Abstract
One of Foucault’s many unfinished projects was an analysis of the links between law, power and subjectivity. This article aims to make a contribution to Foucauldian jurisprudence by asking the question: in what ways does law construct identity? Using the regulation of undercover police investigation as an example, this article considers the intersection between three core rationalities within legal systems—rights, derogation and authorization—as critical moments in the governance of human beings, mobilized through legal architectures. Here, we find identities constructed, tested and applied in a multilateral relationship as intended and unintended consequences of the technologies of law. In this space, we not only see the mechanisms of law operating for the purpose of mobilizing power relations, but we also observe the myriad ways in which the architecture of law promoting rights operates as a system of governance that reveals rights claims as hollow, impeachable and ephemeral. The article concludes by considering rights, derogation and authorization as key components of Foucauldian jurisprudence—a distinct governmentality, where law articulates what rights are available and their associated mechanics, the mechanisms of adjudication and exception, and the formal modes of counter-conduct.
Similar content being viewed by others
Notes
As a matter of law, privacy is a complex issue. Australian law does not recognise a general right to privacy, although the High Court has indicated it would consider the issue in the right case (e.g., Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199). There is a statutory right to privacy in some jurisdictions (Human Rights Act 2004 (ACT), §12; Charter of Rights and Responsibilities Act 2006 (Vic), §13; Human Rights Act 2019 (Qld), §25)). In Canada, there is no specific reference to a general right to privacy in the Charter of Rights and Responsibilities Act. In Hunter v Southam ([1984] 2 S.C.R. 145), however, the Supreme Court of Canada held that Section 8 of the Charter of Rights and Responsibilities Act (dealing with unreasonable search and seizure) was broad enough to protect a citizen from unreasonable state intrusion into privacy. In the UK, there is similarly no specific reference to a general right to privacy in the Human Rights Act 1998 (c.42), but that act is intended to import the provisions of the European Convention on Human Rights (ECHR). Article 8 of the ECHR guarantees the right to privacy. The International Covenant on Civil and Political Rights (ICCPR) also contains a guarantee in Article 17.
See, e.g., A v Hayden (1984) 156 CLR 532 (where the Australian Secret Intelligence Service staged a live-fire raid on a hotel in Sydney); Ridgeway v Queen (1995) 184 CLR 19 (where the Australian Federal Police facilitated the importation of heroin from Malaysia); Gedeon v Commissioner of the NSW Crime Commission [2008] HCA 43 (where undercover investigators “lost” at least 3 kg of cocaine in the course of an undercover operation).
See, e.g., Crimes Act 1914 (Cth) Part IAB; Law Enforcement (Controlled Operations) Act 1997 (NSW); Crimes (Controlled Operations) Act 2008 (ACT). These operations are routinely supported by telecommunications intercepts (Telecommunications (Interception and Access) Act 1979 (Cth)) and listening devices (e.g., Surveillance Devices Act 2004 (Cth)).
The Commonwealth has legislative power with respect to telecommunication (see Commonwealth of Australia Constitution, §51(v); see also Telecommunications (Interception and Access) Act 1979 (Cth)). Note, there is a degree of power-sharing in this space. States also have reciprocal provisions in local law, such as the Telecommunications (Interception and Access) (New South Wales) Act 1987 (NSW); the Surveillance Devices Act 2004 (Cth); and the Surveillance Devices Act 2007 (NSW).
Note, the derogation provisions within the Charter have specific constitutional implications in Canada by virtual of the inclusion of the Charter in the Constitution of Canada.
There is an important link here with Hart’s (2012) analysis of law as the union of primary and secondary rules but that analysis is beyond the scope of this article.
In the ICCPR, those rights are: the right to life (Art. 6), the right not to be tortured (Art. 7), the right not to be enslaved (Art. 8), the right not to be imprisoned for a debt (Art. 11), the right not to be imprisoned for an offense not known in law (Art. 15), the right to legal personality (Art. 16), and freedom of conscience, thought and religion (Art. 18).
The most high-profile extra-judicial killing in recent years was the killing of Osama bin Laden in 2011 by the US. It was celebrated by many around the world, although many lawyers expressed serious concerns. Human Rights lawyer Geoffrey Robertson, for example, argued bin Laden should have been brought before a court and tried according to law.
References
Abelson, D. (2003). Sentencing entrapment: An overview and analysis. Marquette Law Review,86(4), 773.
Appleby, S. C., Hasel, L. E., & Kassin, S. M. (2011). Police-induced confessions: An empirical analysis of their content and impact. Psychology, Crime & Law,19(2), 111–128.
Ashworth, A. (1978). Entrapment. Criminal Law Review, 137–140.
Ashworth, A. (1998). Should the police be allowed to use deceptive practices? Law Quarterly Review,114(Jan), 108–140.
Ashworth, A. (1999). What is wrong with entrapment? Singapore Journal of Legal Studies, December, 293–317.
Ashworth, A. (2000). Is the criminal law a lost cause? Law Quarterly Review,166(April), 225–256.
Ashworth, A. (2002). Re-drawing the Boundaries of Entrapment. Criminal Law Review, March, 161–179.
Ashworth, A. (2006). Four threats to the presumption of innocence. South African Law Journal,123(1), 63–97.
Ashworth, A., & Redmayne, M. (2010). The criminal process (4th ed.). Oxford: Oxford University Press.
Austin, L. (2015a). Lawful illegality: What Snowden has taught us about the legal infrastructure of the surveillance state. In M. Geist (Ed.), Law, privacy and surveillance in Canada in the post-Snowden era (pp. 103–125). Ottawa, ON: University of Ottawa Press.
Austin, L. (2015b). Surveillance and the rule of law. Surveillance & Society,13(2), 295–299.
Aviram, H. (2011). Packer in context: Formalism and fairness in the due process model. Law and Social Inquiry,36(1) [Winter], 237–261.
Beattie, J. (2006). Early detection: The bow street runners in late eighteenth-century London. In C. Emsley & H. Shpayer-Makov (Eds.), Police detectives in history, 1750–1950 (pp. 15–32). Aldershot: Ashgate.
Bell, B. (2002). Theatrical investigation: White-collar crime, undercover operations, and privacy. William and Mary Bill of Rights Journal,11(1), 151–207.
Bowling, B., & Sheptycki, J. (2012). Global policing. London: Sage.
Braithwaite, J., Fisse, B., & Geis, G. (1987). Covert facilitation and crime: Restoring balance to the entrapment debate. Journal of Social Issues,43(3), 5.
Brodeur, J.-P. (1983). High policing and low policing: Remarks about the policing of political activities. Social Problems,30(5), 507–520.
Bronitt, S. (1999). Entrapment, human rights and criminal justice: A licence to deviate? Hong Kong Law Journal,29(2), 216–239.
Bronitt, S. (2002). Sang is dead, loosely speaking. Singapore Journal of Legal Studies, July, 374–387.
Bronitt, S. (2003). Taking privacy rights seriously: Engaging with undercover law reform. Criminal Law Journal,27, 113.
Bronitt, S. (2004). The law in undercover policing: A comparative study of entrapment and covert interviewing in Australia, Canada and Europe. Common Law World Review,33(1), 35–80.
Bronitt, S., & Roche, D. (2000). Between rhetoric and reality: Sociolegal and republican perspectives on entrapment. International Journal of Evidence and Proof,4(2), 77.
Bronitt, S., & Roche, D. (2001). Entrapment, the art of police deception. Australian Quarterly,73(1), 20–48.
Brooke, D. (2009). Entrapment: Beyond the judicial pale. Irish Law Times,27(20), 289–296.
Burchell, G., Gordon, C., & Miller, P. (Eds.). (1991). The foucault effect: Studies in governmentality. Chicago: University of Chicago Press.
Campbell, T. (2006). Rights: A critical introduction. Abingdon, Oxon, UK: Routledge.
Caplan, G. (Ed.). (1983). ABSCAM ethics: Moral issues and deception in law enforcement. Cambridge, MA: Ballinger Pub. Co.
Carter, D. (2009). To catch the lion, tether the goat: Entrapment, conspiracy, and sentencing manipulation. Akron Law Journal,42(1), 135–184.
Chernok, A. (2011). Entrapment under controlled operations legislation: A Victorian perspective. Criminal Law Journal,35(6), 361–375.
Choo, A. L.-T. (1999). Legal aspects of undercover police operations in England and Wales. International Journal of Police Science and Management,2(2), 144–155.
Colvin, E. (2002). Controlled operations, controlled activities and entrapment. Bond Law Review,14(2), 227–250.
Colvin, E. (2006). Fairness and equality in the criminal process. Oxford University Commonwealth Law Journal,6(1), 1–26.
Commonwealth of Australia, New South Wales Government, Queensland Government, & Victorian Government. (1983). Royal commission of inquiry into drug trafficking. Canberra: Australian Government Publishing Service.
Cope, N. (2004). ‘Intelligence led policing or policing led intellegence?’ Integrating volume crime analysis into policing. The British Journal of Criminology,44(2), 188–203.
Cutting, P. D. (1983). The technique of controlled delivery as a weapon in dealing with illicit traffic in narcotic drugs and psychotropic substances. UNODC Bulletin on Narcotics,34(4), 15–20.
Dean, M. (1995). Governing the unemployed self in an active society. Economy and Society,24(4), 559–583.
Dean, M. (2010). Governmentality: Power and rule in modern society (2nd ed.). London: Sage.
Deleuze, G. (1991). What is a dispositif? In T. J. Armstrong (Ed.), Michel foucault: Philosopher (pp. 159–168). New York: Harvester Wheatsheaf.
Depp, D. (2010). Entrapment and controlled operations. New York: LexisNexis.
Douzinas, C. (2000). The end of human rights. Oxford: Hart Publishing.
Dworkin, R. (1978). Taking rights seriously. London: Duckworth Press.
Dworkin, G. (1985). The serpent beguiled me and I did eat: Entrapment and the creation of crime. Law and Philosophy,4(1), 17–39.
Dworkin, G. (1987). Ethics and entrapment. Journal of Social Issues,43(3), 57–59.
Ericson, R. (2007). Crime in an insecure world. Cambridge: Polity Press.
Ferejohn, J., & Pasquino, P. (2004). The law of the exception: A typology of emergency powers. International Journal of Constitutional Law,2(2), 210–239. https://doi.org/10.1093/icon/2.2.210.
Fijnaut, C., & Marx, G. T. (1995). Undercover: Police surveillance in comparative perspective. Norwell: Kluwer Academic Publishers.
Foucault, M. (1980). The confession of the flesh. In C. Gordon (Ed.), Power/knowledge: selected interviews and other writings 1972–1977 (pp. 194–228). New York: Pantheon Press.
Gans, J., Henning, T., Hunter, J., & Warner, K. (2011). Criminal process and human rights. Sydney: Federation Press.
Gershman, B. L. (1982). Abscam, the judiciary, and the ethics of entrapment. The Yale Law Journal,91(8), 1565–1591.
Golder, B. (2015). Foucault and the politics of rights. Stanford, CA: Stanford University Press.
Gottschalk, P. (2009). Information sources in police intelligence. The Police Journal,82(2), 149–170.
Grono, N. (2011). Rule of law and the justice system in Afghanistan. International Crisis Group, April 28. https://www.crisisgroup.org/asia/south-asia/afghanistan/rule-law-and-justice-system-afghanistan.
Hafner-Burton, E., Helfer, L., & Fariss, C. (2011). Emergency and escape: Explaining derogations from human rights treaties. International Organization,65(Fall), 673–707.
Haggerty, K., & Ericson, R. (2000). The surveillant assemblage. The British Journal of Sociology,51(4), 605–622.
Harfield, C., & Harfield, K. (2008a). Covert investigation (2nd ed.). New York: Oxford University Press.
Harfield, C., & Harfield, K. (2008b). Intelligence: Investigation, community and partnership. Oxford: Oxford University Press.
Hart, H. (2012). The concept of law (3rd ed.). Oxford: Oxford University Press.
Heydon, J. D. (1973). The problems of entrapment. Cambridge Law Journal,32(2), 268–286.
House of Commons. (1833). Report from the select committee on the petition of Frederick young and others (Vol. XIII). London: House of Commons.
Hufnagel, S. (2013). Policing cooperation across borders: Comparative perspectives on law enforcement within the EU and Australia. Surrey, UK: Ashgate.
Hufnagel, S., Harfield, C., & Bronitt, S. (Eds.). (2012). Cross border law enforcement. Abingdon, Oxon, UK: Routledge.
James, A. (2003). The advance of intelligence-led policing strategies: The emperor’s new clothes. The Police Journal,76, 45–59.
Jochelson, R., Weinrath, M., & Murchison, M. J. (2012). Searching and seizing after 9/11: Developing and applying empirical methodology to measure judicial output in the supreme court’s section 8 jurisprudence. Dalhousie Law Journal,35(1), 179–213.
Joubert, C. (1994). Undercover policing: A comparative study. European Journal of Crime, Criminal Law and Criminal Justice,2(1), 18–38.
Kassin, S., Drizin, S., Grisso, T., Gudjonsson, G., Leo, R., & Redlich, A. (2010). Police-induced confessions, risk factors, and recommendations: Looking ahead. Law and Human Behavior,34(1), 49–52. https://doi.org/10.1007/s10979-010-9217-5.
Kleinig, J. (1996). The ethics of policing. New York: Cambridge University Press.
Klockars, C. (1980). The Dirty Harry problem. The Annals of the American Academy of Political and Social Science,452(1), 33–47.
Kruisbergen, E. W., Kleemans, E. R., & de Jong, D. (2012). Controlling criminal investigations: The case of undercover operations. Policing,6(4), 398–407.
Leman-Langlois, S., & Shearing, C. (2009). Human rights implications for new developments in policing. Geneva: International Council on Human Rights Policy. http://www.ichrp.org/files/papers/172/policing_and_surveillance_leman-lanlgois_and_shearing.pdf.
Lippert, R. (2009). Signs of the surveillant assemblage: Privacy regulation, urban CCTV, and governmentality. Social & Legal Studies,18(4), 505–522. https://doi.org/10.1177/0964663909345096.
Martinez, L. (2000). Confessions and admissions to undercover police and police agents. The Australian Law Journal,74(6), 391–407.
Marx, G. T. (1974). Thoughts on a neglected category of social movement participant: The agent provocateur and the informant. American Journal of Sociology,80(2), 402–442.
Marx, G. T. (1980). The new police undercover work. Journal of Contemporary Ethnography,8(4), 399–446.
Marx, G. T. (1982). Who really gets stung? Some issues raised by the new police undercover work. Crime & Delinquency,28(2), 165–193.
Marx, G. T. (1985). I’ll Be Watching You: Reflections on the new surveillance. In C. Norris & D. Wilson (Eds.), Surveillance, Crime and Social Control (pp. 3–11). Aldershot: Ashgate.
Marx, G. T. (1988). Undercover: Police surveillance in America. Berkeley: University of California Press.
McDonald, M. J. D. C. (1979–1981). Commission of inquiry concerning certain activities of the Royal Canadian Mounted Police. http://epe.lac-bac.gc.ca/100/200/301/pco-bcp/commissions-ef/mcdonald1979-81-eng/mcdonald1979-81-eng.htm.
Murphy, B. (2014). Retrospective on ridgeway: Governing principles of controlled operations law. Criminal Law Journal,38(1), 38–58.
Murphy, B. (2015). Zone of impeachment: A post-Foucauldian analysis of controlled operations law and policy. PhD Thesis, Newcastle Law School, University of Newcastle, Callaghan, NSW, Australia.
Murphy, B. (2016). Deceptive apparatus: Foucauldian perspectives on law, authorized crime and the rationalities of undercover investigation. Griffith Law Review,25(2), 223–244. https://doi.org/10.1080/10383441.2016.1194956.
Murphy, B., & Anderson, J. (2014). After the serpent beguiled me: Entrapment and sentencing in Australian and Canada. Queen’s Law Journal,39(2), 621.
Murphy, B., & Anderson, J. (2016). Assemblage, counter-law and the legal architecture of Australian Covert Surveillance. In R. K. Lippert, K. Walby, I. Warren, & D. Palmer (Eds.), National security, surveillance and terror: Canada and Australia in comparative perspective (pp. 99–127). Cham: Palgrave Macmillan.
Nadelmann, E. (1994). Cops across borders: The internationalization of U.S. criminal law enforcemeNT. University Park, PA: Pennsylvania State University Press.
Office of Police Integrity. (2007). Ceja task force: Drug related corruption. Melbourne, VIC: Victorian Government Printer.
Ormerod, D., & Roberts, A. (2002). The trouble with Teixeira: Developing a principled approach to entrapment. International Journal of Evidence and Proof,6(1), 3.
Packer, H. (1964). Two models of the criminal process. University of Pennsylvania Law Review,113(1), 1–64.
Packer, H. (1968). The limits of the criminal sanction. Palo Alto, CA: Stanford University Press.
Palmer, A. (2004). Applying Swaffield: Covertly obtained statements and the public policy discretion. Criminal Law Journal,28(4), 217.
Pavone, V., & Esposti, S. D. (2012). Public assessment of new surveillance-oriented security technologies: Beyond the trade-off between privacy and security. Public Understanding of Science,21(5), 556–572.
Philips, C. (1980). The Royal Commission on Criminal Procedure. Report. The investigation and prosecution of criminal offences in England and Wales: The law and procedure. London: HMSO. https://assets.publishing.service.gov.uk/government/uploads/system/uploads/attachment_data/file/271971/2263.pdf
Plowden, P., & Kerigan, K. (2002). Another look at entrapment: Predisposition and the right to a fair trial. Human Rights and UK Practice,3(1), 7–10.
Presser, B. (2001). Public policy, police and interest: A re-evaluation of the judicial discretion to exclude improperly or illegally obtained evidence. Melbourne University Law Review,25(3), 757–785.
Radzinowicz, L. (1956). A history of English Criminal Law and its administration from 1750. The enforcement of the law (Vol. 2). London: Stevens & Sons.
Ranciere, J. (2004). Who is the subject of the rights of man? South Atlantic Quarterly,103(2/3), 297–310.
Richards, D., & Clay, C. (2012). An umbrella with holes: Respect for non-derogable human rights during declared states of emergency, 1996–2004. Human Rights Review,13, 443–471.
Robertson, G. (1994). Entrapment evidence: Manna from heaven, or fruit of the poisoned tree? Criminal Law Review, November, 805–816.
Robertson, G. (2011). Bin Laden’s summary execution maketh the man, martyr and myth. Sydney Morning Herald, May 4. https://www.smh.com.au/politics/federal/bin-ladens-summary-execution-maketh-the-man-martyr-and-myth-20110503-1e6md.html.
Roiphe, R. (2003). The serpent beguiled me: A history of the entrapment defense. Seton Hall Law Review,33(2), 257.
Rose, N., & Valverde, M. (1998). Governed by law? Social & Legal Studies,7(4), 541–551.
Ross, J. (2002). Tradeoffs in undercover investigations: A comparative perspective. University of Chicago Law Review,69(3), 1501–1541.
Ross, J. (2007). The place of covert surveillance in democratic societies: A comparative study of the United States and Germany. The American Journal of Comparative Law,55(3), 493–579.
Sagarin, E., & Macnamara, D. E. J. (1970). The problem of entrapment. Crime & Delinquency,16(4), 363–378.
Skolnick, J. H. (1982). Deception by police. Criminal Justice Ethics,1(2), 40–54.
Slobogin, C. (2010). Government dragnets. Law and Contemporary Problems,73(3), 107–143.
Smith, S., Stinson, V., & Patry, M. (2009). Using the “Mr. Big” technique to elicit confessions: Successful innovation or dangerous development in the canadian legal system? Psychology, Public Policy and Law,15(3), 168–193.
Smith, S., Stinson, V., & Patry, M. (2010). High-risk interrogation: Using the “Mr. Big Technique” to elicit confessions. Law and Human Behavior,34(1), 39–40. https://doi.org/10.1007/s10979-009-9203-y.
Stewart, D. (1986). Royal Commission of Inquiry into alleged telephone interceptions (Vol. 1). Canberra, ACT: Australian Government Publishing Service.
Stober, M. (1985). Entrapment in Canadian criminal law. Calgary, AB: Carswell Legal Publications.
Stober, M. (1992). The limits of police provocation in Canada. Criminal Law Quarterly,34, 290–347.
Valverde, M. (2010). Specters of Foucault in law and society scholarship. Annual Review of Law and Social Science,6(1), 45–59.
Vidocq, F. E. (2003). Memoirs of Vidocq: Master of crime (E. G. Rich, Trans.). Oakland, CA: AK Press.
Walby, K., & Lippert, R. (Eds.). (2014). Corporate security in the 21st century: Theory and practice in international perspective. London: Palgrave MacMillan.
Wood, J. J. (1997). Report of the royal commission into the NSW police service. Sydney, NSW: New South Wales Government.
Žižek, S. (2005). Against Human Rights. New Left Review,34(July August), 115–131.
Cases cited
A v Hayden (1984) 156 CLR 532
AKJ & Ors v Commissioner of Police for the Metropolis [2013] EWHC 32 (QB)
Australian Broadcasting Corporation v Lenah Game Meats Pty Ltd (2001) 208 CLR 199
Gedeon v Commissioner of the NSW Crime Commission [2008] HCA 43
Hunter v Southam [1984] 2 S.C.R. 145
Jacobson v. United States 503 U.S. 540 (1992)
Lawrence v. Texas, 539 U.S. 558 (2003)
People v. Calvano 331 N.Y.S.2d 430 (1972)
R v Hart 2014 SCC 52; [2014] 2 S.C.R. 544
R v Mack [1988] 2 S.C.R. 418
Ridgeway v Queen (1995) 184 CLR 19
Rothman v R [1981] 1 SCR 640
Sherman v. United States 356 U.S. 369 (1958)
Teixeira de Castro v Portugal (1998) 28 EHRR 101
Tofilau v The Queen (2007) 231 CLR 396
Acknowledgements
The author extends sincere thanks to the anonymous reviewers of this article and the invitation of the editors to contribute to this special issue.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Murphy, B. Regulating Undercover Policing: Subjects, Rights and Governmentality. Crit Crim 28, 65–84 (2020). https://doi.org/10.1007/s10612-020-09504-6
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10612-020-09504-6