Abstract
National security and corporate security are typically conceptualised as distinct realms of inquiry and practice. This chapter explores how these two security domains are increasingly fused in Canada at the federal level. We draw on freedom of information data regarding six national departments, usually associated with maintaining national security. The overlap between these realms is not limited to national security ‘responsibilising’ or activating private corporations to gather information; nor is it exclusively about corporate security agents providing services for national security initiatives through outsourced arrangements. Instead the overlap is primarily in the organisation of these departments. We conclude by outlining why there should be greater dialogue between scholars studying national and corporate security in Canada, Australia, and beyond.
Similar content being viewed by others
Notes
- 1.
Barrick Gold corporate security units conduct security risk assessments on local communities and other entities construed as threats. They take steps to manage risks. They set up perimeters, key card access points, surveillance cameras, and physical and technology security features at their mining sites and offices. They establish control rooms to coordinate these practices. Corporate security units respond to what they call critical incidents including fraud, theft, bomb threats, and attempted robberies. They also investigate and monitor employees (Barrick Gold Corporation 2012).
- 2.
We also encountered barriers during data collection. We submitted similar requests to numerous federal government departments, including the Department of National Defence and the Royal Canadian Mounted Police. The former’s ATI Coordinator stalled the request claiming the Department of National Defence did not have a corporate security unit. We engaged in several tense conversations with the ATI Coordinator, noting that all federal government agencies that received the same request had so far indicated they had such a unit and would comply. Yet this ATI Coordinator continued to insist the Department of National Defence had no such corporate security unit, and indicated he wanted to close the file. We then located open source material, including policy and budget documents, on the Department of National Defence website that pointed to the existence of their corporate security unit. Upon receiving this material, the ATI Coordinator then chose an unusual course of action by asking us to contact a member of the corporate security unit to clarify search parameters. The unit representative then indicated the requested information was not formatted to fit the parameters of the search as per the original wording, and so asked for drastic alteration of the request. We complied and the representative eventually released some files outside of the ATI process but had effectively responded to the request in a way that was neither open nor forthcoming, and had disclosed information in a format ill-suited to our interests. These data from the Department of National Defence are incomplete, so we have not analysed them for this chapter. The Royal Canadian Mounted Police eventually released material but it was mostly redacted and exempted and so was not included in our analysis either.
- 3.
These data resulted from the following access to information requests (by ATI reference number): National Defence A-2013-01210; Foreign Affairs, Trade and Development Canada A-2013-01918; Canada Border Services Agency A-2013-09431; Correctional Service Canada A-2013-00369; Correctional Service Canada A-2013-00372; Environment Canada A-2014-00076; Royal Canadian Mounted Police A-2013-05815; Government of Canada Privy Council Office A-2014-00037. These are referenced in text by Department acronym. For additional information, please contact Kevin Walby.
References
Barrick Gold Corporation. 2012. Security Management System. Toronto.
Bell, Colleen. 2006. Surveillance Strategies and Populations of Risk: Biopolitical Governance in Canada’s National Security Policy. Security Dialogue 37(2): 147–165.
Bigo, Didier. 2002. Security and Immigration: Toward a Critique of the Governmentality of the Unease. Alternatives 27(1): 63–92.
Borodzicz, Edward P., and Stevyn Gibson. 2006. Corporate Security Education: Towards Meeting the Challenge. Security Journal 19(3): 180–195.
Brooks, David. 2013. Corporate Security: Using Knowledge Categorization to Define a Practicing Body of Knowledge. Asian Journal of Criminology 8(2): 89–101.
Button, Mark, and Bruce George. 1994. Why Some Organizations Prefer In-House to Contract Security Staff. In Crime at Work: Studies in Security and Crime Prevention, ed. Martin Gill, 201–213. Leicester: Perpetuity Press.
Cohen, Andrew. 1995. Canada in the World: The Return of the National Interest. Behind the Headlines 52(4): 1–16.
Dalton, Dennis R. 2003. Rethinking Corporate Security in the Post 9/11 Era: Issues and Strategies for Today’s Global Business Community. New York: Butterworth Heinemann.
de Larrinaga, M., and M. Salter. 2014. Cold CASE: A Manifesto for Canadian Critical Security Studies. Critical Studies on Security 2(1): 1–19.
Dupont, Benoît. 2014. Private Security Regimes: Conceptualizing the Forces that Shape the Private Delivery of Security. Theoretical Criminology 18(3): 263–281.
Dupont, Benoît, and Jennifer Wood. 2006. Conclusion: The Future of Democracy. In Democracy, Society and the Governance of Security, eds. Jennifer Wood and Benoît Dupont, 241–248. Cambridge: Cambridge University Press.
Forcese, Craig, and Kent Roach. 2015. Bill C-51 Moves Us One Step Closer to the End of Privacy. Toronto Star, February 17.
Giddens, Anthony. 1987. The Nation-State and Violence. London: Polity.
Gill, M., and C. Howell. 2014. Policing Organizations: The Role of the Corporate Security Function and the Implication for Suppliers. International Journal of Police Science and Management 16(1): 65–75.
Haggerty, Kevin D., and Richard V. Ericson. 2006. The New Politics of Surveillance and Visibility. In The New Politics of Surveillance and Visibility, eds. Kevin D. Haggerty and Richard V. Ericson, 3–25. Toronto: University of Toronto Press.
Heide, R. L., T. Grant, C. Ankersen, D. Roy, and J. Boileu. 2005. Defining the National Interest: New Directions for Canadian Foreign Policy. Centre for Security and Defense Studies: Carleton University. Conference Report.
Joshi, James B.D., Arif Ghafoor, and Walid G. Aref. 2002. Security and Privacy Challenges of a Digital Government. In Advances in Digital Government: Technology, Human Factors, and Policy, eds. William J. McIver and Ahmed K. Elmagarmid, 121–136. Boston: Kluwer Academic Publishers.
Lippert, Randy K., and Kevin Walby. 2012. Municipal Corporate Security and the Intensification of Urban Surveillance. Surveillance & Society 9(2): 310–320.
———. 2014. Municipal Corporate Security, Legal Knowledges, and the Urban Problem Space. Law and Social Inquiry 39(3): 720–739.
———. 2016. Governing Through Privacy: Authoritarian Liberalism, Law, and Privacy Knowledge. Law, Culture and the Humanities 12(2): 329–352.
Lippert, Randy K., Kevin Walby, and Rhys Steckle. 2013. Multiplicities of Corporate Security: Identifying Emerging Types and Trends. Security Journal 26(3): 206–221.
Loader, Ian, and Neil Walker. 2007. Civilizing Society. Cambridge, UK: Cambridge University Press.
Loukidelis, David. 2004. Identity, Privacy, Security: Can Technology Really Reconcile Them? Address by Privacy Commissioner of British Columbia, Victoria. www.oipc.bc.ca.
Lustgarten, Laurence, and Ian Leigh. 1994. In from the Cold: National Security and Parliamentary Democracy. Oxford: Clarendon Press.
McDonald, Seonaidh. 2005. Studying Actions in Context: A Qualitative Shadowing Method for Organizational Research. Qualitative Research 5(4): 455–473.
Meerts, Clarissa. 2014. Corporate Security: Governing through Private and Public Law. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 97–115. Houndmills: Palgrave Macmillan.
Monaghan, Jeffrey, and Kevin Walby. 2012. Making Up ‘Terror Identities’: Security intelligence, Canada’s Integrated Threat Assessment Centre and Social Movement Suppression. Policing & Society 22(2): 133–151.
Monahan, Torin, and Neal Palmer. 2009. The Emerging Politics of DHS Fusion Centers. Security Dialogue 40(6): 617–636.
Nalla, Mahesh, and Merry Morash. 2002. Assessing the Scope of Corporate Security: Common Practices and Relationships with Other Business Functions. Security Journal 15(3): 7–19.
Pearson, Geoffrey. 1988. CIIPS Working Paper #11—International Security and Canadian Interests: Report of a Working Group. Canadian Institute for International Peace and Security. Ottawa, Canada.
Petersen, Karen Lund. 2013. The Corporate Security Professional: A Hybrid Agent Between Corporate and National Security. Security Journal 26(3): 222–235.
———. 2014. The Politics of Corporate Security and the Translation of National Security. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 78–96. Houndsmills: Palgrave Macmillan.
Pozen, David E. 2005. The Mosaic Theory, National Security, and Freedom of Information Act. The Yale Law Journal 115(3): 628–679.
——— 2010. Deep Secrecy. The Stanford Law Review 62: 257–340.
Privy Council Office (PCO). 2004. Securing an Open Society: Canada’s National Security Policy. Ottawa: National Library of Canada.
Roy, Jeffrey. 2013. From Machinery to Mobility: Government and Democracy in a Participative Age. New York: Springer.
———. 2014. Secrecy, Security and Digital Literacy in an Era of Meta-Data: Why the Canadian Westminster Model Falls Short. Intelligence and National Security 31: 1–23.
Strauss, Anselm. 1987. Qualitative Analysis for Social Scientists. Cambridge: Cambridge University Press.
Tootell, Holly. 2006. The Application of Critical Social Theory to National Security Research. Prometheus 24(4): 405–411.
Walby, Kevin, and Mike Larsen. 2012a. Access to Information and Freedom of Information Requests: Neglected Means of Data Production in the Social Sciences. Qualitative Inquiry 18(1): 31–42.
———. 2012b. Getting at the Live Archive: On Access to Information Research in Canada. Canadian Journal of Law and Society 27(1): 623–634.
Walby, Kevin, and Randy K. Lippert. 2012. The New Keys to the City: Uploading Corporate Security and Threat Discourse into Canadian Municipal Governments. Crime, Law and Social Change 58(4): 437–455.
Walby, K., and R. Lippert. 2015a. Ford First? Corporate Security and the US Department of War’s Plant Protection Service’s Interior Organization Unit 1917–1918. Labor History 56(2): 117–135.
———. 2015b. Municipal Corporate Security in International Context. London: Routledge.
Walby, Kevin, and Jeffrey Monaghan. 2010. Policing Proliferation: On the Militarization of Police and Atomic Energy Canada Limited’s Nuclear Response Forces. Canadian Journal of Criminology and Criminal Justice 52(2): 117–145.
———. 2011. Private Eyes and Public Order: Policing and Surveillance in the Suppression of Animal Rights Activists in Canada. Social Movement Studies 10(1): 21–37.
Walby, Kevin, Alex Luscombe, and Randy K. Lippert. 2014. Expertise and the Professionalization of Municipal Corporate Security in Canadian Cities. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 116–133. Houndsmills: Palgrave Macmillan.
Walker, Diane, and Florence Myrick. 2006. Grounded Theory: An Exploration of Process and Procedure. Qualitative Health Research 16(4): 547–559.
Walsh, Patrick, and Seumas Miller. 2015. Rethinking ‘Five Eyes’ Security: Intelligence Collection Policies and Practice Post Snowden. Intelligence and National Security 31: 1–24.
Weiss, Robert. 2014. Corporate Security at Ford Motor Company: From the Great War to the Cold War. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 17–38. Houndmills: Palgrave Macmillan.
White, Adam. 2012. The New Political Economy of Private Security. Theoretical Criminology 16(1): 85–101.
Williams, James. 2014. The Private Eyes of Corporate Culture: The Forensic Accounting and Corporate Investigation Industry and the Production of Corporate Financial Security. In Corporate Security in the 21st Century: Theory and Practice in International Perspective, eds. Kevin Walby and Randy K. Lippert, 56–77. Houndmills: Palgrave Macmillan.
Interviews
Federal Corporate Security Manager. 2014.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 The Author(s)
About this chapter
Cite this chapter
Walby, K., Lippert, R.K., Gacek, J. (2016). Securitising ‘National Interests’: Canadian Federal Government Departments, Corporate Security Creep, and Security Regimes. In: Lippert, R., Walby, K., Warren, I., Palmer, D. (eds) National Security, Surveillance and Terror. Crime Prevention and Security Management. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-43243-4_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-43243-4_7
Published:
Publisher Name: Palgrave Macmillan, Cham
Print ISBN: 978-3-319-43242-7
Online ISBN: 978-3-319-43243-4
eBook Packages: Law and CriminologyLaw and Criminology (R0)