents of all sorts, it is not
unlikely that some transgender people experienced difficulty at the polls; as
DECEPTIVE DOCUMENTS zj
Ishow in the next section of this chapter, state-regulated identity documents
pose particular problems for many transgender and gender-nonconforming
people. But the manual works on amore pernicious level than the direct
targeting of transgender people that NCTe’s interpretation suggests.
The image intended to tead as aman in adtess symbolizes deceit in this
case, but it does not necessarily or deliberately create suspicion about trans¬
gender people per se; nor does the manual necessarily use this figure be¬
cause it is explicitly transgender. Rather, the figure stands here as the subject
that cannot be correct, particularly when contrasted with the voter ID card
at its side, which signifies the legitimate citizen-subject. Pitted against the
government-approved document that connotes fundamental truthfulness,
the gender-nonconforming figure functions as arecognizable and basic sym¬
bol of something gone wrong, in need of further inspection. This is not to
say that the image is entirely disconnected from transgender populations: it
may well exacerbate already existing suspicion ditected at many transgender
people, at the polls and elsewhere. Yet many transgender-identified voters
may feel the image’s effects not because it is explicitly anti-transgender, but
because of the ways that voter ID efforts overall create greater vulnerability
for marginalized groups, particularly along lines of race and class. In fact,
given that voter identification restrictions historically and currently central¬
ize race—while also denying that race is afactor—then particularly if the
image’s gender-nonconforming figure reads as white, we can understand it
less as away to target transgender people as aspecific group than as astrat¬
egy for conveying and playing on racial anxieties about voter fraud without
explicitly referencing race.
In this context, NCTE’s claim that previous voter ID programs only in¬
advertently affected transgender people elides the ways that race and class
marginalization work with transgender status to increase risk of scrutiny
(and denial of voting access) and to complicate how state agencies produce
and interpret gender through identification documents. Efforts to raise
suspicion about false identities and documents need not explicitly mark
out transgender people in order to significantly affect them; likewise, as
the True the Vote manual illustrates, efforts that can appear to specifically
target transgender-identified people may do so unintentionally, and may
have their broadest effects on those populations already most vulnerable,
whether transgender or not.'" The ways that medicine and law produce trans¬
gender as arecognized category offer some insight into this category’s re-
30 CHAPTER ONE
lacionship with race, class, and citizenship, as well as the administrative
conflicts it reveals.
Normalizing Gender
DECEPTIVE DOCUMENTS 31
But medical science itself detetmines notmative gendet through apar¬
ticular form of raced, classed, and sexualized body. Western medicine has
consistently linked race, gender, and sexuality such that the norm of white
heterosexuality becomes amarker against which deviance is constructed.
Scientificstudiesfromtheearlynineteenthcenturyonhelpeddesignatepar¬
ticular bodies—typically those that were racially or sexually mixed—as de¬
generative threats to Western norms and national security.^® To be classified
as normatively gendered is also to adhere to norms of racial and economic
privilege. Under this logic, marginalized gender identities can approximate
the norm in part through clinging to ideals of whiteness and class status.
Likewise, concealing gender deviance is about much more than simply eras-
ing transgender status. It also necessitates altering one’s gender presentation
to conform to white, middle-class, able-bodied, heterosexual understand¬
ings of normative gendering.
The notion of concealment via medical intervention structures legal gen¬
der as well, alink made clear by the fact that most state and administrative
agencies deny changes of gender on identity documents without proof of
irreversible medical procedures. United States law depends on medical evi¬
dence to verify gender identity in almost every case involving transgender-
identified people. Importantly, Dean Spade argues that medicine—and thus
also law—continues to rely on an ideal of success in diagnosis and treatment
plans for transgender people, where success is typically defined as “the ability
to be perceived by non-trans people as anon-trans person.”^' Spade’s work
points to the ways that medicine and law work together to correct individu¬
als whose bodies or gender presentations fall outside of the expected norm,
promoting the concealment of transgender status in order to reestablish
that norm.
31 CHAPTER ONE
che opposite sex, but in fact they are nothing more than an imitation of the
opposite sex.”^^ Citing DNA as evidence that one’s sex and gender can never
really change, the judge concluded that “to grant aname change in this case
would be to assist that which is fraudulent,” and he worried that it could lead
Echoing this perspective, legal cases dealing with violence against trans-
gender people often revolve around the victim’s responsibility to disclose
their transgender status or birth-assigned sex. Such cases imply or outright
claim that the individual’s dishonest concealment of their sex was the root
cause of violent actions taken against them. This approach is clearly dem¬
onstrated, for instance, in che narratives constructed around transgender
teenager Gwen Araujo’s murder (and sexual relationships) in zooi. Legal
arguments, news media, and made-for-celevision movies converged to situ¬
ate Araujo’s murder in the context of a“trans panic” defense, centralizing
the shock of discovery and frequently faulting Araujo for not revealing her
assigned sex.^'* In this and many other instances, the interplay of medical,
legal, and cultural representations of transgender populations helps associate
transgender identity with secrecy, precisely because it is understood that the
secret can and should eventually be discovered.
DECEPTIVE DOCUMENTS 33
With such apervasive cultural emphasis on concealment, it may come
as no surprise that the slang used by many transgender-identified people to
describe nondisclosure of transgender status is “going stealth.” Those living
stealth are unknown as transgender to almost everyone in their lives. The
term itself invokes asense of going undercover, of willful secrecy and con¬
cealment, perhaps even of conscious deception. The resonance of militarism
in this term suggests the extent to which going stealth entails acertain com¬
plicity with state agencies, which demand compliance with specific legal and
medical procedures and ostensibly offer in return official documentation
that helps make stealth status possible.
Yet by granting medical and legal changes of gender, government offices
also maintain detailed records of these changes, producing apaper trail of
past identity markers that threatens to expose one’s stealth status. At the
same time, these documentation practices can inadvettently create new
spaces through which transgender people might slip; hundreds of state agen¬
cies and jurisdictions across the United States produce avariety of policies
governing gender changes, put into practice by many different individual
state officials. Adriver’s license clerk in one office may allow agender change
merely based on the applicant’s claim that the current gender marker is a
clerical error, while aclerk in aneighboring office may insist on filing docu¬
mented evidence (such as abirth certificate or aphysician’s letter) to change
the marker. Other factors such as race, citizenship, criminal record, and lo¬
cation can further facilitate—or limit—the possibilities of skirting these
types of inconsistent administrative practices.
The very linguistic construction of “going stealth” depends on the con¬
stancy oigoing-, of continuing to conceal one’s transgender status, even if
that concealment can never be airtight. Although the legal procedures used
to document transgender people’s gender status frequently conflict with one
another, they collectively work toward stricter regulation of legal gender.
Some state agencies and programs refuse to change the gender marker on
birth certificates, while others do so only with documentation of specified
surgeries. Other institutions first require amended birth certificates in order
to change the gender marker on other documents, and in some cases state
and city regulations contradict one another in their medical requirements
for documentation changes.These inconsistent requirements and contra¬
dictory methods for determining gender and administering identification
documents can create ahost of difficulties for transgender people, given the
3 4 CHAPTER ONE
ways that such documents ate central to housing, employment, ttavel, access
26
to public benefits, and other daily life activities.
Such difficulties reflect not transgender people’s inability to fit into cate¬
gories, but rather the fundamentally normalizing function of state-regulated
identity documentation. The creation of an official third gender category
exemplifies this point. Although sometimes imagined as a helpful a n s w e r
and suggested that it would simplify bureaucratic processes and basic life
tasks for such individuals.^" Similarly, U.S. news media reported Pakistan’s
1009 creation of athird gender category on national identity cards as one in¬
tended for hijras, transvestites, eunuchs, and hermaphrodites, and typically
included interviews lauding the category as astep toward rights, respect,
and recognition as human beings.^'* This kind of formalized category might
well ameliorate some of the problems created by state institutions built on a
binary gender system. At the same time, the introduction of acatchall third
gender category meant for those who do not fit into the first two groups
reconsolidates the normative status of male and female as standard options,
from which other identities deviate.This is not to speculate that the third
gender category is always understood this way in practice throughout Nepal
or Pakistan: rather, U.S. news reports on the new policies demonstrate how
such categories circulate transnationally in ways that can strengthen and
naturalize aWestern gender binary. Notably, U.S. news media almost never
link the third gender category in these two countries to the gendered ad¬
ministrative conflicts pervasive in the United States, an omission that might
help locate gender deviance elsewhere, beyond the modern Western state.
At the same time, the establishment and tecognition of third gender
categories can come to seem indicative of amodern, liberal sense of toler¬
ance grounded in rights discourse. This point was clarified for me as Ispoke
about identification documents at avariety of U.S. universities and academic
conferences: not infrequently, audience members—including faculty, un¬
dergraduates, and community members—expressed surprise that Pakistan
DECEPTIVE DOCUMENTS 35
in particular had implemented astate-recognized third gender category.
These reactions suggest, in part, ageneral conception of Pakistan as an op¬
pressive state with outdated gender norms, anotion apparently at odds with
the country’s formal recognition of gender-nonconforming people. But they
also suggest acontrasting (and failed) expectation that the United States
should be aforerunner in that recognition. Moreover, these responses point
to how tightly identification documents and state-regulated categories are
ideologically linked to the notions of both rights and national progress.
It is perhaps no surprise, then, that a2011 California law easing the re¬
quirements for legal change of gender is titled the Vital Records Moderniza¬
tionAct.Afact sheet jointly issued by LGBT advocacy organizations Equal¬
ity California and the Transgender Law Center explains that the former
processforchanginglegalgender“wasfirstestablisheddecadesago,”creat¬
ing an “outdated state policy” that conflicts with “current medical under¬
standing of what is required for obtaining identity documents that reflect
the appropriate gender.”^® In this way, the new law comes to tepresent more
advanced thinking about gender, which aligns with modern medical stan¬
dards to expand rights for amarginalized group. The California state gov¬
ernment’s treatment and formal recognition of transgender people likewise
become ameasure of its progress toward liberal ideals of tolerance and rights.
Like the third gender categories, this law certainly has material benefits for
many transgender-identified people harmed by the dichotomous gender
system structuring most institutions and government programs. But these
benefits arrive through classification schemas and record-keeping practices
that both discipline individuals and regulate the health and security of the
population overall. The very fact that the California law concerns vital re¬
cords (a government registry holding records of life events such as birth,
death, and marriage certificates) and is part of the California Health and
Safety Codes reflects the ways that identity documents are deeply embedded
in surveillance practices.-^'
This dual-function system in which care and discipline operate at once
with surveillance and broad classification—the intertwined workings of dis¬
ciplinary and populational power that Foucault terms biopower—means
that the restructuring of formalized gender categories does not merely
change individuals’ access to state institutions or benefits but also merges
with state surveillance practices that take up and reinforce those categories.
For instance, in 2013 Australia created anew gender marker of Xas athird
36 CHAPTER ONE
option alongside Fand Mon government records. While this category un¬
doubtedly alleviates some of the problems created by the former system, it
also produces anew gender category through which state agencies can ap¬
ply normative standards, collect data, and track groups of people. It makes
sense, then, that the Australian attorney general’s press release on the policy
change ends by explaining that “increased consistency in the way the Aus¬
tralian Government collects and records gender under the Guidelines will
” 3 2
strengthen Australia’s identity security system.
Identification documents thus come to play amajor role in security ef¬
forts, particularly in the kind of “anticipatory surveillance” so central to the
war on terror and related programs implemented by the U.S. DHS.^^ Govern¬
ment officials explain increased tracking and closer scrutiny of documents as
preventative measures that distinguish between safe and dangerous people.
The monitoring of U.S. Social Security records offers an especially clear
example of the ways that state agencies’ own contradictions are magnified
through gender and race to position certain groups as particular objects of
state surveillance, even if they are not explicitly named as such. That the So¬
cial Security number has been considered and rejected as aform of national
ID card several times since the early 1970s is telling of the ways that it has
long functioned as asurveillance mechanism, particularly in relation to race
and class.Its use in this capacity has been reinvigorated by post-9/11 efforts
to prevent both terrorism and undocumented immigration.
The monitoring of Social Security numbers, benefits, and the data used
to issue both of these reveals stare agencies’ own conflicting policies of clas¬
sification as well as their drive to ferret out these inconsistencies. Since 1994,
the Social Security Administration (ssa) has sent “no-match” letters to em¬
ployers in cases where an employee’s hiring paperwork contradicts employee
information on file with the SSA. Ostensibly in place to alert otherwise law-
abiding employers to the possibility that they are unwittingly hiring un¬
documented immigrants, the no-match policy intensified dramatically after
9/11, with 2002. seeing more than eight times the typical number of letters
mailed than in 2001.^^ The no-match letters and related data can now also be
accessed by the DHS, which sends employers guidelines about how to correct
the problem and avoid legal sanctions.
These policies help construct unregulated immigration and terrorism as
interlocking concerns and illustrate how surveillance of gender contributes
to the violence of these policing systems. The no-match policy aims to locate
DECEPTIVE DOCUMENTS 37
undocumented immigrants (and potential terrorists) employed under false
identities, yet it casts amuch broader net. Because conflicting legal and med¬
ical regulations can prevent transgender people from obtaining consistent
gender markers across all of their identity documents, transgender individu¬
als are disproportionately affected by the policy, whether they are undocu¬
mented immigrants or not. The NOTE website notes that the organization
“receives calls regularly from transgender people across the country who
have been ‘outed’ to their employers by the Social Security Administration’s
unfair gender ‘no-match’ employment letter policy.”^^ The no-match policy
exemplifies several interrelated characteristics and effects of state-regulated
identification documents: how scrutiny of these documents targets specific
groups as unruly, thus normalizing other groups, yet can also affect those
beyond the explicitly named targets of surveillance; how state agencies’ own
conflicting classification systems produce the very troublesome identities
they purport to merely locate; and how these practices can appear newly
instituted in the wake of 9/11, yet build on much longer histories of clas¬
sification and surveillance.
38 CHAPTER ONE
invoke the ties between gender presentation, national identity, and bodies
marked as dangerously deceptive.
That the advisory does not specifically name transgender populations in
its text does not make it any less relevant to those populations. The focus on
nonnormative gender presentation certainly raises questions about how this
framing of security affects transgender-identified people. But it also raises
questions about how state institutions might view gender nonconformity
as an act not limited to—perhaps not even primarily associated with—
transgender identities. In the context of security rhetoric related to the war
on terror, transgender individuals may not be the primary target of such
advisories, particularly if those individuals are understood to be conform¬
ing to normative presentations of race and citizenship. Transgender people
who conform to adominant standard of dress and behavior, for instance,
may be legible to the state not as transgender at all, but instead as properly
gendered and safe.
But not all gendered bodies and identities are so easily normalized. Dom¬
inant notions of what constitutes proper feminine or masculine behavior are
grounded in ideals of whiteness, class privilege, and compulsory heterosexu¬
ality, and individuals might be interpreted as nonconforming depending
on particular racial, cultural, economic, or religious expressions of gender,
without ever being classified as transgender. For example, racialized physi¬
cal difference has been understood in both medical and cultural contexts as
DECEPTIVE DOCUMENTS 39
and sex; their bodies are allowed greater leeway to be self-policed or policed
without physical force.”'’ These examples demonstrate that gender norma-
tivity is not limited strictly to gender itself but works through other identity
categories as well. Thus individuals need not be transgender-identified to be
classified as gender-nonconforming. Bodies and identities may be perceived
as abnormal or deviant because of gender presentations read through sys¬
tems of racism, classism, heterosexism, and, particularly in the case of the
DHS advisory’s focus on Al-Qaeda, Islamophobia.
Amplified attention to immigration and national security in the early
2000S, justified by the war on terror’s racist rhetoric, spurred the passage of
the Real ID Act in 2005. The 9/11 Commission, created to detail the events
of September n, 2001, and assess the United States’ response to terrorist
attacks, endorsed the Real ID Act as away to strengthen national security
through identity verification and border fortification. The commission de¬
termined that “for terrorists, travel documents are as important as weap-
o n s , an assertion that helps explain how the major changes proposed in the
tion that eventually any ID card that is not compliant with these standards
will be invalid at the federal level, including activities such as air travel, ac¬
cess to government buildings, and access to federal funding such as Social
Security.’* Stricter standards are to be used to verify identities, citizenship,
names, and birth dates. Draft regulations also specify that Real ID cards and
all supporting documents used to create them (e.g., birth certificates. Social
Security cards, court-ordered name changes, etc.) will be linked through a
federal database and stored there for seven to ten years. Although anum¬
ber of states and organizations ranging from the American Civil Liberties
Union to the conservative Christian American Center for Law and Justice
have publicly opposed the legislation, and despite several proposed alterna¬
tives at the congressional level, the Real ID Act remains in place.
John Torpey distinguishes between passports and identification cards by
noting that while passports regulate movement and support state control of
borders, ID cards typically affirm an individual’s identity for state records
and distribution of state benefits.’^ The Real ID Act combines these two
40 CHAPTER ONE
the Real ID Act’s ability to ensure safety, Senator Arlen Specter (then R-PA)
echoed the logic of the Social Security no-match letters, stating that “one of
the issues that we are struggling with [in immigration legislation] is, beyond
securing borders, to have employers know who is legal and who is not legal.
And we are wrestling with the costs of foolproof identification.”^^
But the government’s own definition of “foolproof identification” works
hand in hand with the constant potential for documents to be forged, inac¬
curate, or otherwise inconsistent, as is evident from former special agent
Michael Johnson’s statement in a2006 congressional hearing on the U.S.
passport system and antiterrorism legislation. Johnson, who served in the
U.S. State Department’s Bureau of Diplomatic Security for eighteen years,
explained that most passport fraud is committed not by those seeking to
immigrate but by individuals already within U.S. borders. His testimony
contends that the passport “provides ironclad proof of an individual’s iden¬
tity. The value of this document to an individual trying to conceal his iden¬
tity or blend into American society is obvious, given the post September ii
scrutiny placed on non-US citizens inside the United States.”'*’* In this logic,
ironically, the purported accuracy and stability of documents like passports
are precisely what make them desirable objects to falsify. Similarly, the very
value of an “ironclad” ID here lies in its own potential to be cracked open.
The notion that identification documents can be simultaneously ironclad
and undermined is particularly clear in government officials’ anxiety over
the possibility of multiple identities, in which one person might hold two or
more different identification cards, as when the 9/11 Commission warns that
terrorists can easily evade current travel restrictions “by tossing away an old
”45
passport and slightly altering the name in the new one.
But this anxiety, and lawmakers’ leverage of it to pass more restrictive
parameters for identity documents, is not new. Nor can it be understood
as distinct from state regulation of gender. For instance, increased concern
over fraudulent identities proved amajor argument in favor of continuing
the compulsory national identity documents instituted in Britain during
World War II. Efforts to maintain individual identity converged with ef¬
forts to regulate sexual practices and gendered relationship structures, as
postwar attempts to shore up the nuclear family took the form of public
outcry against bigamy, viewed by the British government and much of the
public as aforeign practice that enabled both sexual deviance and multiple
identities. In this sense, “bigamy starkly highlighted the extent to which
DECEPTIVE DOCUMENTS 41
social institutions depended on individuals living under one, and only one,
identity,” fueling desires not just to continue the cards, but to expand the
amount of intormation they contained.'**’ For many, compulsory ID cards
recalled totalitarian governing practices associated with Nazi Germany and
thus conflicted with British ideals of privacy and individualism. Yet the pos¬
sibility that such cards could eradicate bigamist practices—securing indi¬
vidual accountability alongside normative sexuality and family structure—
provided its own form of national differentiation. Moreover, because the ID
cards were promoted as preventative measures against stolen identities, state
regulation of identity was encouraged as apersonal right and civil liberty; a
method of increasing lawful citizens’ security. The British government thus
implied that those who had nothing to hide had nothing to fear from the
implementation of national identification cards.
TheRealIDActandthediscoursessurroundingitechomuchofthisrhet¬
oric, which helps explain how and why Congress passed the legislation with
little debate (and unanimous final approval from the Senate), four years after
9/11. In fact. Real ID was tacked onto an emergency spending bill to fund
the wars in Afghanistan and Iraq. In the context of U.S. nationalism that
seeks to eradicate the foreign, the act most overtly targets the figures of the
immigrant and the terrorist, categories that frequently overlap in both public
discourse and government policy. To address the threat that these figures
pose, the Real ID Act increases state surveillance of identity by requiring and
storing asingle identity for each individual. But the administrative systems in
place mean that maintaining asingular, consistent, and legally documented
identity can be quite complicated. For instance, common-law name changes
do not depend on acourt order that would then be filed with aReal ID card,
creating agap in the paper trail that state discourse frames as airtight. Simi¬
larly, this chapter demonstrates how administrative processes make asingle
gendermarkeracrossallrecordsdifficultifnotimpossibleformanytransgen¬
der and gender-nonconforming people. This is especially clear, for example,
in the ways that different state agencies define change of sex differently, with
some requiring one surgery and some another, while other agencies require
nonsurgical medical evidence or other forms of medical approval. Ironically,
then, state agencies’ own contradictory methods of designating legal gender
and sex render Real ID cards ineffectual. Although the Real ID Act creates
and enforces singular, static identities for individuals, it also exposes the flu¬
idity and confusion characterizing state policies on identity documents. Thus
Nothing to Hide
Dean Spade notes that despite the significant problems that the Real ID Act
poses for the most marginalized LGBT people, many high-profile and well-
resourced gay organizations initially failed to take it up as acentral concern.
In assessing this fact. Spade notes that “choices about what to put on the ‘gay
DECEPTIVE DOCUMENTS 43
agenda’ are actually choices about who the constituency of the gay rights
movement is and about the ultimate visionary goals of this movement.’
The Real ID Act, DHS advisory, and no-match lettets did emerge as major
concerns, however, for many advocacy and lobbying organizations with a
specific focus on ttansgendet politics and for many grassroots-based queer
and transgender organizations. And although all of these groups .shared an
opposition to the policies’ harmful effects on transgender individuals, their
different strategic responses reflect the choices that Spade references.
Organizations with aprimarily legislative focus on inclusion did not tend
to consider these security measures’ implications for state regulation of gen¬
der presentation more broadly, particularly as the policies might resonate
for people perceived as gender deviant who are not transgender-identified or
linked in any obvious way to transgender communities or histories. Nor did
these organizations address the ways that particular groups of transgender-
identified people may be targeted differently by such policing. For example,
in a2006 public statement to DHS regarding the no-match letter policy,
NCTE recommends that gender no longer be one of the pieces of data used
to verify employees, arguing that employers are not legally required to sub¬
mit gender classification to SSA, and therefore any exchange of information
about employees’ gender is “an invasion of private and privileged medical
information.”"*^ In an effort to protect transgender employees, the NCTE
statement suggests limiting the amount of information that can be shared
between SSA and DHS. But it also implicitly supports no-match letters as a
form of regulatory state surveillance, by stating clearly the importance of
avoiding fraud through Social Security number confirmation. The state¬
ment does not oppose state surveillance measures more broadly, but rather
seeks to optimize them, offering recommendations on behalf of transgender
employees “in order for the employee verification system to be efficient and
'50
equitable.
An argument based on privacy rights may benefit some gender-noncon¬
forming employees, but in assuming equal access to privacy and legal re¬
course for all transgender people, this strategy fails to address the ways that
privacy is compromised or nonexistent for many. Because the medicolegal
system governing transgender identity tracks gendered changes to identi¬
fication documents, ttansgendet people’s medical and legal information is
never really private or privileged. Likewise, many groups of people—such
as those who apply for disability benefits, use certain social services, or are
4 4 CHAPTER ONE
incarcerated—must routinely make their medical information available to
state agencies, whether they are transgender-identified or not. In addition
to this absence of medical privacy in the everyday, NCTE’s argument must
also be considered in the specific context of post-9/11 surveillance practices.
Diminished rights to privacy are particularly evident in the wake of the
2.001 USA PATRIOT Act, legislation that provides much of the ideological
and legal foundation for more recent surveillance measures.This legislation
builds on earliet policies such as the 1996 Antiterrorism and Effective Death
Penalty Act, which in part removed certain restrictions on state surveillance
of suspected terrotists and dramatically increased government scrutiny and
deportation of immigrants, and the FBI’s COINTELPRO activities in the
1960s, which monitored and eradicated domestic organizations and indi¬
viduals considered subversive national security threats, ranging from Black
and American Indian resistance groups to antiwar organizers. The USA
PATRIOT Act furthet limits privacy rights by expanding the fedetal gov¬
ernment’s ability to sectetly search private homes; collect medical, financial,
and educational records without showing probable cause; and monitor in¬
ternet activity and messages. Passed as part of the anti-immigrant national¬
ism and overt racial profiling that followed 9/n, the act bolsters particular
understandings of the relationships between citizenship, race, privacy, and
danger that undetpin surveillance measures like the Real ID Act and SSA
no-match policy. This context, absent from the NOTE statement, demon¬
strates the frailty of any claim to privacy, particularly for those transgender
and gender-nonconforming people who are immigrants, poor people, and
people of color.
Other advocacy organizations more explicitly rely on the network of le¬
gal and medical policies governing transgender identity to offer protective
strategies, by advising transgender individuals to make themselves visible
as transgender to authotities that question or screen them. In response to
the DHS advisory, the National Transgender Advocacy Coalition (ntac)
released its own security alert to transgender communities, warning that
given the recent advisory, security personnel may be “more likely to commit
unwitting abuses.”’' The organization suggests that transgender travelers
bring their court-ordered name and gender change paperwork with them,
noting that “while terrorists may make fake identifications, they won’t carry
name change documents signed and notarized by acourt.”^^ The organiza¬
tion recommends strategic visibility as asafety ptecaution, urging those who
DECEPTIVE DOCUMENTS 45
might otherwise be going stealth to openly disclose their transgender status
53
tostateofficialsandtocomplywithanyrequestedsearchesorquestionings.
Calling the potential violence and violations against travelers “unwitting
abuses” suggests that authorities enacting these measures cannot be blamed
for carrying out policy intended to protect the general public from the threat
of hidden terrorism. Such aframework neatly sidesteps any broader criticism
of the routine abuses, especially against immigrants and Muslims, that have
been justified in the name of national security. It implicitly supports the
policing of individuals or groups perceived as dangerous, so long as they are
not transgender-identified. The advice for transgender people to make them¬
selves visible as such is couched in terms of distinguishing the good, safe
transgender traveler from the dangerous, deviant terrorist in gendered dis¬
guise. Moreover, by avoiding any larger critique of state surveillance or polic¬
54
ing, NTAC also positions itself as agood, safe, even patriotic organization.
Torpey argues that “our everyday acceptance of ‘the passport nuisance’
and of the frequent demands from state officials that we produce ‘ID’is asign
of the success with which states have monopolized the capacity to regulate
movement and thus to constrain the freedom of ordinary people to come
and go, as well as to identify and constrain possible interlopers.”^’ But the
framing of this as merely capitulation to the state’s monopoly on power be¬
liesFoucault’smodelofpowerasdispersedandfragmentary,neversimplyex¬
erted in one direction. On one level, state institutions coerce the calculated
revealoftransgenderstatusthatNTACencourages.Yetonanotherlevel,that
reveal functions as an example of the confession, which Foucault explains
as aritual understood as critical for the production of truth. He argues that
“the obligation to confess is now relayed through so many different points,
is so deeply ingrained in us, that we no longer perceive it as the effect of
apower that constrains us.”’^ Moreover, he suggests that the confession is
made all the more powerful and privileged through the careful concealment
of what is to be confes.sed.’' Thus while ostensibly forced by state agents and
institutions, the confession that NTAC urges affords the confessor asense of
58
pleasure as well, of presenting oneself as patriotic and willingly compliant.
In this way, the relationship between the figure of the compliant transgender
traveler and state surveillance programs exemplifies Foucault’s concept of
“perpetual spirals of power and pleasure,” such that the concealment and
unveiling of transgender status in response to state pressure form aseductive
59
circle of evasion and discovery.
46 CHAPTER ONE
The recourse to strategic visibility remains grounded in assumptions that
invisibility was ever possible. Which individuals and groups can choose vis¬
ibility, and which are already visible—perhaps even hypervisible—to sur¬
veillance mechanisms? For whom is visibility an available strategy for either
social advancement or personal safety, and at what cost? Moving well away
from the approach taken by NCTE and NTAC, other queer and transgender
organizations accounted for these questions as they addressed the Real ID
Act and related surveillance measures. The Audre Lorde Project (alp), a
community center based in New York City and focused on support and mo¬
bilization in communities of color, held two community meetings about the
war on terror and released an open letter in January 1003 that explains why
the war on terror is an LGBTST issue and urges fellow organizations to op¬
pose the war. This letter directly addresses the question of visibility by high¬
lighting the increased violence, racial profiling practices, and surveillance
measures after 9/11.“ More than adecade later, the organization continued
to explicitly address the Real ID Act as part of anti-immigrant policies that
it articulates as central to LGBTST struggles. For the tenth annual NYC
Trans Day of Action for Social and Economic Justice in 2014, ALP released
a“Points of Unity” statement demanding, among other things, safety in
public spaces including public transit, an end to police violence and harass¬
ment, and the “full legalization of all immigrants.”'’' This last point names
the Real ID Act alongside other policing programs and the increased power
of DHS, maintaining solidarity with all groups targeted by these policies
and specifying transgender and gender-nonconforming people of color as
particular targets.^^ These approaches clarify that not all transgender people
can occupy the role of the good, safe transgender traveler that NTAC recom¬
mends, and that increased visibility simultaneously places one under greater
scrutiny and surveillance. Those made visible as abnormal or unruly and in
need of constraint or correction may experience increased vulnerability, such
that visibility wields more damage than protection. The statements by ALP
explain that some bodies and identities would be read under the DHS ad¬
visory’s warning as gender deviant, dangerous, or deceptive even if they did
produce paperwork documenting their transgender status. While this docu¬
mentation may lessen suspicion of some, it compounds scrutiny of others.
The Transgender Law Center in San Francisco also released aset of rec¬
ommendations for transgender people, including one statement jointly is¬
sued with NCTE in 2003, which discusses new security measures including
DECEPTIVE DOCUMENTS 4 7
the DHS advisory and Real ID Act. They note that although these measures
were originally conceived in response to “legitimate security concerns” re¬
garding terrorists’ use of false documentation, they ultimately create undue
burdens for transgender individuals who seek to “legitimately acquire or
change identification documents.”'^-’ Like NTAc’s concern that nonthreat¬
ening transgender travelers could be mistaken for terrorists, the response
from NCTE and the Transgender Law Center omits critical engagement
with the rhetoric of terrorism used to justify state regulation of gender, race,
and citizenship more broadly. Instead, the organizations’ statement asks for
rights and state recognition on the basis oflegitimacy, aclassification already
infused with the regulatory norms produced and maintained by medical sci¬
ence and government policy. In the case of transgender people specifically,
formal legitimacy is based on legal documents that typically require some
medical evidence for change of gender marker. In almost all cases, medical
professionals depend on aformal diagnosis of gender identity disorder or
dysphoria, which itself turns on the language of correction and normaliza¬
tion. Circularly, then, legitimate status requires identity documents, while
identity documents simultaneously require legitimacy.
Organizational responses like those produced by NCTE and the Trans¬
gender Law Center are unable to address the ways that pervasive surveillance
of gender is inseparable from that of racial difference. New shifts in—and re¬
newed attention to—racial profiling practices in the aftermath of 9/11 offer
important context through which strategies of visibility must be considered.
Within the framework of these organizations’ statements, for which bodies
is legitimacy attainable, and for which is it already foreclosed? The Sylvia
Rivera Law Project provides an analysis of this approach based on its com¬
mitment to anonhierarchical liberation movement in which gender is “inex¬
tricably related to race and class.”^"* The organization argues that the current
political climate of “us vs. them” contributes to the polarization of com¬
munities that could otherwise work in coalition, as some targeted groups
attempt to divert surveillance and policing onto others.® Assimilation—
going stealth, or claiming status as agood transgender citizen—becomes
atactic for escaping state surveillance or persecution, and understandably
so. But these assimilation strategies are regularly used in conjunction with
the scapegoating of other marginalized groups, such chat the good citizen
and the normatively gendered person are produced against the terrorist, un¬
documented immigrant, and gender deviant. In fact, these two seemingly
48 CHAPTER ONE
contradictory groups mutually constitute and require each other: “docile
patriots” and good citizens claim normalcy precisely through distinguishing
66
themselves from other marginalized groups figured as dangerous intruders.
The terrorist figure thus makes possible the construction of anational iden¬
tity and image of citizenship, providing anecessary contrast against which
67
the citizen is formed in opposition.
The repeated advice to reveal one’s transgender status, proving that trans¬
gender people are good citizens with nothing to hide, suggests adifferent in¬
terpretation of going stealth. Here, such apractice means not simply erasing
the signs of transgender identity, but rather maintaining legibility as agood
citizen and patriotic American, providing evidence of legitimate transgender
identity that erases any signs of similarity to the deviant, deceptive terror¬
ist figure. Yet because normative, nonthreatening gender is read through
ideals of whiteness, economic privilege, able-bodiedness, and heterosexual¬
ity, this form of going stealth is an option available only to certain people;
in fact, going stealth in this way requires the simultaneous maintenance of
anonnormative and suspicious category that can produce the safe citizen as
its contrast. The specific reliance on identification documents as aprimary
measure of legitimacy intensifies that polarization. This is not only because
approved documents are not available for certain groups, or because even
approved documents might compound scrutiny for other groups (such as
documentation showing that one’s country of origin is on aterrorism watch
list). More fundamentally, an investment in identification documents as
evidence of credibility reconsolidates nationalist policing of deviance and
illegitimacy. As documentation produces new and refines existing categories
of legitimacy, it also shores up those nonnormative categories that make the
normative possible. In this way, identity documents produce and refine clas¬
sification schemas that support biopolitical regulation of bodies and popula¬
tions as well as the categories of race, gender, sexuality, and citizenship.
DECEPTIVE DOCUMENTS 4 9
CHAPTER TWO
On Medical Necessity
Given the key role medicine has played in producing the category of trans¬
gender, it is perhaps no surprise that prominent advocacy organizations es¬
tablish prosthetics as amajor site of contention in airport screening proce¬
dures. Likewise, their concerns about TSa’s treatment and interpretations of
transgender travelers’ bodies—for instance, whether the presence or absence
of certain body parts in AIT images will incite suspicion because they con¬
flict with agents’ perceptions of the gendered body in front of them—follow
from the notion that modern medicine helps produce transgender bodies
as such. This pervasive belief appears in arange of scholarship suggesting
that transgender identity emerges primarily in relation to medical develop¬
ments that enable physical sex reassignment, positioning the transgender-
identified person (and body) as unique to modernity, produced through a
modern West’s sex/gender categories and its technological and medical ad¬
vances.'* As Iexplained in chapter i, contemporary medical and legal insti¬
tutions continue to rely heavily on the presence of medical technologies as
evidence of legible transgender identity.
Much discussion of transgender people and medicalization focuses on
the processes through which transgender-specific medical care, including
surgeries and hormones, can or should be accessed. Typically, such care is
available only after aformal diagnosis of gender dysphoria (formerly gender
identity disorder). Many critics of this process argue that transgender iden¬
tity is not adisorder and accordingly should be removed from the Diagnostic
and Statistical Manual of Mental Disorders, allowing access to hormones and
surgery through informed consent, as with most non-transgender-specific
medical care. Those favoring the current process often contend that the di¬
agnosis provides ameasure of legitimacy that makes health care available to
transgender people, particularly for those populations with the least access
to care, including youth, poor people, and incarcerated people.^ Advocates
have accomplished several expansions of transgender people’s access to med-
51 CHAPTER TWO
ical care by arguing chat care such as surgeries and hormones is medically
necessary, following abroader framework in health coverage that supports
physicians’ decisions for diagnosing and treating illness, disease, or injury.^
In other words, naming certain medical technologies as medically necessary
treatments for aclinically diagnosed condition can justify the coverage and
administration of such care. In some cases, the medical necessity argument
has won crucial access to medical care. For example, since 2.011, U.S. federal
prisonsandfederalhalfwayhouseshavebeenrequiredtoprovideincarcer¬
atedpersonsappropriateevaluationandtreatment(includinghormones)for
gender dysphoria; similar requirements for carceral institutions on the state
level are still under debate. Likewise, several major cities and public univer¬
sity systems in the United States, along with Medicare, now cover certain
transgender-specific forms of care deemed medically necessary.’^
The rhetoric of medical necessity need not turn only on the notion of
treating aphysical or mental disorder. In fact, the term is sometimes ex¬
plained in ways that locate disorder in social systems rather than in indi¬
vidual bodies: for instance, several public health and medical organizations’
statements on the topic note that access to transition-related care may help
alleviate the mental and physical pain caused by pervasive rransphobia in the
form of harassment, assault, or employment and housing discrimination.*
This approach echoes the development of a“social model” of disability in
disability studies and activism, which eschews amedical framework that
“defines disability in terms of individual deficit” and instead seeks broad
structural change in social and political systems that disable certain bodies
and groups.’ Yet while the concept of medical necessity can be strategically
beneficial, particularly in the realm of law, it also fundamentally grounds
transgender identities and bodies in Western medicine and particular forms
of medical technologies. As Ishow below, commentators invoke these tech¬
nologies as the very things that allow transgender people to pass or appear
unmarked as transgender, amedicalized ability that can be interpreted as
both freeing and damning. On one hand, certain bodily technologies are
said to grant transgender people the ability to move more freely in public
space and to escape the more overt scrutiny applied to transgressive gender
presentations. On the other hand, that same supposed ease of movement
can mark these bodies as dishonest and deceptively threatening, able to hide
deviance and bodily abnormalities until they are actively revealed.
Consider for example awidely circulated fact sheet that NCTE released
F LY I N G U N D E R T H E R A D A R 53
in June 2009. Addressing new airport X-ray scanners, NCTE implicitly re¬
affirms the idea that medical technologies not only are part and parcel of
inhabiting atransgender body, but also offer the freedom to move through
the world without scrutiny—except in special cases where state surveillance
impinges on individual rights to privacy. The document lists prosthetics and
binding materials alongside other body parts that the new X-ray machines
will record, noting that “if atransgender person’s [X-rayed] body looks dif¬
ferent from what the TSA agent considers ‘normal,’ the passenger may be
subjected to further searches and/or humiliation under the auspices of secu¬
rity measures.”"’ The fact sheet suggests that were it not for these new imag¬
ing techniques, many transgender people would not be noticeable to security
personnel as different or not “normal” because they would otherwise be able
to pass freely through security checkpoints.
Of course, only certain transgender bodies can fully achieve or approxi¬
mate the idealized image of normative gender. The fact sheet bypasses this
point by reassuring readers—in asection titled “What Should IDo to Avoid
Problems at the Airport?”—that the new X-ray scanners are “used primarily
for passengers who are flagged for further screening after passing through
ametal detector.”" The document further encourages travelers to “make
their own decisions” about whether to opt for apat-down instead of go¬
ing through the scanner, based on what feels most comfortable and safe
to them.”‘^ These statements assume that most transgender travelers would
not be flagged for reasons beyond clearly marked transgender status, such as
race, nationality, or citizenship status, and that these factors would not in¬
fluence whether security officials interpreted their gender presentation and
gendered body as normal or not normal. At face value, NCTE’s declaration
that “transgender people have as much right to travel as anyone else and we
have aright to express any gender we want, any way we want while traveling”
is admirable.’-’ Yet it also privileges amobile U.S. citizen who can take rights
as agiven, and for whom the choice between AIT screening and pat-down
appears in the guise of freedom and personal safety rather than as afalse
choice between related forms of militarized surveillance. Medical necessity
can serve as recourse only for certain bodies and certain bodily technologies.
This legitimating rhetoric classifies particular types of bodies as in need of
and worthy of care, so that the concept of medical necessity helps construct
the line distinguishing health promotion from health endangerment. Like
all classificatory systems, this process simultaneously extends recognition
54 CHAPTER TWO
and legitimacy to some groups while it withholds them from others, either
by specifically marking certain groups as illegitimate or by failing to name
them at all.
56 CHAPTER TWO
vulnerable to violence and discrimination. Yet framed in the language of
care, the program also helps more fully incorporate those groups into the
biopolitical management of health and risk, via surveillance technologies.
By positioning certain types of bodies as in need of this care, TSA Cares
naturalizes the screening process overall, which comes to seem normative
and routine except in those cases requiring particular forms of care. Ad¬
ditionally, it naturalizes aform of able-bodied health, defined as one that
needs no special screening techniques. In this way the program draws aline
between able-bodied and disabled, health and medical condition.
But no body fully aligns with ideal health, and no body is untouched by
medicine or technology. Lennard Davis observes that perhaps now more
than ever, care of the body is understood as “a requirement of citizenship,”
such that no body is perceived as complete without consumption of med¬
ical, technological, and hygienic products.'^ Suggesting that the categories
of disability and impairment are productively unstable, Davis proposes em¬
bracing chat instability to unseat classificatory distinctions between bodies
along lines of health, dependence, and wholeness. In contrast, the TSA Cares
program invests in these distinctions, relying on the broad title of “disabili¬
ties and medical conditions” that implies an easily recognizable category
with clear and fixed parameters. Yet TSA’s own continual editing of that
category—which conditions can be included, how they are grouped together
or separated out, and what specific bodily states constitute each of them—
illustrates just how unstable and permeable such divisions are. It is not that
certain bodies exist as anomalies within astable system of health, but rather
that this very system and its attendant technologies reinforce and rework
deeply embedded conceptions of normative bodies that can be interpreted
as healthy and safe.
X-Ray Specs
58 CHAPTER TWO
tive measures.^“ Bur the potential damage such technology might cause (not
only for those bodies directly targeted by law enforcement, but for all bodies
and populations under state scrutiny) tends to be muffled by commonsense
beliefs in the necessity of policing technology to ensure safety, beliefs sup¬
ported here by the X-ray’s long-standing reputation of health promotion.
Law enforcement use of X-ray equipment can offer away of testing po¬
tentially damaging technology on atargeted population before it is imple¬
mented more broadly. Backscatter X-ray machines were in use in several
prison systems in the United States during the late 1990s, more than ten
years before their introduction to most commercial U.S. airports. Correc¬
tional facilities lauded the machines as amore efficient and effective way
to screen both incarcerated people and visitors for concealed weapons and
other prohibited items. Backscatter manufacturers and prison officials alike
described the technology as safe, locating danger not in the radiation dosage,
but rather in the incarcerated body that might be hiding harmful objects.^'
Not until the early zooos, when the U.S. government began to consider
extending backscatter screenings to the general public, did the FDA begin a
series of health risk assessments, which similarly characterized X-ray tech¬
22
nology as beneficial to bodily and national health.
Just as with claims to medical necessity, defining and securing public
health necessarily entails delineating specific threats to that health status.
The X-ray machine’s reputation as an objective medical technology that re¬
veals bodily truths has long positioned it as acentral tool for this sorting
process. An 1896 New York Times article announcing the discovery of the
X-ray concluded that it would revolutionize modern medicine because it en¬
abled surgeons to “detect the presence of foreign bodies.”^^ In this case, the
foreign bodies in question were bullets and other material objects lodged in¬
side human bodies. But “foreign bodies” also came to mean other things. For
instance, Lisa Cartwright shows how public health campaigns about the use
of X-rays to detect tuberculosis in the early twentieth-century United States
visually represented the disease as aliteral foreign body, in one case figuring
tuberculosis as acartoon Japanese soldier invading the otherwise healthy
American citizen.^"* Produced just four years after the closing of the last
Japanese American internment camp, the film carries forward white fears
of an enemy within: in this depiction, the racially unmarked individual body
symbolizes the American social body, and the racial other stands poised to
penetrate national health and safety. The campaign positions X-ray tech-
60 CHAPTER TWO
which detainees were expected to reveal hidden truths about their links to
and knowledge of terrorist organizations. These interviews, as guards and
military officials named them, frequently relied on medical expertise for le¬
gitimacy, incorporating physicians to ensure the safety of various torture
27
techniques and psychiatric experts to determine the processes’ efficacy.
Thus the X-ray, even without literal use of its technology, suggests here the
uncovering of information that cannot be identified or extracted by more
superficial tactics. Used against the terrorist figure, it is the X-ray that deftly
seeks what is concealed.
Private Parts
State agencies and media outlets produced and circulated ahandful of of¬
ficial images demonstrating how AIT scans of travelers appear to TSA agents.
The TSA website hosted two such images: one depicting the results of a
backscatter machine, which uses X-ray technology (figure i.i), and one of a
millimeter wave scan, which uses radio waves (figure z.z). Each image depicts
the front and back of two different bodies that appear white against adark
F LY I N G U N D E R T H E R A D A R 6 i
Figure z.i Image produced by X-ray backscatter technology and circulated by
TSA (above). Figure z.z Image produced by millimeter wave scan and circulated
by TSA (facing page, above). Figure 2.3 “Whole Body Imaging FAQ_” circulated
by the National Center for Transgender Equality (FACING PAGE, below).
6z CHAPTER TWO
/"'/ National Center for
I/.TRANSGENDER WHOLE BODY IMAGING FAQ
EQUALITY Tr a v e l i n f o t m s t l o n ● J u n e 2 0 0 9
they are absent the most common surface markers of race, such as skin color.
As the next section of this chapter contends, racial meanings can profoundly
shape these images and their interpretations, but the imagined absence
of racial difference in the X-ray’s gaze shifts public anxieties about such
screenings onto identities and bodily components that may be more overtly
present in the circulated images.
Major concerns about airport screenings—regarding both AIT scans
and pat-down procedures—tend to focus on the forced exposure of bodies
along lines of gender and sexuality and, to alesser extent, age and disability.
These anxieties coalesce around the question of vulnerability, and as such
the model complaint cases tend to be those bodies envisioned as most vul-
64 CHAPTER TWO
viewing AIT images, the pat-down can seem quite straightforward. Yet be¬
cause it relies entirely on individual TSA agents’ interactions with travelers,
it can be equally opaque. Although TSa’s website does not provide an offi¬
cial detailed description of the enhanced pat-down that has been in practice
since 2.010, the procedure is relatively standardized; some airport security
lines even have clearly posted statements that TSA agents read verbatim to
travelers who request apat-down.^^ But the fact that this is only the case in
some locations indicates how variable the process can be. The basic ritual of
the pat-down proceeds as follows: the traveler assumes aspecific stance (feet
shoulder-width apart, arms outstretched with palms facing up), and an agent
of the same gender explains the procedure; asks about injuries, disabilities,
and any desire for aprivate screening; and then physically searches the pas¬
senger. Public anxiety has focused primarily on the enhanced pat-down’s
requirement that agents touch travelers’ breasts, buttocks, and (ofparticular
concern) genitals, actions specified in agents’ scripted statement that they
will move their hands up the traveler’s legs until they meet resistance.
Though routine enough that it follows codified standards and scripts, the
pat-down process also changes significantly depending on airport, specific
security line, individuals involved, and ahost of othet variables. The TSA it¬
self records feedback and complaints not only about the fact of the enhanced
pat-down (that is, complaints about its very existence), but also about the
unpredictable ways in which it is carried out.’’* These reports range from
confusion about different standards in different airports to multiple accusa¬
tions of sexual assault, molestation, and racial and sexual profiling of the
travelers selected for pat-downs. In addition to the many variations in how
the pat-down is physically conducted, individual agents regularly add their
own questions and conversation to the process, such that the pat-down is
simultaneously arepetitive, uniform state practice and aunique interaction
between individual bodies. The divergence that occurs between the formal
physical routine codified by TSA and the spontaneous, diverse range of ver¬
bal interactions produces moments of slippage in which the TSA agent both
carries out standardized state practices and disrupts those practices. These
unpredictable interactions built into pat-downs can position the AIT scans
as routine—indeed, mechanical—by contrast, supporting the illusion of an
objective surveillance practice that is removed from the social or political.
The coerced act of choosing between these two forms of surveillance in¬
volves complicated negotiations of privacy, which is made available to some
66 CHAPTER TWO
instructor who regularly visited her incarcerated son likened the compul¬
sory screenings to “living in apolice Gestapo state” and continued, “this is
ahazard to the general public. Ithink we’re guinea pigs.” While these state¬
ments may well have some validity, they gain it in part through the natural¬
ized oppositional relationship between “the general public” and incarcerated
people. Because the prison is understood to void bodily privacy for chose
bodies that are incarcerated, as apractice built into the very concept of im¬
prisonment, these statements need not attend to the ways that prisoners al¬
ready live in apolice state, as do wide swaths of criminalized populations,
whether literally imprisoned or not.^' Thus it is not deemed unconscionable
CO subject prisoners to the public exposure ofX-ray scans, anotion clarified
by asenior staff member at amaximum-security facility in North Carolina,
where backscacter X-ray machines were being used to screen prisoners rather
chan visitors: “We wouldn’t use it on our staff because it is very intrusive
If afemale stood in front of it, it would show her bra, her panty line; [with]
amale it would show just about everything he’s got.”^* Debates over such
surveillance measures in the context of the prison starkly highlight the ways
chat bodies that are compelled to be public sustain the concept of privacy
for other bodies; because bodily privacy loses purchase within the prison, it
appears natural (if at times endangered) outside of it. We can see the residue
of these discourses in the repeated critical description of both the pat-down
and AIT scan as prison-style searches, rhetoric that secs the free, rights-
bearing citizen against the incarcerated person for whom privacy is fore¬
closed as amatter of course.
This does not mean, of course, that all those not formally incarcerated
are in fact naturally imbued with aright to privacy, for bodily privacy rests
on aconstellation of factors ranging from economic status to disability to
age. (Reproductive justice advocates, for example, have made this clear in
their analyses of the limitations of bodily privacy for pregnant or poten¬
tially pregnant people under increasingly restrictive policies governing re¬
productive decisions, which curtail bodily privacy for all pregnant people
but particularly for those who receive public assistance, who are disabled,
who are minors, or who have criminal records.)^^ Rather, these imagined
clear distinctions between the inside and outside of the prison occur in part
through basic understandings of the prison as aspace of unquestioned and
thoroughly rationalized loss of privacy, so that violations of privacy register
as such only when they touch those for whom privacy otherwise appears so
In addition to their depictions of physical anatomy, the AIT scans also show
various types of objects attached to bodies. Of course, the machine itself
can only record these images; TSA agents operating the scanners must then
interpret them to determine whether individual bodies warrant further ex¬
amination. In the three primary images that circulated as examples of AIT
scans, some of the objects shown are fairly readily recognizable. For instance,
the image reproduced in NCTE’s fact sheet depicts ahandgun on the rear
hip, suggesting that this figure is hiding adangerous weapon. Yet the fig¬
ure also has avariety of other objects on the hips and waist, and these are
more difficult to interpret. This is precisely the concern articulated by many
transgender and disability rights advocates.'*® Within the “nothing to hide,
nothing to fear” logic of the war on terror, the images’ vagueness may work
in favor of bodies that TSA agents perceive as normative and innocent; these
travelers already have greater access to privacy and may be given the ben¬
efit of the doubt in order to maintain that privacy. But for more troubling
bodies—those that are difficult to classify or are already classified as poten¬
tial threats based on perceived race, nation of origin, or citizenship status,
for example—vague images may intensify scrutiny. Yet to remain focused
on the machines’ accuracy coo easily accepts the prevailing parameters of
state surveillance, militarized safety measures, and good versus bad bodies.
The constant reproduction of the same handful of images entices viewers
to examine the depicted bodies again and again. The TSA released the im¬
ages ostensibly to clarify the inner workings of these surveillance practices,
agesture toward full disclosure on the part of state agencies. In fact, the TSA
website offered these images in the context of several pages of information
about what passengers can expect when asked to go through the scanners
68 CHAPTER TWO
and what they can do to assist officials and ensure efficient security lines, all
information intended to make the process perfectly clear. At the same time,
the images themselves are rather less than clear, functioning as invitations
fot extensive inspection. The production and circulation of these images
encourages focused examination of patticular bodies that come to seem out
of the ordinary or difficult to define. Furthermore, the very repetition of
such images naturalizes the process of visual scrutiny and of X-ray imaging
specifically. One may even feel acertain pleasure in the act of studying these
vaguely defined bodies, which begin to stand in for the terrorist body, the
dangerous body, the body that attempts to deceive.
Likewise, these images work closely with the racism embedded in anti¬
terrorism policies and practices. The literal whiteness of these ubiquitous
figures—ghostly white bodies set against black space, with dark shadows
indicating potentially threatening objects—may visually suggest that the
figure under inspection represents anormative white traveler. But because
antiterrorism discourse so persistently locates violence outside of white¬
ness and attaches it instead to Black and Muslim people in particular, these
white figures and their attendant signs of violence (weapons, indeterminate
objects, and as the next section of this chapter suggests, even genitals) are
more likely to signal racial categories other than white. Leti Volpp explains
that particularly since 9/11, public discourse and government actions in the
United States construct the category of the terrorist as one inhabited by
certain racial groups, forming the constitutive outside to the category of the
American citizen. Arguing that these categories are productive of and thus
dependent on one another, she writes that the events of 9/11 “facilitated the
consolidation of anew identity category that groups together persons who
appear ‘Middle Eastern, Arab, or Muslim.’ This consolidation reflects ara-
cialization wherein members of this group are identified as terrorists, and
are disidentified as citizens.”'*' If the scanned images produced and circu¬
lated by TSA are imagined to represent dangerous or terrorist bodies made
available for inspection, then already these images and their meanings are
produced through anti-Muslim racism. For many viewers, race may come
to mark these bodies in ways that are at odds with their literal whiteness,
even without visual reference to other surface features through which race
is routinely read.
The repetition of images may also support the notion that an identifi¬
able terrorist body exists to be sought out by certain technologies. In this
At the same time, Ghassan Hage examines the case of Palestinian suicide
bombings, often described as “the worst possible kind of violence,” against
the mass killings wrought by the Israeli state.^^ He considers the possibil¬
ity of reading acts explicitly classified as terrorism—suicide bombings in
particular—not as the most abhorrent form of violent death, as they are
so commonly interpreted, but as “a sign of life” in populations otherwise
ravaged by the structural and material violence endemic to colonialism:
“for what better sign of life is there, in such violent conditions, than the
capacity to hurt despite the greater capacity of the other to hurt you?’”*"* The
seemingly clear boundaries between life and death, violence and care, break
down and become interdependent when understood through these broader
70 CHAPTER TWO
frameworks. Extending Hage’s analysis, Ja.sbir Puar posits the figute of the
suicide bomber as a“queer assemblage” that exposes these binary systems as
false, producing “a systemic challenge to the entire order of Manichaean ra¬
tionality that organizes the rubric of good versus evil.”'*^ It is this rubric that
animates and rationalizes the war on terror, in which the twin violences of
71 CHAPTER TWO
mass destruction. These complicated positionings speak to the ambivalent
waysthatwhite,heteronormativeU.S.nationalismnavigatesracialandsex¬
ual difference. The focused anxiety about genitals in this case recalls what
Kobena Mercer, following Frantz Fanon, observes as “the primal fantasy
of the big black penis [that] projects the fear of athreat not only to white
womanhood, but to civilization itself.”^^ This threat is then managed in part
through positioning the racialized figure as sexually perverse and primitive
and therefore inferior, even while the persistent emphasis on and anxiety
about this figure (particularly as represented through genitals) reaffirms the
power of the perceived threat. Relatedly, the ways that genitals come to sig¬
nify racial, gendered, and national identifications echo David Eng’s concept
of racial castration, apsychic and political framework through which racial
and sexual difference are both produced and managed always in relation to
one another. Importantly, Eng contends that these identifications not only
construct racialized subjects within narrow frames but also “produce against
these particularized images the abstract national subject of aunified and
coherent national body.”^*
In this sense, the explosive/failed genitals of the underwear bomber
contrast with the exploded/repaired genitals of U.S. soldiers, who are at
once emasculated by the foreign enemy and restored by the West’s modern
medicine and technology.” Legitimated violence thus merges with medical
advancement in the figure of the loyal citizen-soldier, whose genital trauma
signals not perverse failure but patriotic sacrifice, not foreign threat but
national progress and renewed masculinity. The determination of many
transgender advocates to classify transgender-related prosthetics as medi¬
cally necessary—as enabling the modern, mobile citizen—thus has little
room for consideration of the underwear bomber, or the ways that those
genitals (both as literal body parts and as symbolic concepts) become asite
of anxious scrutiny. In fact, the logic of classification here buttresses efforts
to more effectively and accurately demarcate the dangerous figure, whose
body must ultimately differ from those of ordinary citizens. Obscuring that
figure’s historical and ideological resonances with the broader scrutiny of
nonconforming bodies created as threatening, many prominent advocacy
efforts highlight instead the reparative function of medically legitimated
prosthetics, which purport to fold otherwise deviant bodies into the norm
by portraying them as inherently safe, legible, and nonviolent.
In early 1013, partly in response to sustained public concern about the use
of X-ray technology in airports, TSA began replacing backscacter machines
with millimeter wave scans.“ (Notably, the machines were scheduled to be
moved from airports to other government agencies, and by mid-2014, more
than 150 such scanners had been transferred to local law enforcement agen¬
cies, including jails and prisons.)'^' The new machinery does not rely on ion¬
izing radiation, and it does not produce images specific to individual travel¬
ers but instead uses ageneric outline of abody (figure 2.4). Anything that
the scanner records as suspicious is marked on this outline, and in these cases /
7 4 CHAPTER TWO
Figure i.4 Marketing material for ProVisionz security scanner, showing generic
body image and pink and blue scan buttons.
76 CHAPTER TWO
At the same time, perhaps there is something productive—even if un¬
intentionally so—in the anxiety and confusion provoked by these security
procedures and surveillance images, anxiety that can extend even to the
most normative of bodies and identities. That is to say, there is acommon
narrative even from many people who are rarely or never singled out for
scrutiny that they feel anxious approaching security personnel, that they
fear their identification documents may not look enough like them, that
they are concerned their body may be misread by the AIT scanners. As this
chapter shows, certain types of bodies and identities, routinely represented
as security threats, historically bear the brunt of state policing practices,
making it possible for others to imagine that they are free from such prac¬
tices. This is no less true at the airport, of course; one reason that new air¬
port screening procedures draw so much attention is that they overtly scru¬
tinize those bodies that may seem otherwise outside of surveillance systems’
critical gaze. This more widespread anxiety has the potential to open up
different questions about nonnormative bodies and about bodily anomalies
that position them not as fixed, ahistorical, or easily read markers of devi¬
ance, but rather as active interpretations that—like the images from AIT
scanners themselves—can shift according to context. And while certain
people might more easily argue that the screening process has wrongfully
misinterpreted them, the growing awareness that such misreadings occur
at all might usefully make clear the fragility of any surveillance program’s
grasp on bodily norms.
Even this potential disruption can be adjusted for, though. In ZO13, TSA
expanded its Precheck program for “trusted travelers,” allowing any U.S.
citizen to apply for this preapproved status. First piloted in zoii, when it was
available only to certain frequent flier members and those already enrolled
in similar programs through Customs and Border Protection, Precheck re¬
quires abackground check, an in-person interview, fingerprinting, and afee
of $85 for five years of enrollment. In exchange, TSA provides “a more conve¬
nient and efficient screening experience,” with expedited security lanes and,
during the screening process, permission to keep shoes and jackets on and
to keep laptops and liquids in carry-on luggage; byjune Z017, the agency an¬
65
nounced that more than five million people had enrolled in the program.
Given chat Precheck status also typically routes travelers through ametal de¬
tector rather than afull-body AIT scanner, it is perhaps no coincidence that
TSA expanded this program during the same period that it implemented the
port, just as they did when extended to visitors in prisons years before. These
screening measures puncture the illusion of privacy for many travelers who
must now, with AIT scans, confront overt physical scrutiny in the manner of
prisoners or terrorists. Precheck reaffirms that bodily privacy—for instance,
through permission to remain fully clothed during screening—while simul¬
taneously undermining it through biometric data collection. The program
thus layers several sorting processes: it tracks the voluntary relinquishing of
data to apply, inspects fingerprints and identification records of enrollees,
and determines whose bodies will undergo which type of screening at the
airport itself (It should come as no surprise that TSA’s Precheck website in¬
cludes information for “disabilities and medical conditions.”) The promo¬
tional video concludes by noting that TSA “continues to adapt for an ever-
evolving threat.” Though this statement positions Precheck as evidence of
more refined antiterrorism programs, it also speaks to the process by which
state agencies become attuned to variations in bodies and bodily technolo¬
gies, continuing to revise somatic norms and folding new differences into
surveillance practices themselves naturalized as healthy and safe.
78 CHAPTER TWO
CHAPTER THREE
B AT H R O O M S , BORDERS,
AND BIOMETRICS
your child uses.”' This tactic makes use of the basic rhetoric of dangerous
deception, suggesting that the bill condones transgender fraud and assists
the inherently deceptive transgender person in preying on vulnerable (non¬
transgender) women and children. The scare quotes around “transgen¬
dered” position transgender women as men, while also implying that many
such people in the restroom are not actually transgender. In the organiza¬
tion’s logic, then, the transgender figure signifies not only the deviant or de¬
luded transgender-identified person, but also the perverse and threatening
non-transgender perpetrator who—in afantasized revetsal—falsely puts on
atransgender identity as astrategy to avoid scrutiny. Soon after the Phoenix
law passed, the Arizona stare legislature introduced two bills seeking to
align bathroom use with birth-assigned sex.
Arizona represents only one of many U.S. legislative struggles over gen¬
dered bathrooms at the state and local levels. And as in Arizona, many le¬
gal challenges follow closely on the heels of new antidiscrimination laws.
For instance, abroad equal-rights ordinance passed in Houston, Texas, in
May 1014 covered arange of identity categories (including race, national
origin, and age) and addressed employment, housing, and city contracting
practices. Yet public discourse regularly framed it as essentially about gen¬
dered public bathrooms, with some opponents referring to it as the “Sexual
Predator Protection Act.”^ The ordinance was overturned by popular vote
in 2015. Other legislation operates preemptively, as when Utah representa¬
tive Michael Kennedy proposed a2014 bill that both defines gender based
on aphysician’s examination of genitalia and explicitly prohibits students
/
/
in Utah public schools from using abathroom that does not correspond to /
their (genitalia-based) gender.^ These are just three moments of contention
about the regulation of bodies entering the public restroom, each of which
illustrates the powerful anxieties that space commonly provokes. So pressing
and incendiary are these anxieties that broad legislation can be reduced to
the single threatening specter of the unregulated public bathroom and the
deceptive interlopers it hosts.
The basic concerns present in these debates are not new in themselves.
For four decades, advocates have worked to pass nondiscrimination ordi¬
nances at the state and local levels that cover transgender people’s use of
public accommodations, and bathrooms regularly emerge as asticking point
in these efforts. For example, St. Paul, Minnesota’s policy first included
transgender people in 1975, and local transgender activists recall that it
faced considerable resistance for decades, with opponents “attempting to
exploit fears about trans people and bathrooms” to overturn the ordinance.^
Increasingly, though, legislative and public responses to bathroom debates
reflect the anti-immigrant and antiterrorism frameworks that intensified
after 9/11. In particular, this chapter shows how adiscourse of deception
and an investment in biometric surveillance practices shape public and legal
approaches to gendered bathrooms.
Beginning with Arizona state legislators’ challenge to the Phoenix ordi¬
nance in 2013, bathroom policies not only explicitly criminalize those deter¬
mined to have entered the bathroom improperly, but also base that determi¬
nation on specific body parts—such as genitals or chromosomes—framed
80 CHAPTER THREE
as natural and unchanging. This chapter argues for understanding such
bathroom scrutiny in the context of biometric surveillance, which promises
objective identification of individuals through the assessment of presumably
immutable physical characteristics. Biometric data are typically considered
harder to falsify and therefore more objective than ID documents. While
fingerprinting has long been afamiliar form of biometric data collection
to track and identify criminalized persons, biometric surveillance practices
garnered renewed state and public interest after 9/11. Government officials
vigorously pursued an array of biometric technologies as strategies to guard
against terrorism and to track people crossing U.S. borders. By insisting on
the primacy and factuality of the physical body for identification, criminal¬
izing bathroom surveillance employs the basic logic of biometrics. More¬
over, because public bathrooms have always been sites through which good
citizenship is produced and access to public space managed, that surveil¬
lance functions as one component of the anti-immigrant and antiterrorism
biometric programs intended to reinforce spatial boundaries and identify
threatening outsiders in the name of public safety.
Bathroom surveillance often appears as amatter of public safety rather
than as surveillance per se, and rationalizing bodily scrutiny in this way al¬
lows concepts like “the general public” and “safety” to stand unquestioned
as common sense; those bodies understood as wrongly moving into certain
spaces are discursively disassociated from the public because they jeopardize
safety. In this way, surveillance of public bathrooms helps produce ideals of
good citizenship and determine the parameters of citizenship by delimit¬
ing access to public space. The space of the bathroom may seem quite mi¬
nor in relation to the vast scope—and effects—of antiterrorism and anti¬
immigration projects, but Ishow here how bathrooms can highlight the
relationship between those larger projects and the everyday surveillance
practices that regulate citizenship and participation in public life. If, as
Isaac West observes, use of the public bathroom is “one of the most, if not
the most, quotidian practices of citizenship,” then this chapter argues that
surveillance criminalizing public bathroom use is one element of alarger
effort to secure citizenship and spatial belonging through the apprehension
of physical difference.^
linking women to the domestic rather than the public sphere, then the ab¬
sence of public bathrooms for female-assigned bodies aligned with both of
these social standards.^
Si CHAPTER THREE
S|
'WOMEN «(!'i;Vi<-
84 CHAPTER THREE
cussion of racially segregated bathrooms, Wasserstrom argues against their
influence on gendered bathrooms. He attributes the latter’s creation instead
t o the importance of inculcating and pteserving asense of secrecy concern¬
ing the genitalia of the opposite sex,” an analysis that, as Ishowed in chaptet
1, assumes as universal asexual privacy that actually depends heavily on
whiteness.'’
eties about citizenship as both aformal legal status and as asocial status
that turns on idealized understandings of propriety, morality, and legibility.
Strict legal definitions of citizenship are inextricable from the development
of ideals of good citizen.ship that arise through both state actions and “social
policies and practices beyond the state that in myriad mundane ways sug¬
gest, define, and direct adherence to democratic, racial, and market norms
of belonging.”^' Rather than resting on the national progress narrative built
into transgender advocates’ use of “second-class citizen,” the invocation of
citizenship in this claim should prompt consideration of how gendered pub¬
lic bathrooms are always sites through which struggles over citizenship and
belonging play out.
86 CHAPTER THREE
version (SB 1045) specifically protecting business owners from being legally
22
required to allow transgendet people into gendered restrooms.
Although Kavanagh and othet opponents’ vehement response might sug¬
gest that Phoenix’s law was the first to include transgender people in public
accommodations nondiscrimination policy, in fact, many such otdinances
have been in place at the city and state levels since the late 1970s. Several
of these policies ate remarkable for their legal definitions of sex and gen¬
der, which understand these categories as processes, feelings, or expressions,
rather than as obvious facts of birth or body. For example, nondiscrimina¬
tion ordinances passed in Champaign (1977) and Urbana, Illinois (1979),
define sex as “the state of being or becoming male or female or transsexual,
or pregnant.”^^ Ordinances in other locales can be interpreted as addtessing
transgender identity undet other terms; the ordinance for LosAngeles, Cali¬
fornia (1979), defines sexual orientation in terms of “emotional or physical
attachment” to another person, but also includes here “having or projecting
aself-imagenotassociatedwithone’sbiologicalmalenessorone’sbiological
femaleness.”^'* Some ordinances explicitly name bathrooms in their defini¬
tions oipublic accommodations, while some include single-sex public bath¬
rooms as possible exceptions to nondiscrimination policies. For example, St.
Paul, Minnesota’s otdinance (1988) states that “nothing in this chapter shall
prohibit discrimination on the basis of sex in such facilities as rest rooms,
locker rooms, and similar places.” But this line need not be understood as
requiring people to use gendered bathrooms according to the sex they were
assigned at birth, ot according to any single physical attribute. Instead, be¬
causetheordinancedefinesJ'ex:as“havingorbeingperceivedashavingmale
orfemalecharacteristics,”theexceptioncanbeinterpretedascoveringevery
person’s use of the bathroom that aligns with their gendered characteristics,
which, like all bodily or behavioral characteristics, might be self-defined or
perceived in any number of ways.^^ In such cases, then, the exceptions for
gender-segregated facilities may not tighten control over these spaces but
actually open them up to more gender possibilities.
In later years, it was precisely these nuanced and expansive definitions
that opponents pointed to as creating problems for gender-segregated public
spaces, especially bathrooms. Such was the case in 2,008 when Gainesville,
Florida, amended its nondiscrimination ordinance to include gendet iden¬
tity. The new law defines this term as “an inner sense of being aspecific
gender, or the expression of agender identity by verbal statement, appear-
88 CHAPTER THREE
identified, marked as deceptive in the act of traversing particular spatial
boundaries. The birth cettificate and immigration paperwork act almost as
afterthoughts, with documents legitimating the policing of bodies already
deemed unlawful threats.^' Moreover, since all such identification docu¬
Arizona legislators may well have strategically copied the SB 1070 model
in their efforts to weaken nondiscrimination orders. That their public state¬
ments about bathroom policies do not reference the state’s immigration laws
suggests that they too might view these two sets of legislation as addressing
wholly separate issues of citizenship and gender, their only connection the
political rhetoric emphasizing deceptive threats to the general public. But
90 CHAPTER THREE
the text of the bathroom bills themselves demonstrates how they delimit the
practice of citizenship precisely through creating and responding to gender
anxieties. Kavanagh’s initial bill, SB 1432., proposes amisdemeanor offense
under disorderly conduct for entering gendered facilities at odds with one’s
legal sex classification. In restricting use of gendered public space, this leg¬
islation helps define citizenship by granting or limiting full participation in
the public sphere. But perhaps most telling are the bill’s specific exceptions,
including bathroom entrance required by “job responsibilities” or to pro¬
vide “aid or assistance to another person,” including achild.‘^“ Under these
exceptions, certain behaviors that the law would otherwise define as illegal
gendered transgressions are excused because they align with an ideal of good
citizenship. That is, the gainfully employed and the responsible assistant/
parent can cross these gendered boundaries in their role as good (re)pro-
ductive citizens. In its explicit efforts to address gender, the bill constructs
good citizenship as astatus marked by characteristics such as productivity,
personal responsibility, and family formation.
Athird exception in SB 1432. applies to those who are “physically dis¬
abled.” Although listed alongside the previous two exceptions as if easily
equivalent, disability does not signal good citizenship in the same way that
(presumablyable-bodiedandnormativelygendered)workersandparentsdo.
On the contrary, disability has historically served as arationale for denial of
citizenship in both the legal and cultural senses."*' In particular, disability
has served as akey exclusionary category in legislation purporting to keep
public space safe, especially for women and children.^^ The disability ex¬
ception specified in SB 1431 therefore works differently from the other two
exceptions and might be understood in several different ways. It may be an
attempt at compliance with the Americans with Disabilities Act, to expand
or ensure accessibility and presumably affirm citizenship through public
accommodations. It may be areflection of the common structure of pub¬
lic restrooms in the United States, in which the symbol for disability (and
for legal compliance) typically appears on single-user, gender-nonspecific
bathrooms. Or, particularly since the bill is part of asocial and motal panic
about sexualized threats in bathrooms, this exception may be influenced by
long-standing dominant perceptions that people with disabilities are non-
sexual; such perceptions could frame disabled bathroom users not as threats
to childten, but as themselves children, whose bathroom use requires aid or
assistance from good (and able-bodied) citizens.^^ The explicit inclusion of
B AT H R O O M S , B O R D E R S , A N D B I O M E T R I C S 91
disability might both ensure and limit access to the category of citizenship
here, demonstrating how regulations like the criminalizing bathroom bills
actively construct that category rather than simply protecting it.
The bill’s specification of physical disability may be astrategic effort to
avoid loopholes that could grant transgender people access to public bath¬
rooms through this legal exception; after all, many legal arguments have
positioned transgender identity as adisability to win legal protections,
and opponents have often cast transgender identity as mental illness.'*^ But
this legislative strategy may not even be needed, since the exceptions as a
whole already work in at least two contradictory ways regarding transgen¬
der people. On one hand, they could nullify the criminality of entering
the “wrong” bathroom, provided atransgender person falls under one of
the citizen-marking exceptions at the time of entry. On the other hand, they
might assume and imply that good citizens are wholly distinct from those
whom the bill characterizes as athreat to the general public, such that the
exceptions never apply to transgender people at all. Additionally, because
the law would typically be invoked only on the basis of individual com¬
plaints, it is unlikely to be applied in cases when atransgender-identified
person is not perceived as athreat, such as when one’s bodily characteristics
are read as markers of non-transgender status, of legal citizenship, of mem¬
bership in the general public. The law attempts to draw clear boundaries, but
in practice, interpretations of deceptive threat would surely vary according
to context, including abathroom’s location and size, the time of day, and
the user demographics, among ocher factors. So while the exceptions in SB
1432 help define citizenship, they also destabilize that concept: they create
allowances for and reiterate the presumed characteristics of good citizenship,
acategory that can then be put to use in any number of ways.
There is no doubt that the criminalizing bathroom bills in Arizona and
elsewhere target gender, but they do not neatly substitute gender for earlier
legislation’s focus on citizenship. Public bathrooms emerged in the United
States as spaces that helped construct the boundaries of citizenship through
restrictions that explicitly named race, gender, and disability. This history
informs later efforts to restrict access to those public spaces, even when the
specific language of such efforts shifts away from citizenship and onto gen¬
der. Attending to the citizen-making function of the public bathroom can
clarify why this particular form of bathroom bill first appeared in Arizona:
not because legislators adapted anti-immigrant laws to address awholly sep-
92 CHAPTER THREE
arate marginalized group, but because questions of citizenship are central to
public bathrooms, and so these spaces are already contentious in the context
of statewide struggles over identification of citizens and noncitizensd^ We
need only consider the emphasis on birth certificates to understand the ex¬
tent to which anxieties about citizenship undergird these bathroom scenes,
since those documents mark not only state-approved sex designation, but
also legal citizen status. In the most formal sense, birth certificates purport¬
edly confirm citizenship and thus one’s legal belonging to the nation-state.
At the same time, they can serve as evidence of citizenship in amore infor¬
mal or cultural sense; if producing appropriate paperwork is one way of com¬
plying with state regulations and requests, then doing so performs good citi¬
zenship. These two conceptions of citizenship work in tandem, since those
who cannot or do not produce the required documents appear both to resist
the law’s demands and to demonstrate their lack of legal citizenship status.
Moreover, the bathroom bills’ focus on documentation can overshadow
the bodily scrutiny that they ultimately rely on, asomatic assessment per¬
formed in order to identify safe or risky individuals, which follows awell-
established method of surveillance. After all, the demand for birth certifi¬
cates as evidence of proper bathroom use is primarily directed at those vi¬
sually perceived as trespassing in gendered public space. And because state
agencies’own conflicting policies already position that paperwork as unreli¬
able, the desire for birth certificates is less arequest for appropriate paper¬
work than an assessment of the body itself, with birth certificates acting as
placeholders for sexed bodies."** The documents stand in for the physical
bodies at the heart of these bathroom scenes, acting as confirmation of the
deception already attached to particular bodies. This close attention to the
body as objective evidence of belonging (or of danger) draws on the basic
logic of biometric surveillance, which, as we will see, is likewise rooted in
anxieties about citizenship.
B AT H R O O M S , B O R D E R S , A N D B I O M E T R I C S 93
ally treat physical characteristics such as fingerptints, irises, and facial bone
structure as immutable. Once catalogued, these physical features serve as
comparative data to verify identity as bodies move through different se¬
curitized spaces. Because it relies on data recorded directly from the body,
biometric identification is often characterized as more accurate and reliable
9 4 CHAPTER THREE
fuse terrorism with unregulated immigration by raising the possibility that
surveillance systems “cannot clearly differentiate bodies that might bear a
close resemblance,” aconcern fueled by abelief that certain racial groups
are not readily distinguishable as individuals.” In Lisa Cacho’s terms, in the
post-9/11 context terror is “grafted” onto illegality, requiring fresh evalua¬
tion of those bodies regularly imagined as illegal. “Because Latina/o bodies
have rendered the status of illegality recognizable,” she writes, “differently
racialized unauthorized immigrants unsettle this racial coupling, producing
considerable anxiety over not being able to distinguish ‘illegal’ immigrants
from ‘fraudulent’ foreigners.”’^ Biometric surveillance programs respond to
this anxiety by emphasizing the body as proof of individual identity, with
biometric identification guarding against fraud and securing spaces such as
airports and government buildings.
In addition to policing spatial boundaries, biometric surveillance also
produces and reinforces the boundaries around categories such as race, gen¬
der, sexuality, and citizenship. Notably, it does so by insisting that it operates
outside of such categories. Backed by Western science’s claim to aneutral
gaze and the supposedly unambiguous truth of the physical body, biomet¬
ric technologies engage bodies as objective data points untouched by social
and political influence. But biometric efforts to scientifically distinguish be¬
tween safe and threatening bodies, or citizen and noncitizen bodies, must
account for how these categories are already shaped by gendered and racial¬
ized viewing practices. For example, the familiar fingerprinting process can
seem utterly disconnected from questions of race or gender because it focuses
on unique individual characteristics rather than on groups of people. But
Simone Btowne shows how “prototypical whiteness” drives fingerprinting:
a2001 fingerprint study detetmined that people “of Pacific Rim/Asian de¬
” 5 7
scent” ate likely to have “faint fingerprint ridges—especially female users.
In this framewotk, some types of fingets will produce prints that are less
legible than others. Marking bodies belonging to certain races and genders
as inherently difficult to assess natutalizes the process by which white and
male prints can appear neutral, easily read, and therefore compliant. Simi-
latly, multiple researchers have undertaken studies to categorize fingerprint
samples by gender, pointing out patterned differences that might be used to
distinguish between male and female prints.” Because such investigations
ptesumefixedanduniversalizeddefinitionsofmaleandfemale,whenbodies
do not confotm to such definitions, the studies may regard them as funda-
96 CHAPTER THREE
of male and female).^' The more the bill attempts to circumscribe gender, the
more expansive it becomes.
Arizona’s SB 1045 similarly defines “gender identity or expression” as “an
individual’s self-identification as male, female, or something in between,”
including “appearance, mannerisms or other characteristics only insofar as
they relate to gender with or without regard to the individual’s designated
sex at birth.”“ The last phrase gestures to the contingent nature of sex (as
something that must be designated), but it does so in the context of ale¬
gal document intended to further naturalize and enforce dichotomous sex
categories. These categories apply not only to physical bodies but to those
material spaces that the bill terms “privacy areas,” defined as “places of public
accommodation where access is restricted based on sex.”'^^ Even as the bill
itself references sex not as simple fact but as something produced through
medical and legal discourse, it also refuses this in its claim that privacy oc¬
curs not through one’s solitude in aspace, but through one’s sexed sameness
with other bodies sharing aspace that can be neatly restricted by the very
binary sex characteristics that the bill suggests are contingent. The language
choices here are curious, since the bill explicitly addresses gender identity
and expression in ways that are not necessarily dependent on an assigned sex.
This means that although the legislation is presented as astraightforward
measure to protect children from being exposed to “naked men in women’s
locker rooms and showers” (as Kavanagh explains it), its own definitions
position these categories as perhaps even more subjective and slippery than
would abill focused solely on the assessment of sexed bodies.^^ In fact, it
is difficult to determine what might constitute evidence of improper bath¬
room use in SB 1045: although the bill specifies that scrutiny of bodies in
genderedspacesconcernsappearanceandmannerismsratherthanthe(con¬
tingently) sexed body itself, its reliance on the dichotomous sex/gender sys¬
tem structuring public bathrooms suggests that transgressions of gendered
65
space are fundamentally based on bodily difference.
These kinds of legislative efforts generate and teproduce gendered mean¬
ings about bodies that they insist can be assessed as straightforward bio¬
logical facts, all while simultaneously undermining the very definitions they
themselves construct, thus illustrating some of the contradictions inher¬
ent in biometric surveillance. These contradictions do not necessarily un¬
dermine the programs’ efficacy; in fact, they may even further justify this
surveillance by intimating certain bodies’ wider threat. For instance, when
98 CHAPTER THREE
bodies becomes normalized through risk management frameworks under
which “all citizens ate being reclassified as potential threats to state secu-
' 7 0
r i t y. The use of biometric data to track and sort can reshape the category
of citizenship that such surveillance purports to merely identify; as Giorgio
Agamben notes, “the citizen is thus rendered asuspect all along.” '
Even while biometric surveillance programs illustrate the instability
of divisions between citizen and criminal bodies, they are most popularly
employed as away to reinscribe those divisions by promising to identify
certain persons as threats in disguise. Following Senator Feinstein’s lament
that “we could not identify” those who carried out the attacks on 9/11, gov¬
ernment support for increased biometric data collection pointed to bodily
ttuths as safeguards against both terrorism and unregulated immigration.
Disavowing sociopolitical influence, biometric surveillance claims to objec¬
tively sort individuals along lines of safety and citizenship, reading those
qualities through the body itself The bathroom bills follow this logic, using
presumably immutable physical characteristics to determine which bodies
are deceptive interlopers. But this relationship goes beyond ashared logical
framework; criminalizing bathroom surveillance measures gain traction
precisely through their relationship to anxieties about terrorism and immi¬
gration. From their initial institutionalization forward, public bathrooms
have been amechanism for assigning citizenship and national belonging
through bodily assessment.
Commonsense Citizenship
In her blogpost critiquing Arizona’s SB 143Z, Abigail Jensen points out that
regardlessoftransgenderstatus,underthislegislationallpeoplewho“violate
societal gender norms in some way can be harassed to prove their right to
do what every other citizen takes as agiven—the right to use arestroom for
its intended purpose without harassment.”^^ In one sense, this argument
highlights how far the bathroom bills’ impact might stretch; in addition to
legislating punitive measures for those specifically perceived as noncompli-
ant, the bills’ threat of punishment also helps enforce normative gender for
everyonewhoparticipatesinpublicspace.ButJensen’sclaimalsosuggests
that gender-normative citizenship automatically includes unconstrained ac¬
cess to public space, an assumption that overlooksArizona’s newly intensi¬
fied laws regarding racialized citizenship, even though Jensen herself con-
The common rhetorical turn to privacy and security for some citizens
belies the ongoing erosion of those protections for other groups.’” North
Carolina’s notorious HB z, enacted in March 1016, repeals acitywide non¬
discrimination ordinance in Charlotte and is titled the Public Facilities Pri¬
vacy and Security Act. This law is especially noteworthy because it is the
first criminalizing bathroom bill to be enacted on the state level, because it
nullifies previously existing local ordinances protecting LGBT people and
sets standards for specific groups protected under any future ordinances,
because it limits how North Carolina residents can legally pursue claims
of discrimination, and because it bars local jurisdictions from raising the
minimum wage or changing certain other work and wage laws. The bill’s
purported concern for women and children is limited at best. Although
HB 1is titled in terms of security, its prohibition against raising the mini¬
mum wage strikes directly at the security of the working class, within which
women of color are often the most economically vulnerable. Governor Pat
McCrory explained that had he not signed the bill into law, “the expectation
of privacy of North Carolina citizens could be violated.”” Of course, taken
SENSITIVE I N F O R M AT I O N
IN MAY 2016, attorney general Loretta Lynch announced that the U.S.
Department of Justice would file afederal civil rights lawsuit against the
state of North Carolina, based on the discriminatory nature of HB i. Like
much of the news media coverage of bathroom bills, Lynch framed HB 2,
as abacklash against liberal inclusion. “This is not the first time that we
have seen discriminatory responses to historic moments of progress for our
nation,” she stated, citing as examples Jim Crow laws, resistance to racial
desegregation, and state bans on same-sex marriage.' She continued, “Let us
not act out of fear and misunderstanding, but out of the values of inclusion,
diversity, and regard for all that make our country great.” In the final lines of
her statement. Lynch spoke “directly to the transgender community itself ...
No matter how isolated or scared you may feel today, the Department of
Justice and the entire Obama Administration wants you to know that we
see you; we stand with you; and we will do everything we can to protect you
going forward.”
For many, Lynch’s statement marked ahistoric moment of recognition
for transgender people in the United States.^ But others were skeptical of
her promise, pointing out that the Department of Justice incarcerates over
two million people in the United States and asking how Lynch’s statement
relates to the transgender people who are part of that population. “Even as
Lynch and the rest of the Obama administration say that they ‘see’ trans
people,” two activists wrote, “they are also responsible for the vast crimi¬
nal legal system that invisibilizes and victimizes so many trans people. And
when compared to the realities of detention and incarceration for trans
people, Lynch’s historic words have adouble meaning: Once locked up,
crans people are no longer worth protecting.”^ Their argument about this
invisibility considers both Lynch’s failure to mention incarcerated transgen¬
der people and “the inconsistency between her words and the treatment of
incarcerated trans people during her tenure.”^ On this last point, they cite
in particular the case of Chelsea Manning. At the time of Lynch’s state¬
ment, Manning was incarcerated in Fort Leavenworth penitentiary, amen’s
facility, where administrators repeatedly refused her the tight to grow her
hair longer than male military standards. For these authors, Manning’s case
illustrates the Department of Justice’s failure to “see” transgender women
as women, as well as the ways that incarcerated transgender people remain
largely hidden to—and by—the very state agencies that promise protection.
Yet Manning’s case speaks to an even more complicated relationship be¬
tween transgender politics and questions of visibility. An army intelligence
analyst. Manning became awhistle-blower who leaked hundreds of thou¬
sands of classified militaty documents as well as diplomatic cables. She was
convicted in 2013 on multiple counts, including violations of the Espionage
Act. In order to speak to her state of mind at the time of the leaks, during
pretrial hearings Manning’s defense team introduced the argument that she
struggled with her gender identity. For instance, the defense asked awitness
if he recalled an email Manning had sent “with apicture of [her] self dressed
as awoman ... and how [her] gender identity affects [het],” as well as “how
it impacts [her] ability to think.”’ As media coverage amplified this legal
strategy. Manning’s transgender identity—which she claimed explicitly in
statements immediately following her sentencing—became akey factor in
an already highly publicized (if not altogether public) military trial.
The gender-nonconforming figure chat Manning represents, or is made
to represent, shifts away from those figures that the U.S. government has
most often positioned as threats to national safety, particularly in the con¬
text of anti-immigrant and antitetrorism programs. As awhite U.S. citizen
who not only served in the military but had been granted security clearance
to top secret materials. Manning departs significantly from the racialized,
covert figutes of the tetrorist agent and the undocumented immigrant that
U.S. state policy and practices most commonly cite as threatening. At the
same time, as amember of the military, she was subject to the routine forms
of surveillance overseeing all enlisted people, and particularly those work¬
ing as intelligence analysts. Because she was positioned in these two ways
Seeking Evidence
Manning entered the army in zoo8, and one year later was deployed to Iraq,
where she worked as an analyst. According to various testimony and mate¬
rial evidence. Manning began collecting information to leak just amonth
or two after she arrived in Iraq. Beginning in January 2010, she provided to
the whistle-blower website WikiLeaks first aset of hundreds of thousands of
S E N S I T I V E I N F O R M AT I O N 1 0 9
portive of WikiLeaks and because she believed he was “someone who would
possibly understand.”*^ Over the course of these chats, Manning discussed
her family and childhood, her feelings of fear and isolation in the military,
and her convictions about leaking important information she had access to
as an analyst. For instance, she asked Lamo, perhaps rhetorically, “Ifyou had
free reign over classified networks for long periods of time ... and you saw
incredible things, awful things ...things that belonged in the public do¬
main, and not on some server stored in adark room in Washington DC ...
what would you do? [... matetials] explaining how the first wotld exploits
the third, in detail, from an internal perspective?”^
In her first exchanges with Lamo, Manning identified herself not by
name but as “an army intelligence analyst, deployed to eastern baghdad,
pending discharge for ‘adjustment disorder’ in lieu of‘gender identity dis¬
order.’”* Within the first ten minutes or so of their chat, Lamo reassured
her, “I’m ajournalist and aminister. You can pick either, and treat this as a
confession or an interview (never to be published) &enjoy amodicum of le¬
gal protection.”^ Yet afew days later, Lamo arranged ameeting with the FBI
and provided acopy of the chat logs to Wired magazine editor and former
hacker Kevin Poulson. By the end of May 2010, Manning was arrested, held
at Camp Liberty in Iraq for apretrial confinement hearing, and later trans¬
ferred to Camp Ariljan in Kuwait.'® Approximately one month later, she was
transferred to Quantico, Virginia, where she was designated a“maximum
custody” prisoner on “Prevention of Injury” and “Suicide Risk” statuses."
By the time of her arraignment in late February 2012, Manning had been in
pretrial confinement for over six hundred days.
Manning’s case both aligns with and breaks from the common relation¬
ship between state surveillance practices and gender nonconformity. Con¬
sider, for example, the case of Duanna Johnson, who in February 2008 was
arrested in Memphis, Tennessee, on charges of prostitution that were later
dropped. ABlack transgender-identified woman, Johnson was held in a
county jail where, according to her statements, white booking officer Bridges
McRae called her afaggot and ahe-she, using both masculine pronouns
and Johnson’s masculine birch name. When she refused to respond to these
names, McRae beat and maced her; another officer held Johnson in her seat
during part of this assault, and an attending nurse later examined McRae
rather than Johnson. Johnson’s case is not particularly unusual among the
high rates of violence against and incarceration of transgender women of
no CHAPTER FOUR
color, but it is fairly unique in that asurveillance camera installed by the
correctional facility captured these events.'^ Johnson’s attorney leaked the
surveillance footage to alocal news station, and the video quickly went viral
on the internet. Both officers involved were fired, and Johnson filed alaw¬
suit against the city. In November of that year, she was found murdered on
the streets of Memphis, with police claiming they had no suspects. After a
mistrial, McRae pled guilty to the beating and was sentenced to two years
in prison.'^
The surveillance camera in Johnson’s case, constructed to visually track
the criminalized bodies being processed at the jail, also created arecord of
physical state violence against one of those bodies, and so it potentially un¬
dermines its own intended purpose by turning on the state actors it was
meant to support.^* But the video footage cannot be understood in isola¬
tion from the power dynamics at work in this specific interaction or from
the social and political context in which these images circulate. As Judith
Butler cautioned in the aftermath of the Rodney King verdict, “to the ex¬
tent that there is aracist organization and disposition of the visible, it will
work to circumscribe what qualifies as visual evidence, such that it is in some
cases impossible to establish the ‘truth’ of racist brutality through recourse
to visual evidence.”'’ Butler’s analysis has renewed salience in the context of
national calls to mandate body cameras for police officers as preventative
measures against police killings of Black people. Critics of this proposed
solution observe that cameras worn by law enforcement “are oriented not
toward police officers, but rather toward the public” and that the resulting
footage, which must be interpreted by law enforcement and court systems,
often works against defendants and victims of police violence rather than
ensuring police transparency or accountability.'^ Though the surveillance
footage from body cameras and county jails may help make visible the in¬
ner workings of the U.S. policing system, that visibility is partial at best,
filtered through structural racism, sexism, and transmisogyny that shape
the visible and the very act of seeing.'^ This constellation of factors made it
possible for McRae to file an assault charge against Duanna Johnson, using
the surveillance camera footage as visual evidence to argue that she swung
at and verbally threatened him. While these images might illuminate state
violence, they also reenact violence against Johnson, both in their visual
repetition of assault and in their provision of repeated opportunities for
viewers to carefully examine Johnson’s body and behaviors for evidence
SENSITIVE I N E O R M AT I O N ill
of- deviance or noncompliance.'** Johnson’s case is astark reminder chat for
many people, neither surveillance practices nor explicit visibility as trans¬
gender provide protection. Instead, surveillance measures rely on and re¬
inforce the purportedly commonsense sorting between chose people in need
of protection and chose they must be protected from. So even visual evidence
that ought to clearly mark law enforcement as acting improperly can serve
to reconsolidate police power as that which always acts with necessary force:
interpreted in afield of vision wherein Johnson’s body already represents
criminality and resistance to authority, these surveillance images operate as
punitive rather than protective for her.
Complicating this framework, Chelsea Manning’s case makes state vio¬
lence visible not simply through routine surveillance footage but through
Manning’s deliberate and sustained efforts to publicize classified govetn-
ment materials (and later, the conditions of her own incarceration). Al¬
though she navigated military service during the period of Don’t Ask, Don’t
Tell, until she was identified as the source of the leaks her subject position
as awhite U.S. citizen and service member helped mitigate the possibility of
being unduly scrutinized.'^ Because as amilitary intelligence analyst she was
herself astate actor. Manning can be understood as the surveillance mecha¬
nism itself, performing that role first on behalf of the U.S. military and later
on behalf of the U.S. public by deliberately turning the government’s own
surveillance practices back onto itself The publicity surrounding her trial
necessarily increased public awareness of the leaked information, further
amplifying the material evidence of harmful military actions. But in concert
with news media reports, the trial frames Manning’s case as one primar¬
ily concerned with individual transpatency. The defense’s introduction of
Manning’s gender identity suggests abelief that it would benefit her case,
but throughout the trial gender secrets join with state secrets such that a
visible transgender identity not only helps position Manning as adeceptive
individual who is not what she seems, but also justifies intensified surveil¬
lance over that individual.
strategy necessarily tapped into protracted debates about whether the very
presence of LGBT people in the U.S. military compromises national secu-
rity.^^ In Manning’s case, these debates further dovetail with the cultural
positioning of transgender people as inherently deceptive.So although her
attorneys raised the issue of gender identity to make an argument about her
state of mind and not necessarily to suggest causality, it proved difficult to
leverage this argument without giving some credence to the theories that
transgender people—and perhaps LGB people by association—erode na¬
tional security and are unfit to serve.
From the first day of the trial, June 3, 2013, Manning’s defense team set
her leaks of classified information in the context of her inner emotional life.
Lead defense attorney David Coombs noted in his opening statement that
“Manning is not atypical soldier,” and explained that her humanist belief
25
in the value of all human life led her to struggle with her work as an analyst.
He elaborated, “The reason why [she] started to struggle was no longer could
[she] read SigActs or human reports and just see aname or number d n A
[her] struggles were public. [She] was struggling not only with the feeling
of obligation and duty to people, but also with the struggle and internal
struggle, avery private struggle with [her] gender. And this was public for
[her] unit to see.”^'’ This opening statement—a narrative setting the stage
for the trial to come—merges Manning’s concerns about U.S. military ac-
S E N S I T I V E I N F O R M AT I O N 11 3
tions with her struggle to come to terms with ttansgender identity. Notably,
it is Manning’s commitment to humanism that Coombs cites as the reason
she is not atypical soldier, suggesting that her investment in protecting hu¬
man life is atypical for the U.S. military, even though that body formally ra¬
2 7
On the second day of the trial, Coombs questioned Adrian Lamo, the
fotmer hacker to whom Manning had confessed the leaks over instant mes-
senging chats. Attempting to clarify the extent of their relationship during
that time, Coombs inquires:
Q: During this initial chat conversation [she] told you about [her] life
and [her] upbringing?
A: In some amount of detail, yes.
Q: [She] told you that [she] was being challenged due to agender
identity issue?
A: Yes.
Q: [She] also told you that [she] had been questioning [her] gender
for years, but statted to come to terms with that with [het] gender
during the deployment?
A: Yes.
Q:[She]toldyou[she]believed[she]hadmadeahugemess?
11 4 C H A P T E R F O U R
A: Yes, [she] did.
Q: And [she] confessed [she] was emotionally fractured?
A: Yes.
Q: [She] said [she] was talking to you as somebody that needed moral
and emotional support?
A: Yes.^’
After several more questions regarding the sense of desperation and iso¬
lation that Manning expressed, which Lamo likewise confirms, Coombs
moves directly into aset of questions about the leaks.
Q: Now at one point [she] asked you if you had access to classified
networks and so on, incredible things, awful things, things that
belonged to the public domain, not on some servers dark room in
Washington, D.C. What would you do? Do you recall [her] asking
you that question?
A: Yes, Idid.
Q: [She] told you [she] thought that the information that [she] had
would have impact on the entire world?
A: That is also correct.^“
S E N S I T I V E I N F O R M AT I O N I 1 5
combined with and exacerbated other stressors in Manning’s everyday life.
Captain Dr. Michael Worsley, who treated Manning prior to her arrest, tes¬
tified that Manning experienced isolation beyond the levels typically cre¬
ated by deployment and by working under top-.secret clearance: “being in
the military and having agender identity issue do not exactly go hand-in-
hand—it further serves to isolate. [She] finally felt much more comfortable
”32
just having it out.
Worsley’s testimony may have been astrategy to elicit the court’s sympa¬
thy, but it also supported the prosecution’s narrative of Manning as traitor.
Lead prosecutor Major Ashden Fein’s closing argument specifically empha¬
sizes that Manning deceived the military, the U.S. public, and the court;
“Manning was not ahumanist. [She] was ahacker. [She] was not atroubled
young soul. [She] was adetermined soldier with the knowledge, ability, and
desire to harm the United States. [She] was not awhistleblower. [She] was a
traitor.”^^ Fein’s repetitive sentence structure underscores the argument that
both during her service and over the course of the trial. Manning was not
what she purported to be. Fein does not have to explicitly reference Man¬
ning’s gender here in order for the notion of transgender deception to sup¬
port the fundamental argument he makes. In this way, both the defense and
prosecution make use of the narrative that Manning’s gender deception lay
the groundwork for her national deception.
Importantly, however, the chat logs and court testimonies sometimes
contradict this framework. In several instances, they illuminate not Man¬
ning’s psyche or identity—as Coombs’s questions attempt to do—so much
as the ways that state actors read gender transgression into security dis¬
course. In the chat logs. Manning writes to Lamo that “uncertainty” about
gender identity and emotional isolation had made amess of things, “and
little does anyone know, but among this ‘visible’ mess, theres the mess icre¬
ated that no-one knows about yet.”^"* In light of the fact that Wired, military
personnel, and Manning’s own defense team intentionally delayed making
public the gendered aspects of her case, it is noteworthy that Manning her¬
self positions gender questions as visible long before the classified military
documents were made public. This timeline is somewhat at odds with the
narrative that stressful gender secrets led her to publicize national secrets.
In fact. Manning had deliberately provided information about her gender
identity to multiple people, both in and outside the military, months before
the leaked information surfaced through WikiLeaks.
S E N S I T I V E I N F O R M AT I O N 11 7
the “Collateral Murder” video showing aU.S. aerial weapons team repeat¬
edly firing on children, Reuters journalists, and other civilians with what she
described as “seemingly delightful bloodlust,” Manning commented, “It’s
all abig mess and I’m left wondering what these things mean and how it all
fits together it burdens me emotionally.”'*® She continued, “I hoped that the
public would be as alarmed as me about the conduct of the aerial weapons
team members. Iwanted the American public to know that not everyone in
Iraq and Afghanistan were targets that needed to be neutralized, but rather
people who were struggling to live in the pressure cooker environment of
what we call asymmetric warfare.”*' Manning continually emphasized her
belief in the importance of public access to these materials. On the first
day of the trial, Coombs’s statements framed that commitment to public
knowledge as akey aspect of Manning’s emotional landscape: her “struggles
led [her] to feel that [she] needed to do something, that [she] needed to do
something to make adifference in this world. [She] needed to do something
to help improve what [she] was seeing. And so from that moment forward,
and that was January of loio, [she] started selecting information that [she]
believed the public should hear and should see. Information that [she] be¬
lieved that if the public saw would make the world abetter place.”*^ Man¬
ning responded to this emotional burden, then, by making public what the
U.S. military had categorized as secret, information that Manning believed
ought not be concealed from public view.
By folding her “gender identity issue” into her distress about witnessing
the effects of asymmetrical warfare, the trial narrates Manning as someone
other than she had first appeared: awoman where the army saw aman, a
traitor where the government had seen aloyal soldier. The defense seeks to
strengthen its case by introducing Manning’s transgender status as evidence
of the stress and isolation contributing to her “naive, but good-intentioned”
actions.'*^ But this strategy also risks strengthening cultural and court beliefs
that Manning had merely posed as apatriot—before ultimately betraying
her country—just as she mascperaded in terms of gender. Although sig¬
nificant portions of her defense stress the moral and ethical dimensions of
her whistle-blowing, the very structure of the trial shifts culpability away
from the U.S. government and military: the trial is designed to excavate the
truths of Manning’s actions. That process is intensified by the prosecution’s
characterization of her as aduplicitous individual who jeopardized national
security, aframing bolstered by dominant narratives of transgender identity.
S E N S I T I V E I N F O R M AT I O N 11 9
themselves. In asix-by-twelve-foot cell by herself, Manning received daytime
checks by guards every five minutes. Coombs elaborated, “At night, if the
guards cannot see PFC Manning clearly, because [she] has ablanket over
[her] head or is curled up towards the wall, they will wake [her] in order to
ensure [she] is okay.... When PFC Manning goes to sleep, [she] is required to
strip down to [her] boxer shorts and surrender [her] clothing to the guards.
[Her] clothing is returned to [her] the next morning.”'^'^ By March loii, U.S.
news media reported even harsher restrictions: Manning was stripped of
all clothing at night “as a‘precautionary measure’” to prevent self-injury,
according to Quantico officials."*' Each morning, guards required Manning
to stand nude outside her cell for morning inspection. In asubsequent blog
post, Coombs noted that aQuantico spokesperson said the forced nudity
was “not punitive,” but Coombs disputed this claim: “There can be no con¬
ceivable justification for requiring asoldier to surrender all [her] clothing,
remain naked in [her] cell for seven hours, and then stand at attention the
subsequent morning. This treatment is even more degrading considering
that PFC Manning is being monitored—both by direct observation and by
video—at all times.”"**
11 0 CHAPTER FOUR
Remarkably, die conditions of her own incarceration are precisely the type
of information Manning sought to expose through releasing information
about other, more sweeping forms of detention. For example. Manning’s
release of hundreds of files about Guantanamo prisoners—which exposed
names and torturous detention conditions as well as the fact that “many
innocents or marginal figures [had been] swept up by the Guantanamo
dragnet”—was asignificant factor in the charges against her.’° The Guan¬
tanamo camps, some of which had previously served as temporary refugee
camps for Haitian and Cuban migrants during the mid-1990s, were repur¬
posed after 9/n as indefinite spaces of detention for people suspected of
affiliations with anti-U.S. terrorist groups. The U.S. government readily
circulated “depersonalized” images of prisoners in the camps yet also held
those individuals in alegally ambiguous space that, in Naomi Paik’s terms,
rendered them rightless and removed them from the public sphere: “The
prisoners have thus been both highly visible and yet shrouded in direct and
indirect fotms of censorship. Just as the physical bodies of these men have
been persistently obscured by the actions of the U.S. government, so too is
our understanding of many aspects of life at Guantanamo obscured.”^' Fot
reasons that Iclarify in the final section of this chapter. Manning’s case is
not equivalent to those of the hundreds of people imprisoned at Guanta¬
namo. But these camps inform Manning’s own sustained pretrial imprison¬
ment under what the military termed temporary conditions of isolation and
POI status. During her arraignment, aQuantico official testified, “Quantico
is not about long term—it’s about individual short term, but not long term,
confinement.”^^ The recommended short-term confinement at Quantico is
ninety days; Manning was held there for 158 days, spending the majority of
those on POI status.^^ Two military psychiatrists who treated Manning testi¬
fied that these detention conditions were “unprecedented” and “more severe
than [those] of death row inmates.”’^ Manning’s own testimony during her
arraignment points to one of these psychiatrists’ complicity in extending
her temporary status indefinitely: “I started asking [psychiatrist] Captain
Hocter why he wasn’t recommending me to come off of Prevention of In¬
jury status. He kept saying that he was, but then Gunnery Sergeant Blenis,
my counselor, kept on saying it was the docs that were recommending that
” 5 5
status.... Iwasn’t sure who was telling the truth.
These types ofpractices—isolation, high levels of bodily visibility and con¬
stant surveillance, and contradictory or undisclosed institutional policies—
SENSITIVE I N F O R M AT I O N III
mirror many of the aspects of Guantanamo that Manning’s leaks made pub¬
lic, and they are not unusual in the context of the U.S. prison system in gen¬
eral, particularly for incarcerated transgender and gender-nonconforming
peopleIn Manning’s case, these practices are part of an effort to recuper¬
ate national security (and public faith in national security) after her actions
hadallegedlyendangeredit.Manningandherdefenseteamrepeatedlyout¬
lined the care she took to release materials that, even if technically classified,
would not actually threaten national security.^^ If the leaks did undermine
either national security or the U.S. government’s validity, it is not because
the leaked materials creared new weaknesses, but because the U.S. govern¬
ment and military’s own harmful actions—in Iraq, Afghanistan, Guanta¬
namo, and other spaces—became newly visible to the U.S. public through
Manning’s leaks and the publicity of her trial.^* Courts-martial have long
functioned to secure the respected status of the U.S. military when internal
dissent threatens to undermine it. Yet the “legalized spectacle of criminal
prosecution” for service members can also erode that legitimacy, since the
trial process might reveal internal contradictions, systemic problems, and
other damaging information about the U.S. military itself.” For this reason,
acts of service member misconduct are often addressed in other ways; but if
those actions have “undermined faith in American military strength or in
the moral and political authority of military institutions,” the court-martial
can work as atool to restore faith in that authority both internally and for
the U.S. public.^ The material Manning leaked threatened the military’s
moral and political authority in just this way, and to mitigate that threat,
her trial had to expose Manning as adiscrete danger while retroactively
safeguarding military secrets that included treatment of Manning during
pretrial confinement as well as the hundreds of thousands of documents
circulating in the public sphere.
Pretrial motions illustrate the lengths to which the U.S. government
would go in order to protect damning information that was in fact already
freely available. In an effort to “render the government’s case against Man¬
ning less secretive,” the defense requested access to evidence that the pros¬
ecution had not yet provided, including evaluations of how damaging the
leaked material had actually been, claiming that without this evidence Man¬
ning could not receive afair trial.^' The judge ruled thar only unclassified
material could be disclosed; remarkably, this meant that even the leaked
materials—which remained classified despite now being fully accessible
S E N S I T I V E I N F O R M AT I O N 11 3
stated, “This is apublic trial. The hallmark of our democracy is the ability
of our government to be open with its public.”^ These statements position
Manning’s actions as rational, even patriotic efforts to align her work with
the national character of the United States, imagined here as one of trans¬
parency and commitment to the public good. In the context of antiterror¬
ism rhetoric, such statements can even attempt to characterize Manning as
amodel citizen who had so internalized the instructions of the If You See
information: early in her chats with Lamo, Manning wtites, “Living such an
opaque life,has forced me never to take transparency,openness,and hon¬
esty for granted.”^* My point is not to propose that discussions of her emo¬
tional butden constitute afalse narrative, but rather to highlight how that
perhaps inadvertently—complies with the government’s de¬
n a r r a t i v e -
mand that Manning be put under greater scrutiny and helps justify increased
surveillance over her. Investigations into her emotional life work with the
visual surveillance ofher incarceration and with the trial’s meticulous chart¬
11 4 C H A P T E R F O U R
duty to people, but also with ... avery private sttuggle with [her] gender.
And this was public for [her] unit to see.” Although these sentences read as
contradictory (how could aprivate struggle be public for all to see?), they
indicate the complicated relationship between the two types of sensitive
information in Manning’s case; one that threatens national security if it is
exposed, and one that must be exposed to remove its threatening potential.
Even this neat pairing is too simplistic, for although the classified ma¬
terials are presumably the sensitive information that must be protected
from exposure. Manning’s gender and sexuality also posed athreat in the
context of Don’t Ask, Don’t Tell and related legacies of sexual anxiety in
the U.S. military. Similarly, the trial positions Manning as that which must
be exposed to scrutiny in order to (re)secure the nation, even as her defense
team’s strategy suggests that disclosure of certain military secrets was key to
resisting the threat of U.S. military violence both within and outside of U.S.
borders. Courtroom and related media discussions of Manning’s transgen¬
der identity, even when they define that identity as private and individual,
are inevitably linked to examination of the leaks. In fact, as Ishow in the
next section, efforts to separate these two aspects of Manning’s case result
in strengthening the relationship between them.
S E N S I T I V E I N F O R M AT I O N 11 5
paves the way for more intensive government surveillance, with Manning’s
case as high-profile justification7“ This rendering of Manning separates her
from rhe actual content of the leaked materials in order to shift focus away
from damning evidence of systemic government and military harm, locating
harm instead in an individual’s exceptional crimes.
The defense ream also works to frame Manning as aunique individual
(recall Coombs’s description of her as “not atypical soldier”), astrategy
taken up by other supporters who elevate Manning’s individual gendered
experience while moving the effects of U.S. military intervention into the
background. In the left socialist magazine Jacobin, for instance, reporter
Samantha Allen writes directly to Manning, analogizing her exposure of
war crimes to exposure of transgender status. “You’re making ahabit out of
revealing dangerous pieces of information,” she notes. “I don’t know which
revelation was riskier for you: leaking the war documents or coming out as
transgender.”Both pieces of information might well be dangerous, but Al¬
len’sframingsuggestsaneither/orapproachthatisundonebythewayschat
the trial and media coverage merge these two forms of public disclosure. Al¬
len continues, “You are in the unfortunate position of being asymbol. ...
Your announcement was an unwitting choice to be the transgender person
of the moment, the center of adebate over the legitimacy of an entire group
ofpeople.”Allenrefersheretodebatesabouttransgenderpeople’slegitimacy,
and she writes in explicit support of Manning, that larger group of transgen¬
der people, and the act of whistle-blowing. Yet while this supportive position
is distinct from the court-martial’s skepticism and condemnation, in both
cases the attention to Manning’s individual circumstances allows the legiti¬
macy of another “entire group of people”—those targeted by U.S. military
expansion and related antiterrorism measures—to go largely unnamed.
Even as Manning’s actions and testimony focus on those harmed by
U.S. military and government practices, apersistent exceptionalism—
assisted by the continual return to her personal narrative and individual ex¬
periences—mutes their potential to erode public trust in state institutions.
When Manning’s navy psychiatrist testified about her pretrial confinement
at Quantico, his claim that the isolation conditions “were more severe than
[those] of death row inmates” conveys the severity of Manning’s treatment
by distinguishing her from those implicitly understood to deserve that treat¬
ment.^^ Captain Dr. Hocter, the psychiatrist who had treated Manning at
Quantico, testified about the extended time that Manning spent under POI
S E N S I T I V E I N F O R M AT I O N 11 7
whether transgender-identified or not—as broad, nameless groups that make
Manning’s individuality possible. The production of Manning as an excep¬
tional transgender individual occurs through the disposability of other lives,
which ‘‘act as resources” for the “articulation and visibility of amore privi¬
” 7 9
leged transgender subject.
Questions like Samantha Allen’s above, which ask whether leaking clas¬
sified information is riskier than publicly identifying as transgender, suggest
that Manning’s individual identity as transgender can be distinguished from
her actions as awhistle-blower and from the content of the leaked materials.
But the use of transgender identity in her trial intertwines that public iden¬
tification with the government and military actions that she exposed. Man¬
ning’s case is clearly connected to the secretive conditions of Guantanamo
camps, for instance, because her own pretrial detention entailed similar
conditions and because her release of the Guantanamo files forms part of
the government’s justification for her incarceration. Yet her case also dif¬
fers significantly from those of the Guantanamo detainees, because court
and media narratives construct Manning as asingular figure to such ade¬
gree that the hundreds of detainees—whose information Manning initially
made public—recede further into the background, agroup indistinguish¬
able as individuals. But it is in this way that Manning’s gender should be
understood as utterly inseparable from the content of the materials she
leaked: both supporters and detractors engage her as an explicitly transgen¬
der figure in order to buttress claims that she is an exceptional case, thereby
transferring scrutiny onto her (whether as treasonous criminal or mistreated
citizen) and away from the government policies and practices that Manning
made public. The standardized narrative of transgender identity, an indi¬
vidual’s story of secret emotional distress, works with unmarked whiteness
to position Manning as aspecial case whose secrets about both gender and
treason—here discursively folded into one another—must be exposed.
Dominant cultural rhetoric linking transgender identity to concealment
supports the trial’s mandate of exposure, even when that rhetoric is not ex¬
plicitly cited; it assists the trial’s work of making Manning visible as either
patriotic or traitorous. The individuality that the court and news media at¬
tribute to Manning—narrated as her isolation under Don’t Ask, Don’t Tell,
her secret gender struggles, her atypical humanist beliefs, and her single-
handed ability to undermine national security—merges gender secrets with
national secrets while simultaneously distinguishing her from those most
S E N S I T I V E I N F O R M AT I O N 11 9
C O N C L U S I O N
ON ENDURANCE
IBEGAN THE RESEARCH for this book during the last years of the George W.
Bush administration, and completed the bulk of the writing and revisions
under the Barack Obama administration. As Iwrite this conclusion in late
ZO17, nearly one year into the Donald Trump administration, the political
context is shifting rapidly around us, and changes to governing practices and
to the fundamental structure of U.S. state agencies continue to unfold. It is
difficult to know how to conclude abook about U.S. state surveillance under
131 CONCLUSION
where. New surveillance technologies and data-sharing networks—like the
linked databases tequired by the Real ID Act—feed on visibility, which can
also refine conceptions of what transgender means and to whom it properly
applies, so that the expansion of transgender visibility paradoxically narrows
the purview of transgender politics.
This paradox is evident, for example, in the September 2017 news that
the New York voter registration form for Jared Kushner—senior White
House advisor and Trump’s son-in-law—listed his gender as female. This in¬
formation broke as Kushner faced increased scrutiny about his relationship
to Russian interference in the 2016 U.S. election and about his repeated fail¬
ures to disclose required information about foreign contacts and financial
interests on security clearance forms. The news also came some four months
into the work of the new Presidential Advisory Commission on Election
Integrity, avoter fraud commission that Trump established by executive
order following his false postelection claim that millions of people voting
illegally had thrown the popular vote to Hillary Clinton. In news headlines
about Kushner’s voter registration, some outlets reported that he “voted as
awoman,” while others stated directly, “Jared Kushner is awoman.”^ Both
speech acts reflect the ways that, as the early chapters of this book show,
government documentation and administrative practices actively produce
gender; Kushner becomes awoman through the voter registration records
that classify him as such. Yet with few exceptions, the news stories them¬
selves treated Kushner’s voter documents as another paperwork failure
rather than aserious indication of his gender.^ The New York State Board
of Elections announced that the gender classification was their error, not
Kushner’s, and had been corrected; the board’s executive director, Michael
Ryan, insisted that such an “accidental sex swap... would have no chance of
changing someone’s ability to vote,” and that “it’s not something that would
disenfranchise avoter.”'* This is aremarkable statement in the context of
ON ENDURANCE 133
administrative regulations, nor those whose gendered documents become
questionable through racism and xenophobia.
Kushner’s story aptly illustrates how identification documents produce
the gendered problems (and subject positions) they purport to merely reflect,
yet the considerable visibility of transgender people at the time of this story
did not help frame it in those terms. Transgender recognition continues to
be structured largely through specific medical, legal, and/or self-narration
practices, ranging from the claims of medically necessary health care Icon¬
sider in chapter 2. to the legislation defining transgender status to regulate
public bathrooms, as Ishow in chapter 3. Within these modes of legibility,
transgender could not really apply to Kushner, and so public discourse on
this case could not engage transgender politics in any meaningful way. In¬
stead, Kushner becomes awoman only to the extent that this temporary
status highlights either his own incompetence or that of the voter registra¬
tion process.
Yet in its very absence of atransgender-identified subject, this case can
be important to atransgender critique of surveillance. The revelation and
casual dismissal of the database error (“It does happen from time to time,”
Ryan remarked) reaffirms Kushner’s gender as normative while pointing
out flaws inherent to the data collection process. To be sure, some critics
of Trump’s voter fraud commission pointed to Kushner’s story as one that
invalidates the commission’s work, because it shows that such data errors
134 CONCLUSION
take just one widely discussed example, consider those undocumented im¬
migrants who complied with Obama-era policies requiring them to register
with ICE, undergoing regular ICE check-ins and sometimes wearing GPS-
enabled ankle monitors. Under the Obama administration, this surveillance
of undocumented people could be promoted in part as abenevolent regu¬
lation enabling hundreds of thousands of people to remain in the United
States. At the same time, undocumented people outside of this surveillance
mechanism are assigned greater criminality simply for not being part of a
system of compliance and visibility. Meanwhile, because Trump’s policies
explicitly call for swifter deportations and expand the deportation priorities
to those who have committed any act that could be achargeable criminal
offense (which might include anyone who entered the United States with¬
out required legal documentation), already ICE agents have begun using the
required check-ins to facilitate deportations. This process is helped along
by the Obama administration’s own record of deporting millions of immi¬
grants and the xenophobia through which U.S. borders have always been
constructed, such that the new policies should be understood as acontinu¬
ation of, rather than adeparture from, earlier periods.
Relatedly, we might consider the Deferred Action for Childhood Ar¬
rivals (daca) program, developed by the Obama administration in 1012.
to allow eligible undocumented people who entered the United States as
minors to register for arenewable two-year deferment from deportation
proceedings. The program has allowed tens of thousands of undocumented
students to continue high school and college in the United States and to
obtain work permits, yet because it requires aformal admission of undocu¬
mented status, it also operates as surveillance over this group of people who
can now be more effectively monitored. Applications to DACA were always
arisk, since being found ineligible during the application process could lead
to deportation and since it was always possible that the policy could be re¬
voked. The DACA program provides protection only for those who can with¬
stand rigorous government scrutiny and emerge as compliant, productive
individuals. Under the Trump administration, increasing numbers of DACA
recipients have had their protected status canceled, atrend reflecting more
expansive definitions of criminality that can make one apriority for depor¬
tation. Under these conditions, aregistry previously promoted as benevolent
government protection—but which always invested in criminalization by
distinguishing good DACA recipients from other immigrants—becomes an
ON ENDURANCE 135
accessible list of undocumented people who can be better tracked and tar¬
geted for deportation.
Trump’s July zoiy announcement prohibiting transgender people from
serving in the U.S. military demonstrates how readily transgender visibil¬
ity can be incorporated into broader, morphing surveillance projects. The
ban responded to U.S. House of Representatives debates over alarge de¬
fense and security spending bill: aproposed amendment to bar the Pentagon
from funding medical care related to gender transition imperiled the bill’s
passage. Most notably, this spending bill included $i.6 billion for Trump’s
promised U.S.-Mexico border wall. Trump’s pronouncement, claiming that
transgender people’s “tremendous medical costs and disruption” burden
the military, exploits ongoing scrutiny of gender nonconformity in order
to further fund border control efforts targeting Mexican immigrants.” By
discursively tying transgender people to medicalizarion and suggesting that
this link weakens the nation’s defense against immigrants, the policy draws
on abroader discourse of harmful versus healthful bodies that Iconsider
13(5 CONCLUSION
gender. But the policy also demonstrates how U.S. state agencies incorporate
newly recognized transgender people into the formal workings of surveil¬
lance, whether by literally putting them to work on military surveillance
projects or by using them as incendiary and polarizing figures to fund mili¬
tarized surveillance against immigrants in the U.S.-Mexico border region
and beyond.
Further illustrative of the complex relationship between visibility, protec¬
tion, and surveillance in this shifting political context are two major policy
changes made during the early months of the Trump administration that
specifically address transgender people. First, in February 1017, the admin¬
istration rescinded federal guidelines addressing transgender students in
schools that receive federal funding. These guidelines, released in zoi6 by
Obama’s departments of education and justice, draw on Title IX and related
case law to inform school officials of their legal requirements for the treat¬
ment of transgender students, including use of names and pronouns, rest¬
room policies, and dress codes. The removal of these federal guidelines was
one of the first major actions undertaken by Trump’s new attorney general
(Jeff Sessions) and education secretary (Betsy DeVos) after their confirma¬
tions. Second, in March 1017, the U.S. Census Bureau published alist of top¬
ics about which the lozo census would include questions. The list included
sexual orientation and gender identity as aproposed topic, but several hours
later arevised list eliminated this topic altogether, with aCensus Bureau
spokesperson stating that its initial inclusion was made inadvertently. The
agency’s director later released astatement explaining that “there must be
aclear statutory or regulatory need for data collection” for atopic to be in¬
cluded in the census, and that in response to aformal request for its inclusion
made by seventy-five members of Congress, the bureau had determined that
no change in this area was needed.'”
In the wake of these changes, multiple LGBT advocates and organiza¬
tions explained how important the school guidelines are, how federal data
collection on sexual orientation and gender identity would be beneficial,
and the possible harm that could result from the absence of these policies."
Certainly both of these policies have the potential to offer support and pro¬
tection for vulnerable people. The rollback of guidelines for transgender stu¬
dents, in particular, can be interpreted as an act designed to mark the Trump
administration’s explicit withdrawal of support for transgender people, since
the guidelines provided no new protection and carried no legal force in
ON ENDURANCE 137
themselves; they merely clarified federal regulations already in place under
Title IX, and so primarily served to signal the Obama administration’s care
for transgender youth. Meanwhile, in an October 1017 amicus brief in the
lawsuit against Trump’s ban on transgender service members, eight trans¬
gender advocacy organizations (including NCTe) cite removal of the school
guidelines and census questions as evidence of the Trump administration’s
pattern of discrimination against transgender people. Regarding the cen¬
sus questions and similar elimination of LGBT-related questions in other
government surveys, the brief argues, “there has been acoordinated effort
within the Executive Branch to avoid collecting data about LGBT Ameri¬
cans,” thereby “ensuring that there is no data to study.”‘^ Without such data,
the brief suggests, the White House can (and does) abandon federal efforts
to protect transgender people: professing the need for further study while
declining to collect new data for that research allows protective measures to
atrophy through calculated delay and disuse.
Yet both the school guidelines and the now-withdrawn census questions
are also state surveillance practices that help construct the category of trans¬
gender through identifying and counting particular people. Census ques¬
tions make this clear, since the particular types of questions and identity
categories provided change from one census period to the next, structuring
participants’ responses accordingly. Reading the U.S. census’s shifting ra¬
cial categories as away of managing blackness, for instance, Simone Browne
shows how “census enumeration is ameans through which astate manages
its residents by way of formalized categories that fix individuals within a
certain time and aparticular space, making the census atechnology that
renders apopulation legible in racializing as well as gendering ways.”'^ What
would it mean to include the term transgender on the U.S. census at this par¬
ticular moment in time? According to what standards will that identity be
defined and determined? To what uses might this new data be put, especially
against acultural backdrop that links deception with gender nonconfor¬
mity, and which self-identified transgender citizens would benefit? Likewise,
in the case of school guidelines, how will astudent’s transgender identity be
recognized as such, and how might legibility as transgender depend upon
race or class status, or be determined differently in different types of schools
or geographical regions? Could not some schools use legible, recorded trans¬
gender status as atool to reinforce gender segregation (and related surveil¬
lance)ofbathroomsandlockerroomsbyextendinguseofthesespacesonly
138 CONCLUSION
to students whom such policies designate as male or female, whether trans-
gender or not? Might formal records of transgender identity facilitate school
officials’ ability or desire to monitor certain students’ behaviors and bodies?
State projects like these offer protection and recognition that necessarily
entail forms of identification and monitoring and, as the Obama-era poli¬
cies managing undocumented immigrants demonstrate, may shift into more
harmful—or differently harmful—forms.
Going Stealth has tried to show that while surveillance practices may
well take new shapes or gain new significance in moments of crisis, they are
rooted in—and routed through—longer histories of classification and bio¬
political management. Already the crisis of the Trump era has reinvigorated
adesire to protect the forms of state recognition that themselves claim to
protect transgender people, as advocacy organizations’ defense of the census
questions and school guidelines illustrate. Following the longer trajectories
of surveillance practices through their production—and, importantly, their
use—of gender nonconformity helps demonstrate both the surveillance in¬
trinsic to these protective gestures and the limitations of calls for visibility.
More accurate state recognition may increase protection for the recognized
while simultaneously optimizing state agencies’ ability to monitor them (as
in TSA’s continually revised categories of care, or the tracking of transgen-
der identity across ID documents). Meanwhile, those agencies can employ
new categories as justification for expanding surveillance in other ways, for
instance through claims of protecting now-legible groups from those who
remain outside the newly drawn lines of recognition.
Part of this book’s project has been to show how the category of transgen¬
der is produced through surveillance practices that both draw and dissolve
its parameters, not only through spectacular or formal actions undertaken
by state actors but also in the most mundane conditions of our gendered
lives. In refusing to take for granted the boundaries of that category, we can
begin to understand both how aspects of surveillance that never explicitly
use the term transgender—from the official policy of the Real ID Act to the
casual humor surrounding Kushner’s voter registration—play asignificant
role in transgender politics and how surveillance efforts specifically target¬
ingtransgenderpeoplereverberatefarbeyondthoseditectlynamedinsuch
practices. With this in mind, we might pursue new avenues of political soli¬
darity that address the ways that legibility facilitates surveillance programs’
efficacy and demands differentiation from illegible others.
ON ENDURANCE 139
Yet neither does this book call for an easy, uncritical turn to illegibility
that would actively take up deception as apolitical tool to render targeted
populations ungovernable. Those new lines of solidarity should remind us
of the uneven possibilities offered by any embrace of deception, atactic chat
may open new space for some but reignice the truth-seeking mission against
others. In many cases, surveillance practices thrive on the illegibility that
they themselves assign to certain populations. That assignation then ratio¬
nalizes the proliferation of surveillance through state agencies, formal poli¬
cies, and interpersonal engagements, modifying internal logics and frames
of reference to track us more effectively. In itself gender nonconformity
cannot be an inherently resistant foil to the workings of surveillance. This
book shows how surveillance continually exploits and incorporates projects
of transgender visibility, even while those projects—along with endeavors
less legible—gum up the works by exposing normative assumptions and
slipping through the cracks of classificacory systems, both intentionally and
inadvertently. Any promise of lasting evasion is tenuous in this context. Yet
tracing the continuities of surveillance practices across fluctuating popula¬
tion categories, political moments, and technological developments shows
how their endurance depends on adynamic relationship with us. As we look
to the political landscape ahead, we might attune to the possibilities in the
spaces that open, however briefly, through that interplay.
140 CONCLUSION
N O T E S
IEmilia Askari, “Brief Cranbrook Lockdown Over after Report of Man Wearing
Women’s Clothing,” Detroit Free Press, April 17, zooy.
1Askari, “Brief Cranbrook Lockdown.”
3“The danger, deception, and dishonesty allegedly embedded in sexual and gender
nonconformity” is akey theme in the historical criminalization of queer, trans¬
gender, and gender-nonconforming people [Mogul, Ritchie, and Whitlock,
(ln)JustUe, 43].
4Cranbrook Lockdown, April 30, 1007, accessed October 31, Z009, http://www
.cranbrooklockdown.com/index.html.
1 4 Z N O T E S TO I N T R O D U C T I O N
for Transgender Equality, July i, 1009, accessed Augusr 15, 1009, http://www
.transequaliry.org/issues/resources/responding-hate-crimes-community-resource
-manual.
4 0 “SRLP on Hate Crime Laws,” Sylvia Rivera Law Project, 1009, accessed April z,
1010, https://srlp.org/action/hate-crimes/. Multiple other queer and transgender
organizations forwarded asimilar analysis of hate crimes legislation and incorpo¬
rated it into their work. For example, the New York-based Audre Lorde Project
developed and continues to support the Safe OUTside the System Collective,
an antiviolence project “devoted to challenging hate and police violence by us¬
ing community based strategies rather than relying on the police” [“Safe Out¬
side the System (sos),” Audre Lorde Project, zoiy, accessed November n, 1017,
https://alp.org/programs/sos]. In the California Bay Area, Community United
Against Violence for two years held Safetyfest, amultiday event that provided
arange of tools and workshops for queer and transgender antiviolence organiz¬
ing. The festival’s offerings ranged from “community accountability skills to
deal with partner abuse and sexual assault. .. without necessarily relying on the
cops” to fund-raisers for incarcerated queer people of color (Mandy Van De¬
von, “The Bay Area’s Safetyfest Queers Anti-violence Activism,” Bitch Maga¬
zine, April 5, zoio, accessed June 15, 1011, http://www.bitchmedia.org/post/on
-the-map-the-bay-areas-safetyfest-queers-anti-violence-activism).
41 Hammonds, “Black (W)holes,” 141.
Z9 For extensive analysis of the use of third gender categories, particularly in anthro¬
pological work, see Towle and Morgan, “Romancing the Transgender Native.”
We might also ask how third gender categories construct new boundaries around
gender definitions and thus bolster policing and classification processes. What cri¬
teria must one meet in order to be classified as third gender? Does matching those
criteria then foreclose the possibility of being assigned amale or female marker?
How might athird gender marker create new forms of stigma? For instance, for
more than thirty years. New York City maintained apolicy wherein individuals
51 See, for example, Arneri, “Reconstruction of the Male Genitalia”; Jarvis, Male
Body at War, 111-18; Serlin, Replaceable You.
53 Wettlaufer and Weigel, Urology in the Vietnam War, 160.
54 David Brown, “Amputations and Genital Injuries Increase Sharply among Sol¬
diers in Afghanistan,” Washington Post, March 4, zoii.
55 Ks2,A, On Suicide Bombing, 61.
56 Clancy Sigal, “The US Isn’t Facing Up to the Literal Emasculation of Its Soldiers,”
UK Guardian, April 19, zooi. For further discussion of the concept of “signature
wounds,” see Terry, “Significant Injury.”
57 Mercer, Welcome to the Jungle, 185,
58 Eng, Racial Castration, 3.
59 Among the news articles appearing on the rise in wartime genital trauma among
I“Bad for Business: What the Phoenix City ‘Bathroom Bill’ Means for Your Busi¬
ness.” Center for Arizona Policy, February 1013, accessed April 14, 2,014, http://
ww vv.azpolicy.org/media-uploads/pdfs/Bat hroom%ioBi 11/Bathroom%io
Bill%ioBad%zofor%ioBusiness.pdf.
1Mike Morris, “Equal Rights Law Opponents Deliver Signatures Seeking Repeal,”
Houston Chronide,]\i\y 3,1014.
3HB 87, Utah State Legislature, 1014 General Session. This bill failed to pass the
Utah House in March 2,014.
4Currah and Minter, Transgender Equality, 11.
5West, Transforming Citizenships, 29.
6In “Colonial Visions,” Alison Moore notes chat alack of public toilets for women
“served to encourage the limitation of women to the private sphere, with forays into
the public only as long as the intervals between bladder and bowel movements” (no).
These social norms lingered even when bathrooms were available specifically for
women, creating adilemma for many white, class-privileged women: “On one hand
was the opportunity to move through the city with anew freedom; on the other
was the necessity to maintain the appearance of respectable female behavior, which
included the denial of the existence of bodily processes and needs. Toilets were espe¬
cially fraught through being associated, rightly or wrongly, with immoral behavior”
(Brown-May and Fraser, “Gender, Respectability,” 85).
7Kogan, “Sex Separation,” 156.
8Kogan, “Sex Separation,” 156,164.
9Lauren Quock, Modified Bathroom Signs, Laurenquock.com, accessed April 1,
1016, http://laurcnquock.com/section/270348-Modified-Bachroom-Signs.html.
10 Among the many examples of policies and practices that criminalize people of
color in U.S. public spaces are the disproportionate suspension, expulsion, and
arrest of students of color, especially Black students, in public schools (see, for
example, 2013 data collected for Chicago public schools by Project NIA at http://
chiyouthjustice.files.wordpress.com/2013/10/chicago-school-to-prison-updated-
9-13-w-lgbt.pdf, accessed July 12, 2016) and the Special Registration program
implemented in 2002, which primarily targeted men from twenty-three Muslim-
majority countries and required them to be registered, fingerprinted, and pho¬
tographed by U.S. immigration authorities, with this information often used to
arrest, detain, or deport them (see Cainkar and Maira, “Targeting Arab/Muslim/
South Asian Americans”), as well as legislation such as Arizona’s SB 1070, dis¬
cussed later in this chapter.
I I
George Lipsitz provides acogent history of these spatial practices. See Lipsitz,
Possessive Investment-, Lipsitz, “Racialization of Space.”
science date back to the nineteenth century,” linking current digital biometric
surveillance to early anthropometry and fingerprinting (8). Keith Breckenridge
traces the development of biometric data collection through Francis Galton’s work
on statistics and early eugenics programs in the late 1800s, particularly as part
of British imperialism in South Africa (Breckenridge, Biometric State, chap. i).
In Dark Matters, Simone Browne points out that anthropometry “is still being
invoked in biometric information technology R&d” (hi).
48 U.S. Congress, “Biometric Identifiers,” 36.
49 In 1993, the Immigration and Naturalization Services implemented the Passenger
Accelerated Service System, which used hand geometry as biometric identification
to streamline entry into the U.S. for certain prescreened frequent travelers. And
by the late 1990s, U.S. border control agents were using fingerprinting to identify
and track undocumented immigrants crossing the U.S.-Mexico border (Verne G.
Kopytoff, “A Silicon Wall Rises on the Border,” New York January 14,1999).
50 U.S. Congress, “Biometric Identifiers," 7Z.
51 For further discussion of these applications, see Gates, Our Biometric Future-,
Magnet, When Biometrics Fail, and Hall, “Of Ziploc Bags.” The Information
Awareness Office, established by the U.S. Department of Defense in zooz and
58 For discussion of some of these studies, see Beauchamp, “When Things Don’t Add
Up.”
59 In addition to these reading practices, fingerprinting and other biometric data
collection practices shape and are shaped by racial and economic disparities. For
example, disproportionate arrest rates in communities of color and among poor
and immigrant populations mean these groups are overrepresented in biometric
databases and more vulnerable to future surveillance and detention (see Levine et
ah, “Drug Arrests”; and Lynch, “From Fingerprints”).
60 HB 87, Utah State Legislature, 1014 General Session. The following four quota¬
tions are also drawn from this text.
NOTES TO CHAPTER 3 1 6 1
others, suggest the limitations of framing criminalizing bathroom bills as either
new developments or as simply transphobic or homophobic in intent or effect.
Surveillance of public facilities can be understood through these stories as part
of alarger process of control mobilized against those who depend upon public
accommodations or have limited access to private space.
77 Billies, “Low Income LGBTGNC.”
78 KAty, Mobility, io<).
79 This is true even when biometric projects specifically consider transgender peo¬
ple. Recent studies attempt to categorize transgender-identified bodies in order to
develop biometric technologies to better track and identify them. Thus even bod¬
ies that biometric programs themselves acknowledge as changeable are understood
as simply needing to be sorted correctly. For further analysis of these projects, see
Beauchamp, “When Things Don’t Add Up.”
80 See, for example, Leti Volpp’s assessment of the ways that immigration law natu¬
ralizes national borders by imagining the state as “innocent and natural, while the
bodies that move inside and outside this space arc suspect” (“Imaginings of Space,”
464).
81 Shannon Bream, “New A1 Qaeda Manual Reflects Changing Face of Terror,” Fox
News, August 14,1008.
8z Idraw loosely here on Doreen Massey’s argument about how places should be
defined: not through “simple counterposition to the outside,” but “through the
particularity of linkage to that ‘outside,’ which is therefore itself what constitutes
the place. This helps get away from the common association between penetrabil¬
ity and vulnerability. For it is this kind of association which makes invasion by
newcomers so threatening” (Massey, Space, Place, and Gender, 155).
83 Barcan, “Dirty Spaces,” 36.
84 Boris, “You Wouldn’t Want,” 94.
85 Idescribe the actors’ gender and race here not to make my own assumptions
about them, but to convey my analysis of how the video intends these bodies to be
interpreted.
86 “How Will the November Election in Houston Affect You?,” Campaign for Hous¬
ton, ZOI5, accessed December iz, Z015, http://www.campaignforhouston.com/news
/how-will-the-november-election-in-houston-affect-you.
87 Davis, Violence against Women, 6-7. While non-transgender white men play the
role of deceptive predator in these videos, as agroup they are perhaps least likely
to experience the intensified policing and community surveillance that the videos
implicitly call for.
88 On the innocence attached to white childhood, see Betnstein, Racial Innocence. It
is worth noting that the age of childhood is sometimes itself contentious in these
debates. North Carolina’s HB zincludes an exception for parents of children aged
six or younger. State representative Tricia Cotham, aDemocrat, argued for ex¬
panding this exception to those aged eleven and younger, but “Republican House
leaders would not allow it” (Paul Woolverton, “North Carolina’s ‘Bathroom’ Law
governor vetoed in 1016, applied to public schools and was informally titled the
Student Physical Privacy Act. Another Student Physical Privacy Act, HB 1737,
introduced in Kansas in zoi6, states that “children and young adults have natural
and normal concerns about physical privacy when they are in various states of
undress” and stipulates that students may sue for $2,500 in statutory damages if
they encounter “a person of the opposite sex” in asex-segregated space on public
school grounds.
91 Woolverton, “North Carolina’s ‘Bathroom’ Law.”
91 See North Carolina’s Women and Children’s Protection Act of 1015, which also ex¬
tends the waiting period for abortion services. For information regarding state-level
ultrasound requirements, see the Guttmacher Institute’s summary, “Requirement
for Ultrasound,” http://www.guttmacher.org/state-policy/explore/requirements
-ultrasound, accessed May 4,1016.
93 “Drug Testing for Welfare Recipients and Public Assistance,” National Confer¬
ence of State Legislatures, March 18,1016, accessed May 4,1016, http://www.ncsl
.org/research/human-services/drug-testing-and-public-assistance.aspx.
94 HB 663, Virginia General Assembly, 1016.
9 5 “Delegate Cole Files Legislation to Protect the Privacy of Schoolchildren and
Adults,” Delegate Mark Cole, January 13, zoi6, accessed May 10, zoi6, http://
marklcole.com/MarkColePRizJanzoi6.html.
96 “Rep. Morrison Discusses Need for HB 4474,” Tom Morrison, February z, zoi6,
accessed May 10, zoi6, http://www.repmorrison54.com/zo16/oz/rep-morrison
-discusses-need-for-hb-4474.html.
97 U.S. Congress, “Biometric Identifiers,” 37.
98 Barnaby Feder, “Private Sector; The Face of Security Technology,” New York
January zo, zooz.
99 Gates, “Identifying the 9/11,” 434.
too Mitch Kellaway, “Trans Folks Respond to ‘Bathroom Bills’ with #WeJustNeed
Z4 The strategic use of Manning’s transgender identity as one aspect of her legal
defense met with complicated reactions from LGBT communities. Within the
mainstream rights discourse that had long advocated for LGBT inclusion in mili¬
tary service. Manning might have been an important symbolic figure, but her
sustained criticism of U.S. military actions also made her aliability for homona¬
tionalist campaigns that sought approval from state agencies (see Cloud, “Private
Manning”; Goldsmith, “Rich Man’s War”). Other would-be supporters strategi¬
cally edited Manning’s narrative to construct her as asympathetic figure aligned
with military inclusion rhetoric, with some disregarding her transgender identity
“in order to depict her within afriendly white gay pro-military masculinity,” a
strategy that nonetheless often failed to garner broader support (Spade and Willse,
“Sex, Gender, and War,” 17). Others distanced themselves from her in ways that
emphasized their own national loyalty. For instance, the Human Rights Cam¬
paign released astatement affirming their support for transgender service mem-
Conclusion: On Endurance
An August XOI7 FBI report assessing domestic terrorism warns against “Black
Identity Extremist” groups, acategory that multiple commentators understand as
targeting Black Lives Matter without explicitly naming it as such (fbi Counter¬
terrorism Division, “Black Identity Extremists Likely Motivated to Target Law
Enlorcement Officers,” Federal Bureau of Investigation, August 3, Z017, accessed
September 9, 1017, https://assets.documentcloud.org/documents/4067711/BIE
-Redactcd.pdf; Khaled A. Beydoun and Justin Hansford, “The F.B.I.’s Dangerous
Crackdown on ‘Black Identity Extremists,’” New York Times, November 15, Z017).
In May 1017, leaked documents showed that aprivate security firm previously
contracted with the U.S. military worked with local law enforcement in at least
fivestatestoinfiltrateandconductextensivesurveillanceonprotestsagainstthe
Dakota Access Pipeline (Alleen Brown, Will Parrish, and Alice Speri, “Leaked
Documents Reveal Counterterrorism Tactics Used at Standing Rock to ‘Defeat
Pipeline Insurgencies,’” The Intercept, May 17, Z017, accessed September u, Z017,
https://theintercept.com/zo17/05/z7/leaked-documents-reveal-security-firms
-counterterrorism-tactics-at-standing-rock-to-defeat-pipeline-insurgencies/).
These state actions echo COINTELPRO tactics and work alongside the everyday
racist scrutiny enacted by individuals. We might also consider here multiple levels
ofsurveillanceoverabortionservices,includinglegislationdemandingthatclin¬
ics withstand ever greater levels of scrutiny and compliance with new regulations,
surveillance performed by antiabortion organizations in attempts to discredit
providers (then sometimes used as evidence in crafting new restrictive laws), and
surveillance conducted by individuals over abortion providers and clinic staff, in
a d d i t i o n t o the abortion data collected by the Centers for Disease Control and
Prevention,
N O T E S TO C O N C L U S I O N 1 7 1
B I B L I O G R A P H Y
Abel, Elizabeth. Signs ofthe Times: The Visual Politics of Jim Crow. Berkeley; Univer¬
sity of California Press, loio.
Abu-Lughod, Lila. “Do Muslim Women Really Need Saving? Anthropological Re¬
flections on Cultural Relativism and Its Others.” American Anthropologist 104,
no. 3(looz): 783-90.
Adey, Peter. Mobility. New York: Routledge, 1010.
Agamben, Giorgio. “Bodies without Words: Against the Biopolitical Tatoo.” German
Law Journal 5(1004); 167-69.
Agar, Jon. “Modern Horrors: British Identity and Identity Cards.” In Documenting
Individual Identity: The Development of State Practices in the Modern World,
edited by Jane Caplan and John Torpey, loi-io. Princeton, NJ: Princeton Uni¬
versity Press, zooi.
Aizura, Aren Z. “Introduction.” South Atlantic Quarterly 116, no. 3(July Z017);
6 0 6 - 11 .
Asad, Talal. On Suicide Bombing. New York: Columbia University Press, Z007.
Assmus, Alexi. “Early History ofX Rays.” Beam Line: APeriodical of Particle Physics
15, no. z(summer 1995): 10-Z4.
Bacchetta, Paola, Tina Campt, Inderpal Grewal, Caren Kaplan, Minoo Moallem, and
Jennifer Terry. “Transnational Feminist Practices against War.” Meridians z, no.
z(zooz): 30Z-8.
Barcan, Ruth. “Dirty Spaces: Separation, Concealment, and Shame in the Public
Toilet.” In Toilet: Public Restrooms and the Politics of Sharing, edited by Harvey
Molotch and Laura Noren, Z5-41. New York: New York University Press, zoio.
Bassichis, Morgan, Alexander Lee, and Dean Spade. “Building an Abolitionist Trans
and Queer Movement with Everything We’ve Got.” In Captive Genders: Trans
Embodiment und the Prison Industrial Complex, edited by Eric A. Stanley and
Nat Smith, 15-40. Oakland, CA: AK Press, zoii.
Beauchamp, Toby. “When Things Don’t Add Up: Transgender Bodies and the
Mobile Borders of Biometrics.” In Trans Studies: The Challenge to Hetero/
Homo Normativities, edited by Yolanda Martinez-San Miguel and Sarah Tobias,
103-11. New Brunswick, NJ: Rutgers University Press, loiS.
Bederman, Gail. Manliness and Civilization: ACultural History of Gender and Race
in the United States, iSSo-ipiy. Chicago: University of Chicago Press, 1995.
Bedolla, Lisa GdcccH Latino Politics. Cambridge, MA: Polity, 1009.
Bergeron, Claire, Aaron Matteo Terrazas, and Doris Meissner. “Social Security
‘No Match’ Letters: APrimer.” AfP/ Backgrounder 5(1007): i-n. http://www
.migrati0np0licy.org/pubs/BR5_S0cialSecurityN0Match_101007.pdf
Bernstein, Robin. Racial Innocence: Performing American Childhoodfrom Slavery to
Civil Rights. New York: New York University Press, 1011.
Bettcher, Talia Mae. “Evil Deceivers and Make-Believers: On Transphobic Violence
and the Politics of Illusion.” Hypatia ii, no. 3(August 1007): 43-65.
Billies, Michelle. “Low Income LGBTGNC (Gender Nonconforming) Struggles over
Shelters as Public Space.” -4CM£.- An International E-Journal for Critical Geogra¬
phies 14, no. 4(1015): 989-1007.
Boris, Eileen. “‘You Wouldn’t Want One of’Em Dancing with Your Wife’: Racial-
ized Bodies on the Job in World War II.” American Qiiarterly 50, no. i(March
1998): 77-108.
Breckenridge, Keith. Biometric State: The Global Politics of Identification and Sur¬
veillance in South Africa, iSyo to the Present. Cambridge: Cambridge University
Press, 1014.
Bridges, Khiara M. The Poverty of Privacy Rights. Stanford, CA: Stanford University
Press, Z017.
Brown, Wendy. States of Injury: Power and Freedom in Late Modernity. Princeton,
NJ: Princeton University Press, 1995.
Brown-May, Andrew, and Peg Fraser. “Gender, Respectability, and Public Conve¬
nience in Melbourne, Australia, 1859-190Z.” In Ladies and Gents: Public Toilets
and Gender, edited by Olga Gershenson and Barbara Penner, 75-89. Philadel¬
phia: Temple University Press, Z009.
Browne, Simone.. Dark Matters: On the Surveillance of Blackness. Durham, NC: Duke
University Press, Z015.
Butler, Judith. “Against Proper Objects.” Differences 6, nos. z-3 (1994): i-z6.
Butler, Judith. “Endangered/Endangering: Schematic Racism and White Paranoia.”
In Reading Rodney King, Reading Urban Uprising, edited by Robert Gooding-
Williams, 15-zz. New York: Routledge, 1993.
Butler, Judith. Undoing Gender. New York: Routledge, Z004.
Cacho, Lisa. Social Death: Racialized Rightlessness and the Criminalization of the
Unprotected. New York: New York University Press, zoiz.
Cainkar, Louise, and Sunaina Maira. “Targeting Arab/Muslim/South Asian Ameri-
174 BIBLIOGRAPHY
cans: Criminalization and Cultural Citizenship.” J o u r n a l 3 1 , n o . 3
(2.005); 1-2.8.
Califia, Patrick. Sex Changes: Transgender Politics. San Francisco: Clcis, 1003.
Campbell, Kristina M. “The Road to S.B. 1070: How Arizona Became Ground Zero
for the Immigrants’ Rights Movement and the Continuing Struggle for Latino
Civil Rights in America.” Harvard Latino Law Review 14 (loii): i-zi.
Canaday, Margot. The Straight State: Sexuality and Citizenship in Twentieth-Century
America. Princeton, NJ: Princeton University Press, 2009.
Caplan,Jane, and John Torpey. “Introduction.” In Documenting Individual Identity:
The Development of State Practices in the Modern World, edited by Jane Caplan
and John Torpey, i-iz. Princeton, NJ: Princeton University Press, zooi.
Carter, Julian B. The Heart of Whiteness: Normal Sexuality and Race in America,
iSSo~ig40. Durham, NC: Duke University Press, zooy.
Cartwright, L\ssl. Screening the Body: Tracing Medicine’s Visual Ca/tore. Minneapolis:
University of Minnesota Press, 1995.
Case, Mary Anne. “Why Not Abolish Laws of Urinary Segregation?” In Toilet: Pub¬
lic Restrooms and the Politics of Sharing, ed. Harvey Molotch and Laura Norta,
Z11-Z5. New York: New York University Press, zoio.
Ceyhan, Ayse. “Technologization of Security: Management of Uncertainty and Risk
in the Age of Biometrics.” Surveillance and Society 5, no. z(zoo8): 10Z-Z3.
Chambers, Ross. “The Unexamined.” Af/aaerota Review 47 (fall 1996): 141-56.
Clare, Eli. “Body Shame, Body Pride: Lessons from the Disability Rights Movement.”
In The Transgender Studies Reader 2, edited by Susan Stryker and Aren Z. Ai-
zura, 261-65. New York: Routledge, 2013.
Cloud, Dana L. “Private Manning and the Chamber of Secrets.” QED: AJournal in
GLBTCl Worldmakingi, no. i(spring2014): 80-104.
Cohen, Cathy J. “Punks, Bulldaggers, and Welfare Queens; The Radical Porential of
Queer Politics?” In Black Queer Studies: ACritical Anthology, edited by
E. Patrickjohnson and Mae G. Henderson, 21-51. Durham, NC: Duke Univer¬
sity Press, 2005.
“Considering Police Body Cameras.” Harvard Law Review iz8, no. 6(April 2015):
1794-1817.
Davis, Angela Y. Violence against Women and the Ongoing Challenge to Racism.
Latham, NY: Kitchen Table: Women of Color Press, 1985.
BIBLIOGRAPHY 175
Davis, Lennard J. “The End of Identity Politics: On Disability as an Unstable Cat¬
egory.” In The Disability Studies Reader, 4th ed., edited by Lennard J. Davis,
163-77. New York: Routledge, Z013.
de Moulpied, David S., Peter J, Rothschild, and Gerald J. Smith. “X-Ray BodySeatch
Eliminates Strip Search in Montana Prison.” In SPIE Proceedings, vol. 3575: En¬
forcement and Security Technologies, edited by A. Trent DePersia and John J. Pen-
nella, 175-81. Bellingham, WA: SPIE, December 1998.
Desai, Jigna, and Amy L. Brandzel. “Race, Violence, and Terror: The Cultural Defen-
sibility of Heteromasculine Citizenship in the Virginia Tech Massacre and the
Don Imus KSsnc!' Journal of Asian American Studies u, no. i(February 1008):
61-85.
Farrow, Kenyon. “Is Gay Marriage Anti-Black???” In Against Equality: Qtieer Cri¬
tiques oj Gay Marriage, edited by Ryan Conrad, Z1-3Z. Lewiston, ME: Against
Equality Publishing Collective, z o i o .
176 BIBLIOGRAPHY
Foucault, Michel. The History of Sexuality, vol. i: An Introduction. New York; Ran¬
dom House, 1978.
Foucault, Michel. “The Risks of Security.” In Essential Works of Michel Foucault, vol.
3: Power, edited by James D. Faubion, 365-81. New York: New Press, 1001.
Gates, Kelly. “Identifying the 9/11 ‘Faces of Terror’; The Promise and Problem of Facial
Recognition Technology.” Cultural Studies 10, nos. 4-5 (July 1006): 417-40.
Gates, Kelly. Our Biometric Future: Facial Recognition Technology and the Culture oj
Surveillance. New York: New York University Press, 2.011.
Godfrey, Phoebe. “Bayonets, Brainwashing, and Bathrooms: The Discourse of Race,
Gender, and Sexuality in the Desegregation of Little Rock’s Central High.”4?r-
kansas Historical Quarterly 6z, no. i(spring 1003): 41-67.
Goldsmith, Larry. “Rich Man’s War, Poor (Gay) Man’s Fight.” In Why Are Faggots
So Afi-aid of Faggots?, edited by Mattilda Bernstein Sycamore, 181-84. Oakland,
CA: AK Press, loii.
BIBLIOGRAPHY 177
Hausman, Bernice. Changing Sex: Transsexualism, Technology, and the Idea of Gen¬
der. Durham, NC: Duke University Press, 1995.
Hillman, Elizabeth Lutes. Defending America: Military Culture and the Cold War
Court-Martial. Princeton, NJ: Ptinccton Univetsity Press, 1005.
Hirschmann, Nancy J., and Beth Linker, eds. Civil Disabilities: Citizenship, Member¬
ship, and Belonging. Philadelphia: University of Pennsylvania Press, 1014.
Howell,Joel D. Technology in the Hospital: Transforming Patient Carein the Early
Twentieth Century. Baltimore: Johns Hopkins University Press, 1995.
Irving, Dan. "Normalized Transgressions: Legitimizing the Transsexual Body as
Productive.” Radical History Review too (winter zoo8): 38-59.
]3.mts,]oy. Resisting State Violence: Radicalism, Gender, and Race in U.S. Culture.
Minneapolis: University of Minnesota Press, 1996.
Jarvis, Christina S. The Male Body at War: American Masculinity during World War
II. DeKalb: Northern Illinois University Press, 1010.
Johnson. David K. The Lavender Scare: The Cold War Persecution of Gays and Lesbi¬
ans in the Federal Government. Chicago: University of Chicago Press, zoo6.
Johnson, Kevin R. “The Case against Race Profiling in Immigration Enforcement.”
Washmgton University Law Review 78, no. 3(January zooo): 675-736.
Kafer, A.\ison. Feminist, Queer, Crip. Bloomington: Indiana University Press, 1013.
Kamaloni, Sunshine M. “What Are You Doing Here? The Politics of Race and Be¬
longing at the Airport.” In Security, Race, Biopower: Essays on Technology and
Corporeality, edited by Holly Randell-Moon and Ryan Tippet, 61-78. London:
Palgrave Macmillan, 2016.
Kandaswamy, Priya. “Innocent Victims and Brave New Laws: State Protection and
the Battered Women’s Movement.” In Nobody Passes: Rejecting the Rules of Gen¬
der and Conformity, edited by Mattilda a.k.a. Matt Bernstein Sycamore, 83-94.
Emeryville, CA: Seal, 2006.
Kapp-Klote, H., and Angela Peoples. “Loretta Lynch and the Criminalization of
Trans People." Truthout, May 18, 2016. http://www.truth-out.org/opinion/item
/36078-loretta-lynch-and-the-criminalization-of-trans-people.
Kevles, Bettyann Holtzmann. Naked to the Bone: Medical Imaging in the Twentieth
Century. Reading, MA: Addison-Wesley, 1997.
Kim, Eunjung. “Asexuality in Disability Narratives.” Sexualities 14, no. 4(2011): 479-93.
Kogan, Terry S. “Sex Separation: The Cure-All for Victorian Social Anxiety.” In Toi¬
let: Public Restrooms and the Politics of Sharing, edited by Harvey Molotch and
Laura Noren, 145-64. New York: New York University Press, 2010.
Levi, Jennifer L., and Bennett H. Klein, “Pursuing Protection for Transgender People
through Disability Laws.” In Transgender Rights, edited by Paisley Currah, Rich¬
ard M. Juang, and Shannon Price Minter, 74-92. Minneapolis: University of
Minnesota Press, 2006.
Levi, Jennifer, and Daniel Redman. “The Cross-Dressing Case for Bathroom Equal¬
ity.” Seattle University Law Review 34 (2010): 133-71.
Levine, Harry G., Jon B. Gettman, Craig Reinarman, and Deborah Peterson Small.
178 BIBLIOGRAPHY
“Drug Arrests and DNA: Building Jim Crow’s Database.” Council for Respon¬
sible Genetics Forum on Racial Justice Impacts of Forensic DNA Databanks,
June 19, ioo8. http://www.councilforresponsiblegenetics.org/pagedocuments
/orrxbggaei.pdf.
Lipsitz,George.ThePossessiveInvestmentinWhiteness:HowWhitePeopleProfitfi'om
Identity Politics. Philadelphia: Temple University Press, ioo6.
Lipsitz, George. “The Racialization of Space and the Spatialization of Race: Theoriz¬
ing the HiddenArchitecture oiL3.nA^capt!' Landscape Journal z6, no. i(zooy):
10-13.
BIBLIOGRAPHY 179
Moore, Alison. “Colonial Visions of‘Third World’ Toilets; ANineteenth-Century
Discourse That Haunts Contemporary Tourism.” In Ladies and Gents: Public
Toilets and Gender, edited by Olga Gershenson and Barbara Penner, 105-25.
Philadelphia: Temple University Press, 2009.
Morris, Jan. Conundrum. London: Faber and Faber, 1974.
National Commission on Terrorist Attacks upon the United States. “The 9/11 Com¬
mission Report.” U.S. Government Publishing Office, July 22, 2004. Accessed
July 29, 2017. https://www.gpo.g0v/fdsys/pkg/GPO-911REPORT/pdf/GPO
-9iiREPORT.pdf
Ngai, Mae M. Impossible Subjects: Illegal Aliens and the Making of Modern America.
Princeton, NJ: Princeton University Press, 2004.
Nguyen, Mimi Thi. “Clothes Epidermalized, as Republican Representative Targets
‘Illegals.’” Threadbared, April 24, 2010. Accessed June 22, 2010. http://
iheartthreadbared.wordpress.com/2010/04/24/foucault-was-right-gop-rep
-targets-illegals-via-dress.
Ong, Aihwa. Buddha Is Hiding: Refugees, Citizenship, the New America. Berkeley:
University of California Press, 2003.
Ong, Aihwa, Flexible Citizenship: The Cultural Logics of Transnationality. Durham,
NC: Duke University Press, 1999.
Paik, A. Naomi. Rightlessness: Testimony and Redress in U.S. Prison Camps since
World War II. Chapel Hill: University ofNorth Carolina Press, 2016.
Parent!, Christian. The Soft Cage: Surveillance in America from Slave Passes to the
War on Terror. New York: Basic Books, 2003.
Pegler-Gordon, Anna. “Chinese Exclusion, Photography, and the Development of
U.S. Immigration Policy!’ American Qiiarterly 58, no, i(2006): 51-77.
Poole, Mary. The Segregated Origins of Social Security: African Americans and the
Welfare State. Chapel Hill: University ofNorth Carolina Press, 200 6.
Pozen, David E. “The Leaky Leviathan; Why the Government Condemns and Con¬
dones Unlawful Disclosures of Information.” Harvard Law Review 127, no. 512
(2013): 512.-635-
Prosser, Jay. “Exceptional Locations: Transsexual Travelogues.” In Reclaiming Gen¬
ders: Transsexual Grammars at the Fin de Siecle, edited by Kate More and Ste¬
phen Whittle, 83-114. New York: Continuum, 1999.
Puar, Jasbir. Terrorist Assemblages: Homonationalism in Queer Times. Durham, NC:
Duke University Press, 2007.
Puar, Jasbir, and Amit S. Rai. “Monster, Terrorist, Fag: The War on Terror and the
Production of Docile Patriots.” Social Text 20, no. 3(2002): 117-48.
Pugliese, Joseph. “In Silico Race and the Heteronomy of Biometric Proxies: Biomet¬
rics in the Context of Civilian Life, Border Security and Counter-terrorism
hsvfsl Australian Feminist Law Journal 23, no. i(2005): 1-32.
Rana,Junaid. Terrifying Muslims: Race and Labor in the South Asian Diaspora. Dur¬
ham, NC: Duke University Press, 2011.
180 BIBLIOGRAPHY
Raymond, Janice, The Transsexual Empire: The Making of the She-Male. London:
Women’s Press, 1979.
Reeves, Joshua. Citizen Spies: The Long Rise of America’s Surveillance Society. New
York: New York University Press, Z017.
Richardson, Matt. The Queer Limit of Black Memory: Black Lesbian Literature and
Irresolution. Columbus: Ohio State University Press, Z013.
Roberts, Dorothy. Killing the Black Body: Race, Reproduction, and the Meaning of
Liberty. New York: Random House, 1997.
Rosaldo, Renato. “Cultural Citizenship, Inequality, and Multiculturalism.” In Latino
Cultural Citizenship, edited by William V. Flores and Rina Benmayor, Z7-38.
Boston: Beacon, 1997.
Ross, Kristin. Fast Cars, Clean Bodies: Decolonization and the Reordering of French
Culture. Cambridge, MA: MIT Press, 1995.
Rubin, Gayle. “Thinking Sex: Notes for aRadical Theory of the Politics of Sexual¬
ity.” In The Lesbian and Gay Studies Reader, edited by Henry Abelove, Michde
Aina Barale, and David M. Halperin, 3-44. New York: Routledge, 1993.
Russell, Emily, Reading Embodied Citizenship: Disability, Narrative, and the Body
Politic. New Brunswick, NJ: Rutgers University Press, zoii.
Salter, Mark B. Rights of Passage: The Passport in International Relations. Boulder,
CO: Lynne Rienner, Z003.
Schweik, Susan M. The Ugly Laws: Disability in Public. New York: New York Univer¬
sity Press, Z009.
Sears, Cltite. Arresting Dress: Cross-Dressing, Law, and Fascination in Nineteenth-
Century San Francisco. Durham, NC: Duke University Press, zoi4.
Serlin, David. Replaceable You: Engineering the Body in Postwar America. Chicago:
University of Chicago Press, Z004.
Shakespeare, Tom. “The Social Model of Disability.” In The Disability Studies
Reader, 4th ed„ edited by Lennard J. Davis, Z14-Z1. New York: Routledge, Z013.
Siebers, Tobin. “A Sexual Culture for Disabled People.” In Sex and Disability, edited
by Robert McRuer and Anna Mollow, 37-53. Durham, NC: Duke University
Press, zoiz.
Silliman, Jael, and Annya Battacharjee, eds. Policing the National Body: Race, Gender,
and Criminalization. Cambridge, MA: South End, zooz.
Snorton, C. Riley, and Jin Haritaworn. “Trans Necropolitics: ATransnational Reflec¬
tion on Violence, Death, and the Trans of Color Afterlife.” In The Transgender
Studies Reader 2, edited by Susan Stryker and Aren Z. Aizura, 66-76. New York:
Routledge, Z013.
Somerville, Siobhan. Queering the Color Line: Race and the Invention of Homosexual¬
ity in American Culture. Durham, NC: Duke University Press, zooo.
Soto, Sandra K., and Miranda Joseph. “Neoliberalism and the Battle over Ethnic
Studies in Arizona.” Thought and Action (fall zoio): 45-56.
Spade, Dean. “Documenting Gender.” Hastings Law Journal 59 (zoo8): 731-84Z.
BIBLIOGRAPHY 181
Spade, Dean. “Methodologies of Trans Resistance.” Iny^ Companion to Lesbian, Gay,
Bisexual, Transgender, andQiieer Studies, edited by George E. Haggerty and
Molly McGarry, 137-61. Oxford: Blackwell, 1007.
Spade, Dean. Normal Life: Administrative Violence, Critical Trans Politics, and the
Limits of Law. Durham, NC: Duke University Press, zoii.
Spade, Dean. “Resisting Medicine, Re/Modeling Gender,” Berkeley Womens Law
Journal 18 (1003): 15-37.
Spade, Dean, and Craig Willse. “Sex, Gender, and War in an Age of Multicultural
Imperialism.” Journalin GLBTQ^ Worldmaking i, no. i(spring Z014):
5-19.
Stalder, Felix, and David Lyon. “Electronic Identity Cards and Social Classification.”
In Surveillance as Social Sorting: Privacy, Risk and Digital Discrimination, edited
by David Lyon, New York: Routledge, 1003.
Stanley, Eric A., and Nat Smith, ed. Captive Genders: Trans Embodiment and the
Prison Industrial Complex. Oakland, CA: AK Press, ion.
Steele, Sarah M. “Queering Intersectionality: Practical Politics and Southerners on
New Ground.” Master’s thesis. University of Florida, ion. http://ufdc.ufl.edu
/UFE0043001/00001,
Stoeckley, Clark. The United States vs. Private Chelsea Manning: AGraphic Account
from Inside the Courtroom. New York: o/r Books, 1015.
Stone, Sandy. “The Empire Strikes Back: APosttranssexual Manifesto.” In Body
Guards: The Cultural Politics of Gender Ambiguity, edited by Julia Epstein and
Kristina Straub, 180-304. New York: Routledge, 1991.
Stryker, Susan. “(De)Subjugated Knowledges: An Introduction to Transgender Stud¬
ies.” In The Transgender Studies Reader, edited by Susan Stryker and Stephen
Whittle, I-17. New York: Routledge, 2006.
Stryker, Susan, and Aren Z. Aizura. “Introduction: Transgender Studies 2.0.” In The
Transgender Studies Reader 2, edited by Susan Stryker and Aren Z. Aizura, i-ii.
New York: Routledge, 1013.
Stryker, Susan, and Stephen Whittle, eds. The Transgender Studies Reader. New York:
Routledge, 1006.
An American Obsession: Science, Medicine, and Homosexuality in
Modern Society. Chicago: University of Chicago Press, 1999.
Terry, Jennifer. “Significant Injury: War, Medicine, and Empire in Claudia’s Case.”
fVSQ: Women’s Studies Quarterly nos. 1-2 (spring-summer 1009): 200-125.
Torpey,John. The Invention of the Passport: Surveillance, Citizenship and the State.
Cambridge: Cambridge University Press, 1000.
Towle, Evan, and Lynn Morgan. “Romancing the Transgender Native: Rethinking
the Use of the ‘Third Gender’ Concept.” 8, no. 4(1001): 469-97.
US. Congress, Senate Committee on Homeland Security and Governmental Affairs.
“Vulnerabilities in the US. Passport System Can Be Exploited by Criminals and
Terrorists.” Wa,shington, DC: U.S. Government Printing Office, 2006.
U.S. Congress, Senate Committee on the Judiciary. “Will Real ID Actually Make Us
181 BIBLIOGRAPHY
Safer? An Examination of Privacy and Civil Liberties Concerns.” Washington.
DC: U.S. Government Printing Office, 1007.
U.S.Congress,SenateCommitteeontheJudiciary,SubcommitteeonTechnology,
Terrorism, and Government Information. “Biometric Identifiers and the Modern
Face of Terror: New Technologies in the Global War on Terrorism.” Washing¬
ton, DC: U.S. Government Printing Office, 2001.
U.S. Department of State, Passport Office. The United States Passport: Past, Present,
Future. Washington, DC: U.S. Government Printing Office, 1976.
Valentine, David. Imagining Transgender: An Ethnography of aCategory. Durham,
NC: Duke University Press, 2007.
van der Ploeg, Irma. “Borderline Identities:The Enrollment of Bodies in theTech¬
nologicalReconstructionofBorders.”InSurveillanceandSecurity:Technological
Politics and Power in Everyday Life, edited by Torin Monahan, 177-’)},. New
York: Routledge, 2006.
Volpp, Leti. “The Citizen and theTerrorist.” UCLALaw Review 49 (2002): 1575-99.
Volpp, Leti. “Imaginings of Space in Immigration Law.” Law, Culture and the Hu¬
manities 9, no. 3(2012): 456-74.
Wasserstrom, Richard A. “Racism, Sexism and Preferential Treatment: An Approach
totheTopics.”InAppliedEthics:CriticalConceptsinPhilosophy,vol.6,editedby
Ruth Chadwick and Doris Schroeder, 103-42. New York: Routledge, 2002.
West,Isaac.TransformingCitizenships:TransgenderArticulationsoftheLaw.New
York; New York University Press, 2014.
Wettlaufer, John N., and John W. Weigel. Urology in the Vietnam War: Casualty
Management and Lessons Learned. Washington, DC: Office of the Surgeon Gen¬
eral, U.S. Army, 2005.
Zackodnik, Teresa. “Fixing the Color Line: The Mulatto, Southern Courts, and Ra¬
cial Identity.” American Quarterly 53, no. 3(2001): 420-51.
BIBLIOGRAPHY 183
I N D E X
138; privacy discourse and, 11, 43-45; Aizura, Aren Z., 11,141ml
race and, 14-15,19-31, 43“ 45. 47 "49, Allen, Samantha, 116, iz8
American Express commercial (1008), i6on59; concradictions of, 97-98;
8-9,10 criminalization and, 81, 98-99,155010;
anomalies, 51,56-57, 74-78 deception and, 104-6; eugenics and,
anthropometry, 74-76, 93-94,159047 66,74-76, 93-94,159047; facial recog¬
Antiterrorisni and Effective Death Penalty nition technology, 93-94,104-6,
Act (1996), 45 159051; fingerprinting and, 81, 95-96,
Araujo, Gwen, 33,1451114 98-99; fraud and, 95; gender identity
Asad, Talal, 70-71 discourse and, 93-99; immigration
Asian Americans, 4,16-17, 95 policy and, 60, 81, 94-95,106,155010,
assimilation, 48-49. See also going stealth 159047,159049; Information Aware¬
Atick, Joseph J., 104-5 ness Office and, 159051; legibility of
Audre Lorde Project (alp), 47,143040, 95-96,160057; national security and,
148058,148060,148061 94-95,159051; neutrality of 95-96;
9/11 and, 81, 94-95; objective identifica¬
bathroom bills: biometric surveillance tion and, 81, 93-94; public bathrooms
and, 80-81, 93-99; citizenship and, 81, and, 11-11, 81, 93-99; public schools
85-86, 88-93, 99-106,161065; crimi¬ and, 96; race and, 95-96,1601159;
nalization and, 80-81, 88-91,104,106, recognition and, 104-6; terrorism dis¬
157015,161076; deception and, 79-80; course and, 81, 94-95,106; transgender-
disability and, 91-91; fraud and, 79; identified bodies and, 161079; voluntary
gender identity discourse and, 87-88; surveillance and, 78; whiteness and,
genital recognition and, 80-81, 88-89, 95-96
ity and, 86-87; nondiscrimination ordi¬ birth certificates, 15,18,31,34-35, 40, 88,
nances and, 79-81, 86-90,101,103-4, 93,145011,159046. See also identity
157018; privacy and, 103-4,107,15506, documents
161076, i6in88,163090; public schools Black and Pink (prisoner support organiza¬
and, 80, 96-97,104,1630089-90; tion), i69n7i
public space and, 99-106,161076; race Black Identity Extremists, 170m
and, 88-93, 99-100; safety discourse blackness, 8-9,10,11,138-39,143113
and, 79-81, 97-98,101,103-4,1571115; Bland, Sandra, 165016
sexuality and, 87; terrorism discourse bodily visibility. See visibility
and, 80, 99 Brandzel, Amy, 4-5
Battle of Algiers (1965), 38-39 Breckenridge, Keith, 159047
Bederman, Gail, 85,156016 Brown, Wendy, 17
Bedolla, Lisa Garcia, 156016 Browne, Simone, 95,138,141015,14303,
Benjamin, Harry, 31 151018,159047
Bettcher, Talia Mae, 145014 Bush (George W.) administration, ii
biometric surveillance: anthropometry, Butler, Judith, 8, in, 15005
74-76, 93-94,159047; bathroom bills
and, 80-81, 93-99: citizenship dis¬ Cacho, Lisa, 95
course and, 98-99; class and, 160057, Camp X-ray, 60-61
186 INDEX
Canaday, Margot, 17 Cole, Mark, 104
Carter, Julian B., 74~75 “Collateral Murder” video, 109,113,117-18,
Cartwright, Lisa, 59-60 11 3
INDEX 187
disability: advanced imaging technologies 52-33; voter fraud, 10, 27-30,133-34.
and, 51-52; airport security screenings See also deception
and, 21,55-57, S3-64,151040; asexuality/
desexualization and, 159043; citizenship gender identity discourse: bathroom bills
discourse and, 57,159041; disability ad¬ and, 87-88: biometric logic and, 93-99;
vocacy groups, 21, 68,1521140; eugenics census data collection and, 137-38;
and, 74-75; instability of, 57; medical citizenship discourse and, 9, 89-91;
necessity framework and, 52-57,15006; Manning case and, 22,108,114-19,125,
National Center for Transgender Equal¬ 126-29,166021,1660023-24; military
ity and, 152040; normative bodies and, inclusion policies, 136-37,138,156015,
57; privacy and, 3; prosthetics and, 21, 166021,166024; nondiscrimination
51-52,55-57, 72-73; public bathrooms ordinances, 86-88; normalization
and, 91-93; recognition and, 57; social of 31-38; queer of color critique and,
model of disability, 53; surveillance prac¬ 13-14; race and, 32,39-40, 49, 85-86,
tices and, 22-23; transgender-identified 157020; sexual orientation conflation
people and, 91-92,15006; TSA Cares and, 113,16602; third gender concept,
program, 55-57 35-37,1450027-29,146031; whiteness
disciplinary power, 15-16,36-37. See also and, 32,59-40, 49, 85-86,1571120. See
biopower also gender nonconformiry
Don’t Ask, Don’t Tell policy, 112-13, 'ly. gender identity disorder (gender dyspho¬
124-23,128,166019, i66nn2i-22 ria), 31, 48,52-53
gender nonconformity: use of term, 11,
Elias, Norbcrt, I57ni4 13; bodily anomalies and, 74-78;
"The Empire Strikes Back” (Stone), Cranbrook lockdown and, 1-6,10;
144019,147053 criminalization and, 14103; deception
Eng, David, 73 and, 1-3, 9-10, 43,132-34; fraud and,
Enke, A. Finn, 11 9-10; identity documents and, 31-38;
eugenics, 66, 74-76, 93-94,1591147 prison system and, 121-22; privacy and,
43-49; race and, 4,11-14,3°. 39-4°.
facial recognition technology, 93-94, 47-49; surveillance practices and,
104-6,159051 5-6, 7-14,110-11,132-34,138-40;
Fein, Ashden, 116 transgender visibility and, 14-20,
Feinstein, Dianne, 94 22-23,132-34. See also gender identity
Fenster, Mark, 168058 discourse; Manning, Chelsea; norma¬
fingerprinting, 77-78, 81, 94, 95-96, tive bodies
ric surveillance and, 95; citizenship going stealth, 34-35, 45-46, 48-49
discourse and, 9-10,30-31, 41-42, Goins vs. West Publishing, 157028
95; gender nonconformity and, 9-10; Gopinath, Gayatri, 14
identity documents and, 9-10, 27-29, Gorton, Nick, 15005
3^-33. 41-42,44.1451123; race and, 30; Gossett, Che, 12
188 INDEX
Guantanamo Bay detention facility, 4, security and, 40-41; no-march policy,
6 0 - 6 1 , 1 0 9 , 111 - 11 , 11 7 - 1 8 57-3S, 41, 43-45.133-34.148065;
passport systems, 2.5—17,18, 40-41, 46,
Hage, Ghassan, 70-71 143113; post-9/11 and, 41-43; privacy
Hall, Rachel, 119 and, 41-41; production of gender and,
Hammonds, Evelynn, 15-16,10 56-37,133-34; race and, 10,14-15,
Hanhardt, Christina, 1581136 16-18; Real ID Act, 10,14, 40-48,
41-41; legitimacy and, 15-16, 89; name 161065; terrorism discourse and, 4,
changes, 31-33, 40, 41,145013; Na¬ 57-38, 41-43. 45.80-81, 94-95.108-9;
tional Center for Transgender Equality transgender-identified people and, 89-91;
and, 19-30,38, 44-45, 47-48; national Trump administration and, 131-31,
identity and, 10,14-18, 41-43; national 135-36; USA PATRIOT Act and, 45
NDEX 189
individualism, 41-41, 95, iii, 115-19 Magnet, Shoshana Amielle, 98,159047
Information Awareness Office, 159051 Manning, Chelsea: abolition framework
and, 169071; advocacy organizations
James, Joy, 39-40 and, 117-18,1691171; citizenship dis¬
Jensen, Abigail, 90, 99-100 course and, 108-9, III, 117-18; as de¬
Johnson, Duanna, 110-11,1650011-13 ceptive individual, 11,109,111-13, ”6,
Johnson, Kevin, 151018 117,115-16,118-19; Don’t Ask, Don’t
Johnson, Michael, 41 Tell policy and, 111-13,117,114-15,
118,166019, i66nnii-ii; emotional
Kaba, Mariame, 165016 life of, 109,113-19,114-15; exceptional
Kavanagh, John, 86-88, 91, 97 heroic individualism of, 111,115-19;
Keisling, Mara, 76 gender identity and, 11,108,114-19,
Kennedy, Michael, 80 11 5 , 11 8 - 1 9 , i 6 6 n i i , 1 6 6 0 0 1 3 - 1 4 ;
Kushner, Jared, 133-34,139,17003 Guantanamo Bay detention facility and,
4, 60-61,109,111-11,117-18; human¬
Lamo, Adrian, 109-10,111,114-17,114, ist beliefs of, 113-14,116,117,167015;
i66nii incarceration of, 108,119-11,116-18:
law enforcement officers: body cameras isolation and, no, 113-16,118, iii-ii,
and, 111-11,165016,165018; National 116-17,118,1661111; Adrian Lamo and,
Center for Transgender Equality and, 109-10, 111, 114-17,114, i66nii; legal
19; surveillance of police violence, defense strategy, 11,111-19,116-19,
165016 i66nni3-i4; legitimacy and, 48-49,
legibility: of biometric surveillance, 95-96, 5i-53.55-57.171,116; medicolegal dis¬
160057; citizenship discourse and, 49, course and, 114; national security and,
85-86,106; goingstealth, 34-35, 45-46, 11,108-9,117. ”9. >71,118-19, >67041,
48-49; vs. illegibility, 98,139-40; 168058; prettial confinement, 11,110,
medicolegal discourse and, 31,51-55, 111, 111, 116-17, >78,1681151,168055;
190 INDEX
course and, ii, 31-53, 34-35,45-46, Monahan, Torin, 3
48-49; gender markers and, 31-38, Mongia, Radhika Viyas, 16
41-43, 48, 86,145ml, 1451119,146n3i, Moore, Alison, 15506,156016
i7on3; gender tracking and, 44-45, Morris. Jan, 158031
I44ni9,146n3i; legibility and, 31,51-55, Morrison, Tom, 104
106,114, i6in65; normalizing process
and, 8, 31-38,144ni9 national belonging: citizenship discourse
medicolegal discourse: advocacy organi¬ and, 14,11-11, 81, 86, 93, 99-106; mili¬
zations and, 36, 45-46,51, 53-55,73; tarism and, 136; national identity, 81,
gender dysphoria, 31, 48,51-53; leg¬ 99—106,136—37; public bathrooms and,
ibility and, 31,51—55,106,114,1611165; 81, 99-106; race and, 16; transgender-
legitimacy and, 15, 48-49,31—53, identified people and, 136-37; visibility
55-57; medical necessity framework, and, 136
II, 51-57, 71-73, i5onn6-8; militarism National Center for Lesbian Rights,
and, 34, 54-55; normalization of gender 1 4 9 0 3
INDEX 191
national security {continued) pat-down procedures, 50—51, 54-57,
Manning case and, ai, 108-9, H7.119. 63-68,151033,153051
IZI, IZ8-19, i67n4i, i68n58,169064, Paul, Rand, 64
169070; transgender visibility and, policing systems, 58-59, 61,101, no-11. See
119-15; Virginia Tech shootings and, also law enforcement officers
191 INDEX
157018; immigration policy and, 11, 80, 39-4°> 47-49; identity documents and,
81, 88-93, 99-100,106,161065; mili¬ 10,14-2.5, i6-i8; immigration policy
tary institutions and, 157015; national and, 4,16-17, 45-46, 61, 88-89, 94-95,
belonging and, 81, 99-106; privacy and, 1511118, i55nio, 161065; legibility and,
11,103-4, i°7,155116,157015,161076, 15-16,14303; militarism and, 117-18,
i6in88,163090; race and, ii-ii, 83-85, 1561115,170m; militarized surveillance
91-93,101-1,103,1561116,157011, and, 170111; military inclusion policies,
1571115; respectability and, 15506; safety 156015; national belonging and, 16; Na¬
discourse and, 79-81, 97-98,101-4, tional Center for Transgender Equality
157015; second-class-citizen arguments, and, 48,51, 61; Orientalist discourse, 4,
85-86,157010; whiteness and, 81, 5, 70; privacy and, 3,66; public bath¬
84-86,105. See also bathroom bills rooms and, 11-11, 83-85, 91-93,101-1,
Public Facilities Privacy and Security Act 103,156016,157011,157015; public space
(North Carolina), 103-4, i°7.161076, and, 15506,155010,157011; racialized
i6in88 surveillance, n-13, 61, 1691176; sexual
public schools: bathroom bills and, 80, deviance and, 39-40; Social Security
96-97,104,1630089-90; biometric Act and, 37, 40-41,146034; terrorism
surveillance and, 96; census data collec¬ discourse and, 4-6, 45, 69-71,105;
tion and, 137-38; transgender-identified transgender studies and, 5, 7-8,131,
people and, 11,137-38 141011,147053,14904; visibility and,
public space: use of term, i6in8i; bath¬ 47-49, iii-ii; X-ray technologies and,
room bills and, 99-106,161076; crimi¬ 59-60, 61. See a/so whiteness
nalization of people of color and, 155010; RADAR flashlight, 58-59
gender segregation and, 83-85; race Rai, Amit S., 148066
INDEX 193
Safe OUTsidc the System Collective (alp), 6.35-37.1450017-19,146031; lateral
143040,1481160 surveillance, 114,165018; mandatory
safety discourse: airport security screen¬ volunteerism, 148058; politics of rec¬
ings and, 2.1,50-51,151031,151033; ognition and, 131-34; production of
bathroom bills and, 79-81, 97-98,101, gender nonconformity and, 5-6, 6-14,
103-4,1571115; criminalization and, 110-n, 131-34,138-40; production of
58-59; identity documents and, 40-41; transgender subject, i-i, 17-18,10-11,
medical necessity framework and, 55; 31-38,51-53,139-40,149114; public
nonnormative gender presentation and, knowledge of, 111,116,119; transgender
lO; privacy vs., 1-4; public bathrooms critique of surveillance, 6-14,11-13,
and, 79-81, 97-98,101-4,1571115; 131-40; voluntary surveillance, 77—78
RADAR flashlight, 58-59; voluntary Sylvia Rivera Law Project (SRLP), 19,
surveillance and, 78. See also national 48-49,143040,148065
security; terrorism discourse
Safetyfest, 1431140 terrorism discourse: advanced imaging
Salter, Mark B., 16 technologies and, 69-71; airport se¬
SB 97 (Delaware), 101,105,106 curity screenings and, 46-49, 51, 68;
SB 1045 (Arizona), 86-87, 9°> 97.157011 anticipatory surveillance, 37; Antiter¬
SB 1070 (Arizona), 88, 90,157018, rorism and Effective Death Penalty Act
15801119-31,161065 (1996), 45; antiterrorism rhetoric, 4,
SB 1431 (Arizona), 86-87 17, 41-41, 64-65, 69-71, 78, 80-81,
secrecy, 113-10,118-19,156015 94-95, 106,108-9,115-16; bathroom
securitization, 35-37,1450017-19,146031 bills and, 80, 99; biometric surveillance
September ii, 1001. See 9/11 and, 81, 94-95,106; citizenship dis¬
Sex Changes (Califia), 144019 course and, 17-18,38-43, 80,148066;
sexuality, 13-14,35-37, 66, 87,137-38, Department of Homeland Security
1450017-19,146031, i66nii advisory, 14,38-40, 43-44, 45, 47-48;
Shine, Jacqui, 1651116 Guantanamo Bay detention facility and,
Snorton, C. Riley, 117 4 , 6 0 - 6 1 , 1 0 9 , 111 - 11 , 11 7 - 1 8 ; i m m i -
Social Security records, 37,38, 40-41, 44, gtation policy and, 4,10,17-18,37-38,
146034 41-43, 45, 80-81, 94-95,106,108-9,
Spade, Dean, 8,18,31, 43-44,117,165011, 159051; Manning case and, 108-9,
169075 115-16; militarism and, 70-71, 94-95,
Specter, Arlen, 40-41 io6,108-9; national identity and,
Stalder, Felix, 1461133 46-49,148066; privacy and, 64,
Standing Rock/Dakota Access Pipeline 78-79; race and, 4-6, 45, 69-71,105;
protests, 170m recognition and, 105; voluntary surveil¬
Stone, Sandy, 144019,147053 lance and, 77-78; whiteness and, 69,
Stryker, Susan, 11,141011 105
194 INDEX
transgendcr subjects, 1-2,17-18, 20-21, Transparency Fix (Fenster), i68n58
31-38,52-53,139-40.14904 Transportation Security Administra¬
transgender critic]ue of surveillance, 6—14, tion (tsa), 50-51, 55-57, I49nni-i,
2 2 - 2 3 , 1 3 2 - 4 0 I5in40,153060. See also airport security
transgender-identified people: use of screenings
term, 10-11,1421115; airport security trickle up model, 18,1421138
screenings and, 51,52-57; analogic True the Vote, 29-30,134
frameworks, 89-90,156015,157020, Trump (Donald) administration, 22,
158032,158035; census data collection i?3-35. lyms
INDEX 195
Wasserstrom, Richard A., 83-85,157ni5 terrorism discourse and, 69,105;
West, Isaac, 81 transgender studies and, 5,141011;
whiteness; airport security screenings voter identification and, 30-31, See
and, 76; biometric surveillance and, also race
eugenics and, 74-75; gender identity World Professional Association for Trans¬
196 INDEX
TRANS STUDIES SURVIUI.LANCE .STUDIES
to show how security practices extend into the everyday aspects of our gendered lives.
Hebringsthefieldsofdisability,scienceandtechnology,andsurveillancestudiesinto
conversation with transgender studies to show how the scrutinizing of gender non¬
conformity is motivated less by explicit transgender identities than by the perceived
threat that gender nonconformity poses to the U.S. racial and security state. Beau¬
champ uses instances of gender surveillance to demonstrate how disciplinary power
attempts to produce conformist citizens and regulate difference through discourses
of security. At the same time, he contends that greater visibility and recognition for
gender nonconformity, while .sometimes beneficial, might actually enable the surveil¬
lance state to more effectively track, measure, and control nans bodies and identities.
“Tliis innovative book is an important contribution to both trans studies and surveil¬
lance .studies—particularly to analy.ses of the War on Terror, border enforcement,
andidentitydocumentation.TobyBeauchampconvincinglyweavestogetherargu¬
mentsaboutsurveillance,migration,andtransembodiment.Makingseveralcritical
interventions in trans studies and trans advocacy, this book addresses the ways that
whiteness and immigration status are often assumed characteristics of trans subject-
hood.”—DEAN SPADE, author of Nonnal Life: Administrative Violence, Critical
Trans Politics, and the Limits of Law
'Going Stealth is abrilliant intervention in the field of transgender studies and be¬
yond,bywayofitscritiqueoftheviolentcapacitiesofthesurveillancestate.Fromthe
identificationdocumentasanadministrativepracticetotheairportandthepublic
bathroomassiteswheretheanxietiesofthestatearoundcertainbodiesandbodily
technologiesplayout,TobyBeauchamptracesacomplexaccountofmilitarism,mon¬
itoring,andrefusals.Tliisbookisessentialreadingforthosewhoseektounderstand
and critique how surveillance arranges our lives.”—SIMONE BROWNE, author of
Dark Matters: On the Surveillance of Blackness