The chain of security

Increasingly, private companies – including Twitter, airlines, and banks – find themselves in the frontline of fighting terrorism and other security threats, because they are obliged to mine and expel suspicious transactions. This analytical work of companies forms part of a chain, whereby transactions data are analysed, collected, reported, shared, and eventually deployed as a basis for intervention by police and prosecution. This article develops the notion of the Chain of Security in order to conceptualise the ways in which security judgements are made across public/private domains and on the basis of commercial transactions. Drawing on the work of Bruno Latour, this article understands the security chain as the set of practices whereby commercial transactions are collected, stored, transferred, and analysed, in order to arrive at security facts. Understanding the trajectory of the suspicious transaction as a series of translations across professional domains draws attention to the processes of sequencing, movement, and referral in the production of security judgements. The article uses the chain of financial suspicious transactions reporting as example to show how this research ‘thinking tool’ can work. In doing so, it aims to contribute to debates at the intersection between International Relations (IR) and Science-and-Technology Studies (STS).

[1]  Tobias Blanke,et al.  The (Big) Data-security assemblage: Knowledge and critique , 2015, Big Data Soc..

[2]  Frank G. C. Sauer,et al.  Killer drones: The ‘silver bullet’ of democratic warfare? , 2012 .

[3]  Deborah Cowen,et al.  The Deadly Life of Logistics: Mapping Violence in Global Trade, Deborah Cowen. University of Minnesota Press, Minneapolis (2014) , 2014 .

[4]  U. Stäheli Indexing – The politics of invisibility , 2016 .

[5]  Anna Leander The Paradoxical Impunity of Private Military Companies: Authority and the Limits to Legal Accountability , 2010 .

[6]  R. Jaffe,et al.  The hybrid state: Crime and citizenship in urban Jamaica , 2013 .

[7]  B. Latour Why Has Critique Run out of Steam? From Matters of Fact to Matters of Concern , 2004, Critical Inquiry.

[8]  F. Ragazzi,et al.  Low-tech security: Files, notes, and memos as technologies of anticipation , 2014 .

[9]  Julien Jeandesboz Justifying Control: EU Border Security and the Shifting Boundaries of Political Arrangement , 2016 .

[10]  J.H.A.M. Grijpink Biometrics and privacy , 2001 .

[11]  T. Li Practices of assemblage and community forest management , 2007 .

[12]  L. Stampnitzky,et al.  Disciplining Terror: How Experts Invented 'Terrorism' , 2013 .

[13]  J. Law,et al.  Complexities: Social Studies of Knowledge Practices , 2002 .

[14]  Charlotte Heath-Kelly Algorithmic autoimmunity in the NHS: Radicalisation and the clinic , 2017 .

[15]  M. Salter,et al.  Border security as practice: An agenda for research , 2014 .

[16]  The Making of Law , 1921 .

[17]  Frank Gadinger,et al.  The Play of International Practice , 2015 .

[18]  I. Neumann Returning Practice to the Linguistic Turn: The Case of Diplomacy , 2002 .

[19]  Mark B. Salter,et al.  Governmentalities of an Airport: Heterotopia and Confession , 2007 .

[20]  Christian Bueger Making Things Known: Epistemic Practices, the United Nations, and the Translation of Piracy , 2015 .

[21]  Marijn Hoijtink Capitalizing on emergence: The ‘new’ civil security market in Europe , 2014 .

[22]  Jef Huysmans,et al.  The Politics of Insecurity: Fear, Migration and Asylum in the EU , 2006 .

[23]  Maja Zehfuss Constructivism in International Relations: The Politics of Reality , 2002 .

[24]  J. Huysmans What’s in an act? On security speech acts and little security nothings , 2011 .

[25]  James Backhouse,et al.  Profiling under conditions of ambiguity—An application in the financial services industry , 2007 .

[26]  M. Goede,et al.  Sentencing Risk: Temporality and Precaution in Terrorism Trials† , 2013 .

[27]  Frank Gadinger On Justification and Critique: Luc Boltanski’s Pragmatic Sociology and International Relations , 2016 .

[28]  T. Porter Tracing Associations in Global Finance , 2013 .

[29]  Govert Valkenburg,et al.  Materialities between security and privacy: A constructivist account of airport security scanners , 2015 .

[30]  D. Campbell International Engagements , 2001 .

[31]  Bruno Magalhães The Politics of Credibility: Assembling Decisions on Asylum Applications in Brazil , 2016 .

[32]  S. Shapin A Social History of Truth: Civility and Science in Seventeenth-Century England , 1994 .

[33]  I. V. D. Ploeg,et al.  Biometrics and Privacy A note on the politics of theorizing technology , 2003 .

[34]  Joakim Berndtsson,et al.  Private Security and the Public–Private Divide: Contested Lines of Distinction and Modes of Governance in the Stockholm-Arlanda Security Assemblage , 2011 .

[35]  A. Mol The Body Multiple: Ontology in Medical Practice , 2003 .

[36]  S MariaNaVaLvErdeandMichaelMOPa Insecurity and the dream of targeted governance , 2004 .

[37]  J. Mcculloch,et al.  Pre-Crime and Counter-Terrorism Imagining Future Crime in the ‘War on Terror’ , 2009 .

[38]  M. Strathern Cutting the Network , 1996 .

[39]  W. Walters Drone strikes, dingpolitik and beyond: Furthering the debate on materiality and security , 2014 .

[40]  Lucia Zedner,et al.  Pre-crime and post-criminology? , 2007 .

[41]  P. Schouten Security as controversy: Reassembling security at Amsterdam Airport , 2014 .

[42]  Philippe M. Frowd The field of border control in Mauritania , 2014 .

[43]  Rocco Bellanova Data Protection, with Love , 2014 .

[44]  I. Stengers,et al.  The Invention Of Modern Science , 2000 .

[45]  Nadine Voelkner Managing pathogenic circulation , 2011 .

[46]  Michael J. Shapiro,et al.  Challenging boundaries : global flows, territorial identities , 1996 .

[47]  Rocco Bellanova,et al.  A Different View on the 'Making' of European Security: The EU Passenger Name Record System as a Socio-Technical Assemblage , 2012 .

[48]  M. Goede,et al.  Governing future radicals in Europe , 2013 .

[49]  Deborah Avant,et al.  The Market for Force: The Consequences of Privatizing Security , 2005 .

[50]  M. Goede Speculative Security: The Politics of Pursuing Terrorist Monies , 2012 .

[51]  L. Daston,et al.  The Image of Objectivity , 1992 .

[52]  Didier Bigo,et al.  Security and Immigration: Toward a Critique of the Governmentality of Unease , 2002 .

[53]  G. Sullivan Transnational Legal Assemblages and Global Security Law: Topologies and Temporalities of the List , 2014 .

[54]  Jutta Weldes Constructing National Interests: The United States and the Cuban Missile Crisis , 1999 .

[55]  Yee-Kuang Heng,et al.  The other War on Terror revealed: global governmentality and the Financial Action Task Force’s campaign against terrorist financing , 2008, Review of International Studies.

[56]  H. Stritzel Security as translation: threats, discourse, and the politics of localisation , 2011, Review of International Studies.

[57]  H. Stritzel Security, the translation , 2011 .

[58]  M. Cooper Pre-empting Emergence , 2006 .

[59]  Mike Ananny,et al.  Toward an Ethics of Algorithms , 2016 .

[60]  Louise Amoore,et al.  Life beyond big data: governing with little analytics , 2015 .

[61]  B. Latour Pandora's Hope: Essays on the Reality of Science Studies , 1999 .

[62]  F. Ragazzi Countering terrorism and radicalisation: Securitising social policy? , 2017 .

[63]  Anna Leander Technological Agency in the Co-Constitution of Legal Expertise and the US Drone Program , 2013, Leiden Journal of International Law.

[64]  Oliver Belcher,et al.  Ethnographies of closed doors: conceptualising openness and closure in US immigration and military institutions , 2013 .

[65]  D. Vigneswaran The Contours of Disorder: Crime Maps and Territorial Policing in South Africa , 2014 .

[66]  S. Gutwirth,et al.  Privacy, Data Protection and Law Enforcement. Opacity of the Individual and Transparency of Power , 2022, Direito Público.

[67]  A. Mol,et al.  Living with Omega-3: New Materialism and Enduring Concerns , 2015 .

[68]  Jutta Weber,et al.  Keep adding. On kill lists, drone warfare and the politics of databases , 2016 .

[69]  Anthony Amicelle,et al.  Towards a ‘new’ political anatomy of financial surveillance , 2011 .

[70]  Nathaniel O'Grady,et al.  Data Interface Security: Assembling Technologies that Govern the Future , 2015 .

[71]  Luis Lobo-Guerrero Insuring Life: Value, Security and Risk , 2016 .

[72]  Thomas A. Brooks,et al.  Security technologies , 1994, AT&T Technical Journal.

[73]  R. Bellanova,et al.  Politics of Disappearance: Scanners and (Unobserved) Bodies as Mediators of Security Practices , 2013 .

[74]  J. Hoffman Theorizing power in transition studies: the role of creativity and novel practices in structural change , 2013 .

[75]  Elida K. U. Jacobsen,et al.  The cross-colonization of finance and security through lists: Banking policing in the UK and India , 2016 .

[76]  A. Loeber Designing for Phronèsis: Experiences with transformative learning on sustainable development , 2007 .

[77]  Luc Boltanski,et al.  The reality of moral expectations: A sociology of situated judgement , 2000 .

[78]  S. Opitz,et al.  Future Emergencies: Temporal Politics in Law and Economy , 2015 .

[79]  Vulnerable childhood, vulnerable adulthood: Direct provision as aftercare for aged-out separated children seeking asylum in Ireland , 2017 .

[80]  Mireille Hildebrandt,et al.  The Challenges of Ambient Law and Legal Protection in the Profiling Era , 2010 .

[81]  Pierre Lascoumes,et al.  Sentinels in the Banking Industry Private Actors and the Fight against Money Laundering in France , 2007 .

[82]  M. Bourne,et al.  Laboratizing the border: The production, translation and anticipation of security technologies , 2015 .

[83]  M. de Goede The chain of security , 2017, Review of International Studies.

[84]  K. Haggerty,et al.  Surveillance and Democracy , 2010 .

[85]  I. Loader Policing and the social : questions of symbolic power , 1997 .

[86]  Shaun Williams,et al.  The 'politics of possibility' , 2015 .

[87]  D. Lyon Surveillance after September 11 , 2001 .

[88]  Susanne Krasmann Law’s knowledge: On the susceptibility and resistance of legal practices to security matters , 2012 .

[89]  Mark B. Salter,et al.  Research methods in critical security studies : an introduction , 2012 .

[90]  Julien Jeandesboz Smartening border security in the European Union: An associational inquiry , 2016 .

[91]  Annemarie Mol,et al.  Proving or Improving: On Health Care Research as a Form of Self-Reflection , 2006, Qualitative health research.

[92]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[93]  E. Fatas,et al.  Combating Violent Extremism , 2016 .

[94]  Mark B. Salter,et al.  Making Things International 1: Circuits and Motion , 2015 .

[95]  Louise Amoore,et al.  Security and the incalculable , 2014 .