Skip to main content

Securitization, Infopolitics and the Suppression of Liberty

  • Chapter
The Handbook of Security
  • 1608 Accesses

Abstract

Starting 6 June 2013, The Washington Post began to publish a steady stream of revelations about the National Security Agency, including the special-source operations code named Upstream and PRISM (see Gellman, 2013). According to the June 6 article, the US and British governments have been mining vast amounts of global signals data from fibre cables as well as directly from the servers of nine major American Internet service providers and telecommunications companies. These programs perhaps represent the most robust strategic surveillance of American and global populations thus far revealed historically. Broadly speaking, the programs function in at least two ways. The first is a reactive and tactical function: to mine and query the ‘big data’ to build target packages against specific targets. This tactical surveillance, to cite Donald Rumsfeld (2003: 2) from a Department of Defence news briefing in 2002, tries to get at the ‘known unknowns’ — that is to say, the things that are known to be unknown. The second is a proactive and strategic function: applying complex mathematical processing of data flows to conduct human social linkage analysis (Barria, 2013). In other words, the purpose is to potentially get at Rumsfeld’s ‘unknown unknowns’, the things we don’t know that we don’t know.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 299.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • ACPO (1990). Setting the Standards for Policing: Meeting Community Expectation. London: Association of Chief Police Officers.

    Google Scholar 

  • Alderson, J. (1979). Policing Freedom: A Commentary on the Dilemmas of Policing in Western Democracies. Plymouth: Macdonald and Evans.

    Google Scholar 

  • AP (2013). Saudi Man with Pressure Cooker Arrested at Detroit Airport. Accessed October 19, 2013, from http://www.cbsnews.com/8301-201_162-57584242/.

    Google Scholar 

  • Assange, J., Appelbaum, J., Muller-Maguhn, A. and Zimmerman, J. (2012). Cypherpunks: Freedom and the Future of the Internet. New York: O/R Books.

    Google Scholar 

  • Audit Commission for Local Authorities and the National Health Service in England and Wales (1993). Helping with Enquiries: Tackling Crime Effectively. London: HMSO.

    Google Scholar 

  • Barria, C. (2013). NSA Uses Metadata ‘To Create Sophisticated Graphs’ of US Citizens’ Social Connections. Accessed October 19, 2013, from http://rt.com/usa/nsa-metadata-us-social-connections-490/.

    Google Scholar 

  • Beck, U. (1992). Risk Society: Towards a New Modernity. London: Sage.

    Google Scholar 

  • Bentham, J. (1995). The Panopticon Writings. New York: Verso.

    Google Scholar 

  • Cooper, A. (2013a). National DNA Database Strategy Board Annual Report 2012–2013. London: Home Office.

    Google Scholar 

  • Cooper, A. (2013b). National DNA Database Annual Report 2011–2012. London: Home Office.

    Google Scholar 

  • de Lint, W. (2004). Neoconservativism and American Counter-Terrorism: Endarkened Policy? in Deflem, M. (ed.) Terrorism and Counter-Terrorism: Criminological Perspectives. Amsterdam: Elsevier. pp. 131–153.

    Chapter  Google Scholar 

  • de Lint, W., Virta, S. and Deukmedjian, J. (2007). The Simulation of Crime Control: A Shift in Policing?. American Behavioral Scientist, 50, 1631–1647.

    Article  Google Scholar 

  • Deukmedjian, J. (2013). Making Sense of Neoliberal Securitization in Urban Policing and Surveillance.. Canadian Review of Sociology, 50, 52–73.

    Article  Google Scholar 

  • Deukmedjian, J. and de Lint, W. (2007). Community Into Intelligence: Resolving Information Uptake in the RCMP.. Policing and Society, 17, 239–256.

    Article  Google Scholar 

  • Dupont, B. (2004). Security in the Age of Networks.. Policing and Society, 14, 76–91.

    Article  Google Scholar 

  • Ericson, R.V. and Haggerty, K.D. (1997). Policing the Risk Society. Oxford: Clarendon Press.

    Google Scholar 

  • Federation of American Scientists (2013). Foreign Intelligence Surveillance Act. Accessed October 19, 2013, from http://www.fas.org/irp/agency/doj/fisa/.

    Google Scholar 

  • Fisher, M. (2013). Top Secret Clearance Holders So Numerous They Include ‘Packers/ Craters’. Accessed October 19, 2013, from http://www.washingtonpost.com/blogs/worldviews/wp/2013/06/12/top-secret-clearance-holders-so-numerous-they-include-packerscraters/.

    Google Scholar 

  • Foucault, M. (1995). Discipline and Punish: The Birth of the Prison. A. Sheridan (trans.) New York: Vintage Books.

    Google Scholar 

  • Foucault, M. (2007). Security, Territory, Population: Lectures at the College de France, 1977–1978, in Senellart, M., Ewald, F., Fontana, A., and Davidson, A.I. (eds.), Burchell, G. (trans.) Basingstoke, UK: Palgrave Macmillan.

    Book  Google Scholar 

  • Gellman, B. and Poitras, L. (2013). U.S., British Intelligence Mining Data from Nine U.S. Internet Companies in Broad Secret Program. Accessed October 19, 2013, from http://articles.washingtonpost.com/2013-06-06/news/39784046_1_prism-nsa-u-s-servers.

    Google Scholar 

  • Hansard. (1830). Hansard’s Parliamentary Debates: Forming a Continuation of ‘the Parliamentary History of England, from the Earliest Period to the Year 1830’. London: T. C. Hansard.

    Google Scholar 

  • Hayek, F. (2007). The Road to Serfdom: Text and Documents. Chicago: University of Chicago Press.

    Book  Google Scholar 

  • Kelley, M. (2012). US Government Plans To Install Sophisticated Audio Surveillance On Public Buses. Accessed October 19, 2013, from http://www.businessinsider.com/us-plans-audio-surveillance-on-buses-2012-12.

    Google Scholar 

  • Kelling, G., Pate, T., Dieckman, D., and Brown, C.E. (1974). The Kansas City Preventive Patrol Experiment: A Summary Report. Washington, DC: Police Foundation.

    Google Scholar 

  • Keynes, J.M. (1964). The General Theory of Employment, Interest, and Money. San Diego: Harcourt Inc.

    Google Scholar 

  • Lee, M. (1901). A History of Police in England. London: Methuen & Co.

    Google Scholar 

  • Long, C. (2009). Police Stop More Than 1 Million People on Street. Accessed October 19, 2013, from http://www.huffingtonpost.com/2009/10/08/stop-and-frisk-police-sto_n_314509.html.

    Google Scholar 

  • Maguire, M. (2000). Policing by Risks and Targets: Some Dimensions and Implications of Intelligence-Led Crime Control.. Policing and Society, 9, 315–336.

    Article  Google Scholar 

  • McDonald, D. (1981). Freedom and Security Under the Law: Second Report. Ottawa: The Commission.

    Google Scholar 

  • Merton, R. (1938). Social Structure and Anomie.. American Sociological Review, 3, 672–682.

    Article  Google Scholar 

  • Normandeau, A. and Leighton, B. (1990). A Vision of the Future of Policing in Canada: Police-Challenge 2000. Ottawa: Solicitor General Canada.

    Google Scholar 

  • O’Malley, P. and Palmer, D. (1996). Post-Keynesian Policing.. Economy and Society, 25, 137–155.

    Article  Google Scholar 

  • Obama, B.H. (2013). Transcript: Obama’s Remarks on NSA Controversy. Accessed October 18, 2013, from http://blogs.wsj.com/washwire/2013/06/07/transcript-what-obama-said-on-nsa-controversy/.

    Google Scholar 

  • Parker, W. (1954). The Police Challenge in our Great Cities.. Annals of the American Academy of Political and Social Science, 291, 5–13.

    Article  Google Scholar 

  • Peel, R. (1853). The Speeches of the Late Right Honourable Sir Robert Peel, Bart. Delivered in The House of Commons. Volume 1. London: George Routledge and Co.

    Google Scholar 

  • Pike, L. (1873). A History of Crime in England Illustrating the Changes of the Laws in the Progress of Civilization Vol. 1. London: Smith, Elder & Co.

    Google Scholar 

  • Porter, B. (1987). The Origins of the Vigilant State: The London Metropolitan Police Special Branch Before the First World War. London: Widenfeld and Nicolson.

    Google Scholar 

  • Ratcliffe, J. (2008). Intelligence-Led Policing. Devon: Willan.

    Google Scholar 

  • Rose, N. (1996). The Death of the Social? Re-Figuring the Territory of Government.. Economy and Society, 25, 327–356.

    Article  Google Scholar 

  • Rumsfeld, D.H. (2003). Pieces of Intelligence. New York: Free Press.

    Google Scholar 

  • Shamsi, H. (2013). The FBI’s Torjan Horse? Accessed October 18, 2013, from http://www.aclu.org/blog/criminal-law-reform-national-security/fbis-trojan-horse.

    Google Scholar 

  • Skogan, W. (1990). Police and the Public in England and Wales: A British Crime Survey Report. Home Office Research Study No. 117. London: HMSO.

    Google Scholar 

  • Spelman, W. and Brown, D.K. (1981). Calling the Police: Citizen Reporting of Serious Crime. Washington, DC: Police Executive Research Forum.

    Google Scholar 

  • Sutherland, E. (1939). Principles of Criminology. Chicago: J. B. Lippincott Company.

    Google Scholar 

  • United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities (1976). Final Report. Washington, DC: U.S. Government Print Office.

    Google Scholar 

  • Walker, P. (2008). European Court Rules DNA Database Breaches Human Rights. Accessed October 19, 2013, from http://www.theguardian.com/uk/2008/dec/04/law-genetics.

    Google Scholar 

  • Wilson, O.W. (1941). Distribution of Police Patrol Force. Chicago: Public Administration Service.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Copyright information

© 2014 John Edward Deukmedjian

About this chapter

Cite this chapter

Deukmedjian, J.E. (2014). Securitization, Infopolitics and the Suppression of Liberty. In: Gill, M. (eds) The Handbook of Security. Palgrave Macmillan, London. https://doi.org/10.1007/978-1-349-67284-4_40

Download citation

Publish with us

Policies and ethics