1,752
Views
35
CrossRef citations to date
0
Altmetric
Original Articles

Not Just Joining the Dots But Crossing the Borders and Bridging the Voids: Constructing Security Networks after 11 September 2001Footnote

Pages 27-49 | Published online: 20 Aug 2006

References

  • Aldrich , R.J. 2004 . “Transatlantic intelligence and security cooperation” . International Affairs , 80 ( 4 ) : 731 – 753 .
  • Andrew , C. & Dilks , D. (eds) (1984) , The Missing Dimension: Governments and Intelligence Communities in the Twentieth Century , Macmillan , Basingstoke .
  • Bayley , D.H. & Shearing , C.D. (2001) , The New Structure of Policing: Description. Conceptualization, and Research Agenda , National Institute of Justice research report 187083 , Washington : Department of Justice , Available online at www.ojp.usdoj.gov/nij (accessed 10 January 2005) .
  • Bichard (2004) , Bichard Inquiry Report , HC653. Available online at www.bichardinquiry.org.uk (accessed 22 June 2004) .
  • Bigo , D. 2000 . “ Liaison officers in Europe: New officers in the European security field ” . In Issues in Transnational Policing , Edited by: Sheptycki , J. London : Routledge .
  • Block , A. (ed.) (1992) , “Issues and theories on covert policing” , special issue , Crime, Law and Social Change , Vol. 18 , September , pp. 1 – 2 .
  • Born , H. , Johnson , L. and Leigh , I. 2005 . Who's Watching the Spies? Establishing Intelligence Service Accountability , Dulles, Virginia : Potomac Books .
  • Bozeman , A. (1992) , Knowledge and comparative method in comparative intelligence studies , in: Bozeman , A. Strategic Intelligence and Statecraft , Brassey's , Washington DC .
  • Brodeur , J.-P. 2005 . “ Cops and spooks: The uneasy partnership ” . In Policing: Key Readings , Edited by: Newburn , T. Cullompton : Willan .
  • Button , M. 2002 . Private Policing , Cullompton : Willan .
  • Buzan , B , Wæver , O. and de Wilde , J. 1998 . Security: A New Framework for Analysis , London : Lynne Reiner .
  • Caparini , M . & Schreier , F . (2005) , Privatising Security: Law, Practice and Governance of Private Military and Security Companies , Occasional Paper, DCAF, Geneva, available online http://www.dcaf.ch/publications/occasional.cfm?navl = 4&nav2 = 3 (accessed 8 November 2005) .
  • Carter , D. (2004), Law Enforcement Intelligence: A Guide for State, Local, and Tribal Law Enforcement Agencies , Michigan State University and US Department of Justice Office of Community Oriented Policing Services . Available online at www.fas.org (accessed 10 January, 2005) .
  • Castells , M. 2000 . The Rise of the Network Society , 2nd edn , Oxford : Blackwell .
  • “City Sets March 30 Showdown Over Joint Terrorism Task Force” , Portland Communique (2005) , 23 March .
  • Cory (2004) , Cory Collusion Inquiry Report: Patrick Finucane , HC470 , The Stationery Office , London .
  • Dandeker , C. 1990 . Surveillance, Power and Modernity: Bureaucracy and Discipline from 1700 to the Present Day , Cambridge : Polity Press .
  • DCAF Intelligence Working Group (2003) , Intelligence Practice and Democratic Oversight—A Practitioner's View , DCAF , Geneva .
  • Deibert , R.J. 2003 . “Deep Probe: the evolution of network intelligence” . Intelligence and National Security , 18 ( 4 ) : 175 – 193 .
  • der Derian , J. 1992 . Antidiplomacy , Oxford : Blackwell .
  • Dorn , N. 2003 . “ Proteiform criminalities: The formation of organised crime as organisers’ responses to developments in four fields of control ” . In Transnational Organised Crime: Perspectives on Global Security , Edited by: Edwards , A. and Gill , P. London : Routledge .
  • Dowding , K. 1995 . “Model or metaphor? A critical review of the policy network approach” . Political Studies , 43 ( 1 ) : 136 – 158 .
  • Flood , B. 2004 . “Strategic Aspects of the UK National Intelligence Model” . In Strategic Thinking in Criminal Intelligence , Edited by: Ratcliffe , J.H. 37 – 52 . Sydney : Federation Press .
  • Foucault , M. 1991 . “ Governmentality ” . In The Foucault Effect: Studies in Governmentality , Edited by: Burchell , G. London : Harvester Wheatsheaf .
  • Frances , J. , Levačić , R. , Mitchell , J. and Thompson , G. 1991 . “Introduction” . In Markets, Hierarchies and Networks: The Co-Ordination of Social Life , Edited by: Thompson , G. , Frances , J. , Levačić , R. and Mitchell , J. London : Sage .
  • Giddens , A. 1985 . The Nation State and Violence , Berkeley : University of California Press .
  • Gill , P. 2000 . Rounding Up the Usual Suspects? Developments in Contemporary Law Enforcement Intelligence , Aldershot : Ashgate .
  • Gill , P. 2004 . “Securing the globe: Intelligence and the post-9/11 shift from ‘liddism’ to ‘drainism’” . Intelligence and National Security , 19 ( 3 ) : 467 – 489 .
  • Gill , P. (2004/05) , “Policing In Ignorance?” , Criminal Justice Matters , Vol. 58 , Winter , pp. 14 – 15 .
  • Gimenez-Salinas , A. 2004 . “New approaches regarding private/public security” . Policing and Society , 14 ( 2 ) : 158 – 174 .
  • Greenberg , K.J . & Dratel , J.L . (2005) , The Torture Papers: The Road to Abu Ghraib , Cambridge University Press , New York .
  • Grieve , J. 2004 . “Development in UK criminal intelligence” . In Strategic Thinking in Criminal Intelligence , Edited by: Ratcliffe , J.H. 25 – 36 . Sydney : Federation Press .
  • Haggerty , K. and Ericson , R. 1999 . “The militarization of policing in the information age” . Journal of Political and Military Sociology , 27 : 233 – 255 .
  • Hillyard , P. and Gordon , D. 1999 . “Arresting statistics: the drift to informal justice in England and Wales” . Journal of Law and Society , 26 ( 4 ) : 502 – 522 .
  • Hoare , O. (ed.) (2002) , British Intelligence in the Twentieth Century: A Missing Dimension? Special Issue, Intelligence and National Security, Vol. 17, no. 1.
  • Home Office (2004) , “Leading the fight against organised crime: Key SOCA appointments announced” , Ref: 274/2004, 13 August .
  • Home Office (2005a) , “Bichard inquiry—implementation of recommendations” . Available online at www.homeoffice.gov.uk/docs4/bichard_statement.html (accessed 20 January 2005) .
  • Home Office (2005b) , Prevention of Terrorism Bill, Background Briefing Papers , February .
  • Hughes , G. 2000 . “ Communitarianism and law and order ” . In Perspectives on Crime Reduction , Edited by: Hope , T. Dartmouth : Ashgate .
  • Hulnick , A.S. 1999 . Fixing the Spy Machine: Preparing American Intelligence for the Twenty-First Century , London : Praeger .
  • Intelligence and Security Committee (2003) , Annual Report 2002–2003 , HMSO, London Cm 5837. Available online at www.cabinet-office.gov.uk/intelligence (accessed 15 February 2005) .
  • Johnson , L. 2002 . Bombs, Bugs, Drugs, and Thugs: Intelligence and America's Quest for Security , New York : New York University Press .
  • Johnston , L. 1992 . The Rebirth of Private Policing , London : Routledge .
  • Johnston , L. 2000a . Policing Britain: Risk, Security and Governance , Harlow : Longman .
  • Johnston , L. 2000b . “ Transnational private policing: The impact of global commercial security ” . In Issues in Transnational Policing , Edited by: Sheptycki , J. London : Routledge .
  • Johnston , L. and Shearing , C. 2003 . Governing Security , London : Routledge .
  • Jones , T. and Newburn , T. 1998 . Private Security and Public Policing , Oxford : Clarendon Press .
  • Jordan , L.J . (2005) , “Homeland Security Faces Massive Overhaul” , San Francisco Chronicle , June 17 , 2005 .
  • Kickert , W. and Koppenjaan , J. 1997 . “ Public management and network management: An overview ” . In Managing Complex Networks: Strategies for the Public Sector , Edited by: Kickert , W. London : Sage .
  • Klerks , P. (2003) , The network paradigm applied to criminal organisations: theoretical nitpicking or a relevant doctrine for investigators? , in: Edwards , A. & Gill , P. , Transnational Organised Crime: Perspectives on Global Security , Routledge , London .
  • Knoke , D. and Kuklinski , J.H. 1991 . “ Network analysis: Some basic concepts ” . In Markets, Hierarchies and Networks: The Co-Ordination of Social Life , Edited by: Thompson , G. London : Sage .
  • Leishman , F. 1999 . “ Policing in Japan: East Asian archetype? ” . In Policing Across the World , Edited by: Mawby , R.I . London : UCL Press .
  • Lustgarten , L. and Leigh , I. 1994 . In From the Cold: National Security and Parliamentary Democracy , Oxford : Clarendon Press .
  • Lutterbeck , D. (2005) , “Blurring the line: The convergence of internal and external security in Western Europe” , Security Dialogue , Vol. 36 , no. 1 . Available at http://www.gcsp.ch/e/about/News/Faculty-articles/Academic-articles/index-Academic.htm (accessed 15 February 2005).
  • Lyon , D. 2003 . Surveillance after September 11 , Cambridge : Polity .
  • McGrew , T. (1992) , Conceptualizing global politics , in: McGrew , T. et al. , Global Politics , Polity , Cambridge .
  • Manning , P.K. 2000 . “ Policing new social spaces ” . In Issues in Transnational Policing , Edited by: Sheptycki , J. London : Routledge .
  • Markle (2003) , Creating a Trusted Information Network for Homeland Security , 2nd Report of the Markle Foundation Task Force, December, Available online at www.markle.org/downloadable_assets/nstf_report2_full_report.pdf (accessed 15 January 2005) .
  • Marx , G. 1988 . Undercover: Police Surveillance in America , Berkeley : University of California Press .
  • Morris , N . (2004) , “Secret services to be given access to ID card database” , Independent , October 28 .
  • Poveda , T. 1990 . Lawlessness and Reform: The FBI in Transition , California : Brooks/Cole Publishing Company, Pacific Grove .
  • Risen , J . & Johnston , D . (2002) “Bush has widened authority of CIA to kill terrorists” , New York Times , December 5 .
  • Schrei , F . & Caparini , M . (2005) , Privatising Security: Law, Practice and Governance of Private Millitary and Security Companies , Occasional Paper, DCAF, Geneva, available online at http://www.dcaf.ch/publications/occassional.cfm?nav1 = 4&nav2 = 3 (accessed 8 November 2005) .
  • Seifert , J.W. (2004) , Data Mining: An Overview , Congressional Research Service, Washington, RL31798. Available online at www.fas.org/irp (accessed 16 December 2004) .
  • Shearing , C.D. & Stenning , P.C. (eds) (1987) , Private Policing , Sage , London .
  • Sheptycki , J . (2004) , Review of the Influence of Strategic Intelligence on Organised Crime Policy and Practice , Special Interest Paper 14, RDS, Home Office, London .
  • Singer , P.W. 2003 . Corporate Warriors: The Rise of the Privatized Military Industry , Ithaca : Cornell University Press .
  • Singer , P.W. (2004) , “The private military industry and Iraq: What have we learned and where to next?” , DCAF Policy Paper. Available online at www.dcaf.ch (accessed November 2004) .
  • Smith , M. 2003 . The Spying Game: The Secret History of British Espionage , London : Politico's .
  • Sparrow , M.K. 1991 . “Network vulnerabilities and strategic intelligence in law enforcement” . International Journal of Intelligence and Counterintelligence , 5 ( 3 ) : 255 – 274 .
  • Steele , R. 2002 . The New Craft of Intelligence: Personal, Public and Political , Oakton, Virginia : OSS International Press .
  • Stevens (2003) , Stevens Enquiry: Overview and Recommendations . Available online at www.met.police.uk/commissioner/MP-Stevens-Enquiry-3.pdf (accessed April 2004) .
  • Thompson , G. 2003 . Between Hierarchies and Markets , Oxford : Oxford University Press .
  • Thompson , G. et al. (eds) (1991) , Markets, Hierarchies and Networks: The Coordination of Social Life , Sage , London .
  • Travers , R. (1997) “The coming intelligence failure” , Studies in Intelligence , Vol. 1 , no. 1 , Available online at www.odci.gov/csi/studies/97unclass/failure.html (accessed 19 February 2002) .
  • Walker , C. 2002 . Blackstones’ Guider to the Anti-Terrorism Legislation , Oxford : Oxford University Press .
  • Whitaker , R. 1999 . The End of Privacy: How Total Surveillance is Becoming a Reality , New York : The New Press .

Web References

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.