U.S. homeland security and risk assessment

https://doi.org/10.1016/j.giq.2015.04.008Get rights and content

Highlights

  • Risk assessment drives U.S. security policy.

  • The practices of risk threaten safety and civil liberties, especially for other-ed populations.

  • The practices of risk hide how inconclusive risk assessments are.

  • The risk imaginary tries to control the unknown future.

  • The risk imaginary creates panic.

Abstract

Risk is constitutive of homeland security policy in the United States, and the risk apparatus supports growing concentration of executive power, increased surveillance, and secrecy. For example, the Transportation Security Administration in the Department of Homeland Security employs risk assessment particularly against groups considered “other.” Using the work of mostly European scholars, especially the literatures about Foucault's governmentality and Beck's risk society, the paper combines theory with empirical work by governmental agencies on transparency, secrecy, and risk assessment methods used in the Department of Homeland Security, providing insight into the securitization of the American state. Risk is a means to futurize threats to the polity, to create the security imaginary, a fictionalization that creates a moral panic and a climate of fear in seeking to cope with uncertainty. With those limitations of risk in mind, we can question four important elements of risk in U.S. security practice: “connecting the dots”; the quantitative bases of risk assessment algorithms; how risk assessment tends to ignore the important if circular intentionality of terror; and the difficulties inherent in controlling populations by classification, especially other-ed populations. The paper concludes with suggestions about unmasking the uncertainty of risk assessment and enabling oversight of its practice by legislative, judicial, and public actors.

Introduction

At the annual meeting of the Association for Information Science and Technology in Montréal in fall 2013, there was a panel discussion about information policy since 9/11/2001 that considered, among other things, the role of scholars in the study of public information policy and security. Among the themes discussed was the scholarly and ethical imperative for scholars of public policy to be members of “the loyal opposition,” exploring what Mannheim called “dangerous thoughts” (cited in Mythen & Walklate, 2006, p. 395). That is, policy scholars must view what policy makers do with a skeptical but sympathetic eye and must be independent from governmental power while recognizing the difficult task at hand in keeping the polity safe, open, and welcoming. The current paper is an exercise in that skepticism, critically examining the use of risk management in general, and risk analysis in particular, as a cornerstone of security policy in the United States.

Post-9/11 initiatives in the U.S. to increase government secrecy and government surveillance are part of a much older and larger narrative in politics of the accretion of executive power and the intractable tension between secrecy and openness. This last is a “mess” (Schön, 1983, p. 16, citing Russell Ackoff); a “muddle” (Lindblom, 1959, Lindblom, 1979); or a “wicked problem” (Rittel & Webber, 1973). These are terms used to describe enduring dilemmas in public policy. One way of reading American political history is as a story of the increasing concentration of power in the executive branch of government, no matter which political party or parties are in power or which may be in decline. This concentration comes, in part, at the expense of the power of the legislature and judiciary. In the context of security affairs, one theme in this expansion is the growth of the concept of homeland security from war and national security, a story well if briefly told by Relyea (2002) in the earlier pages of this journal. Another theme is the “rhetoric of crisis” that governments of all stripes have commonly used, including the executive branch of the government of the United States, which has been explored in depth by, for example, Kiewe (1994) and Kuypers (1997) on the U.S. presidency and crisis rhetoric. This long-standing use of crisis has, since 9/11, devolved into the rhetoric of permanent emergency (Doty, forthcoming). A third theme in this expansion is how it is that increased governmental secrecy and surveillance can undermine the public trust in government.

In order to make appropriate theoretical interventions and to inform both the polity and policy makers about political conflicts, scholars must often assume a contrarian position in the emotionally volatile context of the politics of security. It is important to ask genuine questions about important security matters, especially to question the need for increased surveillance, increased secrecy about governmental actions and decision-making, exceptions to the Constitutional protections of citizens and non-citizens, and the purported necessity to avoid judicial and legislative review and oversight of executive action. At the same time, however, research into information policy problems can remind us all of the moral landscape in which such problems reside without resorting to moralistic and antagonistic attitudes toward decision makers.

Section snippets

Examples of risk assessment and travel security since 9/11

Acting on President George Bush's Proposal to Create the Department of Homeland Security of June 2002 (U.S. Executive Office of the President, 2002), the 107th U.S. Congress established the Department of Homeland Security in the Homeland Security Act of 2002 (PL 107-296, codified at 6 USC 111) on November 25 of that year. Section 101 of the Act specifies the mission of the Department, and the first four of the six elements that identify its “primary mission” focus on terrorism: (1) to “prevent

Risk as a social concept and in security studies

As explored above, risk management generally, and risk assessment in particular, are foundations of U.S. homeland security policy and are key to understanding the twin actions of surveillance and secrecy. While the examination of risk theoretically and politically is more mature in the European literatures (see selected citations below), it is increasingly clear that examinations of risk in U.S. security policy are useful. This paper is a small contribution in that conversation. Before looking

Risk as an imaginary

As discussed throughout this paper, risk has been an important characteristic of modernity. In this sense, risk is a tool by which the uncertainty of the future is “tamed” (see Hacking, 1990, Hacking, 1991). Uncertainty is translated into concepts (such as insurance and social service institutions) and technologies (e.g., actuarial tables, risk management and assessment techniques, and computational routines) that stabilize the unknown and unforeseeable. Excellent historical reviews of the

The value of a contrarian view

The beginning of this paper notes the discussion at the 2013 ASIST meeting about the value of some policy scholars' taking a contrarian view of security practices, viewing governmental action with a sympathetic but skeptical eye. As noted, such an approach is especially valuable when dealing with the messes (Schön and Ackoff), muddles (Lindblom), or wicked problems (Rittel & Webber) presented by homeland security post-9/11. Some of these particular difficulties are well known and widely

Final words

We imagine homeland security overwhelmingly to be an information problem; thus, more information seems to be the only way to address it. Research in information studies and in other disciplines has long revealed that more information often undermines our ability to make good decisions, and that we can never have “all the information” (e.g., Bawden and Robinson, 2009, Eppler and Mengis, 2004, O'Reilly, 1980). Given the unmistakable speculative character of risk and risk assessment, there is no

Philip Doty is Associate Dean and Associate Professor at the School of Information at the University of Texas at Austin and earned his PhD from Syracuse University's School of Information Studies. He is Associate Director of the Telecommunications and Information Policy Institute and Faculty Affiliate of the Center for Women's and Gender Studies at UT. He co-edited Privacy in America: Interdisciplinary Perspectives with William Aspray and wrote about the relation of copyright and privacy,

References (81)

  • David Bawden et al.

    The dark side of information: Overload, anxiety and other paradoxes and pathologies

    Journal of Information Science

    (2009)
  • Ulrich Beck

    The risk society: Towards a new modernity

    (1992)
  • Ulrich Beck

    The terrorist threat: World risk society revisited

    Theory, Culture & Society

    (2002)
  • Ulrich Beck

    World at risk

    (2009)
  • James R. Beniger

    The control revolution: Technological and economic origins of the information society

    (1986)
  • Peter L. Bernstein

    Against the gods: The remarkable story of risk

    (1996)
  • Dider Bigo

    Security, exception, ban and surveillance

  • Geoffrey C. Bowker et al.

    Sorting things out: Classification and its consequences

    (1999)
  • Dallas Boyd et al.

    The dark matter of terrorism

    Studies in Conflict & Terrorism

    (2010)
  • Rosi Braidotti

    Metamorphoses: Towards a materialist theory of becoming

    (2002)
  • Gerald G. Brown et al.

    How probabilistic risk assessment can mislead terrorism risk analysts

    Risk Analysis

    (2011)
  • Robert Castel

    From dangerousness to risk

  • Alfred D. Chandler

    The visible hand: The managerial revolution in American business

    (1977)
  • Blaise Cronin

    Intelligence, terrorism, and national security

  • Marieke de Goede

    Beyond risk: Premeditation and the post-9/11 security imagination

    Security Dialogue

    (2008)
  • Daniel Defert

    “Popular” life and insurance technology

  • Philip Doty

    Ethics, risk, and U.S. government secrecy

    Journal of Information Ethics

    (2015)
  • Mary Douglas

    The depoliticization of risk

  • Paul N. Edwards

    The closed world: Computers and the politics of discourse in cold war America

    (1996)
  • Jacques Ellul

    The technological society [La technique]

    (1964)
  • Martin J. Eppler et al.

    The concept of information overload: A review of literature from organization science, accounting, marketing, MIS, and related disciplines

    The Information Society

    (2004)
  • Richard V. Ericson

    The state of preemption: Managing terrorism risk through counter law

  • François Ewald

    Insurance and risk

  • Michel Foucault

    Discipline and punish: The birth of the prison

    (1979)
  • Michel Foucault

    The confessions of the flesh

  • Michel Foucault

    Governmentality

  • Oscar H. Gandy

    The panoptic sort: A political economy of personal information

    (1993)
  • Oscar H. Gandy

    Coming to terms with the panoptic sort

  • D. Garland

    The limits of the sovereign state: Strategies of crime control in contemporary society

    British Journal of Criminology

    (1996)
  • Cited by (9)

    • Building Cybersecurity Awareness: The need for evidence-based framing strategies

      2017, Government Information Quarterly
      Citation Excerpt :

      Communication about cybersecurity issues and the urgent need for policies is a difficult endeavour and cannot be easily communicated in a clear and convincing manner. All too often, people point to cybersecurity risk as a means to futurize threats to the polity – to create a security imaginary, a fictionalization that might create a climate of fear (Doty, 2015). Furthermore, the way humans and technology interact, blurs and dissolves the concepts of being ‘inside’ or ‘outside’ a cybersecurity space (Leuprecht, Skillicorn, & Tait, 2016).

    • Surveillance as information practice

      2023, Journal of the Association for Information Science and Technology
    View all citing articles on Scopus

    Philip Doty is Associate Dean and Associate Professor at the School of Information at the University of Texas at Austin and earned his PhD from Syracuse University's School of Information Studies. He is Associate Director of the Telecommunications and Information Policy Institute and Faculty Affiliate of the Center for Women's and Gender Studies at UT. He co-edited Privacy in America: Interdisciplinary Perspectives with William Aspray and wrote about the relation of copyright and privacy, especially how technological determinism contributes to privacy invasions in digital environments.

    View full text