Normal view MARC view ISBD view

National Security, Surveillance and Terror : Canada and Australia in Comparative Perspective.

By: Lippert, Randy K.
Contributor(s): Walby, Kevin | Warren, Ian | Palmer, Darren.
Material type: TextTextSeries: eBooks on Demand.Crime Prevention and Security Management: Publisher: Cham : Springer International Publishing, 2016Copyright date: ©2016Description: 1 online resource (368 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9783319432434.Subject(s): Critical criminologyGenre/Form: Electronic books.Additional physical formats: Print version:: National Security, Surveillance and Terror : Canada and Australia in Comparative PerspectiveDDC classification: 355.03 LOC classification: HV6001-7220.5Online resources: Click here to view this ebook.
Contents:
Foreword -- Series Editor's Introduction -- Acknowledgements -- Contents -- Contributors -- List of Figures -- List of Tables -- 1: Interrogating National Security, Surveillance, and Terror in Canada and Australia -- Context -- Contributions -- Overview -- References -- Part I: Introduction: Thinking About National Security, Surveillance and Terror -- 2: One Warrant to Rule Them All: Reconsidering the Judicialisation of Extraterritorial Intelligence Collection -- Introduction -- CSIS's Security Intelligence Functions -- CSE's Foreign Intelligence and CSIS Assistance Mandate -- Legal Rights of Persons in Canada -- Conventional Domestic Spying -- Technological Development and the Blurring of Domestic and Foreign Spying -- Webbed Communication and Incidental Domestic Spying -- Pervasive Metadata as a New Source of Intelligence -- Legal Rights of Persons Outside of Canada -- The Hape Headache and the CSIS Aftermath -- A Legislative Solution that Fails to Fix -- Uncertain Legality and Applicability -- Extending the Charter Privacy Protections to Foreign Operations -- Using a Breach of International Law as the Trigger for a Warrant -- A Third Way -- A Pure Foreign Intelligence Organisation -- A Typology of Investigations -- Conclusion -- References -- Legislation -- Cases -- 3: Australian National Security Intelligence Collection Since 9/11: Policy and Legislative Challenges -- Introduction -- Policy and Legislative Landmarks -- The Howard Government (1996-2007) -- The Rudd/Gillard/Rudd Governments (2007-September 2013) -- The Abbott Government (September 2013-September 2015) -- An Overview of Canadian Policy and Counter-­Terrorism Legislation Since 9/11 -- Australian National Security Intelligence Challenges -- Conclusion -- References.
4: The Supreme Court of Canada Presents: The Surveillant Charter and the Judicial Creation of Police Powers in Canada -- Introduction: Creating Police Powers, the Canadian Judicial Way -- Theorising Surveillance, the State, and the Charter -- Threshold Issues -- Degrees of Privacy Protection and the Sliding Scale -- Common Law Expansion -- Empirical Estimations -- A Charter of Surveillance -- The Ripening of Surveillance -- References -- Legislation -- Cases -- 5: Assemblage, Counter-Law and the Legal Architecture of Australian Covert Surveillance -- Introduction -- Historical Perspectives on Australian Surveillance Law -- General 'Surveillance' Law Landscape -- Telecommunications Surveillance -- Personal Surveillance -- Intrusive Covert Investigations -- Typologies of Investigative Regulation -- Authorisation Requirements -- Controlled Activity -- Immunities -- Prosecution Evidence -- Accountability Structures -- Theorising Principles of Governance -- Policy Discourses -- Investigations, Assemblage and Counter-Law -- References -- Part II: Introduction: Case Studies in Comparative Perspective -- 6: The Australian Security Continuum: National and Corporate Security Gaps from a Surveillance Language Perspective -- Introduction -- Surveillance and Its Role in the Pursuit of Security -- The Australian Security Continuum -- Understanding the Actors in the Security Surveillance Continuum -- National Security -- Corporate Security -- Private Security -- The Surveillance Language in the Security Continuum -- The Language of CCTV Surveillance -- Understanding the CCTV Surveillance Language Effect -- Australian Security Surveillance Gaps -- Conclusion -- References -- 7: Securitising 'National Interests': Canadian Federal Government Departments, Corporate Security Creep, and Security Regimes -- Corporate Security 'Creep'.
Corporate Security and National Security in Context -- Methodology -- Corporate Security Practices in Federal Government Agencies -- Department/Agency Cooperation and Corporate Security -- Corporate Security and Risk Management -- Discussion and Conclusion -- References -- Interviews -- 8: The 'Security of Security': Making Up the Australian Intelligence Community 1975-2015 -- Introduction -- Governmentality and Security -- 'Making Up' the Intelligence Community -- Flood Report (2004) -- Counter-Terrorism 2015 -- Conclusion -- References -- Legislation -- 9: Justifying Insecurity: Canada's Response to Terrorist Threat Circa 2015 -- Introduction -- The Legislative Context -- The Anti-Terrorism Act, 2001 -- Smart Border Declaration (2001) -- Canada, Iraq and Syria -- October 2014, Martin Rouleau-Couture and Michael Zehaf-Bibeau -- Post-MZB -- Enter Bill C-51, the Anti-Terrorism Act: January 2015 -- The Video -- Where to from Here? -- Conclusion -- References -- Part III: Introduction: National Security, Surveillance and Terror: Issues and Dilemmas -- 10: Unmanned Aerial Vehicles (UAVs) and Law Enforcement in Australia and Canada: Governance Through 'Privacy' in an Era of Counter-Law? -- Introduction -- "Counter-Law", Rule with Law, and Privacy -- UAV Surveillance in Law Enforcement -- Framing the Surveillance Ramifications of UAV Use in Law Enforcement -- Governance and Regulatory Landscapes in Australia and Canada -- UAVs and Law Enforcement in Australia -- Authorising Law Enforcement Use of UAV Surveillance -- Australian Privacy Law as "Rule with Law" and UAV Surveillance -- UAVs and Law Enforcement in Canada -- Authorising Law Enforcement Use of UAV Surveillance -- UAV Regulation and the Courts -- Conclusion: What's Left of Privacy in an Era of Counter-Law? -- References -- Legislation -- Cases.
11: The Canada-US Shiprider Programme, Jurisdiction and the Crime-Security Nexus -- Introduction -- Shiprider and the Reconfiguration of Territorial Jurisdiction in the Maritime Environment -- Background -- Shiprider and the Crime-Security Nexus -- Beyond Bi-National Parameters: Shiprider Patrols in Akwesasne Mohawk Territory -- Whither Sovereignty? -- 'There Is No Border' -- Conclusion -- References -- Interviews -- Film -- Legislation and Case Law -- 12: Intelligence and National Security: Australian Dilemmas Post-9/11 -- Introduction -- Intelligence and National Security: Australian Dilemmas -- The Evolution of Australian Intelligence -- The Evolution of Australian Security -- 9/11, Bali and the Transformation of National Security Architecture -- Intelligence Resourcing and the Changing Nature of Terrorism Post-2001 -- The AIC's Response to Global Jihadism -- Law, Freedom and Counter-Terror: A Misconceived Debate -- The Flood Report and Its Aftermath: The Continuing Problem of AIC Coordination -- Conclusion -- References -- 13: The Day the Border Died? The Canadian Border as Checkpoint in an Age of Hemispheric Security and Surveillance -- Globalisation, Security, Borders -- Beyond the Border: Surveillance and Theatres of Insecurity -- Checkpoints, Risks, Desert(ed) Borders -- (Dis)appearance of the Canada-US Border and the Biopolitical Checkpoint -- Conclusions -- References -- 14: Surveillance and the Colonial Dream: Canada's Surveillance of Indigenous Self-­Determination -- The 'Colonial Dream': Surveillance as a Mode of Colonial Governance -- The Colonial Regulation of Productive Practice -- Colonial Emergency -- (Re)Defining Risks to the Settler State: Emergency Management Paradigm of National Security -- Object of Security: Critical Infrastructure -- Key Actors in the Contemporary "Critical Infrastructure" Surveillance Assemblage.
The Law Enforcement-Security Actors -- CSIS and the Integrated Terrorism Assessment Centre -- RCMP: The Aboriginal JIG and the Critical Infrastructure Intelligence Team -- Front-Line Policing: The 'Eyes and Ears' of Surveillance -- Emergency Management Actors -- AANDC: The Indian Agent 2.0 -- Government Operations Centre -- Conclusions -- References -- Index.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Call number URL Status Date due Barcode
Electronic Book UT Tyler Online
Online
HV6001-7220.5 (Browse shelf) http://ebookcentral.proquest.com/lib/uttyler/detail.action?docID=4756435 Available EBC4756435

Foreword -- Series Editor's Introduction -- Acknowledgements -- Contents -- Contributors -- List of Figures -- List of Tables -- 1: Interrogating National Security, Surveillance, and Terror in Canada and Australia -- Context -- Contributions -- Overview -- References -- Part I: Introduction: Thinking About National Security, Surveillance and Terror -- 2: One Warrant to Rule Them All: Reconsidering the Judicialisation of Extraterritorial Intelligence Collection -- Introduction -- CSIS's Security Intelligence Functions -- CSE's Foreign Intelligence and CSIS Assistance Mandate -- Legal Rights of Persons in Canada -- Conventional Domestic Spying -- Technological Development and the Blurring of Domestic and Foreign Spying -- Webbed Communication and Incidental Domestic Spying -- Pervasive Metadata as a New Source of Intelligence -- Legal Rights of Persons Outside of Canada -- The Hape Headache and the CSIS Aftermath -- A Legislative Solution that Fails to Fix -- Uncertain Legality and Applicability -- Extending the Charter Privacy Protections to Foreign Operations -- Using a Breach of International Law as the Trigger for a Warrant -- A Third Way -- A Pure Foreign Intelligence Organisation -- A Typology of Investigations -- Conclusion -- References -- Legislation -- Cases -- 3: Australian National Security Intelligence Collection Since 9/11: Policy and Legislative Challenges -- Introduction -- Policy and Legislative Landmarks -- The Howard Government (1996-2007) -- The Rudd/Gillard/Rudd Governments (2007-September 2013) -- The Abbott Government (September 2013-September 2015) -- An Overview of Canadian Policy and Counter-­Terrorism Legislation Since 9/11 -- Australian National Security Intelligence Challenges -- Conclusion -- References.

4: The Supreme Court of Canada Presents: The Surveillant Charter and the Judicial Creation of Police Powers in Canada -- Introduction: Creating Police Powers, the Canadian Judicial Way -- Theorising Surveillance, the State, and the Charter -- Threshold Issues -- Degrees of Privacy Protection and the Sliding Scale -- Common Law Expansion -- Empirical Estimations -- A Charter of Surveillance -- The Ripening of Surveillance -- References -- Legislation -- Cases -- 5: Assemblage, Counter-Law and the Legal Architecture of Australian Covert Surveillance -- Introduction -- Historical Perspectives on Australian Surveillance Law -- General 'Surveillance' Law Landscape -- Telecommunications Surveillance -- Personal Surveillance -- Intrusive Covert Investigations -- Typologies of Investigative Regulation -- Authorisation Requirements -- Controlled Activity -- Immunities -- Prosecution Evidence -- Accountability Structures -- Theorising Principles of Governance -- Policy Discourses -- Investigations, Assemblage and Counter-Law -- References -- Part II: Introduction: Case Studies in Comparative Perspective -- 6: The Australian Security Continuum: National and Corporate Security Gaps from a Surveillance Language Perspective -- Introduction -- Surveillance and Its Role in the Pursuit of Security -- The Australian Security Continuum -- Understanding the Actors in the Security Surveillance Continuum -- National Security -- Corporate Security -- Private Security -- The Surveillance Language in the Security Continuum -- The Language of CCTV Surveillance -- Understanding the CCTV Surveillance Language Effect -- Australian Security Surveillance Gaps -- Conclusion -- References -- 7: Securitising 'National Interests': Canadian Federal Government Departments, Corporate Security Creep, and Security Regimes -- Corporate Security 'Creep'.

Corporate Security and National Security in Context -- Methodology -- Corporate Security Practices in Federal Government Agencies -- Department/Agency Cooperation and Corporate Security -- Corporate Security and Risk Management -- Discussion and Conclusion -- References -- Interviews -- 8: The 'Security of Security': Making Up the Australian Intelligence Community 1975-2015 -- Introduction -- Governmentality and Security -- 'Making Up' the Intelligence Community -- Flood Report (2004) -- Counter-Terrorism 2015 -- Conclusion -- References -- Legislation -- 9: Justifying Insecurity: Canada's Response to Terrorist Threat Circa 2015 -- Introduction -- The Legislative Context -- The Anti-Terrorism Act, 2001 -- Smart Border Declaration (2001) -- Canada, Iraq and Syria -- October 2014, Martin Rouleau-Couture and Michael Zehaf-Bibeau -- Post-MZB -- Enter Bill C-51, the Anti-Terrorism Act: January 2015 -- The Video -- Where to from Here? -- Conclusion -- References -- Part III: Introduction: National Security, Surveillance and Terror: Issues and Dilemmas -- 10: Unmanned Aerial Vehicles (UAVs) and Law Enforcement in Australia and Canada: Governance Through 'Privacy' in an Era of Counter-Law? -- Introduction -- "Counter-Law", Rule with Law, and Privacy -- UAV Surveillance in Law Enforcement -- Framing the Surveillance Ramifications of UAV Use in Law Enforcement -- Governance and Regulatory Landscapes in Australia and Canada -- UAVs and Law Enforcement in Australia -- Authorising Law Enforcement Use of UAV Surveillance -- Australian Privacy Law as "Rule with Law" and UAV Surveillance -- UAVs and Law Enforcement in Canada -- Authorising Law Enforcement Use of UAV Surveillance -- UAV Regulation and the Courts -- Conclusion: What's Left of Privacy in an Era of Counter-Law? -- References -- Legislation -- Cases.

11: The Canada-US Shiprider Programme, Jurisdiction and the Crime-Security Nexus -- Introduction -- Shiprider and the Reconfiguration of Territorial Jurisdiction in the Maritime Environment -- Background -- Shiprider and the Crime-Security Nexus -- Beyond Bi-National Parameters: Shiprider Patrols in Akwesasne Mohawk Territory -- Whither Sovereignty? -- 'There Is No Border' -- Conclusion -- References -- Interviews -- Film -- Legislation and Case Law -- 12: Intelligence and National Security: Australian Dilemmas Post-9/11 -- Introduction -- Intelligence and National Security: Australian Dilemmas -- The Evolution of Australian Intelligence -- The Evolution of Australian Security -- 9/11, Bali and the Transformation of National Security Architecture -- Intelligence Resourcing and the Changing Nature of Terrorism Post-2001 -- The AIC's Response to Global Jihadism -- Law, Freedom and Counter-Terror: A Misconceived Debate -- The Flood Report and Its Aftermath: The Continuing Problem of AIC Coordination -- Conclusion -- References -- 13: The Day the Border Died? The Canadian Border as Checkpoint in an Age of Hemispheric Security and Surveillance -- Globalisation, Security, Borders -- Beyond the Border: Surveillance and Theatres of Insecurity -- Checkpoints, Risks, Desert(ed) Borders -- (Dis)appearance of the Canada-US Border and the Biopolitical Checkpoint -- Conclusions -- References -- 14: Surveillance and the Colonial Dream: Canada's Surveillance of Indigenous Self-­Determination -- The 'Colonial Dream': Surveillance as a Mode of Colonial Governance -- The Colonial Regulation of Productive Practice -- Colonial Emergency -- (Re)Defining Risks to the Settler State: Emergency Management Paradigm of National Security -- Object of Security: Critical Infrastructure -- Key Actors in the Contemporary "Critical Infrastructure" Surveillance Assemblage.

The Law Enforcement-Security Actors -- CSIS and the Integrated Terrorism Assessment Centre -- RCMP: The Aboriginal JIG and the Critical Infrastructure Intelligence Team -- Front-Line Policing: The 'Eyes and Ears' of Surveillance -- Emergency Management Actors -- AANDC: The Indian Agent 2.0 -- Government Operations Centre -- Conclusions -- References -- Index.

Description based on publisher supplied metadata and other sources.

Author notes provided by Syndetics

<p>Randy K. Lippert is Professor of Criminology at the University of Windsor, Canada, specializing in policing, security and urban governance. </p> <p>Kevin Walby is Chancellor's Research Chair and Associate Professor of Criminal Justice at the University of Winnipeg, Canada. </p> <p>Ian Warren is a Senior Lecturer in Criminology at Deakin University, Australia, specializing in international and comparative justice, surveillance and comparative law. </p> <p>Darren Palmer is Associate Professor in Criminology at Deakin University, Australia, with interests in policing, security and surveillance.</p> <p> </p> <br>

There are no comments for this item.

Log in to your account to post a comment.