Skip to main content

Interrogating National Security, Surveillance, and Terror in Canada and Australia

  • Chapter
  • First Online:
National Security, Surveillance and Terror

Part of the book series: Crime Prevention and Security Management ((CPSM))

  • 983 Accesses

Abstract

In this chapter the co-editors introduce the comparative volume and its rationales, provide context about national security, surveillance and terror in both Canada and Australia, describe contributions found in the volume, and conclude with an overview of the volume.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Adelman, Howard, Allan Borowski, Meyer Burstein, and Lois Foster. 1994. Immigration and Refugee Policy: Australia and Canada Compared. vol. 2. Toronto, ON: University of Toronto Press.

    Google Scholar 

  • Ahmad, Muneer. 2002. Homeland Insecurities: Racial Violence the Day After September 11. Social Text 20(3): 101–115.

    Article  Google Scholar 

  • Aradau, Claudia, and R. van Munster. 2009. Exceptionalism and the ‘War on Terror’: Criminology Meets International Relations. British Journal of Criminology 49(5): 686–701.

    Article  Google Scholar 

  • Australian Government. 2010. Counter-Terrorism White Paper. Canberra: Australian Government Printer.

    Google Scholar 

  • Australian Human Rights Commission. 2014. The Forgotten Children: National Inquiry into Children in Immigration Detention. Canberra ACT: Australian Human Rights Commission.

    Google Scholar 

  • Baldwin, David. 1997. The Concept of Security. Review of International Studies 23(1): 5–26.

    Article  Google Scholar 

  • Barry, Donald, and Duane Bratt. 2008. Defense Against Help: Explaining Canada-U.S. Security Relations. American Review of Canadian Studies 38(1): 64–84.

    Article  Google Scholar 

  • Bell, Colleen. 2006a. Surveillance Strategies and Populations at Risk: Biopolitical Governance in Canada’s National Security Policy. Security Dialogue 37(2): 147–165.

    Article  Google Scholar 

  • ———. 2006b. Subject to Exception: Security Certificates, National Security and Canada’s Role in the ‘War on Terror’. Canadian Journal of Law and Society 21(1): 63–83.

    Article  Google Scholar 

  • Bell, Colleen, and B. Evans. 2010. From Terrorism to Insurgency: Re-Mapping the Post-Interventionary Security Terrain. Journal of Intervention and Statebuilding 4(4): 371–390.

    Article  Google Scholar 

  • Bhandar, Davina. 2004. Renormalizing Citizenship and Life in Fortress North America. Citizenship Studies 8(3): 261–278.

    Article  Google Scholar 

  • Biersteker, Thomas. 2003. The Rebordering of North America: Implications for Conceptualizing Borders After September 11. In The Rebordering of North America: Integration and Exclusion in a New Security Context, eds. Peter Andreas and Thomas Biersteker, 153–167. New York: Routledge.

    Google Scholar 

  • Bigo, Didier. 2000. When Two Become One: Internal and External Securitisations in Europe. In International Relations Theory and the Politics of European Integration: Power, Security, and Community, eds. Morten Kelstrup and Michael C. Williams, 171–205. London: Routledge.

    Google Scholar 

  • ———. 2002. Security and Immigration: Toward a Critique of the Governmentality of Unease. Alternatives 27(1): 63–92.

    Article  Google Scholar 

  • Bronskill, Jim. 2012. Flying the Secret Skies: Difficulties in Obtaining Data on Canadian Airport Screening Tests Following 9/11. In Brokering Access: Power, Politics and Freedom of Information Process in Canada, eds. M. Larsen and K. Walby, 97–114. Vancouver: University of British Columbia Press.

    Google Scholar 

  • Brunet-Jailly, E., and J. Martin. 2010. Local Government in a Global World: Australia and Canada in Comparative Perspective. In Local Government in a Global World: Australia and Canada in Comparative Perspective, eds. E. Brunet-Jailly and J. Martin, 3–34. Toronto, ON: University of Toronto Press.

    Chapter  Google Scholar 

  • Cox, Wayne. 2014. Canadian Critical Security Studies as a Non-American Social Science: A Rejoinder To de Larrinaga and Salter. Critical Studies on Security 2(1): 35–38.

    Article  Google Scholar 

  • Dandeker, Christopher. 1990. Surveillance, Power, and Modernity: Bureaucracy and Discipline from 1700 to the Present Day. New York: St. Martin’s Press.

    Google Scholar 

  • de Larrinaga, Miguel, and Mark Salter. 2014. Cold CASE: A Manifesto for Canadian Critical Security Studies. Critical Studies on Security 2(1): 1–19.

    Article  Google Scholar 

  • de Lint, W., and Reem Bahdi. 2012. Access to Information in an Age of Intelligencized Governmentality. In Brokering Access: Power, Politics and Freedom of Information Process in Canada, eds. M. Larsen and K. Walby, 115–141. Vancouver: University of British Columbia Press.

    Google Scholar 

  • Diab, Robert. 2008. Guantanamo North: Terrorism and the Administration of Justice. Fernwood: Halifax.

    Google Scholar 

  • Dupont, Alan, and William Reckmeyer. 2012. Australia’s National Security Priorities: Addressing Strategic Risk in a Globalized World. Australian Journal of International Affairs 66(1): 34–51.

    Article  Google Scholar 

  • Findlay, Mark. 1986. Organised Crime as Terrorism. The Australian Quarterly 58(3): 286–296.

    Article  Google Scholar 

  • Forcese, Craig, and Kent Roach. 2015. False Security. Irwin Law Inc: Ottawa.

    Google Scholar 

  • Gabor, Thomas. 2004. The Views of Canadian Scholars on the Impact of the Anti-Terrorism Act. Ottawa: Research and Statistics Division, Department of Justice Canada.

    Google Scholar 

  • Gad, U., and Karen Petersen. 2011. Concepts of Politics in Securitization Studies. Security Dialogue 42(4): 315–328.

    Google Scholar 

  • Geist, Michael. 2015. Why Watching the Watchers Isn’t Enough: Canadian Surveillance Law in the Post-Snowden Era. In Law, Privacy and Surveillance in Canada in the Post-Snowden Era, ed. M. Geist, 225–256. Ottawa: University of Ottawa Press.

    Chapter  Google Scholar 

  • Giddens, Anthony. 1981. A Contemporary Critique of Historical Materialism: Vol. 1 Power, Property, and the State. London: The Macmillan Press Ltd.

    Book  Google Scholar 

  • Gill, Peter. 2003. Democratic and Parliamentary Accountability of Intelligence Services After September 11th (Working Paper No. 103). Geneva Centre for the Democratic Control of Armed Forces.

    Google Scholar 

  • Goldsmith, Andrew. 2008. The Governance of Terror: Precautionary Logic and Counterterrorist Law Reforms After September 11. Law & Policy 30(2): 141–167.

    Article  Google Scholar 

  • The Guardian. 2015. Paris Attacks Condemned by World Leaders as the ‘Work of the Devil’. http://www.theguardian.com/world/2015/nov/14/paris-terror-attacks-world-leaders-condemn-the-work-of-the-devil. Accessed 15 Nov.

  • Haggerty, Kevin. 2009. ‘Ten Thousand Times Larger…’ Anticipating the Expansion of Surveillance. In New Directions in Surveillance and Privacy, eds. B. Goold and D. Neyland, 159–177. Cullompton: Willan.

    Google Scholar 

  • Hameed, Yavar, and Jeffrey Monaghan. 2012. Accessing Dirty Data: Methodological Strategies for Social Problems Research. In Brokering Access: Power, Politics and Freedom of Information Process in Canada, eds. M. Larsen and K. Walby, 142–168. Vancouver: University of British Columbia Press.

    Google Scholar 

  • Henstra, Dan. 2013. Multilevel Governance and Canadian Emergency Management Policy. In Multilevel Governance and Emergency Management in Canadian Municipalities, ed. D. Henstra. Montreal: McGill-Queen’s University Press.

    Google Scholar 

  • Hewitt, Steve. 1998. Intelligence at the Learneds: The RCMP, the Learneds, and the Canadian Historical Association. Journal of the Canadian Historical Association 8: 267–286.

    Article  Google Scholar 

  • ———. 2002. Spying 101: The RCMP’s Secret Activities at Canadian Universities, 1917–1997. Toronto, ON: University of Toronto Press.

    Book  Google Scholar 

  • Higgs, Edward. 2001. The Rise of the Information State: The Development of Central State Surveillance of the Citizen in England, 1500–2000. Journal of Historical Sociology 14(2): 175–196.

    Article  Google Scholar 

  • Hocking, Jenny. 1994. First the Verdict then the Trial. Policing and Society 4(3): 219–236.

    Article  Google Scholar 

  • Hocking, Jenny. 2004. Terror Laws: ASIO, Counter-Terrorism and the Threat to Democracy. Sydney: University of New South Wales Press.

    Google Scholar 

  • Huysmans, Jef. 2004. Minding Exceptions: The Politics of Insecurity and Liberal Democracy. Contemporary Political Theory 3(3): 321–341.

    Article  Google Scholar 

  • Iacobucci, The Honourable. 2008. Inquiry into the Actions of Canadian Officials in Relation to Abdullah Almaki, Ahmad Abou-Elmaati and Muayyed Nureddin. Ottawa: Queen’s Press.

    Google Scholar 

  • Katzenstein, Peter, ed. 1996. The Culture of National Security. Norms and Identity in World Politics. New York: Columbia University Press.

    Google Scholar 

  • Keating, Tom, and Robert Murray. 2014. Mutual Constitution or Convenient National Interest? The Security Strategies of Canada and the United States since 1991. Canadian Foreign Policy Journal 20(3): 247–258.

    Article  Google Scholar 

  • King, Gary, and Christopher J. Murray. 2001. Rethinking Human Security. Political Science Quarterly 116(4): 585–610.

    Article  Google Scholar 

  • Kinsman, Gary, and Patrizia Gentile. 2010. The Canadian War on Queers: National Security as Sexual Regulation. Vancouver: UBC Press.

    Google Scholar 

  • Kruger, Erin, Marlene Mulder, and Bojan Korenic. 2004. Canada After 11 September: Security Measures and ‘Preferred’ Immigrants. Mediterranean Quarterly 15(4): 72–87.

    Article  Google Scholar 

  • Leffler, Melvyn. 1990. National Security. Journal of American History 77(1): 143–152.

    Article  Google Scholar 

  • Lippert, Randy K., and Daniel O’Connor. 2003. Security Assemblages: Airport Security, Flexible Work, and Liberal Governance. Alternatives 28(3): 331–358.

    Article  Google Scholar 

  • Lippert, Randy K., and Kevin Walby. 2016. Governing Through Privacy: Authoritarian Liberalism, Law, and Privacy Knowledge. Law, Culture, and the Humanities 12(2): 329–352.

    Article  Google Scholar 

  • Lyon, David. 2003. Surveillance After September 11. Cambridge: Polity Press.

    Google Scholar 

  • MacDonald, N. 2011. Parliamentarians and National Security in Canada. Canadian Parliamentary Review 34(4): 33–41.

    Google Scholar 

  • Mangold, Peter. 1990. National Security and International Relations. London: Routledge.

    Google Scholar 

  • Michaelsen, Christopher. 2010. Reforming Australian’s National Security Laws: The Case for a Proportionality-Based Approach. University of Tasmania Law Review 29(1): 32–48.

    Google Scholar 

  • Monaghan, Jeffrey, and Kevin Walby. 2012a. ‘… They Attacked the City’: Security Intelligence, the Sociology of Protest Policing, and the Anarchist Threat at the 2010 Toronto G20 Summit. Current Sociology 60(5): 653–671.

    Article  Google Scholar 

  • ———. 2012b. Making up ‘Terror Identities’: Security Intelligence and Canada’s Integrated Threat Assessment Centre. Policing & Society 22(2): 133–151.

    Google Scholar 

  • Monahan, Torin, and Neal Palmer. 2009. The Emerging Politics of DHS Fusion Centers. Security Dialogue 40(6): 617–636.

    Article  Google Scholar 

  • McCulloch, Jude, and Sharon Pickering. 2009. Precrime and Counter-Terrorism: Imagining Future Crime in the ‘War on Terror’. British Journal of Criminology 49(5): 626–645.

    Article  Google Scholar 

  • Muller, Benjamin J. 2004. (Dis)Qualified Bodies: Securitization, Citizenship and Identity Management. Citizenship Studies 8(3): 279–294.

    Article  Google Scholar 

  • Neocleous, Mark. 2008. Critique of Security. Montreal: McGill-Queen’s University Press.

    Book  Google Scholar 

  • Oriola, Temitope. 2009. Counter-Terrorism and Alien Justice: The Case of Security Certificates in Canada. Critical Studies in Terrorism 2(2): 257–274.

    Article  Google Scholar 

  • Palmer, Darren, and Ian Warren. 2013. Global Policing and the Case of Kim Dotcom. International Journal for Crime, Justice and Social Democracy 2(3): 105–119.

    Article  Google Scholar 

  • Palmer, Darren, and Chad Whelan. 2006. Counter-Terrorism Across the Policing Continuum. Police Practice and Research 7(5): 449–465.

    Article  Google Scholar 

  • PCLOB (Privacy and Civil Liberties Oversight Board). 2014. Report on the Telephone Records Program Conducted under Section 215 of the USA Patriot Act and on the Operations of the Foreign Surveillance Court. Washington, DC. https://www.pclob.gov/library/215-Report_on_the_Telephone_Records_Program.pdf. Accessed 15 Nov 2015.

  • Petersen, Karen. 2014. The Politics of Corporate Security and the Translation of National Security. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. K. Walby and Randy K. Lippert, 78–96. London: Palgrave Macmillan.

    Google Scholar 

  • Pickering, Sharon. 2004. The Production of Sovereignty and the Rise of Transversal Policing: People Smuggling and Federal Policing. Australian & New Zealand Journal of Criminology 37(3): 362–379.

    Article  Google Scholar 

  • Pickering, Sharon, and Jude McCulloch. 2010. The Haneef Case and Counter-Terrorism Policing in Australia. Policing and Society 20(1): 21–38.

    Article  Google Scholar 

  • Potter, Evan, ed. 1998. Economic Intelligence and National Security. Ottawa: Carleton University Press.

    Google Scholar 

  • Powell, Rebecca, Leanne Weber, and Sharon Pickering. 2015. Every Death Counts: An Argument for Counting Deaths in Immigration Custody in the National Deaths in Custody Collection. Current Issues in Criminal Justice 27(1): 114–121.

    Google Scholar 

  • Roach, Kent. 2007. A Comparison of Australian and Canadian Anti-Terrorism Laws. UNSW Law Journal 30(1): 53–85.

    Google Scholar 

  • ———. 2011. Entrapment and Equality in Terrorism Prosecutions: A Comparative Examination of North American and European Approaches. Mississippi Law Journal 80(4): 1455–1490.

    Google Scholar 

  • ———. 2012a. Uneasy Neighbors: Comparative American and Canadian Counter-Terrorism. William Mitchell Law Review 38(5): 1701–1803.

    Google Scholar 

  • ———. 2012b. Counter-Terrorism In and Outside Canada and In and Outside the Anti-Terrorism Act. Review of Constitutional Studies 16(2): 243–264.

    Google Scholar 

  • ———. 2014. Be Careful What You Wish For? Terrorism Prosecutions in Post-9/11 Canada. Queen’s Law Journal 40(1): 99–140.

    Google Scholar 

  • Rubin, David, Kim Lynch, Jason Escaravage, and Hillary Lerner. 2014. Harnessing Data for National Security. SAIS Review of International Affairs 34(1): 121–128.

    Article  Google Scholar 

  • Schulhofer, Stephen J. 2002. The Enemy Within: Intelligence Gathering, Law Enforcement, and Civil Liberties in the Wake of September 11. New York: Century Foundation Press.

    Google Scholar 

  • Shafqat, Narmenn, and Ashraf Masood. 2016. Comparative Analysis of Various National Cyber Security Strategies. International Journal of Computer Science and Information Security 14(1): 129–136.

    Google Scholar 

  • Shearman, Peter, and Matthew Sussex. 2004. America and Europe After 9/11. In European Security After 9/11, eds. Peter Shearman and Matthew Sussex, 51–68. Aldershot: Ashgate.

    Google Scholar 

  • Skocpol, Theda, and Margaret Somers. 1980. The Uses of Comparative History in Macrosocial Inquiry. Comparative Studies in Society and History 22(2): 174–197.

    Article  Google Scholar 

  • Sloan, Elinor. 2010. Security and Defence in the Terrorist Era: Canada and the United States Homeland. 2nd ed. Montreal: McGill-Queen’s University Press.

    Google Scholar 

  • Tham, Joo-Cheong. 2004. Casualties of the Domestic ‘War on Terror’: A Review of Recent Counter-Terrorism Laws. Melbourne University Law Review 28(2): 512–531.

    Google Scholar 

  • Walby, Kevin, and Seantel Anaïs. 2012. Communications Security Establishment Canada (CSEC), Structures of Secrecy, and Ministerial Authorization After September 11. Canadian Journal of Law and Society 27(3): 363–380.

    Article  Google Scholar 

  • Walby, Kevin, and Randy K. Lippert. 2015. The Difference that Homeland Security Makes: Municipal Corporate Security in Canada and the United States Compared. Security Dialogue 46(3): 238–255.

    Article  Google Scholar 

  • Walby, Kevin, and Jeffrey Monaghan. 2011a. ‘Haitian Paradox’ or Dark Side of the Security-Development Nexus: Canada’s Role in the Securitization of Haiti, 2004–2009. Alternatives 36(4): 273–287.

    Article  Google Scholar 

  • ———. 2011b. Private Eyes and Public Order: Policing and Surveillance in the Suppression of Animal Rights Activists in Canada. Social Movement Studies 10(1): 21–37.

    Article  Google Scholar 

  • Warren, Ian. 2015. Surveillance, Criminal Law and Sovereignty. Surveillance and Society 13(2): 300–305.

    Article  Google Scholar 

  • Warren, Ian and Darren Palmer. 2015. Global Criminology. Pyrmont, NSW: Law Book Company/Thomson Reuters.

    Google Scholar 

  • Whitaker, Reginald. 2003. After 9/11: A Surveillance State? In Lost Liberties: Ashcroft and the Assault on Personal Freedom, ed. Cynthia Brown, 52–74. New York: New Press.

    Google Scholar 

  • ———. 2005. A Faustian Bargain? America and the Dream of ‘Total Information Awareness’. In The New Politics of Surveillance and Visibility, eds. Kevin Haggerty and Richard V. Ericson, 141–170. Toronto, ON: University of Toronto Press.

    Google Scholar 

  • Whitaker, Reginald, and Gary Marcuse. 1994. Cold War Canada: The Making of a National Insecurity State, 1945–1957. Toronto, ON: University of Toronto Press.

    Google Scholar 

  • Whitaker, Reginald, Gregory Kealey, and Andrew Parnaby. 2012. Secret Service: Political Policing in Canada From the Fenians to Fortress America. Toronto, ON: University of Toronto Press.

    Google Scholar 

  • The White House. 2001. U.S.–Canada Smart Border/30 Point Action Plan Update. https://2001-2009.state.gov/p/wha/rls/fs/18128.htm

  • Williams, Michael. 2011. The Continuing Evolution of Securitization Theory. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. T. Balzacq, 212–222. London: Routledge.

    Google Scholar 

  • Wright, Katie. 2009. Redefining Development for National Security: Implications for Civil Society. Development in Practice 19(6): 793–798.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 The Author(s)

About this chapter

Cite this chapter

Walby, K., Lippert, R.K., Warren, I., Palmer, D. (2016). Interrogating National Security, Surveillance, and Terror in Canada and Australia. In: Lippert, R., Walby, K., Warren, I., Palmer, D. (eds) National Security, Surveillance and Terror. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-43243-4_1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-43243-4_1

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-43242-7

  • Online ISBN: 978-3-319-43243-4

  • eBook Packages: Law and CriminologyLaw and Criminology (R0)

Publish with us

Policies and ethics