Securitization, Infopolitics and the Suppression of Liberty

  • John Edward Deukmedjian

Abstract

Starting 6 June 2013, The Washington Post began to publish a steady stream of revelations about the National Security Agency, including the special-source operations code named Upstream and PRISM (see Gellman, 2013). According to the June 6 article, the US and British governments have been mining vast amounts of global signals data from fibre cables as well as directly from the servers of nine major American Internet service providers and telecommunications companies. These programs perhaps represent the most robust strategic surveillance of American and global populations thus far revealed historically. Broadly speaking, the programs function in at least two ways. The first is a reactive and tactical function: to mine and query the ‘big data’ to build target packages against specific targets. This tactical surveillance, to cite Donald Rumsfeld (2003: 2) from a Department of Defence news briefing in 2002, tries to get at the ‘known unknowns’ — that is to say, the things that are known to be unknown. The second is a proactive and strategic function: applying complex mathematical processing of data flows to conduct human social linkage analysis (Barria, 2013). In other words, the purpose is to potentially get at Rumsfeld’s ‘unknown unknowns’, the things we don’t know that we don’t know.

Keywords

Europe Marketing Assure Expense Toll 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. ACPO (1990). Setting the Standards for Policing: Meeting Community Expectation. London: Association of Chief Police Officers.Google Scholar
  2. Alderson, J. (1979). Policing Freedom: A Commentary on the Dilemmas of Policing in Western Democracies. Plymouth: Macdonald and Evans.Google Scholar
  3. AP (2013). Saudi Man with Pressure Cooker Arrested at Detroit Airport. Accessed October 19, 2013, from http://www.cbsnews.com/8301-201_162-57584242/.Google Scholar
  4. Assange, J., Appelbaum, J., Muller-Maguhn, A. and Zimmerman, J. (2012). Cypherpunks: Freedom and the Future of the Internet. New York: O/R Books.Google Scholar
  5. Audit Commission for Local Authorities and the National Health Service in England and Wales (1993). Helping with Enquiries: Tackling Crime Effectively. London: HMSO.Google Scholar
  6. Barria, C. (2013). NSA Uses Metadata ‘To Create Sophisticated Graphs’ of US Citizens’ Social Connections. Accessed October 19, 2013, from http://rt.com/usa/nsa-metadata-us-social-connections-490/.Google Scholar
  7. Beck, U. (1992). Risk Society: Towards a New Modernity. London: Sage.Google Scholar
  8. Bentham, J. (1995). The Panopticon Writings. New York: Verso.Google Scholar
  9. Cooper, A. (2013a). National DNA Database Strategy Board Annual Report 2012–2013. London: Home Office.Google Scholar
  10. Cooper, A. (2013b). National DNA Database Annual Report 2011–2012. London: Home Office.Google Scholar
  11. de Lint, W. (2004). Neoconservativism and American Counter-Terrorism: Endarkened Policy? in Deflem, M. (ed.) Terrorism and Counter-Terrorism: Criminological Perspectives. Amsterdam: Elsevier. pp. 131–153.CrossRefGoogle Scholar
  12. de Lint, W., Virta, S. and Deukmedjian, J. (2007). The Simulation of Crime Control: A Shift in Policing?. American Behavioral Scientist, 50, 1631–1647.CrossRefGoogle Scholar
  13. Deukmedjian, J. (2013). Making Sense of Neoliberal Securitization in Urban Policing and Surveillance.. Canadian Review of Sociology, 50, 52–73.CrossRefGoogle Scholar
  14. Deukmedjian, J. and de Lint, W. (2007). Community Into Intelligence: Resolving Information Uptake in the RCMP.. Policing and Society, 17, 239–256.CrossRefGoogle Scholar
  15. Dupont, B. (2004). Security in the Age of Networks.. Policing and Society, 14, 76–91.CrossRefGoogle Scholar
  16. Ericson, R.V. and Haggerty, K.D. (1997). Policing the Risk Society. Oxford: Clarendon Press.Google Scholar
  17. Federation of American Scientists (2013). Foreign Intelligence Surveillance Act. Accessed October 19, 2013, from http://www.fas.org/irp/agency/doj/fisa/.Google Scholar
  18. Fisher, M. (2013). Top Secret Clearance Holders So Numerous They Include ‘Packers/ Craters’. Accessed October 19, 2013, from http://www.washingtonpost.com/blogs/worldviews/wp/2013/06/12/top-secret-clearance-holders-so-numerous-they-include-packerscraters/.Google Scholar
  19. Foucault, M. (1995). Discipline and Punish: The Birth of the Prison. A. Sheridan (trans.) New York: Vintage Books.Google Scholar
  20. Foucault, M. (2007). Security, Territory, Population: Lectures at the College de France, 1977–1978, in Senellart, M., Ewald, F., Fontana, A., and Davidson, A.I. (eds.), Burchell, G. (trans.) Basingstoke, UK: Palgrave Macmillan.CrossRefGoogle Scholar
  21. Gellman, B. and Poitras, L. (2013). U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program. Accessed October 19, 2013, from http://articles.washingtonpost.com/2013-06-06/news/39784046_1_prism-nsa-u-s-servers.Google Scholar
  22. Hansard. (1830). Hansard’s Parliamentary Debates: Forming a Continuation of ‘the Parliamentary History of England, from the Earliest Period to the Year 1830’. London: T. C. Hansard.Google Scholar
  23. Hayek, F. (2007). The Road to Serfdom: Text and Documents. Chicago: University of Chicago Press.CrossRefGoogle Scholar
  24. Kelley, M. (2012). US Government Plans To Install Sophisticated Audio Surveillance On Public Buses. Accessed October 19, 2013, from http://www.businessinsider.com/us-plans-audio-surveillance-on-buses-2012-12.Google Scholar
  25. Kelling, G., Pate, T., Dieckman, D., and Brown, C.E. (1974). The Kansas City Preventive Patrol Experiment: A Summary Report. Washington, DC: Police Foundation.Google Scholar
  26. Keynes, J.M. (1964). The General Theory of Employment, Interest, and Money. San Diego: Harcourt Inc.Google Scholar
  27. Lee, M. (1901). A History of Police in England. London: Methuen & Co.Google Scholar
  28. Long, C. (2009). Police Stop More Than 1 Million People on Street. Accessed October 19, 2013, from http://www.huffingtonpost.com/2009/10/08/stop-and-frisk-police-sto_n_314509.html.Google Scholar
  29. Maguire, M. (2000). Policing by Risks and Targets: Some Dimensions and Implications of Intelligence-Led Crime Control.. Policing and Society, 9, 315–336.CrossRefGoogle Scholar
  30. McDonald, D. (1981). Freedom and Security Under the Law: Second Report. Ottawa: The Commission.Google Scholar
  31. Merton, R. (1938). Social Structure and Anomie.. American Sociological Review, 3, 672–682.CrossRefGoogle Scholar
  32. Normandeau, A. and Leighton, B. (1990). A Vision of the Future of Policing in Canada: Police-Challenge 2000. Ottawa: Solicitor General Canada.Google Scholar
  33. O’Malley, P. and Palmer, D. (1996). Post-Keynesian Policing.. Economy and Society, 25, 137–155.CrossRefGoogle Scholar
  34. Obama, B.H. (2013). Transcript: Obama’s Remarks on NSA Controversy. Accessed October 18, 2013, from http://blogs.wsj.com/washwire/2013/06/07/transcript-what-obama-said-on-nsa-controversy/.Google Scholar
  35. Parker, W. (1954). The Police Challenge in our Great Cities.. Annals of the American Academy of Political and Social Science, 291, 5–13.CrossRefGoogle Scholar
  36. Peel, R. (1853). The Speeches of the Late Right Honourable Sir Robert Peel, Bart. Delivered in The House of Commons. Volume 1. London: George Routledge and Co.Google Scholar
  37. Pike, L. (1873). A History of Crime in England Illustrating the Changes of the Laws in the Progress of Civilization Vol. 1. London: Smith, Elder & Co.Google Scholar
  38. Porter, B. (1987). The Origins of the Vigilant State: The London Metropolitan Police Special Branch Before the First World War. London: Widenfeld and Nicolson.Google Scholar
  39. Ratcliffe, J. (2008). Intelligence-Led Policing. Devon: Willan.Google Scholar
  40. Rose, N. (1996). The Death of the Social? Re-Figuring the Territory of Government.. Economy and Society, 25, 327–356.CrossRefGoogle Scholar
  41. Rumsfeld, D.H. (2003). Pieces of Intelligence. New York: Free Press.Google Scholar
  42. Shamsi, H. (2013). The FBI’s Torjan Horse? Accessed October 18, 2013, from http://www.aclu.org/blog/criminal-law-reform-national-security/fbis-trojan-horse.Google Scholar
  43. Skogan, W. (1990). Police and the Public in England and Wales: A British Crime Survey Report. Home Office Research Study No. 117. London: HMSO.Google Scholar
  44. Spelman, W. and Brown, D.K. (1981). Calling the Police: Citizen Reporting of Serious Crime. Washington, DC: Police Executive Research Forum.Google Scholar
  45. Sutherland, E. (1939). Principles of Criminology. Chicago: J. B. Lippincott Company.Google Scholar
  46. United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (1976). Final Report. Washington, DC: U.S. Government Print Office.Google Scholar
  47. Walker, P. (2008). European Court Rules DNA Database Breaches Human Rights. Accessed October 19, 2013, from http://www.theguardian.com/uk/2008/dec/04/law-genetics.Google Scholar
  48. Wilson, O.W. (1941). Distribution of Police Patrol Force. Chicago: Public Administration Service.Google Scholar

Copyright information

© John Edward Deukmedjian 2014

Authors and Affiliations

  • John Edward Deukmedjian

There are no affiliations available

Personalised recommendations