Governance, Risk and Dataveillance in The War On Terror
Governance, Risk and Dataveillance in The War On Terror
DOI: 10.1007/s10611-005-1717-8
C Springer
2005
150
new but takes place within a larger shift towards what Mariana Valverde and
Michael Mopas call targeted governance. The new penology, according to
Valverde and Mopas (2004: 240), involves a shifting away from discipline
to risk. Discipline. . .governs individuals individually while simultaneously
forming and normalizing populations. Risk management, by contrast, breaks
the individual up into a set of measurable risk factors (emphasis in original).
The new emphasis on risk in penology combines a neoliberal disappointment
in welfare-state objectives of totalizing transformations with an optimistic
belief in the ability of information and technology to produce a risk-free
society. Targeted governance entails a limited and risk-driven intervention
into society, based upon a dream of a smart, specific, side-effects-free,
information-driven utopia of governance (Valverde and Mopas, 2004: 239).
It should be clear that this paper does not suggest that post-9/11 risk management is entirely new, nor that it operates with full reach and consistency.
For example, there is a rich literature critically examining border policing prior
to 9/11 (for example Bigo, 2002; Doty, 2003; Andreas and Snyder, 2000). In
fact, we have written about the politics of risk management discourses in finance and consulting that were clearly visible before 9/11 (Amoore, 2004; de
Goede, 2005). Moreover, the risk management practices discussed here continue to face substantial bureaucratic and political resistance, and unevenness
of application. However, it is perhaps precisely because of the political resistance to targeted governance that the representation of 9/11 as a radical break
with the past was able to accelerate the risk management programs that predate the attacks. The idea that a radically new threat demands a radically new
response was able to generate political support for controversial data-mining
programmes (OHarrow, 2005). In addition, what is new about contemporary
terrorist risk management, as the article discusses, is its increasing reliance
on technology and computerised data-mining. Inside data-mining technology,
questionable data become hardened facts making critical political analysis
of these practices warranted.
Valverde and Mopas concept of targeted governance, then, is highly pertinent to analysing developments in the war on terror, for two reasons. First, it
offers an understanding of dispersed power, in which the state is not a necessary or logical centre (Larner and Walters, 2004: 4). In the war on terrorism,
it is important to understand how power is exercised through a complex policy constellation including regulatory state bodies, international institutions,
industry self-regulating bodies and private risk assessment firms. This does
not simply entail a shift from public to private authority, but entails more precisely the enduring and even enhanced power of particular state agencies, in
close cooperation with international institutions and private risk assessment
firms.
151
152
International Monetary Fund (IMF), the United Nations (UN), and the Financial Action Task Force (FATF). What is emerging at the heart of this policy
constellation is a risk-based approach, focused on the collection and analysis
of financial data in order to identify suspicious transactions that may indicate
terrorist behaviour. The Financial Crimes Enforcement Network (FinCen) of
the US Treasury, for example, collects and analyses suspicious action reports
(SARs) filed by diverse financial institutions which may lead to criminal
prosecution. FinCen has existed since 1990 but its tasks have been significantly expanded under the Patriot Act, and the agency has subsequently pursued around 500 cases. Our approach to regulation is risk-based, declared
FinCens director William J. Fox (2004a) in a recent speech, we believe effective implementation of [anti-money laundering law] must be predicated
upon a financial institutions careful assessment of its own vulnerabilities to
money laundering and other financial crime. . ..It is not a rule-based approach, where the regulator gives the regulated a laundry list to be checked
off.
At the heart of FinCens strategies and policies is the (contestable) conviction that follow-the-money techniques are effective in identifying and comprehending not just the proceeds of crime but also in assessing the intentions of
terrorists, who may need to be apprehended before they commit their crimes.
In other words, money laundering regulation is evolving from a regulatory
tool designed to confiscate criminal money after the act (with a desired deterring effect) to a regulatory tool required to predict and apprehend potential
terrorists. In its preoccupation with risk assessment and prediction, the war
on terrorist finance represents a marked break with earlier regimes of money
laundering regulation, which focused on tracing criminal money associated
with narcotics or political corruption after the crime.3 If undermining crime
and amassing evidence were the objectives of pre-9/11 money laundering
policy, predicting possible terrorist attacks became the objective after 9/11
(Malkin and Elizur, 2002: 64). For example, in a recent Hearing before the
US House of Representatives, Fox (2004b) argued that financial intelligence
is actionable intelligence. It can...lead to effective strategic action that stops
or disrupts the flow of money to terrorist and their networks, which, in turn,
serves to halt or impede terrorist operations (emphasis added).
The risk-based approach to terrorist financing entails the two aspects that
according to Valverde and Mopas are particular to targeted governance. First,
it is designed to reconcile the need for new financial regulation with the
continuing operation of deregulated, neoliberal financial markets. This approach offers common ground to (inter)national public regulators and industry self-regulating bodies. It is designed, in part, to interfere minimally
with existing global capital markets and offers profit opportunities to private
153
Suspicious transactions
It is important to examine, however what precisely is deemed risky and suspicious in the emerging policy constellation that pursues the war on terrorist finance. For example, according to US Treasurys Terrorist Financing Rewards
Program, which offers rewards of up to US$ 5 Million for information leading to the dismantling of any system used to finance a terrorist organization,
suspicious transactions include: account transactions that are inconsistent
with past deposits or withdrawals, transactions involving a high volume of
incoming or outgoing wire transfers and wire transfers by charitable organizations to companies located in countries known to be bank or tax havens.4
This rewards program has distributed posters and flyers with classifications
of suspicious transactions accompanied by images of Osama bin Laden and
the falling World Trade Towers, in order to urge the public to report possible
illegal financial activity. It thus encourages what Lyon (2003a: 59) calls a
culture of suspicion, in which ordinary citizens are called upon as the eyes
and ears of police and intelligence. The Rewards program emphasises foreign wire transfers as a source of suspicion and identifies as illicit sources
welfare and food-stamp fraud, cigarette smuggling, counterfeit merchandise
and alternative remittance systems. But the representation of terrorist money
as a foreign problem, and the enumeration of a host of misdemeanours such
as welfare fraud and counterfeit merchandising under the terrorist banner is
very problematic (also Campbell, 2004).
However, even more significant than the Rewards Programme, because operating with further reach and consistency, is the move towards computerised
154
Financial exclusion
In the risk classifications designed to trace terrorist financing, then, certain
suspicious people and suspicious places are identified. It stands out that those
without regular income and expenditure, as well as those who send international wire transfers in small amounts, are considered especially suspect. This
includes, most notably, migrant, students, and the unemployed. Perhaps this is
not odd, given that the September 11 hijackers pretended to be students while
living in the US prior to their attack. However, political criticism must raise the
question whether criminalising large groups at the margins of society can have
a preventative function in the war on terrorist finance. Here, we draw out three
areas of concern where the war on terrorist finance is transforming not just
the international financial architecture, but the everyday life of global finance
155
156
157
a paper published by the Harvard Law Schools Seminar on International Finance in April 2002 attributes the continuing existence of informal money
transfer networks to the benefits they offer for illicit finance, and links them
to narcotics, trafficking in human beings, terrorism, corruption, and smuggling (Gillespie, 2002: 89). Moreover, the US Treasurys National Money
Laundering Strategy identifies alternative remittance systems as particularly
vulnerable or attractive to terrorist financiers and money launderers (US
Department of the Treasury, 2003: 13).
Criminalisation in policy discourse has very real material effects, and it
is important to note that among the few actual convictions under the Patriot
Act are a number of imprisoned and fined unlicensed money remitters. The
2003 Money Laundering Strategy notes that the United States has succeeded
in disrupting the operations of several illegal money remitters potentially
implicated in terrorist financing (US Department of the Treasury, 2003: 15,
emphasis added). More specifically, FinCens 2002 report to Congress details
a number of cases where informal remittance networks have been prosecuted,
including two cases of unlicensed hawalas sending remittances to East Africa,
and the imprisonment of an unlicensed Boston hawaladar (US Department of
the Treasury, 2002: 30, 36, 38). However, the Patriot Act specifically provides
that a conviction for failure to comply with a state licensing requirement
does not need to require proof that the defendant knew of the state licensing
requirement. This means that hitherto condoned or invisible money remitters
found themselves prosecuted after September 11 for failing to have acquired
licenses of which they may not have known.
My point here is not that informal money remitters are never involved in
criminal activity, but more precisely to question the identification of hawala
as especially suspect and vulnerable to abuse. As Passas (1999: 67) concludes
in his report to the Dutch Ministry of Justice, informal value transfer systems do not represent a money laundering or crime threat in ways different
from conventional banking or other legitimate institutions (see also Passas,
2004a,b). This point is supported by the report of the 9/11 Commission, that
is especially harsh in its condemnation of the actions that the Bush administration took against the large Somali-based money remitter al-Barakaat.
Al-Barakaat was considered suspicious for remitting large amounts of cash
from the US-based Somali Diaspora back to Somalia and was closed down
by the Bush administration in November 2001 at which time Kenneth Dam
of US Treasury claimed to have disrupted millions of dollars destined for
terrorist organisations. However, the 9/11 Commission concludes that despite
unparalleled access and support from the central bank of the United Arab
Emirates, which made available thousands of pages of documents related to
al-Barakaat accounts, they found no evidence linking al-Barakaat to terrorist
158
activity, and no evidence that closing the al-Barakaat network hurt al-Qaeda
financially (Roth et al., 2004: 81). The Commission suggests that poor understanding of remittances and prejudice against migrants may underlie the harsh
pursuit of al-Barakaat, because criminal authorities assumed fraud must be
at work when they discovered the amounts of money remitted by the Somali
migrant community of Minneapolis to their home country (Roth et al., 2004:
74). The report further notes the damage done to Somali migrants when their
remittances were frozen and not delivered to the intended recipients.
It is difficult not to conclude that pursuing unlicensed money remitters
offers FinCen an easy target and allows it to report success to Congress, while
its effect on preventing terrorist financing remains dubitable. Meanwhile,
migrants are deprived of relatively cheap and efficient ways of sending money
to their families, and are increasingly dependent on more expensive formal
channels like Western Union.
Thirdly, cash itself is becoming increasingly suspect, and the war on terrorist finance has an explicit goal to reduce the use of cash worldwide. The
objective of reducing cash use is not new, and the FATFs 40 Anti-Money
Laundering Recommendations, published in 1990, include the stipulation
that Countries should. . .encourage. . .the development of modern and secure techniques of money management, including increased use of checks,
payment cards, direct deposit of salary checks, and book entry recording of
securities, as a means to encourage the replacement of cash transfers.7 But the
political significance of reducing cash use increases in the context of dataveillance, as it expands further into the realm of everyday finance. Surveillance
technology in the risk society relies on the proposition that each movement or
transaction. . .leaves a trail of electronic traces, which means that individuals
cannot easily disappear (Levi and Wall, 2004: 206). In other words, money
in electronic form credit cards, account debits, ATM transactions is registered and traceable, and thus police-able. At the heart of the policy pursued in
the name of the war on terrorist finance is what Aufhauser (2003: 301) calls
the electronic footprint of the terrorists: People cannot plant themselves for
years at a time in a foreign land without establishing a footprint of the source
of their funding. . .. At some juncture be it collection, recruitment, training,
transport, housing, planning or execution terrorist financing will intersect
with the recorded financial system (original emphasis).
However, the electronic footprint theory criminalises cash use, and ignores the growth of the informal economy that is not associated with criminal
activity but with neo-liberal regimes of labour flexibility. If a sizeable informal economy was once seen as a sign of underdevelopment, it is now widely
acknowledged that neo-liberal practices of global competition and labour flexibility have caused the growth of the informal economy in the centres of global
159
160
161
Governing mobilities
Announcing his plans for the US VISIT programme to the European policy
community, US Secretary of Homeland Security, Tom Ridge, highlighted the
risks and rewards of living in a globalizing society. As the world community has become more connected through the globalization of technology,
transportation, commerce and communication, he explained, the benefits
of the global economy enjoyed by each of us are available to the terrorists as
well (Department of Homeland Security, 2005: 1). Framed in this way, the
problem becomes one of isolating the legitimate transborder activities of the
global economy, and segregating these from the illegitimate transnationalism
of those who exploit the possibilities of open borders. As we have argued
elsewhere, following Pat OMalley and others, the discursive deployment of
risk is closely allied to the representation of the risks and rewards of globalization (De Goede, 2004; Amoore, 2004; OMalley, 2000). Far from seeking
to minimize or limit the risks of a globalizing society, the new penology of targeted governance rests upon an embracing of risk made possible through the
global integration of information technologies (Baker, 2002). The US VISIT
system deploys just such an embracing risk approach, appearing to hold
out the possibility of reconciling the image of porous international borders
that are open for business, with the need for security at the border (Brisbin,
2004).
Accentures smart border solution to the policing of international mobilities rests upon an electronic information-based system of risk management that engages in the social sorting of people into categories of riskiness (Lyon, 2003b). As the US business press succinctly capture Accentures
task:
Half a billion foreign visitors cross Americas borders, land at her airports,
and dock at her harbors every year. Imagine trying to weed out the criminals
162
163
of people to their travel documents and visas (Accenture digital forum 2004:
2). Rather, by encoding people with a pre-determined identity and assuming
that high-tech identification process to be indisputable, US VISIT engages in
what has been called the legitimation work of globalization, the everyday
work of issuing and denying documents, sealing and opening records, regulating and criminalizing transactions, and repudiating and claiming countries
and persons (Coutin et al., 2002: 804). The risk management system sold to
the US government, then, is more appropriately described as a risk displacement system. The virtual border envisaged by Smart Border Alliance and the
Department of Homeland Security becomes actual in the lives of migrants
who experience ever greater uncertainty in their lives. De Genovas reading
of the US-Mexico border, for example, describes the border as the exemplary
theatre for staging the spectacle of the illegal alien (2002: 436). US-VISIT
leaves open the possibility of entrance to the US for non-business/ non-global
economy travel, for example by Mexican workers, but with the proviso of the
ongoing surveillance of Accentures virtual border which will come into play
in spheres from money and banking, to medical care, insurance and housing.
The border thus becomes a mobile phenomenon that allows entry to the physical space of the US without offering open entrance to the social, political
and legal space of the US. In a very real sense, the mastery of border risks by
governments and their business and technology partners is undertaken on the
back of the intensification and reallocation of risk onto the most vulnerable
groups.
164
to which data can be safely secured. What Irma van der Ploeg has observed
as a gradually extending intertwinement of individual physical characteristics with information systems (2003: 58), has served to deepen the faith in
data as a means of risk management. In a world of identity politics and risk
management, argues David Lyon, surveillance is turning decisively to the
body as a document for identification, and as a source for prediction (Lyon,
2001: 72).
In the US VISIT programme the use of biometric technologies as a source
of identification and prediction is taking two important turns. The first is
to seek to annex low risk travellers via the use of voluntary systems of
biometric submission. As the Secretary of Homeland Security Tom Ridge
explains:
A fingerprint or iris scan is all that is needed for quick passenger identification and expedited processing through security. Ive enrolled in the
program myself, and I can tell you that it is a great tool that helps move
low risk travellers more efficiently so that resources can be focused elsewhere, where the need is greater (Department of Homeland Security,
2005: 1).
Tom Ridges participation in the US Air Transportation Associations
Registered Traveller project, which uses Unisys technology to link frequent
fliers to a biometric database, suggests that biometrics is being used in a
process of risk pooling (Heimer, 2002), whereby individuals classified in a
similar risk category are grouped together for common treatment in this case
for swift passage through security checks. However, in populations targeted
for higher risk pools the electronic connection of data to bodies is more invasive and the surveillance intensified. Regular commercial travellers across the
MexicoUS border, for example, can submit biometric information in order
to fast-track the security check point. Unlike Mr Ridges frequent traveller
card, however, the smart cards used at the USMexico border may be radio frequency identification enabled (RFID), making them, at least in theory,
trackable within the US.
Such faith in the ability of biometric data to secure identity is playing a
central role in the war on terror at the border. As exemplified by Mike Davis,
director of FBI criminal justice services, when he informed a European conference of technology companies that the only way to trace a terrorist is
through biometrics, reassuring them that we are obtaining DNA from terrorists around the world as we encounter them (cited in The Guardian, June
18, 2004: 17). Leaving aside the question of the somewhat improbable nature
of such a scenario, Mr Daviss belief that the war on terror has come to rely
on biometric technology raises a number of questions. The first concerns
165
the purposes for which biometric data is collected and deployed. Despite
assurances by the DHS that the US VISIT system will not be in breech of
international privacy laws limiting access to personal data, it seems that biometric data systems are being traded precisely on the grounds that multiple
agencies can have networked access. Western police and intelligence agencies have drawn up plans to share biometric information, such that US VISIT
biometric requirements become a Trojan horse for their introduction elsewhere. As Accenture are keen to point out, the US VISIT contract is a key
win in a climate where other countries on the front line of terrorism are interested in similar programmes (Accenture press release, 2004: 1). Plans
in the UK to link a biometric ID card to US VISIT compliant passports,
for example, suggest that there is a trend towards linking the governance of
international mobility to national systems of biometric identification (Lyon,
2004).
Our second question concerns the representation of biometric technologies
as infallible and unchallengeable verifiers of the truth about a person. The
linking of biometrics to integrated databases not only appears to make the
identification of a person beyond question, but also lends authenticity and
credibility to all of the data that is connected to that identity. Treated as a
scientific, neutral and smart solution to the problem of establishing identity,
biometrics become discrete entities that can be parcelled up, contracted out,
integrated, applied and innovated. Yet, rather than being a secure anchor to
the human body, biometric technology represents an informatization of the
body, part of a process in which technologies are themselves incorporated
into the bodily experience (van der Ploeg, 2003; see also Thrift, 2004). It
is important, then, to challenge and destabilize the apparent security of the
biometrics-body link, to point to the fallibility of technologies, as well as to
the agency that is enacted as technologies tend to take on a life of their own
(Levi and Wall, 2004: 204).
166
in the private sector it is possible to enhance the security of our country while
increasing efficiency at our borders (DHS, 2 June, 2004a). Similarly, Accentures Eric Stange, managing partner of the Homeland Security practice, talks
of the Smart Border Alliance as a strong team of highly qualified companies with significant border management expertise (Accenture press release,
2004: 2). For one of Accentures sub-contractors, Titan Corp., some of this
expertise was acquired through the supply of interrogators and interpreters to
the Abu Ghraib prison in Iraq.
Nonetheless, US VISIT represents a programme of authorization that actively decentres the state and blurs the boundaries of public and private domains of governance. By virtue of a system that disperses power throughout a network of agencies, the surveillance of migrant illegality (Coutin,
2000) takes a renewed twist that authorizes private authorities and individuals
to engage in the everyday policing of the movement of people. According
to reports of Accentures bid for the US VISIT contract, for example, the
consultants positioned immigrants at he heart of their proposals: Accenture
wowed government officials with a demo that included wireless tags that
tracked immigrants whereabouts (Business Week, 2004b: 74). Given US
VISITs status as a system designed to verify those who have visas (i.e. not
for immigrants), it is this targeting of immigrant groups under the guise of
efficient border management that is provoking widespread concern among
civil liberties groups. As one civil liberties representative explained: since
9/11 the public authorities have turned to the private authorities to design the
architecture of the systems, to make efficient systems.12 The concern is
that the authorization of groups such as the Smart Border Alliance to act to
govern the movement of people has, in effect, depoliticized the US VISIT
system and normalized its practices on the grounds of expertise and technical
know-how.
The extension of border control authority into the private sphere does not
end with private firms, however. As Accentures Eric Stange explained in an
interview following the award of the US VISIT contract, what is needed in
the war on terror is a cultural change, a shift that extends beyond governments and firms, and into individuals perceptions of their own responsibilities
(CIO Insight, 2004). Perhaps an example of such a shift towards a state of
constant vigilance can be found in Town Compass LLC, a Seattle data company, marketing personal products to fight the war on terror. Their Most
Wanted Terrorists database is available as a free download to pocket PCs and
smartphones as part of their Terrorism Survival bundle. As Town Compass
explain: people can have the photos and descriptions at their fingertips at all
times in case they spot a suspicious person, easily comparing the person to
the photo without endangering themselves (cited in Military and Aerospace
167
Conclusions
The central issue in the politics of the risk society, according to Beck (2002:
41) is how to feign control over the uncontrollable (original emphasis). It is
possible to argue that targeted governance in the war on terror is one way in
which control over the uncertainties of globalization is feigned. As illustrated
by Secretary Ridge:
Its truly no coincidence that the threat to the stability and the peace of the
world has coincided with the globalization of technology, commerce, transportation and communication. The same benefits enjoyed by peace-loving,
freedom-loving people across the world are available not to terrorists, as
well. (Department of Homeland Security, 2004b: 2).
Risk management via targeted governance, then, rests upon the representation of two worlds of globalization: one populated by legitimate and civilized groups whose normalised patterns of financial, tourist and business
behaviour are to be secured; and another populated by illegitimate and uncivilized persons whose suspicious patterns of behaviour are to be targeted and
apprehended. In order that the legitimate world of profitable global financial
168
transactions and business and leisure travel can remain an alluring and enduring prospect, control over the illicit world of terrorism, trafficking or illegal
immigration must be given credence. As we have argued, the impression
of policing the behaviour in the illegitimate sphere rests upon the categorization and risk pooling of normality and suspicion, as well as problematic
dichotomies between civil and uncivil everyday practices (Amoore and Langley, 2004: 108110).
Yet, as Coutin et al. argue (2002: 803), and as we have illustrated, the
legitimate and illegitimate spaces of globalization are more mutually constituting and interdependent than is normally assumed. In the field of money
laundering and terrorist finance, there is increasing evidence that the upper
worlds and underworlds are more closely linked and difficult to separate
than is assumed in much policy literature (van Duyne et al., 2002). Similarly,
the governmental practices of border control do not simply defend the inside
from the threats outside, but continually produce our sense of the insiders
and outsiders in the global political economy. We have sought here to problematize the techniques and technologies deployed to isolate and segregate the
underworld of outsiders from the upperworld of insiders. In a system where
verification by dataveillance becomes a condition of being, it is precisely the
most subordinate and marginalized groups who will find their identities most
difficult to authenticate. From downtown banking halls to city airport terminals, the techniques of dataveillance will continually inscribe and reinscribe
a manufactured border between the licit and illicit worlds.
Neglecting the mutuality and contingency of the legitimate/illegitimate
worlds of the movement of money and peoples, however, not only serves
to further marginalize the poor but also seriously underplays the extent to
which risk is deployed as a means of governing contemporary society. Of
course, it suits the various players in the homeland security market to talk
up the threats and risks of the covert world. As the US business press note,
terror may be your portfolios security (Business Week Online, 2004: 14).
But, our purpose here has been to challenge the discourse of risk multiplication and intensification that has played such a central role in both the war
on terror and the booming homeland security market. From our perspective, and following a tradition of critical thought on risk, it is not so much
that new risks have come into being, but that society has come to understand itself and its problems in terms of risk management (De Goede, 2004;
Amoore, 2004; Ewald, 1990). Among the implications of this risk-based
means of governing in the war on terror, as we have shown, is the ongoing
displacement and reallocation of risk that cannot be so easily calculated and
controlled.
169
Notes
1. Though we focus explicitly on the deployment of risk profiling in the governing of the
movement of money and people, similar processes of classification and social sorting are
at work in the movement of commodities. See, for example, Josiah Heymans study of the
marking out of legitimate commodities at USMexico ports of entry (2001), and Brenda
Chalfins work on surveillance by customs agencies at Ghanaian ports (2004). Indeed, the
surveillance of commodities at key sites such as airports is tightly interwoven with the
classification of legitimate from illegitimate mobilities (Adey, 2004).
2. With the term the War on Terrorist Finance is meant all policy measures and regulatory
guidelines issued by governments, private bodies and international institutions designed
to detect and prevent the financing of terrorism. The war on terrorist finance is an important component of the war on terror, and some of the most important and far-reaching
provisions of the Patriot Act are in the field of financial regulation and prosecution for
money-laundering.
3. The debate about the logic and effectiveness of follow-the-money methods in crime policy
is ongoing, see for example, Levi (2002, 2003), Naylor (1999), and Nelen (2004).
4. Stopping Terrorism Starts with Stopping the Money poster, to be downloaded at:
http://www.ustreas.gov/rewards/.
5. Find the leaflet online at the British Banking Organisations website: http://www.bba.
org.uk/pdf/awareness2.pdf.
6. For the Eight Special Recommendations, see: http://www.fatf-gafi.org/TerFinance en.htm.
7. Recommendation 25, Forty Recommendations, FATF I, http://www.fatf-gafi.org/pdf/
40Rec-1990 en.pdf.
8. Full text of the testimony is available at www.house.gov/reform/tapps/hearings.htm.
9. United States Visitor and Immigrant Status Indicator Technology.
10. Full text of the letter is available at www.epic.org/privacy/us-visit/redress letter.pdf.
11. Interview with representative of Electronic Privacy Information Center, Washington, DC,
November 9, 2004.
12. Interview with civil liberties organization, New York, November 7, 2004.
References
Accenture digital forum, US DHS to Develop and Implement US VISIT Program at Air, Land
and Sea Ports of Entry, 2004, available at www.digitalforum.accenture.com.
Accenture press release, Government Security Contract to Help Make US Safer, 2004, available at www.carers3.accenture.com/careers/global.aboutaccenture/careersnews/cn-usvisit.
Adey, P., Secured and Sorted Mobilities: Examples from the Airport, Surveillance and
Society, 2004 (1: 4), 500519.
Al-Suhaimi, J., Demystifying Hawala Business, The Banker, 2002, 152(914), 7678.
Amoore, L., Risk, Reward and Discipline at Work, Economy and Society, 2004 (33: 2),
174196.
Amoore, L. and P. Langley, Ambiguities of Global Civil Society, Review of International
Studies, 2004 (30: 1), 89110.
Andreas, P. and T. Snyder, (eds.) The Wall Around the West: State Borders and Immigration
Controls in North America and Europe (Lanham: Rowman & Littlefield, 2000).
170
Appadurai, A., Spectral Housing and Urban Cleansing: Notes on Millennium Mumbai, Public
Culture, 2000 (12: 3), 627651.
Aufhauser, D.D., Terrorist Financing: Foxes Run to Ground, Journal of Money Laundering
Control, 2003 (6: 4), 301305.
Baker, T., Liability and insurance after September 11: Embracing Risk meets the Precautionary
Principle, University of Connecticut School of Law Working Paper Series, 2002.
Beeson, A., On the Home Front: A Lawyers Struggle to Defend Rights After 9/11, in R.
Leone and G. Anrig (eds.), The War on Our Freedoms (New York: Public Affairs/Century
Foundation, 2003).
Beck, U., The Terrorist Threat: World Risk Society Revisited, Theory, Culture & Society,
2002 (19: 4), 3955.
Bester, H., L. de Koker and R. Hawthorne, Access to Financial Services in South Africa,
Genesis Analytics, April, 2004, available at http://www.finmarktrust.org.za/documents/
2004/April/FATFCaseStudy 2004.pdf.
Bigo, D., Security and Immigration: Toward a Critique of the Governmentality of Unease,
Alternatives, 2002 (27), 6392.
Brisbin, R., Old Standards and New Practices of Governing: Federalism and Rights Paradigms
and the Risk-Management Regime, paper presented at the annual convention of the American Political Science Association, 2004, 25 September, 2004.
Business Week, The Price of Protecting the Airways, 2001, available at www.businessweek.
com/print/technology/content/dec2001/tc2001124 0865.htm.
Business Week, Welcome to Security Nation, 2004a, 3887, p. 32.
Business Week, Accenture Hits the Daily Double, 2004b, 3891, p. 74.
Business Week Online, Terror May be Your Portfolios Security, 16 August, 2004, www.
buinsessweek.com/print/bwdaily/dnflash/aug2004/nf20040816 9987 db014.htm?chan=d,
Campbell, D., With Pot and Porn Stripping Corn, Americas Black Economy is Flying High,
The Guardian, 2 May, 2003, p. 3.
Campbell, D., Introducing Del-Qaida, The Guardian, 17 July, 2004, p. 17.
CIO Insight, Beta, August, 2004, 42, p. 22.
Chalfin, B., Border Scans: Sovereignty, Surveillance and the Customs Service in Ghana,
Identities: Global Studies in Culture and Power, 2004 (11), 397416.
Clarke, R., Dataveillance: Delivering 1984, in L. Green and R. Guinery (eds.), Framing
Technology: Society, Choice and Change (London: Routledge, 1994).
Coutin, S.B., Legalizing Moves: Salvadoran Immigrants Struggle for US Residency (Ann
Arbor: University of Michigan Press, 2000).
Coutin, S.B., B. Maurer and B. Yngvesson, In the Mirror: The Legitimation Work of Globalization, Law and Social Inquiry, 2002 (27: 4), 801843.
De Genova, N.P., Migrant Illegality and Deportability in Everyday Life, Annual Review of
Anthropology, 2002 (31), 419447.
De Goede, M., Repoliticising Financial Risk, Economy and Society, 2004 (33: 2), 197
217.
De Goede, M., Virtue, Fortune and Faith: A Genealogy of Finance (Minneapolis: University
of Minnesota Press, 2005).
Department of Homeland Security, DHs Announces Award of US VISIT Prime Contract to
Accenture LLP, 2004a, available at www.dhs.gov/dhspublic/display?theme=43&content.
Department of Homeland Security, Transcript of Secretary of Homeland Security Tom Ridge
at the Center for Transatlantic Relations at Johns Hopkins University, 2004b, available at
www.dhs.gov/dhspublic/display?theme=44&content=3994&print=true.
171
172
Lyon, D., (ed.) Surveillance as Social Sorting: Privacy, Risk, and Digital Discrimination (New
York: Routledge, 2003b).
Lyon, D., Identity Cards: Social Sorting by Database, OII Issue Brief 2004, no. 3.
Maimbo, S.M., The Money Exchange Dealers of Kabul, Worldbank Working Paper, June, 2003,
no. 13.
Malkin, L. and Y. Elizur, The Dilemma of Dirty Money, World Policy Journal, 2001, (Spring),
1323.
Malkin, L. and Y. Elizur, Terrorisms Money Trail, World Policy Journal 2002 (Spring),
6070.
Mantas, Money Laundering Keep it Clean, Banking Technology, 30 November, 2003,
available at http://www.mantas.com/NewsEvents/News/BankingTechnology113003.html.
Military and Aerospace Electronics, Homeland Security Focus, 2004 (15: 7), 4.
Naylor, R.T., Wash-Out: A Critique of Follow-the-Money Methods in Crime Control Policy,
Crime, Law & Social Change, 1999 (32), 157.
Nelen, H., Hit Them Where It Hurst Most?, Crime, Law and Social Change, 2004 (41),
517534.
OHarrow, R., No Place to Hide (New York: Free Press, 2005).
OMalley, P., Uncertain Subjects: Risks, Liberalism and Contract, Economy and Society,
2000 (29: 4), 460484.
Passas, N., Informal Value Transfer Systems and Criminal Organisations: A Study into SoCalled Underground Banking Networks, Dutch Ministry of Justice, 1999, available at
http://www.minjust.nl:8080/b organ/wodc/publications/ivts.pdf.
Passas, N., Law Enforcement Challenges in Hawala-Related Investigations, Journal of
Financial Crime, 2004a (12: 2), 112119.
Passas, N., Indicators of Hawala Operations and Criminal Abuse, Journal of Money
Laundering Control, 2004b (8: 2), 168172.
Peterson, V.S., A Critical Rewriting of Global Political Economy (London: Routledge,
2003).
Pieth, M., Financing of Terrorism: Following the Money, European Journal of Law Reform,
2002 (4: 2), 365376.
Rose, N. and V. Mariana, Governed by Law?, Social and Legal Studies, 1998 (7: 4), 541
551.
Roth, J., D. Greenberg and S. Wille, National Commission on Terrorist Attack upon the
United States, Monograph on Terrorist Financing, 2003, available at http://www.9
11commission.gov/staff statements/911 TerrFin Monograph.pdf
Sassen, S., The Global City: London, New York, Tokyo (Princeton, NJ: Princeton University
Press, 1991).
Stein, N., The Fruits of Safety, Fortune (Europe), 2004 (149: 11), 11.
Theil, S., Gordon Woo: Calculus for Catastrophe, Newsweek, 12 July, 2004, available at
http://www.msnbc.msn.com/id/5352360/site/newsweek/
Thrift, N., Movement-Space: The Changing Domain of Thinking Resulting from the Development of new Kinds of Spatial Awareness, Economy and Society, 2004 (33: 4),
582.
US Department of the Treasury, A report to Congress in Accordance with Section
359 of the USA Patriot Act, November, 2002, availale at http://www.fincen.gov/
hawalarptfinal11222002.pdf.
US Department of the Treasury, National Money Laundering Strategy 2003, 2003, available at
http://www.ustreas.gov/offices/eotffc/publications/ml2003.pdf.
173
Valverde, M. and M. Mopas, Insecurity and the Dream of Targeted Governance, in W. Larner
and W. Walters (eds.), Global Governmentality: Governing International Spaces (London:
Routledge, 2004).
van der Ploeg, I., Biometrics and the Body as Information: Normative Issues of the SocioTechnical Coding of the Body, in D. Lyon (ed.), Surveillance as Social Sorting (London:
Routledge, 2003).
van Duyne, P.C., K. von Lampe and N. Passas, Upperworld and Underworld in Cross-Border
Crime (Nijmegen: Wolf Legal Publishers, 2002).
Walters, W., Mapping Schengenland: Denaturalizing the Border, Environment and Planning
D: Society and Space, 2002 (20), 561580.