scholarly journals Mapping Interfacial Regimes of Control: A Qualitative Analysis of America’s Post-9/11 Security Technology Infrastructure

2020 ◽  
Vol 18 (2) ◽  
pp. 231-243
Author(s):  
Emma Knight ◽  
Alex Gekker

Recent technological advancements in surveillance and data analysis software have drastically transformed how the United States manages its immigration and national security systems. In particular, an increased emphasis on information sharing and predictive threat modeling following the terrorist attacks of September 11, 2001, has prompted agencies such as the Department of Homeland Security to acquire powerful data analysis software from private sector vendors, including those in Silicon Valley. However, the impacts of these private sector technologies, especially in the context of privacy rights and civil liberties, are not yet fully understood. This article interrogates those potential impacts, particularly on the lives of immigrants, by analyzing the relational database system Investigative Case Management (ICM), which is used extensively by Immigration and Customs Enforcement (ICE) to track, manage, and enforce federal immigration policy. As a theoretical framework, the we use Benjamin Bratton’s concept of the “interfacial regime,” or the layered assemblages of interfaces that exist in modern networked ICT infrastructures. By conducting a document analysis, we attempt to visually situate ICM within the federal government’s larger interfacial regime that is composed by various intertwined databases both within and outside the government’s realm of management. Furthermore, we question and critique the role ICM plays in surveilling and governing the lives of immigrants and citizens alike.

2010 ◽  
Vol 8 (1) ◽  
pp. 43-60 ◽  
Author(s):  
Anthony Bolton Newkirk

This paper argues that 'fusion centers' are byproducts of the privatization of state surveillance and assaults on civil liberties, at least in the United States, the nation on which the research is based, with special focus on the recent case of the Maryland State Police spying scandal. In fusion centers, members of local, state, and federal police and intelligence units, as well as private-sector organizations, share information with each other by means of computerized technology and store it in databases. While the official purpose is to protect public safety, the practice of 'data-mining' and unclear lines of authority lead to fusion centers being unaccountable to the public and, hence, a threat to the democratic process. These conditions are encapsulated in the case of official espionage in the state of Maryland at least between 2004 and 2006. Drawing on official documents, the history of 'homeland security' since World War II and the characteristics of fusion centers, the Department of Homeland Security, and events in Maryland are surveyed. Working within the contexts of social history, surveillance theory, and political economy, this paper is grounded in the work of Beck, Churchill and Wall, Donner, Fuchs, Graham, Lyon, McCulloch and Pickering, and Monahan.


2020 ◽  
Vol 54 (4) ◽  
pp. 1184-1211 ◽  
Author(s):  
Pia M. Orrenius ◽  
Madeline Zavodny ◽  
Sarah Greer

E-Verify is a federal electronic verification system that allows employers to check whether their newly hired workers are authorized to work in the United States. To use E-Verify, firms first must enroll with the Department of Homeland Security (DHS). Participation is voluntary for most private-sector employers in the United States, but eight states currently require all or most employers to use E-Verify. This article uses confidential data from DHS to examine patterns of employer enrollment in E-Verify. The results indicate that employers are much more likely to sign up in mandatory E-Verify states than in states without such mandates, but enrollment is still below 50 percent in states that require its use. Large employers are far more likely to sign up than small employers. In addition, employers are more likely to newly enroll in E-Verify when a state’s unemployment rate or the state’s population share of likely unauthorized immigrants rises. However, enrollment rates are lower in industries with higher shares of unauthorized workers. Taken as a whole, the results suggest that enrolling in the program is costly for employers in terms of both compliance and difficulty in hiring workers. A strictly enforced nationwide mandate that all employers use an employment eligibility program like E-Verify would be incompatible with the current reliance on a large unauthorized workforce. Allowing more workers to enter legally or legalizing existing workers might be necessary before implementing E-Verify nationally.


Author(s):  
Fred H. Cate ◽  
Beth E. Cate

This chapter covers the US Supreme Court’s position on access to private-sector data in the United States. Indeed, the Supreme Court has written a great deal about “privacy” in a wide variety of contexts. These include what constitutes a “reasonable expectation of privacy” under the Fourth Amendment to the Constitution; privacy rights implicit in, and also in tension with, the First Amendment and freedom of expression; privacy rights the Court has found implied in the Constitution that protect the rights of adults to make decisions about activities such as reproduction, contraception, and the education of their children; and the application of the two privacy exemptions to the Freedom of Information Act (FOIA).


Author(s):  
María Cristina García

In response to the terrorist attacks of 1993 and 2001, the Clinton and Bush administrations restructured the immigration bureaucracy, placed it within the new Department of Homeland Security, and tried to convey to Americans a greater sense of safety. Refugees, especially those from Iraq, Afghanistan, and Syria, suffered the consequences of the new national security state policies, and found it increasingly difficult to find refuge in the United States. In the post-9/11 era, refugee advocates became even more important to the admission of refugees, reminding Americans of their humanitarian obligations, especially to those refugees who came from areas of the world where US foreign policy had played a role in displacing populations.


2010 ◽  
Author(s):  
Steve Kerber ◽  

Under the United States Department of Homeland Security (DHS) Assistance to Firefighter Grant Program, Underwriters Laboratories examined fire service ventilation practices as well as the impact of changes in modern house geometries. There has been a steady change in the residential fire environment over the past several decades. These changes include larger homes, more open floor plans and volumes and increased synthetic fuel loads. This series of experiments examine this change in fire behavior and the impact on firefighter ventilation tactics. This fire research project developed the empirical data that is needed to quantify the fire behavior associated with these scenarios and result in immediately developing the necessary firefighting ventilation practices to reduce firefighter death and injury. Two houses were constructed in the large fire facility of Underwriters Laboratories in Northbrook, IL. The first of two houses constructed was a one-story, 1200 ft, 3 bedroom, 
bathroom house with 8 total rooms. The second house was a two-story 3200 ft, 4 bedroom, 2.5 bathroom house with 12 total rooms. The second house featured a modern open floor plan, two- story great room and open foyer. Fifteen experiments were conducted varying the ventilation locations and the number of ventilation openings. Ventilation scenarios included ventilating the front door only, opening the front door and a window near and remote from the seat of the fire, opening a window only and ventilating a higher opening in the two-story house. One scenario in each house was conducted in triplicate to examine repeatability. The results of these experiments provide knowledge for the fire service for them to examine their thought processes, standard operating procedures and training content. Several tactical considerations were developed utilizing the data from the experiments to provide specific examples of changes that can be adopted based on a departments current strategies and tactics.


Sign in / Sign up

Export Citation Format

Share Document