Publication Cover
Contemporary Justice Review
Issues in Criminal, Social, and Restorative Justice
Volume 20, 2017 - Issue 1
1,354
Views
21
CrossRef citations to date
0
Altmetric
Articles

Surveillance of environmental movements in Canada: critical infrastructure protection and the petro-security apparatus

&
Pages 51-70 | Received 10 Apr 2015, Accepted 19 Apr 2016, Published online: 09 Dec 2016

References

  • Amster, R. (2006). Perspectives on ecoterrorism: catalysts, conflations, and casualties. Contemporary Justice Review, 9, 287–301.10.1080/10282580600827991
  • Aradau, C. (2010). Security that matters: Critical infrastructure and objects of protection. Security Dialogue, 41, 491–514.10.1177/0967010610382687
  • Bajc, V. (2007). Surveillance in public rituals: Security meta-ritual and the 2005 U.S. presidential inauguration. American Behavioral Scientist, 50, 1648–1673.10.1177/0002764207302473
  • Bajc, V. (2013). Sociological reflections on security through surveillance. Sociological Forum, 28, 1–9.
  • BCCLA. (2014a). British Colombia Civil Liberties Association. Letter to Shayna Stawicki, Registrar, Security Intelligence Review Committee. February 6, 2014.
  • BCCLA. (2014b). British Colombia Civil Liberties Association. Letter to Ian McPhail, Chair, Commission for Public Complaints Against the RCMP. February 6, 2014.
  • Becker, H. (1963). Outsiders: Studies in the sociology of deviance. New York, NY: The Free Press.
  • Bigo, D. (2006). Internal and external aspects of security. European Security, 15, 385–404.10.1080/09662830701305831
  • Boykoff, J. (2007). Beyond bullets: The suppression of dissent in the United States. Oakland: AK Press.
  • Brodeur, J. P. (2010). The policing web. New York, NY: Oxford Press.10.1093/acprof:oso/9780199740598.001.0001
  • Canada. (2004a). Security an open society: Canada’s national security strategy. Ottawa: Government of Canada.
  • Canada. (2004b). Government of Canada position paper on a national strategy for critical infrastructure protection. Ottawa: Public Safety and Emergency Preparedness Canada.
  • Canada (2009a). National strategy for critical infrastructure. Ottawa: Government of Canada.
  • Canada (2009b). Action plan for critical infrastructure. Ottawa: Government of Canada.
  • CASE. (2006). Critical approaches to security in Europe: A networked manifesto. Security Dialogue, 37, 443–487.
  • Coaffee, J., Murakami-Wood, D., & Rogers, P. (2008). The everyday resilience of the city: How cities respond to terrorism and disaster. London: Palgrave.
  • Collier, S., & Lakoff, A. (2008). The vulnerability of vital systems: How critical infrastructure became a security problem. In Dunn Cavelty, M., & Kristensen, K. (Eds.), Securing the Homeland: Critical infrastructure, risk and securitisation (pp. 17–39). London: Routledge.
  • Comack, E. (2012). Racialized policing: Aboriginal people’s encounters with the police. Winnipeg: Fernwood Publishing.
  • Coward, M. (2009). Network-centric violence, critical infrastructure and the urbanization of security. Security Dialogue, 40, 399–418.10.1177/0967010609342879
  • Crosby, A., & Monaghan, J. (2012). Settler governmentality and the Algonquin of Barriere Lake. Security Dialogue, 43, 420–437.
  • Crosby, A., & Monaghan, J. (2016). Settler colonialism and the policing of idle no more. Social Justice, 43(2), 1–21.
  • Deibert, R., & Rohozinski, R. (2010). Risking security: Policies and paradoxes of cyberspace security. International Political Sociology, 4, 15–32.10.1111/ips.2010.4.issue-1
  • Dorn, N., & Levi, M. (2009). Private-public or public–private? Strategic dialogue on serious crime and terrorism in the EU. Security Journal, 22, 302–316.10.1057/palgrave.sj.8350086
  • Dunn Cavelty, M., & Suter, M. (2008). Early warning for critical infrastructure protection and the road to public-private information sharing. Intelligencia y Seguridad, 4, 85–113.
  • Ellefsen, Rune (2012). Green movements as threats to order and economy? Animal advocates repressed in Austria and beyond. In R. Ellefsen, R. Sollund, & G. Larsen (Eds.), Eco-global crimes: Contemporary problems and future challenges (pp. 181–208). Farnham: Ashgate.
  • Fernandez, L. (2008). Policing dissent: Social control and the anti-globalization movement. Chapel Hill: Rutgers University Press.
  • Gillham, P., Edwards, B., & Noakes, J. A. (2013). Strategic incapacitation and the policing of Occupy Wall Street protests in New York City, 2011. Policing and Society, 23, 81–102.10.1080/10439463.2012.727607
  • Godfrey, R., Brewis, J., Grady, J., & Grocott, C. (2014). The private military industry and neoliberal imperialism: Mapping the terrain. Organization, 21, 106–125.10.1177/1350508412470731
  • Harris, C. (2004). How did colonialism dispossess? Comments from an edge of empire. Annals of the Association of American Geographers, 94, 165–182.10.1111/j.1467-8306.2004.09401009.x
  • Howe, Miles (2015). Debriefing Elsipogtog: The anatomy of a struggle. Halifax: Fernwood.
  • Kinsman, G., Buse, D., & Steedman, M., (Eds.). (2000). Whose national security? Canadian state surveillance and the creation of enemies. Toronto: Between the Lines.
  • Kinsman, G., & Gentile, P. (2010). The Canadian war on queers: National security as sexual regulation. Vancouver: UBC Press.
  • Koski, C. (2011). Committed to protection? Partnerships in critical infrastructure protection. Journal of Homeland Security and Emergency Management, 8, 1–19.
  • Kulchyski, P. (2013). Aboriginal rights are not human rights. In defence of indigenous struggles. Winnipeg: ARP Books.
  • Lentzos, F., & Rose, N. (2009). Governing insecurity: Contingency planning, protection, resilience. Economy and Society, 38, 230–254.10.1080/03085140902786611
  • Lipschutz, R. (2008). Imperial warfare in the naked city—Sociality as critical infrastructure. International Political Sociology, 2, 204–218.10.1111/ips.2008.2.issue-3
  • Lubbers, E. (2012). Secret manoeuvres in the dark corporate and police spying on activists. London: Pluto Press.
  • Lundborg, T., & Vaughan-Williams, N. (2011). Resilience, critical infrastructure, and molecular security: The excess of “life” in biopolitics. International Political Sociology, 5, 367–383.10.1111/ips.2011.5.issue-4
  • McCreary, T., & R. Milligan. (2014). Pipelines, permits, and protests: Carrier Sekani encounters with the Enbridge Northern Gateway Project. Cultural Geographies, 21, 115–129.10.1177/1474474013482807
  • McDiarmid, M. (2014). Environmentalists shift focus to more grassroots, less government. CBC News. October 3.
  • Mitchell, D., & Heynen, N. (2009). The geography of survival and the right to the city: Speculations on surveillance, legal innovation, and the criminalization of intervention. Urban Geography, 30, 611–632.10.2747/0272-3638.30.6.611
  • Monahan, T., & Palmer, N. (2009). The emerging politics of DHS fusion centers. Security Dialogue, 40, 617–636.10.1177/0967010609350314
  • Monbiot, G. (2006). Heat: How to stop the planet from burning. Toronto: Doubleday Canada.
  • Mueller, J. (2006). Overblown: How politicians and the terrorism industry inflate national security threats, and why we believe them. New York, NY: Free Press.
  • Newbold, K., Jr, & Delp, B. (2011). Critical infrastructure protection program: A case study on higher education collaboration in homeland security. The Homeland Security Review, 5, 193–212.
  • Nikiforuk, A. (2001). Saboteurs: Weibo Ludwig’s war against big oil. Toronto: Macfarlane Walter and Ross.
  • O’Reilly, C. (2010). The transnational security consultancy industry: A case of state-corporate symbiosis. Theoretical Criminology, 14, 183–210.10.1177/1362480609355702
  • Palmer, D., & Whelan, C. (2006). Counter‐terrorism across the Policing Continuum. Police Practice and Research, 7, 449–465.10.1080/15614260601076082
  • Potter, W. (2011). Green is the New Red: An insider’s account of a social movement under siege. San Francisco: City Lights.
  • Pynnöniemi, K., & Busygina, I. (2013). Critical infrastructure protection and Russia's hybrid regime. European Security, 22, 559–575.10.1080/09662839.2013.809338
  • Quigley, K. (2013). “Man plans, God laughs”: Canada's national strategy for protecting critical infrastructure. Canadian Public Administration, 56, 142–164.10.1111/capa.2013.56.issue-1
  • Sjostedt, R. (2013). Ideas, identities and internalization: Explaining securitizing moves. Cooperation and Conflict, 48, 143–164.10.1177/0010836712445023
  • Stake, R. (1995). The art of case study research. Thousand Oaks: Sage.
  • Thobani, S. (2007). Exalted subjects. Toronto: University of Toronto Press.
  • Walby, K., & Monaghan, J. (2011). Private eyes and public order: Policing and surveillance in the suppression on animal rights activists in Canada. Social Movement Studies, 10, 21–37.10.1177/0010836712445023
  • Whitaker, R., & Marcuse, H. (1994). Cold war Canada: The making of a national insecurity state, 1945–1954. Toronto: University of Toronto Press.

Access to Information Act Requests

  • CSIS (Canadian Security Intelligence Service). 2009-143. Access to information Act request.
  • NRCan (Natural Resources Canada). 7040-12-214. Access to information Act request.
  • NRCan (Natural Resources Canada). 7040-13-094. Access to information Act request.
  • PSC (Public Safety Canada). 2009-00280. Access to information Act request.
  • RCMP (Royal Canadian Mounted Police). A008499. Access to information Act request.
  • RCMP (Royal Canadian Mounted Police). A008929. Access to information Act request.
  • RCMP (Royal Canadian Mounted Police). 2013-05745. Access to information Act request.
  • RCMP (Royal Canadian Mounted Police). 2013-013180. Access to information Act request.
  • RCMP (Royal Canadian Mounted Police). 2012-016333. Access to information Act request.
  • RCMP (Royal Canadian Mounted Police). 2011-016328. Access to information Act request.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.