Abstract
This chapter focuses on the formation of new security configurations involved in mega-event security. These include the creation of new agencies themselves, specialised units within agencies and dedicated network structures developed by security actors intended to coordinate the security operation across organisational boundaries. First, we address the specialised units of the G20 Taskforce and the G20 Group, including how these actors or nodes were formed and various tensions concerning their design. Second, we turn to three key networks established by the G20 Taskforce and G20 Group and also examine the design and composition of such networks. The chapter concludes by looking at the internal tensions within security nodes and networks and some of the many variables that accentuate or alleviate these tensions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
The three-tier security model is addressed in Chapter 5.
- 2.
The ACIC was established on 1 July 2016. It was previously known as the Australian Crime Commission.
References
Bennett, C., & Haggerty, K. (2011). Introduction to security games: Surveillance and control at mega-events. In C. Bennett & K. Haggerty (Eds.), Security games: Surveillance and control at mega-events (pp. 1–19). Hoboken: Routledge.
Bennett Moses, L., & Chan, J. (2016). Algorithmic prediction in policing: Assumptions, evaluation, and accountability. Policing and Society (online first 20 October 2016).
Bjelland, H. F., & Vestby, A. (2017). ‘It’s about using the full sanction catalogue’: On boundary negotiations in a multi-agency organised crime investigation. Policing and Society, 27(6), 655–670.
Boyle, P., & Haggerty, K. (2009). Spectacular security: Mega-events and the security complex. International Political Sociology, 3(3), 57–74.
Brodeur, J. P., & Dupont, B. (2008). Introductory essay: The role of knowledge and networks in policing. In T. Williamson (Ed.), The handbook of knowledge-based policing: Current conceptions and future directions (pp. 9–33). West Sussex: Wiley.
Burcher, M., & Whelan, C. (2017). Social network analysis as a tool for criminal intelligence: Understanding its potential from the perspectives of intelligence analysts. Trends in Organized Crime (online first 24 May 2017).
Chan, J. (2001). The technological game: How information technology is transforming police practice. Criminology & Criminal Justice, 1(2), 139–159.
Duijn, P., & Klerks, P. (2014). Social network analysis applied to criminal networks: Recent developments in Dutch law enforcement. In A. J. Masys (Ed.), Networks and network analysis for defence and security (pp. 121–159). Heidelberg: Springer.
Frey, C. (2014). World Cup 2014: Inside Rio’s Bond-villain mission control. The Guardian [online]. Retrieved January 10, 2018, from https://www.theguardian.com/cities/2014/may/23/world-cup-inside-rio-bond-villain-mission-control.
G20 Taskforce. (2015). Australia 2014 G20: G20 taskforce report. Canberra: Department of Prime Minister and Cabinet.
Giacomantonio, C. (2015). Policing integration: The sociology of police coordination work. London: Palgrave.
Kitchen, V., & Rygiel, K. (2014). Privatizing security, securitizing policing: The case of the G20 in Toronto, Canada. International Political Sociology, 8(2), 201–217.
Manning, P. K. (2008). The technology of policing: Crime mapping, information technology, and the rationality of crime control. New York: New York University Press.
Mastrofski, S. D. (2007). Police organization and management issues for the next decade. Washington, DC: Bureau of Justice Assistance.
Molnar, A. (2015). The geo-historical legacies of urban security governance and the Vancouver 2010 Olympics. Geographical Journal, 181(3), 235–241.
Monaghan, J., & Walby, K. (2012). Making up ‘terror identities’: Security intelligence, Canada’s Integrated Threat Assessment Centre and social movement suppression. Policing and Society, 22(2), 133–151.
Queensland Police Service. (2014a). G20 group: Operation southern cross policy and procedures manual. Brisbane: Queensland Police Service.
Queensland Police Service. (2014b). G20 group: Organisational structure. Brisbane: Queensland Police Service.
Queensland Police Service. (2016). G20–2014 operation southern cross: Post operation report. Brisbane: Queensland Police Service.
Sanders, C. B., & Henderson, S. (2013). Police ‘empires’ and information technologies: Uncovering material and organisational barriers to information sharing in Canadian police services. Policing and Society, 23(2), 243–260.
Sanders, C. B., & Sheptycki, J. (2017). Policing, crime and ‘big data’; towards a critique of the moral economy of stochastic governance. Crime, Law and Social Change, 68(1–2), 1–15.
Sanders, C. B., Weston, C., & Schott, N. (2015). Police innovations, ‘secret squirrels’ and accountability: Empirically studying intelligence-led policing in Canada. British Journal of Criminology, 55(4), 711–729.
Sheptycki, J. (2004). Organizational pathologies in police intelligence systems. European Journal of Criminology, 1(3), 301–332.
Sheptycki, J. (2017). The police intelligence division-of-labour. Policing and Society, 27(6), 620–635.
Smith, G., Bennett Moses, L., & Chan, J. (2017). The challenges of doing criminology in the Big Data era: Towards a digital and data-driven approach. British Journal of Criminology, 57(2), 259–274.
Whelan, C., & Dupont, B. (2017). Taking stock of networks across the security field: A review, typology and research agenda. Policing and Society, 27(6), 671–687.
Willis, J. J., & Mastrofski, S. D. (2011). Innovations in policing: Meanings, structures, and processes. Annual Review of Law and Social Science, 7, 309–334.
Author information
Authors and Affiliations
Corresponding author
Copyright information
© 2018 The Author(s)
About this chapter
Cite this chapter
Whelan, C., Molnar, A. (2018). Organising Security Actors: Designing New Nodes and Networks. In: Securing Mega-Events. Crime Prevention and Security Management. Palgrave Macmillan, London. https://doi.org/10.1057/978-1-137-59668-0_3
Download citation
DOI: https://doi.org/10.1057/978-1-137-59668-0_3
Published:
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-137-59667-3
Online ISBN: 978-1-137-59668-0
eBook Packages: Law and CriminologyLaw and Criminology (R0)