Abstract
Starting 6 June 2013, The Washington Post began to publish a steady stream of revelations about the National Security Agency, including the special-source operations code named Upstream and PRISM (see Gellman, 2013). According to the June 6 article, the US and British governments have been mining vast amounts of global signals data from fibre cables as well as directly from the servers of nine major American Internet service providers and telecommunications companies. These programs perhaps represent the most robust strategic surveillance of American and global populations thus far revealed historically. Broadly speaking, the programs function in at least two ways. The first is a reactive and tactical function: to mine and query the ‘big data’ to build target packages against specific targets. This tactical surveillance, to cite Donald Rumsfeld (2003: 2) from a Department of Defence news briefing in 2002, tries to get at the ‘known unknowns’ — that is to say, the things that are known to be unknown. The second is a proactive and strategic function: applying complex mathematical processing of data flows to conduct human social linkage analysis (Barria, 2013). In other words, the purpose is to potentially get at Rumsfeld’s ‘unknown unknowns’, the things we don’t know that we don’t know.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
ACPO (1990). Setting the Standards for Policing: Meeting Community Expectation. London: Association of Chief Police Officers.
Alderson, J. (1979). Policing Freedom: A Commentary on the Dilemmas of Policing in Western Democracies. Plymouth: Macdonald and Evans.
AP (2013). Saudi Man with Pressure Cooker Arrested at Detroit Airport. Accessed October 19, 2013, from http://www.cbsnews.com/8301-201_162-57584242/.
Assange, J., Appelbaum, J., Muller-Maguhn, A. and Zimmerman, J. (2012). Cypherpunks: Freedom and the Future of the Internet. New York: O/R Books.
Audit Commission for Local Authorities and the National Health Service in England and Wales (1993). Helping with Enquiries: Tackling Crime Effectively. London: HMSO.
Barria, C. (2013). NSA Uses Metadata ‘To Create Sophisticated Graphs’ of US Citizens’ Social Connections. Accessed October 19, 2013, from http://rt.com/usa/nsa-metadata-us-social-connections-490/.
Beck, U. (1992). Risk Society: Towards a New Modernity. London: Sage.
Bentham, J. (1995). The Panopticon Writings. New York: Verso.
Cooper, A. (2013a). National DNA Database Strategy Board Annual Report 2012–2013. London: Home Office.
Cooper, A. (2013b). National DNA Database Annual Report 2011–2012. London: Home Office.
de Lint, W. (2004). Neoconservativism and American Counter-Terrorism: Endarkened Policy? in Deflem, M. (ed.) Terrorism and Counter-Terrorism: Criminological Perspectives. Amsterdam: Elsevier. pp. 131–153.
de Lint, W., Virta, S. and Deukmedjian, J. (2007). The Simulation of Crime Control: A Shift in Policing?. American Behavioral Scientist, 50, 1631–1647.
Deukmedjian, J. (2013). Making Sense of Neoliberal Securitization in Urban Policing and Surveillance.. Canadian Review of Sociology, 50, 52–73.
Deukmedjian, J. and de Lint, W. (2007). Community Into Intelligence: Resolving Information Uptake in the RCMP.. Policing and Society, 17, 239–256.
Dupont, B. (2004). Security in the Age of Networks.. Policing and Society, 14, 76–91.
Ericson, R.V. and Haggerty, K.D. (1997). Policing the Risk Society. Oxford: Clarendon Press.
Federation of American Scientists (2013). Foreign Intelligence Surveillance Act. Accessed October 19, 2013, from http://www.fas.org/irp/agency/doj/fisa/.
Fisher, M. (2013). Top Secret Clearance Holders So Numerous They Include ‘Packers/ Craters’. Accessed October 19, 2013, from http://www.washingtonpost.com/blogs/worldviews/wp/2013/06/12/top-secret-clearance-holders-so-numerous-they-include-packerscraters/.
Foucault, M. (1995). Discipline and Punish: The Birth of the Prison. A. Sheridan (trans.) New York: Vintage Books.
Foucault, M. (2007). Security, Territory, Population: Lectures at the College de France, 1977–1978, in Senellart, M., Ewald, F., Fontana, A., and Davidson, A.I. (eds.), Burchell, G. (trans.) Basingstoke, UK: Palgrave Macmillan.
Gellman, B. and Poitras, L. (2013). U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program. Accessed October 19, 2013, from http://articles.washingtonpost.com/2013-06-06/news/39784046_1_prism-nsa-u-s-servers.
Hansard. (1830). Hansard’s Parliamentary Debates: Forming a Continuation of ‘the Parliamentary History of England, from the Earliest Period to the Year 1830’. London: T. C. Hansard.
Hayek, F. (2007). The Road to Serfdom: Text and Documents. Chicago: University of Chicago Press.
Kelley, M. (2012). US Government Plans To Install Sophisticated Audio Surveillance On Public Buses. Accessed October 19, 2013, from http://www.businessinsider.com/us-plans-audio-surveillance-on-buses-2012-12.
Kelling, G., Pate, T., Dieckman, D., and Brown, C.E. (1974). The Kansas City Preventive Patrol Experiment: A Summary Report. Washington, DC: Police Foundation.
Keynes, J.M. (1964). The General Theory of Employment, Interest, and Money. San Diego: Harcourt Inc.
Lee, M. (1901). A History of Police in England. London: Methuen & Co.
Long, C. (2009). Police Stop More Than 1 Million People on Street. Accessed October 19, 2013, from http://www.huffingtonpost.com/2009/10/08/stop-and-frisk-police-sto_n_314509.html.
Maguire, M. (2000). Policing by Risks and Targets: Some Dimensions and Implications of Intelligence-Led Crime Control.. Policing and Society, 9, 315–336.
McDonald, D. (1981). Freedom and Security Under the Law: Second Report. Ottawa: The Commission.
Merton, R. (1938). Social Structure and Anomie.. American Sociological Review, 3, 672–682.
Normandeau, A. and Leighton, B. (1990). A Vision of the Future of Policing in Canada: Police-Challenge 2000. Ottawa: Solicitor General Canada.
O’Malley, P. and Palmer, D. (1996). Post-Keynesian Policing.. Economy and Society, 25, 137–155.
Obama, B.H. (2013). Transcript: Obama’s Remarks on NSA Controversy. Accessed October 18, 2013, from http://blogs.wsj.com/washwire/2013/06/07/transcript-what-obama-said-on-nsa-controversy/.
Parker, W. (1954). The Police Challenge in our Great Cities.. Annals of the American Academy of Political and Social Science, 291, 5–13.
Peel, R. (1853). The Speeches of the Late Right Honourable Sir Robert Peel, Bart. Delivered in The House of Commons. Volume 1. London: George Routledge and Co.
Pike, L. (1873). A History of Crime in England Illustrating the Changes of the Laws in the Progress of Civilization Vol. 1. London: Smith, Elder & Co.
Porter, B. (1987). The Origins of the Vigilant State: The London Metropolitan Police Special Branch Before the First World War. London: Widenfeld and Nicolson.
Ratcliffe, J. (2008). Intelligence-Led Policing. Devon: Willan.
Rose, N. (1996). The Death of the Social? Re-Figuring the Territory of Government.. Economy and Society, 25, 327–356.
Rumsfeld, D.H. (2003). Pieces of Intelligence. New York: Free Press.
Shamsi, H. (2013). The FBI’s Torjan Horse? Accessed October 18, 2013, from http://www.aclu.org/blog/criminal-law-reform-national-security/fbis-trojan-horse.
Skogan, W. (1990). Police and the Public in England and Wales: A British Crime Survey Report. Home Office Research Study No. 117. London: HMSO.
Spelman, W. and Brown, D.K. (1981). Calling the Police: Citizen Reporting of Serious Crime. Washington, DC: Police Executive Research Forum.
Sutherland, E. (1939). Principles of Criminology. Chicago: J. B. Lippincott Company.
United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (1976). Final Report. Washington, DC: U.S. Government Print Office.
Walker, P. (2008). European Court Rules DNA Database Breaches Human Rights. Accessed October 19, 2013, from http://www.theguardian.com/uk/2008/dec/04/law-genetics.
Wilson, O.W. (1941). Distribution of Police Patrol Force. Chicago: Public Administration Service.
Editor information
Editors and Affiliations
Copyright information
© 2014 John Edward Deukmedjian
About this chapter
Cite this chapter
Deukmedjian, J.E. (2014). Securitization, Infopolitics and the Suppression of Liberty. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_40
Download citation
DOI: https://doi.org/10.1007/978-1-349-67284-4_40
Publisher Name: Palgrave Macmillan, London
Print ISBN: 978-1-349-67286-8
Online ISBN: 978-1-349-67284-4
eBook Packages: Palgrave Social Sciences CollectionSocial Sciences (R0)