Skip to main content

Securitising ‘National Interests’: Canadian Federal Government Departments, Corporate Security Creep, and Security Regimes

  • Chapter
  • First Online:
National Security, Surveillance and Terror

Part of the book series: Crime Prevention and Security Management ((CPSM))

  • 886 Accesses

Abstract

National security and corporate security are typically conceptualised as distinct realms of inquiry and practice. This chapter explores how these two security domains are increasingly fused in Canada at the federal level. We draw on freedom of information data regarding six national departments, usually associated with maintaining national security. The overlap between these realms is not limited to national security ‘responsibilising’ or activating private corporations to gather information; nor is it exclusively about corporate security agents providing services for national security initiatives through outsourced arrangements. Instead the overlap is primarily in the organisation of these departments. We conclude by outlining why there should be greater dialogue between scholars studying national and corporate security in Canada, Australia, and beyond.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Notes

  1. 1.

    Barrick Gold corporate security units conduct security risk assessments on local communities and other entities construed as threats. They take steps to manage risks. They set up perimeters, key card access points, surveillance cameras, and physical and technology security features at their mining sites and offices. They establish control rooms to coordinate these practices. Corporate security units respond to what they call critical incidents including fraud, theft, bomb threats, and attempted robberies. They also investigate and monitor employees (Barrick Gold Corporation 2012).

  2. 2.

    We also encountered barriers during data collection. We submitted similar requests to numerous federal government departments, including the Department of National Defence and the Royal Canadian Mounted Police. The former’s ATI Coordinator stalled the request claiming the Department of National Defence did not have a corporate security unit. We engaged in several tense conversations with the ATI Coordinator, noting that all federal government agencies that received the same request had so far indicated they had such a unit and would comply. Yet this ATI Coordinator continued to insist the Department of National Defence had no such corporate security unit, and indicated he wanted to close the file. We then located open source material, including policy and budget documents, on the Department of National Defence website that pointed to the existence of their corporate security unit. Upon receiving this material, the ATI Coordinator then chose an unusual course of action by asking us to contact a member of the corporate security unit to clarify search parameters. The unit representative then indicated the requested information was not formatted to fit the parameters of the search as per the original wording, and so asked for drastic alteration of the request. We complied and the representative eventually released some files outside of the ATI process but had effectively responded to the request in a way that was neither open nor forthcoming, and had disclosed information in a format ill-suited to our interests. These data from the Department of National Defence are incomplete, so we have not analysed them for this chapter. The Royal Canadian Mounted Police eventually released material but it was mostly redacted and exempted and so was not included in our analysis either.

  3. 3.

    These data resulted from the following access to information requests (by ATI reference number): National Defence A-2013-01210; Foreign Affairs, Trade and Development Canada A-2013-01918; Canada Border Services Agency A-2013-09431; Correctional Service Canada A-2013-00369; Correctional Service Canada A-2013-00372; Environment Canada A-2014-00076; Royal Canadian Mounted Police A-2013-05815; Government of Canada Privy Council Office A-2014-00037. These are referenced in text by Department acronym. For additional information, please contact Kevin Walby.

References

  • Barrick Gold Corporation. 2012. Security Management System. Toronto.

    Google Scholar 

  • Bell, Colleen. 2006. Surveillance Strategies and Populations of Risk: Biopolitical Governance in Canada’s National Security Policy. Security Dialogue 37(2): 147–165.

    Article  Google Scholar 

  • Bigo, Didier. 2002. Security and Immigration: Toward a Critique of the Governmentality of the Unease. Alternatives 27(1): 63–92.

    Article  Google Scholar 

  • Borodzicz, Edward P., and Stevyn Gibson. 2006. Corporate Security Education: Towards Meeting the Challenge. Security Journal 19(3): 180–195.

    Article  Google Scholar 

  • Brooks, David. 2013. Corporate Security: Using Knowledge Categorization to Define a Practicing Body of Knowledge. Asian Journal of Criminology 8(2): 89–101.

    Article  Google Scholar 

  • Button, Mark, and Bruce George. 1994. Why Some Organizations Prefer In-House to Contract Security Staff. In Crime at Work: Studies in Security and Crime Prevention, ed. Martin Gill, 201–213. Leicester: Perpetuity Press.

    Google Scholar 

  • Cohen, Andrew. 1995. Canada in the World: The Return of the National Interest. Behind the Headlines 52(4): 1–16.

    Google Scholar 

  • Dalton, Dennis R. 2003. Rethinking Corporate Security in the Post 9/11 Era: Issues and Strategies for Today’s Global Business Community. New York: Butterworth Heinemann.

    Google Scholar 

  • de Larrinaga, M., and M. Salter. 2014. Cold CASE: A Manifesto for Canadian Critical Security Studies. Critical Studies on Security 2(1): 1–19.

    Article  Google Scholar 

  • Dupont, Benoît. 2014. Private Security Regimes: Conceptualizing the Forces that Shape the Private Delivery of Security. Theoretical Criminology 18(3): 263–281.

    Article  Google Scholar 

  • Dupont, Benoît, and Jennifer Wood. 2006. Conclusion: The Future of Democracy. In Democracy, Society and the Governance of Security, eds. Jennifer Wood and Benoît Dupont, 241–248. Cambridge: Cambridge University Press.

    Chapter  Google Scholar 

  • Forcese, Craig, and Kent Roach. 2015. Bill C-51 Moves Us One Step Closer to the End of Privacy. Toronto Star, February 17.

    Google Scholar 

  • Giddens, Anthony. 1987. The Nation-State and Violence. London: Polity.

    Google Scholar 

  • Gill, M., and C. Howell. 2014. Policing Organizations: The Role of the Corporate Security Function and the Implication for Suppliers. International Journal of Police Science and Management 16(1): 65–75.

    Google Scholar 

  • Haggerty, Kevin D., and Richard V. Ericson. 2006. The New Politics of Surveillance and Visibility. In The New Politics of Surveillance and Visibility, eds. Kevin D. Haggerty and Richard V. Ericson, 3–25. Toronto: University of Toronto Press.

    Google Scholar 

  • Heide, R. L., T. Grant, C. Ankersen, D. Roy, and J. Boileu. 2005. Defining the National Interest: New Directions for Canadian Foreign Policy. Centre for Security and Defense Studies: Carleton University. Conference Report.

    Google Scholar 

  • Joshi, James B.D., Arif Ghafoor, and Walid G. Aref. 2002. Security and Privacy Challenges of a Digital Government. In Advances in Digital Government: Technology, Human Factors, and Policy, eds. William J. McIver and Ahmed K. Elmagarmid, 121–136. Boston: Kluwer Academic Publishers.

    Chapter  Google Scholar 

  • Lippert, Randy K., and Kevin Walby. 2012. Municipal Corporate Security and the Intensification of Urban Surveillance. Surveillance & Society 9(2): 310–320.

    Article  Google Scholar 

  • ———. 2014. Municipal Corporate Security, Legal Knowledges, and the Urban Problem Space. Law and Social Inquiry 39(3): 720–739.

    Google Scholar 

  • ———. 2016. Governing Through Privacy: Authoritarian Liberalism, Law, and Privacy Knowledge. Law, Culture and the Humanities 12(2): 329–352.

    Google Scholar 

  • Lippert, Randy K., Kevin Walby, and Rhys Steckle. 2013. Multiplicities of Corporate Security: Identifying Emerging Types and Trends. Security Journal 26(3): 206–221.

    Article  Google Scholar 

  • Loader, Ian, and Neil Walker. 2007. Civilizing Society. Cambridge, UK: Cambridge University Press.

    Book  Google Scholar 

  • Loukidelis, David. 2004. Identity, Privacy, Security: Can Technology Really Reconcile Them? Address by Privacy Commissioner of British Columbia, Victoria. www.oipc.bc.ca.

  • Lustgarten, Laurence, and Ian Leigh. 1994. In from the Cold: National Security and Parliamentary Democracy. Oxford: Clarendon Press.

    Google Scholar 

  • McDonald, Seonaidh. 2005. Studying Actions in Context: A Qualitative Shadowing Method for Organizational Research. Qualitative Research 5(4): 455–473.

    Article  Google Scholar 

  • Meerts, Clarissa. 2014. Corporate Security: Governing through Private and Public Law. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 97–115. Houndmills: Palgrave Macmillan.

    Google Scholar 

  • Monaghan, Jeffrey, and Kevin Walby. 2012. Making Up ‘Terror Identities’: Security intelligence, Canada’s Integrated Threat Assessment Centre and Social Movement Suppression. Policing & Society 22(2): 133–151.

    Article  Google Scholar 

  • Monahan, Torin, and Neal Palmer. 2009. The Emerging Politics of DHS Fusion Centers. Security Dialogue 40(6): 617–636.

    Article  Google Scholar 

  • Nalla, Mahesh, and Merry Morash. 2002. Assessing the Scope of Corporate Security: Common Practices and Relationships with Other Business Functions. Security Journal 15(3): 7–19.

    Article  Google Scholar 

  • Pearson, Geoffrey. 1988. CIIPS Working Paper #11—International Security and Canadian Interests: Report of a Working Group. Canadian Institute for International Peace and Security. Ottawa, Canada.

    Google Scholar 

  • Petersen, Karen Lund. 2013. The Corporate Security Professional: A Hybrid Agent Between Corporate and National Security. Security Journal 26(3): 222–235.

    Article  Google Scholar 

  • ———. 2014. The Politics of Corporate Security and the Translation of National Security. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 78–96. Houndsmills: Palgrave Macmillan.

    Google Scholar 

  • Pozen, David E. 2005. The Mosaic Theory, National Security, and Freedom of Information Act. The Yale Law Journal 115(3): 628–679.

    Google Scholar 

  • ——— 2010. Deep Secrecy. The Stanford Law Review 62: 257–340.

    Google Scholar 

  • Privy Council Office (PCO). 2004. Securing an Open Society: Canada’s National Security Policy. Ottawa: National Library of Canada.

    Google Scholar 

  • Roy, Jeffrey. 2013. From Machinery to Mobility: Government and Democracy in a Participative Age. New York: Springer.

    Book  Google Scholar 

  • ———. 2014. Secrecy, Security and Digital Literacy in an Era of Meta-Data: Why the Canadian Westminster Model Falls Short. Intelligence and National Security 31: 1–23.

    Google Scholar 

  • Strauss, Anselm. 1987. Qualitative Analysis for Social Scientists. Cambridge: Cambridge University Press.

    Book  Google Scholar 

  • Tootell, Holly. 2006. The Application of Critical Social Theory to National Security Research. Prometheus 24(4): 405–411.

    Article  Google Scholar 

  • Walby, Kevin, and Mike Larsen. 2012a. Access to Information and Freedom of Information Requests: Neglected Means of Data Production in the Social Sciences. Qualitative Inquiry 18(1): 31–42.

    Article  Google Scholar 

  • ———. 2012b. Getting at the Live Archive: On Access to Information Research in Canada. Canadian Journal of Law and Society 27(1): 623–634.

    Google Scholar 

  • Walby, Kevin, and Randy K. Lippert. 2012. The New Keys to the City: Uploading Corporate Security and Threat Discourse into Canadian Municipal Governments. Crime, Law and Social Change 58(4): 437–455.

    Article  Google Scholar 

  • Walby, K., and R. Lippert. 2015a. Ford First? Corporate Security and the US Department of War’s Plant Protection Service’s Interior Organization Unit 1917–1918. Labor History 56(2): 117–135.

    Article  Google Scholar 

  • ———. 2015b. Municipal Corporate Security in International Context. London: Routledge.

    Google Scholar 

  • Walby, Kevin, and Jeffrey Monaghan. 2010. Policing Proliferation: On the Militarization of Police and Atomic Energy Canada Limited’s Nuclear Response Forces. Canadian Journal of Criminology and Criminal Justice 52(2): 117–145.

    Article  Google Scholar 

  • ———. 2011. Private Eyes and Public Order: Policing and Surveillance in the Suppression of Animal Rights Activists in Canada. Social Movement Studies 10(1): 21–37.

    Article  Google Scholar 

  • Walby, Kevin, Alex Luscombe, and Randy K. Lippert. 2014. Expertise and the Professionalization of Municipal Corporate Security in Canadian Cities. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 116–133. Houndsmills: Palgrave Macmillan.

    Google Scholar 

  • Walker, Diane, and Florence Myrick. 2006. Grounded Theory: An Exploration of Process and Procedure. Qualitative Health Research 16(4): 547–559.

    Article  Google Scholar 

  • Walsh, Patrick, and Seumas Miller. 2015. Rethinking ‘Five Eyes’ Security: Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security 31: 1–24.

    Google Scholar 

  • Weiss, Robert. 2014. Corporate Security at Ford Motor Company: From the Great War to the Cold War. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 17–38. Houndmills: Palgrave Macmillan.

    Google Scholar 

  • White, Adam. 2012. The New Political Economy of Private Security. Theoretical Criminology 16(1): 85–101.

    Article  Google Scholar 

  • Williams, James. 2014. The Private Eyes of Corporate Culture: The Forensic Accounting and Corporate Investigation Industry and the Production of Corporate Financial Security. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 56–77. Houndmills: Palgrave Macmillan.

    Google Scholar 

Interviews

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Walby, K., Lippert, R.K., Gacek, J. (2016). Securitising ‘National Interests’: Canadian Federal Government Departments, Corporate Security Creep, and Security Regimes. In: Lippert, R., Walby, K., Warren, I., Palmer, D. (eds) National Security, Surveillance and Terror. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-43243-4_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-43243-4_7

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-43242-7

  • Online ISBN: 978-3-319-43243-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics