Hostname: page-component-848d4c4894-r5zm4 Total loading time: 0 Render date: 2024-06-30T05:14:01.627Z Has data issue: false hasContentIssue false

Zones of Opacity: Data Fusion in Post-9/11 Security Organizations*

Published online by Cambridge University Press:  27 June 2014

Torin Monahan
Affiliation:
The University of North Carolina at Chapel Hill, Department of Communication Studies, CB# 3285, 115 Bingham Hall, Chapel Hill, NC 27599-3285, USA, torin.monahan@unc.edu
Priscilla M. Regan
Affiliation:
George Mason University, Department of Public and International Affairs, 4400 University Drive, MSN 3F4, Fairfax, VA 22030-4444, USA, pregan@gmu.edu

Abstract

Image of the first page of this content. For PDF version, please use the ‘Save PDF’ preceeding this image.'
Type
Research Article
Copyright
Copyright © Canadian Law and Society Association 2012

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

Footnotes

*

This material is based upon work supported by the National Science Foundation under grant numbers SES 0957283 and 0957037. Any opinions, findings, conclusions, or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. JoAnn Brooks and Krista Craven provided research assistance.

References

1 Kean, Thomas H.et al., The 9/11 Commission Report: Final Report of The National commission on Terrorist Attacks upon the United States (Washington, DC: US Government Printing Office, 2004)Google Scholar.

2 See, e.g., Monahan, Torin, Surveillance in the Time of Insecurity (New Brunswick, NJ: Rutgers University Press, 2010)Google Scholar; US Department of Homeland Security, “About the Directorate for Management,” (Washington, DC: Directorate for Management, 2011), http://www.dhs.gov/xabout/structure/ecfitorial_0096.shtmGoogle Scholar.

3 Monahan, Torin, “The Murky World of ‘Fusion Centres’,” Criminal Justice Matters 75, 1 (2009), 2021CrossRefGoogle Scholar; Rollins, John, “Fusion Centers: Issues and Options for Congress,” (Washington, DC: Congressional Research Service, 2008), http://www.fas.org/sgp/crs/intel/RL34070.pdfGoogle Scholar.

4 Latour, Bruno, Science in Action: How to Follow Scientists and Engineers through Society (Cambridge: Harvard University Press, 1987)Google Scholar.

5 All interviews were conducted in confidentiality, and the names of interviewees are withheld in accordance with our universities' ethics review board protocols.

6 See generally Monahan, Torin, “The Future of Security? Surveillance Operations at Homeland Security Fusion Centers,” Social Justice 37, 2-3 (2011)Google Scholar.

7 See, e.g., Guzik, Keith, “Discrimination by Design: Predictive Data Mining as Security Practice in the United States' ‘War on Terrorism’,” Surveillance & Society 7, 1 (2009)Google Scholar; also see Monahan, “The Future of Security?”

8 Hall, Mimi, “State-Run Sites Not Effective vs. Terror; Report Blasts Costly Intelligence Centers,” USA Today (07 24, 2007): 1AGoogle Scholar.

9 See generally Wood, David Murakami and Webster, C. William R., “The Normality of Living in Surveillance Societies,” Innovating Government 20, 3 (2011)CrossRefGoogle Scholar.

10 Public Intelligence, “Drone Aircraft Are Patrolling U.S. Cities,” Public Intelligence, 04 26, 2010, http://publicintelligence.net/drone-aircraft-are-patrolling-u-s-cities/Google Scholar; also see Wall, Tyler and Monahan, Torin, “Surveillance and Violence from Afar: The Politics of Drones and Liminal Security-Scapes,” Theoretical Criminology 15, 3 (2011)CrossRefGoogle Scholar.

11 See Crimaldi, Laura, Boston Police Unveil New ‘Real Time’ Tech Center,” BostonHerald.com (03 2, 2010) http://news.bostonherald.com/news/regional/view/20100302boston_police_boast_early_success_with_new_real_time_technology_center/ (last accessed March 20, 2010)Google Scholar; see also Harris, Blake, “Chicago Fusion Center Gives Police New Criminal Investigation Tools,” Digital Communities (04 21, 2008), http://www.govtech.com/dc/261463Google Scholar.

12 German, Mike and Stanley, Jay, “ACLU Fusion Center Update“ (07 2008), 2, http://www.aclu.org/pdfs/privacy/fusion_update_20080729.pdfGoogle Scholar.

13 See Brakel, Rosamunde van and Hert, Paul de, “Policing, Surveillance and Law in a Pre-Crime Society: Understanding the Consequences of Technology Based Strategies,” Journal of Police Studies 20, 3 (2011)Google Scholar.

14 i2 Group, “COPLINK&® Deployed to Boost Crime Solving and Anti-Terrorism Initiatives at the Chicago Police Department's Crime Center“ (10 3, 2007), http://www.i2group.com/news-article.asp?id=75Google Scholar.

15 New York State Intelligence Center, “New York State Law Enforcement Terrorism Indicators Reference Card“ (09 3, 2008), http://publicintelligence.net/new-york-state-law-enforcement-terrorism-indicators-reference-card/Google Scholar.

16 Savage, Charlie, “F.B.I. Agents Get Leeway to Push Privacy Bounds,” New York Times (06 12, 2011), http://www.nytimes.com/201l/06/13/us/13fbi.html?_r=18ml=todaysheadlines&emc=tha2Google Scholar.

17 Pariser, Eli, “How the Net Traps Us All In Our Own Little Bubbles,” The Guardian, 06 12, 2011, http://www.guardian.co.uk/technology/2011/jun/12/google-personalisation-internet-data-filtering?cat=technology&type=articleGoogle Scholar.

18 See Citron, Danielle Keats and Pasquale, Frank, “Network Accountability for the Domestic Intelligence Apparatus,” Hastings Law Journal 62 (2011)Google Scholar.

19 Hylton, Hilary, “Fusion Centers: Giving Cops Too Much Information?Time.com, 03 9, 2009, http://www.time.com/time/nation/irticle/0,8599,1883101.OO.htmlGoogle Scholar.

20 Citron and Pasquale, “Network Accountability for the Domestic Intelligence Apparatus.“

21 See German and Stanley, “ACLU Fusion Center Update“; also see Monahan, “The Future of Security?“

22 See Citron and Pasquale, “Network Accountability.“

23 See, e.g., Associated Press, “NYPD Official: Muslim Spying by Secret Demographics Unit Generated No Leads, Terrorism Cases,” The Washington Post (08 21, 2012), http://www.washingtonpost.com/national/on-faith/nypQ-official-muslim-spying-in-neighborhoods-led-to-no-leads-terror-cases-in-over-6-years/2012/08/21/e14d96f6-eb5b-llel-866f-60a00f604425_story.html (last accessed August 22, 2012)Google Scholar; Monahan, “The Future of Security?“; see also Newkirk, Anthony B., “The Rise of the Fusion-Intelligence Complex: A Critique of Political Surveillance after 9/11,” Surveillance & Society 8, 1 (2010)Google Scholar; The Nation, “Can Anyone Rein in the NYPD's Spies?The Nation, 03 7, 2012, http://www.thenation.com/article/166673/can-anyone-rein-nypds-spiesGoogle Scholar.

24 See, e.g., Priscilla M. Regan and Torin Monahan, Beyond Counterterrorism: Data Sharing, Privacy, and Organizational Histories of DHS Fusion Centers, International Journal of E-Politics (forthcoming); Rollins, “Fusion Centers.“

25 See generally Chin, Gabriel J. and Wells, Scott C., “The Blue Wall of Silence as Evidence of Bias and Motive to Lie: A New Approach to Police Perjury,” University of Pittsburgh Law Review 59 (1997)Google Scholar.

26 See, e.g., German and Stanley, “ACLU Fusion Center Update“; Monahan, “The Future of Security?“; Newkirk, The Rise of the Fusion-Intelligence Complex.“

27 Monahan, “The Future of Security?“

28 See generally German and Stanley, “ACLU Fusion Center Update.“

29 See, e.g., O'Harrow, Robert Jr., “Centers Tap Into Personal Databases; State Groups Were Formed After 9/11,” The Washington Post (04 2, 2008), A01Google Scholar; O'Harrow, Robert Jr., and Nakashima, Ellen, “National Dragnet Is a Click Away; Authorities to Gain Fast and Expansive Access to Records,” The Washington Post (03 6, 2008), A01Google Scholar.

30 See generally Monahan, Torin and Palmer, Neal A., “The Emerging Politics of DHS Fusion Centers,” Security Dialogue 40, 6 (2009)CrossRefGoogle Scholar.

31 Geiger, Harley, “Fusion Centers Get New Privacy Orders via DHS Grants“ (12 15, 2009), http://www.cdt.org/blogs/harley-geiger/fusion-centers-get-new-privacy-orders-dhs-grantsGoogle Scholar.

32 Ibid.

33 See, e.g., Citron and Pasquale, “Network Accountability“; Monahan, “The Future of Security?“