Skip to main content

Organising Security Actors: Designing New Nodes and Networks

  • Chapter
  • First Online:
Securing Mega-Events

Part of the book series: Crime Prevention and Security Management ((CPSM))

  • 251 Accesses

Abstract

This chapter focuses on the formation of new security configurations involved in mega-event security. These include the creation of new agencies themselves, specialised units within agencies and dedicated network structures developed by security actors intended to coordinate the security operation across organisational boundaries. First, we address the specialised units of the G20 Taskforce and the G20 Group, including how these actors or nodes were formed and various tensions concerning their design. Second, we turn to three key networks established by the G20 Taskforce and G20 Group and also examine the design and composition of such networks. The chapter concludes by looking at the internal tensions within security nodes and networks and some of the many variables that accentuate or alleviate these tensions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 109.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The three-tier security model is addressed in Chapter 5.

  2. 2.

    The ACIC was established on 1 July 2016. It was previously known as the Australian Crime Commission.

References

  • Bennett, C., & Haggerty, K. (2011). Introduction to security games: Surveillance and control at mega-events. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 1–19). Hoboken: Routledge.

    Google Scholar 

  • Bennett Moses, L., & Chan, J. (2016). Algorithmic prediction in policing: Assumptions, evaluation, and accountability. Policing and Society (online first 20 October 2016).

    Article  Google Scholar 

  • Bjelland, H. F., & Vestby, A. (2017). ‘It’s about using the full sanction catalogue’: On boundary negotiations in a multi-agency organised crime investigation. Policing and Society, 27(6), 655–670.

    Article  Google Scholar 

  • Boyle, P., & Haggerty, K. (2009). Spectacular security: Mega-events and the security complex. International Political Sociology, 3(3), 57–74.

    Article  Google Scholar 

  • Brodeur, J. P., & Dupont, B. (2008). Introductory essay: The role of knowledge and networks in policing. In T. Williamson (Ed.), The handbook of knowledge-based policing: Current conceptions and future directions (pp. 9–33). West Sussex: Wiley.

    Chapter  Google Scholar 

  • Burcher, M., & Whelan, C. (2017). Social network analysis as a tool for criminal intelligence: Understanding its potential from the perspectives of intelligence analysts. Trends in Organized Crime (online first 24 May 2017).

    Article  Google Scholar 

  • Chan, J. (2001). The technological game: How information technology is transforming police practice. Criminology & Criminal Justice, 1(2), 139–159.

    Article  Google Scholar 

  • Duijn, P., & Klerks, P. (2014). Social network analysis applied to criminal networks: Recent developments in Dutch law enforcement. In A. J. Masys (Ed.), Networks and network analysis for defence and security (pp. 121–159). Heidelberg: Springer.

    Chapter  Google Scholar 

  • Frey, C. (2014). World Cup 2014: Inside Rio’s Bond-villain mission control. The Guardian [online]. Retrieved January 10, 2018, from https://www.theguardian.com/cities/2014/may/23/world-cup-inside-rio-bond-villain-mission-control.

  • G20 Taskforce. (2015). Australia 2014 G20: G20 taskforce report. Canberra: Department of Prime Minister and Cabinet.

    Google Scholar 

  • Giacomantonio, C. (2015). Policing integration: The sociology of police coordination work. London: Palgrave.

    Book  Google Scholar 

  • Kitchen, V., & Rygiel, K. (2014). Privatizing security, securitizing policing: The case of the G20 in Toronto, Canada. International Political Sociology, 8(2), 201–217.

    Article  Google Scholar 

  • Manning, P. K. (2008). The technology of policing: Crime mapping, information technology, and the rationality of crime control. New York: New York University Press.

    Google Scholar 

  • Mastrofski, S. D. (2007). Police organization and management issues for the next decade. Washington, DC: Bureau of Justice Assistance.

    Google Scholar 

  • Molnar, A. (2015). The geo-historical legacies of urban security governance and the Vancouver 2010 Olympics. Geographical Journal, 181(3), 235–241.

    Article  Google Scholar 

  • Monaghan, J., & Walby, K. (2012). Making up ‘terror identities’: Security intelligence, Canada’s Integrated Threat Assessment Centre and social movement suppression. Policing and Society, 22(2), 133–151.

    Article  Google Scholar 

  • Queensland Police Service. (2014a). G20 group: Operation southern cross policy and procedures manual. Brisbane: Queensland Police Service.

    Google Scholar 

  • Queensland Police Service. (2014b). G20 group: Organisational structure. Brisbane: Queensland Police Service.

    Google Scholar 

  • Queensland Police Service. (2016). G20–2014 operation southern cross: Post operation report. Brisbane: Queensland Police Service.

    Google Scholar 

  • Sanders, C. B., & Henderson, S. (2013). Police ‘empires’ and information technologies: Uncovering material and organisational barriers to information sharing in Canadian police services. Policing and Society, 23(2), 243–260.

    Article  Google Scholar 

  • Sanders, C. B., & Sheptycki, J. (2017). Policing, crime and ‘big data’; towards a critique of the moral economy of stochastic governance. Crime, Law and Social Change, 68(1–2), 1–15.

    Article  Google Scholar 

  • Sanders, C. B., Weston, C., & Schott, N. (2015). Police innovations, ‘secret squirrels’ and accountability: Empirically studying intelligence-led policing in Canada. British Journal of Criminology, 55(4), 711–729.

    Article  Google Scholar 

  • Sheptycki, J. (2004). Organizational pathologies in police intelligence systems. European Journal of Criminology, 1(3), 301–332.

    Article  Google Scholar 

  • Sheptycki, J. (2017). The police intelligence division-of-labour. Policing and Society, 27(6), 620–635.

    Article  Google Scholar 

  • Smith, G., Bennett Moses, L., & Chan, J. (2017). The challenges of doing criminology in the Big Data era: Towards a digital and data-driven approach. British Journal of Criminology, 57(2), 259–274.

    Article  Google Scholar 

  • Whelan, C., & Dupont, B. (2017). Taking stock of networks across the security field: A review, typology and research agenda. Policing and Society, 27(6), 671–687.

    Article  Google Scholar 

  • Willis, J. J., & Mastrofski, S. D. (2011). Innovations in policing: Meanings, structures, and processes. Annual Review of Law and Social Science, 7, 309–334.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chad Whelan .

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Whelan, C., Molnar, A. (2018). Organising Security Actors: Designing New Nodes and Networks. In: Securing Mega-Events. Crime Prevention and Security Management. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-59668-0_3

Download citation

  • DOI: https://doi.org/10.1057/978-1-137-59668-0_3

  • Published:

  • Publisher Name: Palgrave Macmillan, London

  • Print ISBN: 978-1-137-59667-3

  • Online ISBN: 978-1-137-59668-0

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics