Crime, Law and Social Change

, Volume 43, Issue 2–3, pp 149–173 | Cite as

Governance, risk and dataveillance in the war on terror

  • Louise Amoore
  • Marieke De Goede


This paper critically analyses the importance of risk management techniques in the war on terror. From the protection of borders to international financial flows, from airport security to daily financial transactions, risk assessment is emerging as the most important way in which terrorist danger is made measurable and manageable. However, we argue that the risk-based approach results in the displacement of risk onto marginal groups, while its effectiveness in the war on terror remains questionable.


Risk Assessment Risk Management Management Technique International Relation Financial Transaction 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. Accenture digital forum, “US DHS to Develop and Implement US VISIT Program at Air, Land and Sea Ports of Entry,” 2004, available at
  2. Accenture press release, “Government Security Contract to Help Make US Safer,” 2004, available at
  3. Adey, P., “Secured and Sorted Mobilities: Examples from the Airport,” Surveillance and Society, 2004 (1: 4), 500–519.Google Scholar
  4. Al-Suhaimi, J., “Demystifying Hawala Business,” The Banker, 2002, 152(914), 76–78.Google Scholar
  5. Amoore, L., “Risk, Reward and Discipline at Work,” Economy and Society, 2004 (33: 2), 174–196.CrossRefGoogle Scholar
  6. Amoore, L. and P. Langley, “Ambiguities of Global Civil Society,” Review of International Studies, 2004 (30: 1), 89–110.CrossRefGoogle Scholar
  7. Andreas, P. and T. Snyder, (eds.) The Wall Around the West: State Borders and Immigration Controls in North America and Europe (Lanham: Rowman & Littlefield, 2000).Google Scholar
  8. Appadurai, A., “Spectral Housing and Urban Cleansing: Notes on Millennium Mumbai,” Public Culture, 2000 (12: 3), 627–651.Google Scholar
  9. Aufhauser, D.D., “Terrorist Financing: Foxes Run to Ground,” Journal of Money Laundering Control, 2003 (6: 4), 301–305.Google Scholar
  10. Baker, T., “Liability and insurance after September 11: Embracing Risk meets the Precautionary Principle”, University of Connecticut School of Law Working Paper Series, 2002.Google Scholar
  11. Beeson, A., “On the Home Front: A Lawyer's Struggle to Defend Rights After 9/11”, in R. Leone and G. Anrig (eds.), The War on Our Freedoms (New York: Public Affairs/Century Foundation, 2003).Google Scholar
  12. Beck, U., “The Terrorist Threat: World Risk Society Revisited,” Theory, Culture & Society, 2002 (19: 4), 39–55.Google Scholar
  13. Bester, H., L. de Koker and R. Hawthorne, “Access to Financial Services in South Africa,” Genesis Analytics, April, 2004, available at
  14. Bigo, D., “Security and Immigration: Toward a Critique of the Governmentality of Unease,” Alternatives, 2002 (27), 63–92.Google Scholar
  15. Brisbin, R., “Old Standards and New Practices of Governing: Federalism and Rights Paradigms and the Risk-Management Regime”, paper presented at the annual convention of the American Political Science Association, 2004, 2–5 September, 2004.Google Scholar
  16. Business Week, “The Price of Protecting the Airways,” 2001, available at
  17. Business Week, “Welcome to Security Nation,” 2004a, 3887, p. 32.Google Scholar
  18. Business Week, “Accenture Hits the Daily Double,” 2004b, 3891, p. 74.Google Scholar
  19. Business Week Online, “Terror May be Your Portfolio's Security,” 16 August, 2004,,
  20. Campbell, D., “With Pot and Porn Stripping Corn, America's Black Economy is Flying High,” The Guardian, 2 May, 2003, p. 3.Google Scholar
  21. Campbell, D., “Introducing Del-Qaida,” The Guardian, 17 July, 2004, p. 17.Google Scholar
  22. CIO Insight, “Beta,” August, 2004, 42, p. 22.Google Scholar
  23. Chalfin, B., “Border Scans: Sovereignty, Surveillance and the Customs Service in Ghana,” Identities: Global Studies in Culture and Power, 2004 (11), 397–416.CrossRefGoogle Scholar
  24. Clarke, R., “Dataveillance: Delivering 1984,” in L. Green and R. Guinery (eds.), Framing Technology: Society, Choice and Change (London: Routledge, 1994).Google Scholar
  25. Coutin, S.B., Legalizing Moves: Salvadoran Immigrants' Struggle for US Residency (Ann Arbor: University of Michigan Press, 2000).Google Scholar
  26. Coutin, S.B., B. Maurer and B. Yngvesson, “In the Mirror: The Legitimation Work of Globalization,” Law and Social Inquiry, 2002 (27: 4), 801–843.Google Scholar
  27. De Genova, N.P., “Migrant Illegality and Deportability in Everyday Life,” Annual Review of Anthropology, 2002 (31), 419–447.CrossRefGoogle Scholar
  28. De Goede, M., “Repoliticising Financial Risk,” Economy and Society, 2004 (33: 2), 197–217.CrossRefGoogle Scholar
  29. De Goede, M., Virtue, Fortune and Faith: A Genealogy of Finance (Minneapolis: University of Minnesota Press, 2005).Google Scholar
  30. Department of Homeland Security, “DHs Announces Award of US VISIT Prime Contract to Accenture LLP,” 2004a, available at
  31. Department of Homeland Security, “Transcript of Secretary of Homeland Security Tom Ridge at the Center for Transatlantic Relations at Johns Hopkins University,” 2004b, available at
  32. Department of Homeland Security, “Remarks by Secretary of Homeland Security Tom Ridge at the European Policy Centre,” 2005, available at
  33. Doty, R.L., Anti-Immigrantism in Western Democracies: Statecraft, Desire and the Politics of Exclusion (London: Routledge, 2003).Google Scholar
  34. Ewald, F., “Norms, Discipline and the Law,” in R. Post (ed.), Law and the Order of Culture (Berkeley: University of California Press, 1990).Google Scholar
  35. “Biometrics Beyond Terrorism,” 2004 available at
  36. Fox, P., “The Security Privilege,” Computerworld, 2004 (38: 23), 1.Google Scholar
  37. Fox, W.J., Speech Before the Anti-Money Laundering Compliance Conference (New York: Securities Industry Association, 2004a), 4 March, available at
  38. Fox, W.J., Statement Before the United States House of Representatives, Committee on Financial Services, 16 June, 2004b, available at
  39. FSA, Financial Services Authority, Reducing Money Laundering Risk: Know Your Customer and Anti-Money Laundering Monitoring, 2003, Discussion Paper 22, August, available at
  40. Gillespie, J., Follow the Money: Tracing Terrorist Assets, Seminar on International Finance, Harvard Law School, 15 April, 2002, available at
  41. Heimer, C., “Insuring More, Ensuring Less: Private Regulation Through Insurance,” in T. Baker and J. Simon (eds.), Embracing Risk: The Changing Culture of Insurance and Responsibility (Chicago: University of Chicago Press, 2002).Google Scholar
  42. Heyman, J., “Class and Classification on the US-Mexican Border,” Human Organization, 2001 (60), 128–140.Google Scholar
  43. Horst, C. and N. van Hear, “Counting the Cost: Refugees, Remittances and the ‘War against Terrorism,’” Forced Migration Review, 2002 (14), 32–34.Google Scholar
  44. Kestelyn, J., “For Want of a Nail,” Intelligent Enterprise, 2002 (5: 7), 8.Google Scholar
  45. Langley, P., The Everyday Life of Global Finance, IPEG working paper, British International Studies Association, 2002, available at
  46. Larner, W. and W. Walters, “Introduction: Global Governmentality: Governing International Spaces,” in W. Larner and W. Walters (eds.), Global Governmentality: Governing International Spaces (London: Routledge, 2004).Google Scholar
  47. Levene, T., “Why Rules Won't Wash on Money Laundering,” The Guardian Jobs and Money, 2003, 28 June, 2–3.Google Scholar
  48. Levi, M., “Money Laundering and Its Regulation,” Annals of the AAPSS 2002 (582), 181–194.Google Scholar
  49. Levi, M., “Following the Criminal and Terrorist Money Trails,” in P. C. van Duyne, K. von Lampe and J.L. Newell (eds.), Criminal Finances and Organising Crime in Europe (Nijmegen: Wolf Legal Publishers, 2003).Google Scholar
  50. Levi, M. and D.S. Wall, “Technologies, Security, and Privacy in the Post-9/11 European Information Society,” Journal of Law and Society, 2004 (31: 2), 194–220.CrossRefGoogle Scholar
  51. Leyshon, A. and N. Thrift, “Lists Come Alive: Electronic Systems of Knowledge and the Rise of Credit-Scoring in Retail Banking,” Economy and Society, 1999 (28: 3), 434–466.Google Scholar
  52. Lyon, D., Surveillance Society: Monitoring Everyday Life (New York: Routledge, 2001).Google Scholar
  53. Lyon, D., Surveillance After September 11 (London: Polity, 2003a).Google Scholar
  54. Lyon, D., (ed.) Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination (New York: Routledge, 2003b).Google Scholar
  55. Lyon, D., “Identity Cards: Social Sorting by Database,” OII Issue Brief 2004, no. 3.Google Scholar
  56. Maimbo, S.M., The Money Exchange Dealers of Kabul, Worldbank Working Paper, June, 2003, no. 13.Google Scholar
  57. Malkin, L. and Y. Elizur, “The Dilemma of Dirty Money,” World Policy Journal, 2001, (Spring), 13–23.Google Scholar
  58. Malkin, L. and Y. Elizur, “Terrorism's Money Trail,” World Policy Journal 2002 (Spring), 60–70.Google Scholar
  59. Mantas, “Money Laundering –Keep it Clean,” Banking Technology, 30 November, 2003, available at
  60. Military and Aerospace Electronics, “Homeland Security Focus,” 2004 (15: 7), 4.Google Scholar
  61. Naylor, R.T., “Wash-Out: A Critique of Follow-the-Money Methods in Crime Control Policy,” Crime, Law & Social Change, 1999 (32), 1–57.Google Scholar
  62. Nelen, H., “Hit Them Where It Hurst Most?,” Crime, Law and Social Change, 2004 (41), 517–534.Google Scholar
  63. O'Harrow, R., No Place to Hide (New York: Free Press, 2005).Google Scholar
  64. O'Malley, P., “Uncertain Subjects: Risks, Liberalism and Contract,” Economy and Society, 2000 (29: 4), 460–484.CrossRefGoogle Scholar
  65. Passas, N., Informal Value Transfer Systems and Criminal Organisations: A Study into So-Called Underground Banking Networks, Dutch Ministry of Justice, 1999, available at
  66. Passas, N., “Law Enforcement Challenges in Hawala-Related Investigations,” Journal of Financial Crime, 2004a (12: 2), 112–119.Google Scholar
  67. Passas, N., “Indicators of Hawala Operations and Criminal Abuse,” Journal of Money Laundering Control, 2004b (8: 2), 168–172.Google Scholar
  68. Peterson, V.S., A Critical Rewriting of Global Political Economy (London: Routledge, 2003).Google Scholar
  69. Pieth, M., “Financing of Terrorism: Following the Money,” European Journal of Law Reform, 2002 (4: 2), 365–376.CrossRefGoogle Scholar
  70. Rose, N. and V. Mariana, “Governed by Law?,” Social and Legal Studies, 1998 (7: 4), 541–551.Google Scholar
  71. Roth, J., D. Greenberg and S. Wille, National Commission on Terrorist Attack upon the United States, Monograph on Terrorist Financing, 2003, available at http://www.9–
  72. Sassen, S., The Global City: London, New York, Tokyo (Princeton, NJ: Princeton University Press, 1991).Google Scholar
  73. Stein, N., “The Fruits of Safety,” Fortune (Europe), 2004 (149: 11), 11.Google Scholar
  74. Theil, S., “Gordon Woo: Calculus for Catastrophe,” Newsweek, 12 July, 2004, available at
  75. Thrift, N., “Movement-Space: The Changing Domain of Thinking Resulting from the Development of new Kinds of Spatial Awareness,” Economy and Society, 2004 (33: 4), 582.CrossRefGoogle Scholar
  76. US Department of the Treasury, A report to Congress in Accordance with Section 359 of the USA Patriot Act, November, 2002, availale at
  77. US Department of the Treasury, National Money Laundering Strategy 2003, 2003, available at
  78. Valverde, M. and M. Mopas, “Insecurity and the Dream of Targeted Governance,” in W. Larner and W. Walters (eds.), Global Governmentality: Governing International Spaces (London: Routledge, 2004).Google Scholar
  79. van der Ploeg, I., “Biometrics and the Body as Information: Normative Issues of the Socio-Technical Coding of the Body,” in D. Lyon (ed.), Surveillance as Social Sorting (London: Routledge, 2003).Google Scholar
  80. van Duyne, P.C., K. von Lampe and N. Passas, Upperworld and Underworld in Cross-Border Crime (Nijmegen: Wolf Legal Publishers, 2002).Google Scholar
  81. Walters, W., “Mapping Schengenland: Denaturalizing the Border,” Environment and Planning D: Society and Space, 2002 (20), 561–580.CrossRefGoogle Scholar

Copyright information

© Springer Science + Business Media, Inc. 2005

Authors and Affiliations

  1. 1.University of Durham, UK and University of AmsterdamAmsterdamThe Netherlands

Personalised recommendations