National Security, Surveillance, and Mental Health

advertisement
National Security, Surveillance, and Mental Health at the Canada-U.S. Border
Alex Rosenblat, M.A.
Department of Sociology, Queen’s University, Kingston, ON
Supervisors: David Murakami Wood and Annette Burfoot
September 2013
1
Introduction
In December 2010, Lois Kamenitz, a Canadian woman, was denied entry to the
United States (U.S.) at Toronto’s Pearson International Airport after her digital records
alerted the border guard who was performing a routine interview with her that she had a
history of mental illness. When she asked why U.S. Custom and Border Patrol (CBP)
agents had access to her health records, they replied that they had her police record, and it
indicated that police attended her home in 2006 (Bridge 2005:NP). “I was really
perturbed,” Kamenitz says. “I couldn’t figure out what he meant. And then it dawned on
me that he was referring to the 911 call my partner made when I attempted suicide”
(Ibid.). Suicide is not necessarily the result of mental illness, but an indication of it is a
sufficient condition from which a border guard can infer a history of mental illness.
Kamenitz reported her border case to the Psychiatric Patient Advocacy Office (PPAO), a
government institution in Toronto. Since her case emerged in 2010, at least a dozen other
similar cases, Canadians denied entry to the U.S. after digital records indicated a mental
illness have been reported to the PPAO (PPAOb 2011:NP).
Evidently, police records generate informal mental illness labels that can have
consequences far beyond regional policing concerns. Once private information is shared
with agencies outside of those for which it was originally designated, there is the risk that
this practice will become normalized, grafting permanent stigmas onto the people who
are castigated by them. This essay will offer a sociological analysis of those
consequences by examining border controls, surveillance, and mental health. It will
compare pre-9/11 bilateral efforts in trans-border crime prevention with significant
2
expansion in collaborative border security initiatives implemented post-9/11. This
expansion reflects a shifting focus in Canada-U.S. crime-prevention collaboration from
trans-border criminals to a new mandate revolving around National Security agendas.
After 9/11, there were some American suspicions that Canada was a vacuum for
terrorist activity. This vacuum represents a convenient foothold for greater American
insinuation into Canadian border operations. Indeed, the border became a source of
significant interest to the U.S. as it developed greater Homeland Security structures to
deal with the threat of terror. Canada is implicitly, and sometimes explicitly, included in
the ‘Homeland’ (Radia 2013). Canada subscribes to U.S. National Security initiatives at
the border as a function of several agreements it entered into concerning economic and
security relations. These relations are contextualized by a power disparity that exists
between the two nations in which the U.S. has the upper hand, although it is perceived as
a mostly neighbourly, not a coercive, figure in the Canadian historical imagination.
The U.S. has long pursued a strategy of zero-risk management to achieve its National
Security goals, something which became more explicit, intense, and obvious after 9/11
(Lyon 2013:101). At the border, broad surveillance systems are used to collect large
amounts of data on people, in order to sort them into categories ranging from low-risk to
high-risk. An analysis of this strategy indicates that locating risk, somewhat arbitrarily, in
varying objects and digital records, like mental health, promotes insecurity because it
deflects attention from less obvious markers of concern and creates queues behind the
security gate that can present a new target for terrorist attacks (Molotch 2012:106). The
solution to this dilemma thus far has been characterized by the building up of a culture of
fear to balance out the introduction of security measures with untested or unproven
3
efficacy. The latter both inconvenience travelers, and can have significant negative
consequences to the travelers who are caught up in the security apparatus because they
are marked as ‘risky’. The capricious nature of risk assessment also provide a dangerous
precedent in terms of what kinds of governmental actions can be justified at the border
under the umbrella of ‘security’. Throughout this paper, the rhetoric of national security
will be addressed – specifically how it plays on notions of security and insecurity (Lyon
2013:100). This essay argues that some categories of risk, in particular mental illness, are
based on stigmas and stereotypes, and that there is little evidence that focusing on mental
health improves national security.
The overly broad nature of a category like mental illness makes about a fifth of the
Canadian population potentially ‘higher-risk’ than other Canadians because one in five
will experience a type of mental illness at some point in their lifetime (The Public Health
Agency of Canada 2002: NP). In the course of my research I have not found any
evidence that people with mental health issues are a higher security risk. It is an
unexamined assumption, held self evidently true because it has been a reason for denying
people entry to the U.S. for about a century (Bridge 2005:NP and U.S. Citizenship;
Immigration Services 1988: Sec. 212.7), although what mental illness referred to a
century ago is very different than what it encompasses today. This is evidence of one of
the flaws in broad surveillance systems, which is that casting too wide a net distracts
attention from more pointed searches for terrorists, and subsequently creates more
insecurities about what is ‘risky’. Conversely, when people are hindered in their travel or
mobility because of mental health issues or inferences, their experience serves to amplify
the stigma of mental illness on a broader, societal level. This is especially problematic
4
because health information is considered highly sensitive, and less visible. Its sudden
visibility on the screen of a foreign border guard in a space fostered by intergovernmental co-operation signifies a type and scale of trespass that is jarring.
By sharing information on its citizens that includes sensitive references to mental
health status with U.S. border authorities, the Canadian government is enabling a foreign
government to discriminate against Canadians in ways that are prohibited at home by the
Canadian Charter of Rights and Freedom. This discrimination may even reduce actual
security by allocating resources to categories of risk that are too broad to be effective.
While the Charter does not apply, legally, at the border, it has the potential to apply to
information that supports stigma-based discrimination, which travels from Canada to the
U.S. More importantly, the Charter is a sort of map for the kind of society that Canada
aspires to be, and reflects distinctly Canadian values about discrimination and civil rights.
Simply put, it is impossible to sanctify one standard of rights and values within the
country, and then abandon that standard at the periphery, without creating dissonance in
values Canada stands for as a free and open society. The Kamenitz case is a clear
example of that kind of dissonance.
It is possible to take some action against this gap though, which is evidenced by the
Ontario’s Chiefs of Police Association’s positive response to the issues raised by
Kamenitz’s case, which was to implement guidelines advising police not to record mental
health information into police records, with some exceptions. Their actions, which will be
discussed in more detail later in this essay, lay the groundwork for further debate on the
intersection between policing and mental illness, and the appropriation of local police
records foreign governments to fulfill national security goals. In support of this debate,
5
several examples of Charter and other rights issues that arise from collaborative bilateral
security and economic regimes will be offered throughout this essay to demonstrate that
Kamenitz’s case is part of a larger trend in governmental surveillance and Canada-U.S.
relations.
Throughout this essay, the term “Canadian citizens” will be used interchangeably
with “individuals.” Although the term “citizen” is slippery, nuanced and contested, it
does have a specific legal definition that will be employed here: it refers to people who
have official Canadian citizenship, rather than people who are in the process of applying
for citizenship or who are on any kind of visa. I make this distinction between people
who have legal status as Canadian citizens versus people who are more transient,
temporary or not yet permanent members of Canadian society, like foreign students,
travelers and refugees, in order to examine specifically how Canadians are treated at the
border. While both Canadian and American border control authorities have access to each
other’s national police databases, my intent is to focus on the impact of this convergent
surveillance on Canadians with mental illness. As well, just as “…in ordinary Canadian
speech, the word ‘border’ resonates to mean primarily one thing: the crossing-point to the
continental USA,” (New 1998:35). All mentions of the border in this essay refer to that
crossing-point.
A Brief History of Canada-U.S. Information-Sharing Practices on Criminals Before 9/11
Canada developed a computer-based system for compiling and sharing
information between provinces and jurisdictions on violent crime in the 1980s as an
investigative tool for tracking serial offenders who commit serious crimes. An FBI
program in the U.S. called the Violent Criminal Apprehension Program (ViCAP) inspired
6
the creation of a national database of Major Crime Files (MCF) in Canada. These
automated systems are aimed at organizing criminal apprehension efforts across regional,
provincial and national borders, between the U.S. and Canada. The MCF system proved
ineffective with only 800 cases in the database and 1 linkage (RCMP, ViCLAS:NP). In
1991, Canada sent a representative to the U.S. to study their serious crime linkage
systems who subsequently revamped the Canadian system successfully; as of 2007, it
contained 300 000 cases and 3 200 linkages, according to the Plans for the Future section
of the RCMP website. Today,
The RCMP are working with the FBI who are in the process of redesigning their ViCAP system. It
is hoped that by sharing information they will be able to develop a system that will allow the
portability of information across systems” (NP).
However, the RCMP’s website does not specify what kinds of information they want to
share and if this goes beyond records of serious crimes.
The Canada Police Information Centre (CPIC) was established in 1972 to form a
centralized national database of police records. CPIC is also connected to the United
States National Crime Information Center (NCIC), run by the Federal Bureau of
Investigation (FBI), which allows both countries to access each other’s national criminal
databases. Indeed, in a comment on the Kamenitz case, RCMP Inspector Denis St. Pierre
says,
The database contains anything that could alert authorities to a potential threat to public safety and
security, and all CPIC information is available to the U.S. Department of Homeland Security….
(Bridge 2011:NP).
A cursory summary of the Privacy Impact Assessment of CPIC (neither the actual
assessment nor a substantial summary is publicly available yet, according to the RCMP’s
website, because there is no formal departmental process for processing it) makes no
7
mention of privacy concerns related to bilateral information-sharing practices between
the U.S. and Canada. It does discuss the current functions and goals of these practices:
CPIC…will continue to be integral to meeting the RCMP strategic objectives by facilitating
information sharing at the national and international working levels, thus facilitating the
prevention of situations such as terrorist attacks…CPIC is and will continue to be a national
repository of information of interest to the law enforcement community and provide query
capabilities to other indexed data repositories of administrative and law enforcement systems such
as…NCIC [National Crime Information Centre] and NLETS [The International Justice and Public
Safety Information Sharing Network] in the United States…(RCMP 2005: NP)
While most information in CPIC is currently available to U.S. authorities, through
a Memorandum of Cooperation made between the RCMP and U.S. border authorities,
there are some exceptions. For example, Wandering and Missing Person’s information is
restricted (BC Civil Liberties Union 2012:NP).
The method by which the U.S. CBP officers would have gained access to CPIC's
police records database in Kamenitz’s case is through a Memorandum of Understanding
(MoU) between CPIC and the Toronto Police, and subsequently through a Memorandum
of Cooperation (MOC) between the RCMP and the FBI, although the specific MoU in
question is not available in the public domain. A request made to the RCMP in 2011
under The Freedom of Information act, submitted by Fritsch when he was legal counsel
to the PPAO, for information on a,
MoU or other agreement between the Canadian Govt [government], the RCMP and the USGovt /
US Dept Homeland Security governing the cross-border sharing of CPIC information, both current
and all historical agreements going back to 1980 (Fritsch 2011:NP).
was met with a reply to the effect that no such records could be found. In any event,
Kamenitz’s lawyer, Sean Dewart, did manage to obtain copies of a an MoU between the
RCMP and the Toronto Police, as well as Memorandum of Cooperation dated July 25,
2008 between the RCMP and the FBI, “which "built upon and supplemented" a 1999
8
Memorandum of Cooperation ("the 1999 MOC") dated May 6, 1999” (Dewart Factum
2012) regarding the direct automated CPIC/NCIC Interface. However,
The 2008 MOC observes that the “use of information contained in the CPIC and the NCIC/III is
for criminal justice purposes…However, neither the 1999 MOC or the 2008 MOC address the
types of records and the extent of disclosure of information in the records to be shared on the
direct automated computer interface. (Ibid. 11)1
It is standard practice for police officers to submit police records to CPIC. At the
border, the Automated Canadian United States Police Information Exchange System
(ACUPIES) gives U.S. CBP officers access to CPIC files. Although it is unclear when
the ACUPIES program began, it currently processes over 12 million transactions per year
(RCMP 2006:NP).
CPIC files became part of an automated system of bilateral data surveillance
through the Integrated Customs Enforcement System (ICES) program. ICES was
originally a U.S.-based initiative for U.S. customs and border enforcement purposes, but
since 2004, Canada’s CBSA has been participating in it as well to share and compare
notes on passenger information for those who travel across the border. This program is in
place typically at major border crossings only, such that a person who is flagged at
Toronto’s Pearson International airport may not be flagged at a point of entry in rural
Quebec. As the Office of the Privacy Commissioner of Canada (2010) reports,

ICES also contains records on arrests, seizures and customs investigations.

Using ICES, CBSA officers are able to create, access, maintain and issue “lookouts.” A
lookout flags or identifies particular travellers or vehicles on the basis of risk
indicators or other available intelligence. [emphasis added]

Some travellers may be pulled over for secondary inspections or searches. In that case, all
related information is also entered into the ICES database, including the reason for the
additional screening; the results of the search; interview notes; identity information such
as name, age, address, citizenship, licence and passport numbers; details of any CBSA
The original citation within the Factum is this, but I do not have access to it: St-Pierre Affidavit, Exhibit
E, Applicant's Compendium, Tab 3E, p. 73
1
9
actions taken (for example, if the individual was searched, arrested or detained), and the
names of travel companions.

Personal information collected under this program is retained for six years.
Kamenitz’s incident above was recorded into the CPIC’s centralized database
with this kind of flagging system, and the information collected on her for policing
purposes was clearly instrumental in creating trouble for her at the border. Her data
double superseded any reassurance she could have offered U.S. border authorities about
her mental state. Law enforcement officers routinely enter over 540,000 criminal records
into that system annually (RCMP 2009:NP) and these records include any information
relevant to a criminal investigation, even if no charges are ever brought against the party
under investigation. As Dewart (2012), Kamenitz’s lawyer, notes, “The creation of a
CPIC record for an individual who has attempted suicide is absolutely discretionary.
There is an absence of clear criteria or statutory authority for determining when a CPIC
record for a suicide attempt is required” (p. 4). The RCMP (2009:NP) manages 9.6
million CPIC records, which are available to U.S. border authorities. According to the
Privacy Commissioner of Ontario, Ann Cavoukian (2007), in a report on police
background checks,
… police databases often contain… information about an individual’s mental health…In fact, if
you have had any contact with the police or have come to the attention of police for any reason,
this may be recorded in police records (p. 1).
The process by which a non-criminal police record, like Kamenitz has, is created is
outlined below in the graphic by the PPAO (PPAOd 2011:4)2 :
Graphic sourced directly from: “What is a Mental Health Police Record?” Mental Health Police Records:
Issues and Solutions. Presented by the Police Records Check Coalition, Nov. 22, 2011.
2
10
A police record contains data about any encounter an individual has had with
police, including observations that police make about the mental status of those they
encounter. Despite the graph above, a hospital visit is not necessary for the purpose of
creating a record based on an encounter, but the visit itself guarantees the creation of a
record. Recorded encounters include the medical emergencies to which police are alerted,
and can contain misinformation or misunderstandings about the details of the supposed
crisis. A person who is misidentified with mental illness issues is equally subject to a redflag at the border as is a person having a medical emergency, and the limited recourses
available to rectify misinformation poses a continual obstacle to citizens who are fighting
for their mobility, and their liberty.
11
According to the British Columbia Division of the Canadian Mental Health
Association (CMHA), the scope of the issue of police intervention in mental illness
events is significant:
A 2008 research study by the Vancouver Police Department found that more than one-third of all
calls for Vancouver Police involve people with mental health issues. In the Downtown Eastside, it
increases to almost one in every two calls. A CMHA BC Division study found that over 30% of
people came into contact with police during their first experience trying to access mental health care
in BC. (CMHA 2012:NP).
Sometimes, well-meaning officers arrest people they perceive to be having a mental
health crisis just to guarantee that the person will be seen by a hospital (MHCC 2013:50).
Suffice it to say that ill intent of officers is not the issue; the issue is how easily mental
health can become a policing concern, and how this has significant consequences when
concern transpires into something much more dire in a national security context at the
border.
At the border, each U.S. CBP officer has the legal right to use discretion to deny
entry to anyone for any reason according to the DHS (2010:NP), but automatic flagging
is likely to make them less reliant on personal discretion – after all, each officer is very
likely terrified of admitting the next 9/11 terrorist into the country. However, the way
that information on Canadians travels to the U.S. is problematic because it puts individual
citizens at the sometimes-capricious mercy of CBP officers, whose power or job exists in
its current format on the basis of the fear and unease perpetuated by the security
apparatus that it represents. This raises important questions about the principles behind
risk assessments as they are made at the border, and how they came about.
In the wake of 9/11, the DHS was created to fight the War on Terror that thenPresident George Bush declared in October 2001. The DHS was given the mandate to
12
secure U.S. borders against external threats to U.S. national security under the Homeland
Security Act of 2002 (Haddal 2010:1). That act brought the Bureau of Customs and
Border Protection (CBP) under DHS control. Risk management became DHS’s main
strategy for securing U.S. borders (Muller 2008:2) against terrorists, illegal aliens,
smugglers and other criminals (Haddal 2010:1). Risk is calculated as part of this strategy:
DHS collects vast amounts of information on people, which it uses to sort them into
categories of risk at pre-clearance screening stations.
Why Is The U.S. More Concerned With The Canadian Border After 9/11?
After 9/11, Canada was mistakenly but popularly identified as a potential source
of some of the terrorists who entered the U.S. in the 9/11 attacks. “The 9/11 Commission
Report” by the National Commission on Terrorist Attacks upon the United States (2004)
did note that there were “…examples of terrorists entering from Canada, awareness of
terrorist activity in Canada and its more lenient immigration laws…” 3 (p.81) before 9/11.
Prior to the attacks, the border had been perceived as,
…a dividing line so accepted that it has been described in recent years as the longest undefended
cliché in the world. Canada and the United States were the archetypical “good neighbours.”
(Taylor 1989:241).
Post-9/11, the border loomed large in America’s national imagination as a source of risk
to national security, even though none of the 9/11 terrorists entered the U.S. via Canada.
In the wave of finger pointing that followed the attacks, Canada was noted as a possible
The “9/11 Commission Report” is referring to the case of Ahmed Ressam, who arrived in Montreal in
1999 using a false passport, admitted it was false when he underwent questioning by Canadian border
guards, and successfully claimed political asylum for false persecution in Algeria. He later drove a car full
of precursor materials for a bomb from Victoria, Canada to Port Angeles, but was selected for secondary
inspection because he looked nervous. He panicked, and tried to run away. Ressam claimed that a Bin
Ladin lieutenant, Abu Zubaydah encouraged and facilitated the plans for attack. (National Commission on
Terrorist Attacks upon the United States 2004:176-177). It also noted that, “All but one of the 9/11
hijackers acquired some form of U.S. identification document, some by fraud” (Ibid.:398).
3
13
source for future attacks as “…the keeper of an under-policed border which posed a
security threat to its powerful neighbor, the United States.” (Murphy 2007: 4). In 2001,
for example, Democratic Senator Byron Dorgan suggested that,
We have a 4,000 mile border between the United States and Canada, with 128 ports of entry, and
100 of them are not staffed at night. At 10 o’clock at night, the security between the United States
and Canada is an orange rubber cone, just a big old orange rubber cone. It cannot talk. It cannot
walk. It cannot shoot. It cannot tell a terrorist from a tow truck. It is just a big fat dumb rubber
cone sitting in the middle of the road (Moens and Gabler 2012:10).
While the rubber cone is, hopefully, a metaphorical function of rhetoric, it signifies a
notion that does play into public perceptions of Canada in America, which is that it is
unable to defend itself, or America’s interests, without a stronger American presence in
Canadian border operations. Indeed, in a report prepared for the U.S. Congress in 2010,
Chris C. Haddal (2010:25), a specialist in immigration policy noted that as per concerns
raised after 9/11, the U.S.
…emphasis on intelligence and cooperation with Canada reflects the concern that terrorists may
attempt to infiltrate the United States along the sparsely defended northern border. In their report,
the 9/11 Commission noted that prior to the terrorist attacks, the northern border received very
little attention from Congress or the White House…
After 9/11, this attention shifted and Canada became the focus of border talks that had a
national security agenda tied in explicitly with an economic or trade relations’ agenda.
Before discussing how those relations shifted, it is worth outlining the U.S. attitude
towards risk management and broad surveillance, the defining precepts of U.S. National
Security.
The State of Pure Knowing
Current risk management practices at the border invoke a type of relationship
between risk, security, information, and surveillance that represents a grounded
application of American philosopher John Dewey’s (1984) idea that the “quest for
14
complete certainty can be fulfilled in pure knowing alone” (p. 7). Indeed, the Director of
Administration of The International Justice and Public Safety Information Sharing
Network (NLETs) characterizes the role of information-sharing practices as follows:
In the post-September 11 world, information is the cornerstone of protecting citizens and property.
Whether it’s the officer on patrol…or an agent at an international border, the 21st-century law
enforcement and criminal justice professional faces a daunting task (Locke 2005:NP).
Since the 9/11 terrorists were from the Middle East, risks to national security became
more strongly associated with foreign or foreign-looking bodies that pass through the
border. This effectively relocates uncertainty and insecurity away from the confines of a
national space and onto groups that are conceived of as foreign and deviant. Indeed, the
larger discourse of risk is about labeling risk, whether or not it really exists, by
identifying sources of it. If there are no good ways to identify sources of it, then stigma
fills the vacuum. The stigmatized are left to grapple with proving that they are not risky
to people working for the DHS or CBP, which is difficult to do, because stigma is a
powerful thing, and because those with mental health issues involving police records tend
to have little to no recourse for getting a third, more powerful body to weigh in on the
risk assessment.
Indeed it has long been established in the human rights arena, and in particular by the
Ontario Human Rights Commission (2009: 13), that there is a “…domino effect,”
whereby barriers in one area (such as education or employment), lead to barriers in other
areas (such as housing)...” This domino effect can equally be used to describe the way
that mental illness stigmas evolve into higher-risk stigmas at the border.
Mental Health Stigmas
Overall, mental illness has become so widespread as a label that terms like
15
‘depression’ or ‘bipolar’ have entered the common vernacular as an explanatory category
for describing deviant or anti-social behavior. A survey conducted by the Canadian
Medical Association (CMA) in 2008 revealed that, “Almost half of Canadians, 46 per
cent, think people use the term mental illness as an excuse for bad behaviour” (CBC
2008:NP) The former president of the CMA, Dr. Brian Day, commented, “In some ways,
mental illness is the final frontier of socially-acceptable discrimination” (Ibid:NP). The
border manifests this conceptual frontier physically, where socially acceptable
discrimination has become the basis for profiling. When medical labels are appropriated
as a tool for securing the border in an effort to shield society from a perceived threat of
people with mental illness, they become a permanent feature of that individual’s profile
in the CPB database and beyond. In an age of wide-scale medicalization of ‘abnormal’
behaviour, medical diagnoses can present risks far outside the range of a doctor-patient,
diagnosis-treatment protocol.
Mental health is particularly sensitive to societal overreaction associated with
stigmatized identities because stereotypes about it are so prevalent. As Corrigan
(2000:49) notes, “Research has shown that well-trained professionals from most mental
health disciplines also subscribe to stereotypes about mental illness.” Many disorders
share similar diagnostic criterion. Moreover, the symptoms of mental illness can be
described qualitatively; they do not routinely rely on clearly physical indices of disease,
like the laboratory results of blood work tests. All of which makes mental illness
diagnoses more subjective and thus more vulnerable in a culture that promotes
medicalization. As psychiatrist and academic Thomas S. Szaz wrote in The Myth of
Mental Illness,
16
The notion of mental symptom is therefore inextricably tired to the social (including ethical)
context in which it is made in much the same way as the notion of bodily symptom is tied to an
anatomical and genetic context (Szasz 1960:NP).
In The Depsychiatrization of Mental Illness, anthropologist Joseph Dumit (2005:
9) notes how pressures in the West from the pharmaceutical industry to expand its market
has led to a trend of mass diagnoses of illnesses and the creation of a state of ‘dependent
normality’, where people depend on medication to regulate their daily life. In other
words, it has become ordinary for people to seek out a medical diagnosis and a label for
their ills; and every medical label is characterized by the danger or risks inherent to the
disorder it defines. This is not to discount the real medical conditions for which people
seek treatment, but it does highlight a societal standard for mass medicalization that
includes mental health. This trend has become so conventional that it is being entrenched
in legal codes. For example, Illinois passed into law the Children’s Mental Health Act,
2003, and a task force was subsequently established to design mandatory screening
processes for mental illness in pregnant women and children ages zero to five (Center for
the Study of Social Policy 2012:13). This type of legislation speaks to the fixity of mental
health surveillance, and the potential hazard of using it in governmental functions that go
beyond ensuring the health or well-being of the nation. If it is used to keep people under
control via their category, it leaves very little space for individuals to have privacy. As
Cohen (2012) observes about the need for individuals to have privacy in a surveillance
sosciety, “It is also and more generally about preventing the seamless imposition of
patterns predetermined by others” (p. 149).
Medical data in particular exacerbates the existence of the ‘Other’ by identifying
multiple classifications of abnormalities. It can also provide fodder for what Beck (2006)
describes as, “the ‘mathematicized morality’ of expert thinking and public discourse on
17
‘risk profiling’” (p. 333). On a theoretical level, Beck has posited that, “risk exposure is
replacing class as the principal inequality of modern society” (Ibid). Therefore, the
increased medical surveillance of Canadian citizens is potentially introducing a model for
social control that catalogues people according to their risk, and confers or reduces legal
and social privileges on them accordingly. For instance, the Nexus card, which allows
travelers who are considered low risk to pass through the U.S.-Canada border more
quickly than non-card holders, can be considered a metaphor for the digitization and
classification of citizens into the ‘haves and the have nots.’ In other words,
medicalization of individuals’ behavior is one way to facilitate or hamper their social
mobility – it helps to determine who has the privilege of movement and who is restricted.
In examining how risk is manufactured in modern societies, Beck (2006)
observed that, “…in the face of the production of insuperable manufactured uncertainties
society more than ever relies and insists on security and control…” (Ibid:335). The US
National Security apparatus is tasked with finding the exception, the terrorist, and in
doing so it has created broad categories that make everyone a possible exception. Having
overly broad categories of risk is clearly counter-productive to finding a needling terrorist
in a haystack, which is what broad surveillance systems are all about.
Broad Surveillance Systems
The border is a unique place in time and space where the digital data doubles of
men and women take precedence over the characteristics or information that can be
observed from the contents of their baggage or a search of their person for the purpose of
18
border controls. Instead, mass amounts of data are collected from a variety of sources and
are used to sort travelers into low or high-risk categories. Records or information on
people that did not previously cause hassles at the border are newly relevant to post-9/11
risk management regimes that aim to achieve better security through broader surveillance
practices. As Gilles Deleuze (1992) argues,
The numerical language of control is made of codes that mark access to information, or reject it.
We no longer find ourselves dealing with the mass/individual pair. Individuals have
become “dividuals,” and masses, samples, data, markets, or “banks” (NP).
To wit, “Surveillance societies do not monitor people qua individuals but operate
through dissembling and reassembling data points (Taipale 2012:NP), resulting in
“dividualization”. Lyon has further noted, with reference to consumer marketing and data
mining practices and their value to post-9/11 security surveillance practices, that,
The key practice here is that of coded categories through which persons and groups of persons
may be sorted (Cayhan 2005; Lyon2003b). If personal data can be extracted, combined, and
extrapolated in order to make profiles of potential consumers for targeted marketing purposes,
then, by a similar logic, such data can be similarly processed in order to identify and isolate groups
and persons that may be thought of as potential perpetrators of “terrorist” acts. Such “social
sorting” has become a standard way of discriminating between different persons and groups…”
(Lyon 2006:404).
In practical terms, one of the criticisms levied against the TSA by the U.S. House
of Representatives (2011) is that it has,
…failed to develop an effective, comprehensive plan to evolve from a one-size-fits-all operation—
treating all passengers as if they pose the same risk—into a highly intelligent, risk-based operation
that has the capacity to determine a traveler‘s level of risk and adjust the level of screening in
response (p.10).
In a one-size-fits-all operation of broad surveillance, citizens become ‘dividuals,’ and,
instead of creating an improved albeit homogenizing security machine, broad
surveillance adopts a bulldozing approach to security with unclear effectiveness at the
19
high cost of civil liberties. Security technologist Bruce Schneier4 (2009) argues that,
…it is largely unnecessary to trade civil liberties for security, and that the best security measures –
reinforcing the airplane cockpit door, putting barricades and guards around important buildings,
improving authentication for telephone and Internet banking – have no effect on civil
liberties…(NP)
Moreover, he argues that using data mining to uncover future terrorist plots is
untenable. “We’re not trading privacy for security; we’re giving up privacy and getting
no security in return” (Schneier 2006:NP).
The TSA encourages people to submit lots of information about themselves so it can
be processed by data banks, but it is not easy to prove that you do not belong in the
category of risk that your information may put you in. One way to deflect risk and to
increase mobility, according to TSA schemes, is to let them know more about you, either
through application to pre-screening programs like Nexus, where you submit forms
detailing your travels and habits over a lengthy period of time, or by being invited to join
an alternative pre-screening program like PreCheck if you are identified as a frequent
traveler whose habits are already known well enough, as opposed to the less frequent
traveler about whom less is known. Both of these schemes, and others like it, have to do
with the perceived banality of security to people in higher-income classifications, who
are considered lower-risk in the first place. Reducing the hassles of security screening is
about making traveling easier for those with the incomes to be highly mobile; the flip
side is that the TSA can reduce the energy it expends on interviewing everyone by
making exceptions of an elite. While higher-income/lower risk ratios initially applied
more to the flying elite of the private jet world, there is a developing trend that makes
Bruce Schneier is a long-time critic of the TSA’s ‘security theatre’ and was removed from the witness list
appearing before a congressional meeting of the Committee on Oversight and Government Reform and the
Committee on Transportation and Infrastructure at the TSA’s request in March 2012 (Masnick 2012:NP).
4
20
flying without the hassles of TSA screening, in pre-clearance forms or otherwise,
available to the ‘mass affluent’ (Rosenbloom 2013:1). These hassles reflect a broader
trend that Kamenitz’s case demonstrates well: mobility is a privilege, and one that is
subject to capricious restrictions at the border in the name of national security.
What matters less is what you have become, but rather, what identity markers on your
primarily digital profile are currently being selected out for security purposes, which
means that old stigmas can resurface in unexpected ways, in particular to restrict mobility
at the border. Kamenitz’s record of a suicide call was four years old by the time she was
flagged at the border, and she had traveled freely between 2006 and 2010 before that. In
times of crisis, stigma has a nasty way of resurfacing to form social controls over
‘suspicious’ groups of people. This process is sometimes trumpeted as national security.
In other words,
…the ontological assumptions made in "emergency" situations about the categories of “people”
and “things,” and how these value judgments structure and define the concept of “emergency"
itself. (Stark 2012:1).
According to a representative from the DHS, mental illness is now on America’s
border security radar. He is quoted as saying, “Mental illness is actually under our law as
a reason that you may not get admitted…The issue is always going to be: could someone
be a danger to someone [else]?” (Bridge 2005:NP). Indeed, the U.S. Department of State
(1995:NP)) highlights Section 212(a)(1)(A)(iii) of the 1965 U.S. Immigration and
Nationality Act on its website to note that any alien who has,
a physical or mental disorder and behavior associated with the disorder that may pose, or has
posed, a threat to the property, safety, or welfare of the alien or others,” may be ineligible for
admission to the U.S (NP).
21
Mental illness has been a reason for denying an individual admission to the U.S.
since 1917, a time when mental illness primarily referred to mental retardation (Ellis
Island Exhibit 2012). Although the U.S. has long held legislative policies on the
exclusion of the mentally ill (U.S. Citizenship and Immigration Services 1988: Sec.
212.7),5 these laws could not be readily mobilized against Canadians with digital records
of mental illness until the computerization and digitization of various databases occurred,
and until databases that contain mental health references were made available to U.S.
border authorities. The risk of mental illness is relevant to the DHS now presumably
because a zero-risk border securitization strategy demands more stringent management of
anything perceived as risky. As criminologist Pat O’Malley (2006) notes,
…a move to a “risk-based” approach will not necessarily entail a radical transformation but,
rather, will represent the formalization and intensification of practices that are already in place (p.
414).
In a zero-risk border management policy, suspicions are given more weight than
good security because risk is about fear and stigma. As Beck (2009) describes, “Risks
exist in a permanent state of virtuality, and only become “topical” to the extent that they
are anticipated. Risks are not “real,” they are “becoming real” (p. 292). The possibility of
risk-management as a source of security is tempting strategy because life-logs of people
5
The U.S. has long held an immigration policy on this issue. According to Title 8 of the U.S. Code of
Federal Regulations, in Section 212(a)(1) of the Waiver of Certain Grounds of Excludability, various
stipulations regulate what constitutes what kinds of mental health records or indications make its subject
eligible or ineligible for admission: “If the alien is excludable under section 212(a) (1) or (3) (because of
mental retardation or because of a past history of mental illness) he or his sponsoring family member shall
submit an executed Form I - 601 to the consular or Service office with a statement that arrangements have
been made for the submission to that office of a medical report. The medical report shall contain a complete
medical history of the alien, including details of any hospitalization or institutional care or treatment for
any physical or mental condition…and findings as to the current mental condition of the alien, with
information as to prognosis and life expectancy and with a report of a psychiatric examination conducted
by a psychiatrist who shall, in case of mental retardation, also provide an evaluation of the alien's
intelligence. For an alien with a past history of mental illness, the medical report shall also contain
available information on which the U.S. Public Health Service can base a finding as to whether the alien
has been free of such mental illness for a period of time sufficient in the light of such history to
demonstrate recovery” (U.S. Citizenship and Immigration Services 1988: Sec. 212.7)
22
are becoming available, such that biographical events of the past are regaining new
meaning.
As such, the present ability to capture and store vast amounts of information is inspiring a vision
of pervasive computing that generates ubiquitous information of the present, which is kept to
become a continuous record of the past. (Dodge and Kitchen 2007:432)
While the DHS is not necessarily tracking all life events of everyone, it seems
inspired by that same vision of pervasive computing as a salve to the despairing question
of how to catch terrorists. Being able to identify, or condemn, someone based on a thing
they did in the past, that other people probably did as well, on the pretext that this event is
sufficient proof of their ability to harm something as substantial as national security is a
powerful tool for mobilizing state resources against them, and for garnering public
support for this powerful step. That is not the equivalent of good security, which is what
the rhetoric about national security and 9/11 claims; rather, it is a way of showing
strength in much the same way that a bully shows strength by picking not on an enemy,
but on someone whose oddness or even criminality might be credible by virtue of the
stigma they carry, as a weaker party. Bullying rhetoric works to rile up support for
national security regimes because there is a general consensus that national security is
important, to avoid another 9/11. In fact, young soldiers at Guantanamo Bay are made to
watch an FBI presentation on the events of 9/11 because they were in grade-school when
9/11 happened, and the government wants to keep the attacks fresh in the minds of its
young fighters (Currier 2013:NP).
As part of the U.S.’s War Against Terror, the DHS has spent huge sums on
programs of unverifiable efficacy using the post-/911 rhetoric to solicit large budgets
from the U.S. Congress in many areas, but for border patrol in particular. A
Congressional Research report in 2010 noted that,
23
Appropriations for the Border Patrol has grown steadily, from $1.06 billion in FY2000 to $3.58
billion requested in FY2011 – an increase of 238%. The bulk of this increase has taken place since
the formation of DHS in FY2003 and demonstrates Congress’s interest in enhancing the security
of the U.S. border post 9/11. (Haddal 2010:6).
Indeed, specific costs-effectiveness reports have been missing components of the
information DHS releases. The National Priorities Project, a non-governmental
organization based out of Massachusetts, which aims to make government budgets
transparent, offers, critically, that
The lion’s share of responsibility for border security lies with part of the DHS, the U.S. Customs
and Border Protection (CBP), which had an $11.7 billion budget in fiscal 2012. But in the land of
utter duplication that is Washington’s version of counter-terrorism, there is also something called
the Border Security Program at the State Department, with a separate pot of funding to the tune of
$2.2 billion last year. The jury’s out on whether these programs are faintly doing their jobs, even
as they themselves define them. As with so many other DHS programs, the one thing they are
doing successfully is closing and locking down what was once considered an “open” society.
(Kramer and Hellman 2013:NP).
Public support for this kind of huge spending is fueled more by rhetoric and less by
firm, transparent data or clear (not mixed) results. It is evident, however, of an
observation that philosopher Giorgio Agamben (2005) observed about our current
situation: “The State of Exception tends increasingly to appear as the dominant
paradigm” (p.2). Wildly increasing defense expenditures, coupled with major shifts in
border policies, are symptoms of this exceptionalism. The attitude is that we must do
whatever it takes to prevent another 9/11, which leads, in many cases, to another attitude
about civil liberties: this attitude is that they can be sacrificed in times of war because
national security is more important, or there will be no civil liberties left to discuss.
As The 9/11 Commission Report notes, “The terrorists have used our open society
against us. In wartime, government calls for greater powers, and then the need for those
powers recedes after the war ends” (2004:394). However, the vagaries in this ‘War on
24
Terror’, with the ever-expansive definition of what constitutes terror, and the unclear
distinction between terrorist versus criminal motivations, leads to an indefinite
justification of the State of Exception. Indeed, as Lyon observes,
Security – by which is often meant some ill-defined idea of ‘national’ security – is today a
political priority in and across many countries, and of course it is a massive motivator in the world
of surveillance…It seems that, ironically, today’s security generates forms of insecurity as a byproduct – or maybe in some cases as a deliberate policy? – an insecurity felt keenly by the very
people that security measures are supposed to protect. (Bauman and Lyon 2013:100-101).
Lyon also notes that, “There’s no knowing when the categories of risk may
‘accidentally’ include us or, more accurately, exclude us from participation, entry or
entitlement” (Ibid.:101). Lyon’s point speaks to the reasons why Canadians, whether they
are affected by mental illness or not, should be concerned about surrendering their
privacy too easily without benefit to themselves except the promise of ‘economic
competitiveness’. As McGrath (2004) notes about street surveillance cameras, but which
applies readily to surveillance and policing, “Operators of surveillance systems routinely
use the systems to watch, zoom in on and follow the members of the public they judge
likely to display criminal behaviour” (p.22). The same can be said for the way that
surveillance operates at the border. Indeed, the dangers of broad surveillance were
anticipated by “The 9/11 Commission Report”, which gave a thorough review of all the
factors leading to the 9/11 attacks, and recommendations for the prevention of future
terrorist attacks, the authors warned that,
Overreactions can impose high costs too-on individuals, our economy, and our beliefs about justice We
advocate a system for screening, not categorical profiling. A screening system looks for particular,
identifiable suspects or indicators of risk. It does not involve guesswork about who might be
dangerous…The border and immigration system of the United States must remain a visible
manifestation our belief in freedom, democracy, global economic growth, and the rule of law, yet serve
equally well as a vital element of counterterrorism. (National Commission on Terrorist Attacks upon
the United States 2004:387).
25
The ‘guesswork’ that the authors refer to happens in the sense that broad surveillance
systems are put in place; they allocate risk onto an increasing number of types of
suspicious people, characteristics, and objects; and those things become subject to greater
scrutiny because they are questionable for one reason or another. As Molotch (212:95)
observes, the “…latent effect of any security system that expands the number of potential
offenses that then, thanks to modern technology, follow the individual into realms where
security has no relevance.” The widening security net subsequently creates a greater
sense of fear about airports or other places of transport across borders, and prompts a
stronger belief in the need for more surveillance and security. This subsequently creates
the sense that we are still justifiably subject to the ontological assumptions made about
people in a State of Emergency (Stark 2012:1).
In the U.S., there have been numerous examples of people caught up in the TSA’s
overly wide National Security net who are good examples of the failures of such a wide
surveillance system. Current U.S. airport border security practices assign low risk to
every passenger (TSA 2011:Slide 10), and uses expanded pre-screening procedures
(passenger data collection and analysis); behaviour detection and screening programs;
and random and unpredictable selections of passengers for further screening to counter
the threat of unanticipated risks to national security. At Southwest Florida International
Airport, forty-three TSA employees were fired or disciplined in June 2012 for not
performing enough secondary inspections or random checks (Davidson 2012:NP).
The TSA began using a specific program, nicknamed the Assessor Project, in
August 2011 to identify suspicious passengers by having short interrogative interviews
with each person who tries to cross the border. It has received criticism from the U.S.
26
House of Representatives (2011) because,
Unfortunately, rather than employing several highly-trained transportation security personnel to
observe and question selected high-risk passengers, the demonstration project employed a large,
bureaucratic ensemble of Transportation Security Officers (TSOs) who expended an unnecessarily
lengthy time performing meaningless interviews with all passengers, regardless of risk level…(p.
12).
However, it is difficult to imagine how the TSA could avoid performing interviews with
everyone, and rely on a system of digital risk-assessments that do not have profiling as an
implicit part of the screening process, as per the recommendations of “The 9/11
Commission Report” that favors screening, but is against profiling (National Commission
on Terrorist Attacks upon the United States 2004:387). Risk-assessment necessarily has a
built-in idea of what to look for (Bauman and Lyon 2013:101), and in lieu of actual
effective measures for what a needle in a haystack might look like, broad surveillance
really means profiling according to categories. As Lyon (Ibid.) notes in addressing
Bauman in their ongoing correspondence about “liquid surveillance”,
So far from modernity managing to conquer fears one by one, liquid modernity now discovers that
struggling against fears is a lifelong task. And if we in the West weren’t fully conscious of this
before 9/11, what you call the ‘terrors of the global’ caught up with us then. After 9/11 the
practices of risk management, already de rigueur for several decades, became well known,
obvious. And again, you observed that with the surveillant focus on ‘external, visible and
recordable objects’, new surveillance systems were also bound to be ‘oblivious to the individual
motives and choices behind the recorded images, and so must lead eventually to the substitution of
the idea of “suspicious categories” in place of individual evildoers’. 6 (p.101).
6
Originally cited from Bauman (2006:6).
27
The Assessor Program is one example of a risk management policy that shifts
dichotomously away from the pre-9/11 idea that all risk is calculable and towards the idea
that all risk is, to some extent, unimaginable and unknowable and only knowable by
good, suspicious guesswork. That notion can be credited in part to the findings of the
9/11 Commission, which attributed the attacks in part to U.S. intelligence agencies’
inability to imagine the probabilities of unknown risks (Surveillance Studies Centre
2011), because they “did not connect the dots that could have prevented the attacks”
(NYDailyNews 2012:NP).
The Assessor Program recently came under fire again after more than thirty
federal officers from Boston’s Logan International Airport raised complaints against
racial profiling practices that emerged in the media in August, 2012, and
…asserted that passengers who fit certain profiles — Hispanics traveling to Miami, for instance,
or blacks wearing baseball caps backward — are much more likely to be stopped, searched and
questioned for “suspicious” behavior…The practice has become so prevalent, some officers said,
that Massachusetts State Police officials have asked why minority members appear to make up an
overwhelming number of the cases that the airport refers to them (Schmidt and Lichtbau 2012:1).
Despite mounting criticism, the Assessor program has been recommended as a model for
airport security all over the country, and was recently extended to Detroit Metropolitan
Wayne County Airport (TSA 2012).
If passengers object to any part of the screening process, they potentially risk
undergoing more invasive screening procedures. Technically, people are allowed to opt
out of going through the Advanced Imaging Technology units, or ‘body scanners,’ and
they are searched by hand instead, but they risk undergoing more invasive screening
procedures. There have been multiple examples of this happening reported in the media,
whereby TSA agents find nitrates on the bodies of passengers who opt out of the body
28
scanners; this provides the excuse for closer bodily inspections. Nitrates can indicate
residue from explosives, but they are also prevalent in a variety of non-explosive sources.
Traces of nitrates can be found in some medications, and on clothing from a variety of
sources, such as grass fertilizer, fireworks, firearms, and some hand lotions (USPA
2008:NP). In one instance, an entire airport was evacuated because someone’s cosmetics
were wrongly identified as explosives (Schneier 2008:3).
One woman, Dr. Tammy Banovac, who is bound to a metal wheelchair, always
refuses to go through the metal detector, so she is routinely patted down. Exasperated
with increasingly invasive physical searches she was subjected to, she appeared at an
Oklahoma City airport dressed in a bra and panties to protest treatment that made her feel
violated. Subsequently, she was sequestered for an additional one-hour search of her
person because nitrates were found on her body (Diaz 2010:NP). While the one-hour
search seems spiteful, it fits in with an idea about what kinds of ‘threats’ are being used
“to fill a vacuum of fear agendas” (Molotch 2012:9) when quotas for catastrophes are
unmet.
In another instance, a Florida passenger, who is a former TSA agent herself, is
facing misdemeanor battery charges for groping a TSA agent who had grabbed at her
breasts and crotch in the screening process. In the U.S., the right to protest invasive
searches was recently established in court in the case of John Brennan. He opted out of
the body scanner screening process and chose to be inspected by a TSA officer instead.
His clothing was swabbed for an Explosive Trace Detection test and traces of nitrates
were found on his clothing, so he stripped down completely to prove that he was not
29
carrying an explosive, against the protests of the TSA agents on hand (Ross 2012:NP).
He was subsequently prosecuted on a violation related to charges of disorderly conduct,
although he maintains his legal right “…to be nude, but not lewd as a form of protest”
(Frauenfelder 2012:NP). He is quoted as saying,
“It’s security theater,” Brennan said. “They know it doesn’t do anything, but it gives the
appearance of doing something. The TSA needs to justify itself and the billions of dollars they’re
spending. They need to do their job, and I felt I needed to do my job, which is protecting my civil
rights” (Ross 2012:NP).
In July 2012, a judge agreed with him on his right to use nudity as a form of
protest, and the charges were dropped (Kravets 2012: NP). There is no commensurate
legal precedent in Canada in relation to protests at the border at this time. However, on
the topic of discriminatory security screening practices at the border, Karl Flecker, the
National Director of Human Rights and Anti-Racism at the Canadian Labour Congress
commented on discriminatory profiling practices that,
The government must acknowledge this reality and Parliament should engage in a review of these
practices to reaffirm that they are inappropriate under the Canadian Charter of Rights (ICLMG
2010:NP).
In the ongoing battle between civil liberties and Homeland Security, there is no
way to appeal to a higher authority against the treatment meted out by TSA agents nor is
there any way to protest their processes on-site, except, as Brennan did, through rights to
nudity. Conversely, if TSA agents act more prudently or cautiously in their searches, they
can be fired. Beyond the more titillating reports of inspection hazards, TSA methods are
giving way to more serious concerns about the profiling of activists, and searches of
computer hard-drives at the border, which raise significant privacy issues. TSA agents
met one activist, hacker, and computer-security researcher, who goes by his hacker
30
moniker, Moxie Marlinspike, at his plane when it arrived at JFK because his name was
on a list of sorts. He was held for four and a half hours while his devices, included his
laptop’s hard-drive, were searched. He comments,
If there’s some information that they think I have — I can’t speculate about what that might be —
they can’t legally get that because they don’t have any reasonable suspicions,” he said. “But they
can do whatever they want at the border. And it feels like that is possibly being abused (Zetter
2010:NP).
This type of extreme measure (at least, from a civil liberties perspective) is a
predictable consequence of anti-terrorist security measures that are free from
constitutional scrutiny. For example, in 2009, the American Civil Liberties Union
(ACLU) drew the media’s attention to a DoD Antiterrorism and Force Protection Annual
Refresher Course that indicated that protests are amongst “…certain First Amendmentprotected activities that may amount to “low level terrorism” (ACLU 2009:01). This
assertion has remained true to the present day. Four years after this determination from
the DoD, in September 2012, James Tyson, an activist who was traveling to the
Democratic National Convention was arrested for driving with a revoked license, was
informed that he is on a terrorist watchlist (Wright and Off 2012:NP) and ostensibly
jailed to prevent him from participating.
One viable alternative to profiling by categories of suspicion may be to rely on the
expertise of veteran agents, but that is hard to achieve, perhaps in part to the high
turnover rates of TSA agents, which stood at a 17% voluntary attrition rate in 2008 (U.S.
House of Representatives 2011:8). According to a 2010 Congressional Research Report
that refers to statistics offered by a General Accounting Office report from 1999,
…the average experience level of Border Patrol agents had declined agency-wide, and that the
percentage of agents with less than two years of experience had almost tripled, from 14% to 39%,
31
between 1994 and 1998. (Haddal 2010:33).7
One of the additional criticisms levied at the TSA by the U.S. House of Representatives
(Ibid., cited from O’Keefe 2010:NP) is that the quality of their hires is poor:
Despite TSA’s claims that it operates as an intelligent risk-based organization, TSA advertised for
employment at the Washington Reagan National Airport on pizza boxes and on advertisements
above pumps at discount gas stations in the D.C. area.
The National Commission on Terrorist Attacks upon the United States did note that one
of the potential 9/11 hijackers was stopped by the good instincts of one veteran agent,
however (2004:387), and perhaps trusting the instincts of reliably-recruited, intelligent
agents who have incentives to stay and to do their job well is one way to balance out the
need for security with the need for discretion. Schmitt (as cited in O’Connor and de Lint
2009:40) noted that,
…deciding the exception is a capacity of a competent sovereign. In order to maintain the capacity
to make competent decisions agents seek to advance opportunities where they can and with the
tools and technologies that they are uniquely positioned to exploit. Competence, being “absolute
and independent of the correctness of its content” (p. 15), may not be derogated and audited for
particular types of decisions.
Indeed, even if the TSA agents have adequate surveillance or other risk-assessment
technologies at their disposal, their ability to use discretion in a reasonable way is
obviously impaired if the ability of agents themselves is questionable, or they have to
work under conditions where their ability to use discretion is minimalized by overly
cautious or zero-risk management systems and lack of constitutional controls.
The absence of really good, compelling reasons for the way security is currently
conducted brings into question what the cost of broad surveillance measures is in other
7
The original citation, to which I do not have access, is: U.S. General Accounting Office, Border Patrol
Hiring: Despite Recent Initiatives, Fiscal Year 1999 Hiring Goal Was Not Met, GAO/GGD-00-39,
December 1999, p. 2.
32
areas. It seems like part of the purpose of big security systems that bulldoze over privacy
and other civil rights areas is to maintain a sense of insecurity, to justify a selfpropagating security apparatus. That brings into question, what exactly is being secured?
While this is a question worth exploring, it is beyond the scope of this essay. For now, it
will examine what mental health has to do with National Security, or rather, how the
mental health of Canadians became available to DHS through non-criminal police
records.
Does Mental Illness Create Insecurity?
Muller has identified the principle method of U.S.-Canada border risk management
security strategies as the ‘technologization’ of security. This results in the classification
of people into risky and non-risky travelers based on the digital information available on
them. In an overview on surveillance issues, Hacking (cited in Lyon 2007: 81) discusses,
…a “…‘looping’ effect that occurs with categorization, such that when a group of people are
classified, this is associated with certain laws or regularities concerning others in that group…Of
course, as Hacking also remarks, some classifications are ‘inaccessible’ to those classified, but the
classifications may generate institutional practices with which the classified may well interact, thus
once more creating looping effects.
To this end, any information that can be gathered on travelers through digital databases or
by TSA schemes that comes under the purview of centralized authorities is used to assess
the incalculable or unquantifiable risk that mobile citizens represent at border crossings.
However, as security technologist Bruce Schneier (2008) points out,
It’s not about data collection; it’s about data analysis…Demands for even more surveillance miss
the point. The problem is not obtaining data, it’s deciding which data is worth analyzing and then
interpreting. Everyone already leaves a wide audit trail as we go through life, and law enforcement
can already access those records…(p. 6).
Admittedly, it is difficult to know what information is valuable for sorting out potential
33
criminals or threats to national security, and what is a misleading signal (Cohen
2012:118). However, broad surveillance and its tools, like profiling, may make things
less secure, as both Schneier (2006) and, to similar effect, Molotch (2012:105) have
argued: “Profiles bias scrutiny toward those lacking the wit to fit in, not the sophisticated
plotter.” These ‘global marginals’ (those subject to scrutiny under emergent security
regimes in international settings) become quite vulnerable to what Bauman describes as
“…the increasingly concerted activities of international ‘managers of unease’ such as
police, border officials and airline companies” (Bauman and Lyon 2013:60-61).
While these ‘managers of unease’ are consumed with watching those who are
profiled, they create an opportunity for terrorist activity. There is an endless procession of
objects that can become ‘risky’ (TSA 2013:NP) if terrorists want to add to that list. All it
takes is one failed shoe bomb (Frischling 2011:NP) to result in a widespread,
international policy of shoe removal at the airport, which creates further queues and
another thing to be ‘managed’. As more objects or record types are identified as ‘risky’,
broad surveillance actually becomes the tool of the terrorists, who can use it to a) create
riskier situations for passengers who have to queue endlessly for any variety of security
measures, and b) force the U.S., and anyone following suit, to devote more and more
resources to airport security. At a certain point, it becomes evident that a better costanalysis needs to be in place to determine how broad is too broad.
While the social consequences of these information-sharing practices are still
developing, it is unlikely that it is any advantage for a citizen to have other governmental
or security agencies, local or international, alerted to their mental health issues. For
34
example, if there was a concern about protecting people from unnecessary border
difficulties, then perhaps they could be given papers providing medical clearance.
However, the U.S. panel-appointed physicians who examine Canadians with mental
illness and clear them for admission to the U.S. are prohibited from giving any
documentation to those travelers (Office of Dr. Seiden 2011). Instead, they must fax the
clearance information to a U.S. CBP station, and this information is maintained in the file
collected on each passenger. This creates another unknown for the weary traveller whose
mobility is at stake – did CBP receive the fax? Will the CBP officer they encounter go
find it if it’s not readily available? This obvious uncertainty indicates that the purpose of
this security measure is not to ensure safe passage for Canadians; rather, it is to add to a
sense of fear and uncertainty about their freedom of movement. Using records to create a
sense of insecurity is not very different from finding more and more objects, like
shampoo in excess of 30mL (Molotch 2012:95), to create an ongoing low-level panic
about what the terrorists might try next. There are no explicit concerns that the DHS has
stated about mental illness, or the risk the individuals with mental health issues or records
pose to national security. There is simply an operating assumption that mentally ill people
are prone to doing risky things that can harmfully affect others (Bridge 2005:NP). There
is no explicit concern that suicide bombers have mental health issues.
There is no procedure or protocol in place to appeal or to change or delete the data
collected on Canadians once it is given to the U.S. authorities, despite this policy in
section 7.2 of CPIC’s Reference Manuel:
CPIC Information from the Investigative Databank may be released for security and reliability
clearances or for private employment purposes; however, no CPIC information should be released
for this purpose unless:
35
1.
2.
3.
4.
confirmation and verification with the record owner (originating agency) has been carried
out; and,
the originating agency has been notified of the reason for the check and has consented to
the release; and
personal visual identification by the law enforcement agency of the subject of the check
has taken place; and,
the results of the check are communicated directly to the subject of the check… (OACP
2011:8)
Indeed, as Canada’s Privacy Commissioner points out,
When personal information moves across borders individuals may lose some of their
privacy rights such as the ability to request access and challenge the accuracy of the
information. One of our concerns about information that flows to government agencies in
the United States is that the US Privacy Act does not apply to foreign nationals, thereby
depriving Canadians and the citizens of other countries of certain privacy protections—
including access and redress rights—under American law (Office of the Privacy
Commissioner of Canada 2005:NP).
Canadians can request the criminal record kept on them by the RCMP through The
Privacy Act of Canada, and they are able to subsequently file a complaint if the
information on them is incorrect (John Howard Society of Alberta 2000:NP). However,
this does not necessarily rectify the information collected on them by U.S. authorities.
Indeed, as Cohen (2012) observes, “…the gap between the rhetoric of liberty and the
reality of diminished individual control is nonetheless striking” (p.3).
Murakami Wood and Graham observe on this type of boundary making between
categories of social groups to which risk is ascribed,
This is leading to an increasingly coded or software-sorted society and ‘splintered’ urban
landscape characterized by highly differentiated mobilities: corridors of high mobility and easy
access for some, and slow travel and difficult, expensive and blocked access for the majority.
However, for neither class is the permeability particularly negotiable, whether or not such controls
were highly accepted voluntarily or even requested (as most are in the case of higher income
groups) or were enforced. Once introduced, both access and blockage are increasingly functions of
encoded categorization. (Murakami Wood and Graham 2006: 178).
It is just this type of categorization or ‘encoded risk’ that resulted in Kamnitz filing suit
against the Toronto Police Service and the RCMP. She is arguing essentially that her
36
mobility was impaired because they enabled her private mental health information to
travel to the DHS, and that this is wrong and unlawful.
Kamenitz issued a Notice of Application to file suit against the Toronto Police
Services Board in the Ontario Superior Court of Justice that was heard on December 5,
2011. The Notice of Application makes,
(a)
a declaration that the Toronto Police Service contravened the Municipal Freedom of
Information and Protection of Privacy Act and the Canadian Charter of Rights and Freedoms in disclosing
the applicant’s personal medical information directly, or indirectly, to the United States Homeland Security
Service or to other known persons;
(b)
a declaration that the Royal Canadian Mounted Police contravened the Personal
Information Protection and Electronic Documents Act and the Canadian Charter of Rights and Freedoms
in disclosing the applicant’s personal medical information directly, or indirectly, to the United States
Homeland Security Service or to other known persons (Ontario Superior Court of Justice 2011:3).
The case was resolved privately, and the details of it are not available to the public, but
the question of how the Charter applies remains ripe for debate, and for legal action.
However, evidently, until clear policies are legislated on information-sharing practices
that take into account the Charter and Canadian privacy law, disputes that arise in this
area will be resolved in courts.
It is worth noting that the information available on her in the CPIC database has
the potential to be protected from border securitization policies if the information does
not indicate criminal activity.
As the Factum in her case points out,
The CPIC Manual distinguishes between the release of information for criminal/investigation
purposes and “non-criminal purposes” such as “security clearances”. The protocol for the
dissemination of information for “non-criminal purposes” is as follows:
If the request for release of CPIC information is for security and reliability clearance, you
must have written consent of the subject of the query. The subject must agree to the
release of information, identifiable to that person, that may be on the CPIC system.
[Emphasis from original source] (Dewart 2012:13)8
8
The original citation within the Factum is stated as the following, although I do not have access to it: 9
Supplementary St-Pierre Affidavit, Exhibit C, p. 44 [Bold emphasis added], Applicant's Compendium, Tab
4C, p. 149.
37
What a history of mental illness in general, and not with regard to specific
incidence of violence or threat to anyone or any thing’s security, has to do with national
security is largely based on myths about mental illness. What mental health has to do
with national security is unclear, and may bear no relation to it. For example, he U.S.
DoD gave implicit recognition to this when, in July 2008, they readjusted their
employment application form, which requires undergoing a background check to gain
security clearance, to reflect that mental health history alone does not make one ineligible
to work with them. The DoD’s “Questionnaire For National Security Positions” notes
that,
Mental health counseling in and of itself is not a reason to revoke or deny a clearance.
In the last 7 years, have you consulted with a health care professional regarding an emotional or
mental health condition or were you hospitalized for such a condition? Answer “No” if the
counseling was for any of the following reasons and was not court-ordered:
1) strictly marital, family, grief not related to violence by you; or
2) strictly related to adjustments from service in a military combat environment. (Henderson
2013).
In March 2013, the DoD became more specific on its form, which reflects the need to
articulate a useful policy change directed at job applicants who might be confused about
how their mental health history affects their ability to work towards national security:
In the last seven (7) years, have you had a mental health condition that would cause an
objective observer to have concern about your judgment, reliability, or trustworthiness in
relation to your work? Evidence of such a condition could include exhibiting behavior that was
emotionally unstable, irresponsible, dysfunctional, violent, paranoid, or bizarre; receiving an
opinion by a duly qualified mental health professional that you had a condition that might impair
judgment, reliability, or trustworthiness; or failing to follow treatment advice related to a
diagnosed emotional, mental, or personality condition (e.g., failure to take prescribed
medication). These examples are merely illustrative. Merely consulting a mental health
professional is not, standing alone, evidence of such a condition. [Emphasis added] (Henderson
2013:NP).
38
Evidently, the DoD thinks that mental illness is not a reasonable or definitive category of
risk because it is too broad, even though this is its border policy. This indicates that broad
surveillance is being used instead of better measures of risk, which lends more credence
to the argument that stigma is being used as a short-cut to security. Indeed, the DoD’s
change,
…reaffirms that an individual’s decision to seek mental health care alone cannot adversely impact
the individual’s ability to obtain or maintain eligibility to hold a national security sensitive
position or eligibility for access to classified information. Further, mental health counseling alone
cannot form the basis of a denial of a security clearance. The decision to seek personal wellness
and recovery should not be perceived to jeopardize an individual’s security clearance and may
favorably affect a person’s eligibility determination. (Office of the Director of National
Intelligence 2013:NP)
This policy articulation signifies that, in fact, mental illness is not prohibitive to good
national security work, a policy that is not subsequently reflected in the broad
surveillance classification systems applied to Canadian citizens at the border. Of course,
the DoD scrutinizes work applications in much greater and discriminating detail than can
be readily applied to the average traveler, so the opportunity that job applications have to
explain their mental health history is significant. It is worth noting, though, that using any
mental illness history to revoke privileges of mobility across the border is clearly overly
broad according to their own logic. The point is that they have the power to revoke those
privileges, and the Canadian government helps them do it by failing to put in place
appropriate privacy guards on trans-border information flows.
There is no explicit policy requiring the Canadian government to take note of its
citizens’ mental health records for the purpose of national security, so the way that it
happens is difficult to contest, especially since there is also no policy explicitly
prohibiting it. For example, the capriciousness or discretion with which the police create
39
records of mental health issues in the line of duty is noted by Dewart (2012:4), who
writes that,
The creation of a CPIC record for an individual who has attempted suicide is absolutely
discretionary. There is an absence of clear criteria or statutory authority for determining when a
CPIC record for a suicide attempt is required. In this case, it cannot be said that the collection of
the applicant’s private information regarding her suicide attempt was for the purpose of detection,
prevention or suppression of crime, or for the enforcement of any law.
Indeed, in response to the Kamenitz case, the Ontario Association of Chiefs of Police
(OACP) confirmed through its LEARN Guideline, discussed further in this essay, that a
“…police criminal record check will NOT include…Any reference to incidents involving
mental health contact that did not result in a conviction. (OACP 2011:53). The social
implications of linking criminality with mental health incidents indiscriminately are
clearly harmful and not warranted for good policing.
Beyond the logic of the DoD, and the Toronto Police, there is the simple math
available to put mental health flagging in perspective as clear proof that it is too broad to
be a reasonable way to flag for potential threats to national security: The Public Health
Agency of Canada (2002: NP) estimates that twenty-percent of Canadians will suffer
from a mental illness during their lifetime. Clearly, it does not make sense to flag one in
five people at the border because that kind of risk calculation is overly broad, imprecise,
and amounts to a bad security practice. CBP officers do not routinely ask passengers if
they have a mental illness, but it can come up, through a police record check, for
example, or through questions raised during the initial screening. For instance, if a
passenger is traveling to the U.S. for a medical appointment, a CBP officer might ask
what the purpose of the medical appointment is, and if it happens to be for mental health
40
reasons, then a red flag is raised. So, what is the purpose of having a rule on the books
against admitting people with mental illness to the U.S. that is haphazardly applied and
under-advertised? Even if the rule was being stringently applied, declaring one in five
people ineligible for entry to the U.S. is excessive. Moreover, there is a huge variety in
the types and symptoms of mental illnesses that exist. It might make sense to flag people
with violent disorders, if there is a way to flag for that, but it does not make sense to flag
everyone who has ever suffered from depression. The result of that would be a huge
amount of false positives for increased risk, which would distract the DHS from better
ways for catching terrorists. In fact, it is probable that the people who actively seek
treatment, and who are being treated, are most likely to have records of mental health,
and are therefore more likely to be caught by this rule, which essentially punishes them
for following and being open about their treatment regime. If it is not practical to flag
broadly for mental illness, and it is difficult to be more precise in flagging for ‘riskier’
disorders, then it is possible that the rule simply helps to maintain a sense of uncertainty,
suspicion, and fear at the border, which in turn supports the institutionalization of a state
of exception at security checkpoints. Molotch (2012:106) argues that this sort of
nonsensical profiling comes out of impotence on behalf of the state, in despairing how to
otherwise increase security effectively:
One reason for the great concentration of security at airports in the first place is not that it is
effective, but that it can, quite simply, be arranged. Against the inherent ambiguity of
securitization, having control at entry gates presents itself as something doable. Planes are nice
discrete people holders that have narrow points of ingress: passengers can be bunched up for
clearance at specific choke points. Logistical possibilities of this sort influence just where security
operates within the airport, even when it creates crowds that would otherwise not exist. The extra
questions at check-in slow down movement and cause people to cluster up. The security gate
furthers the gathering up, making for dense crowds- still not yet scrutinized for weaponry – often
in a snaking queue. This is a security-generated target often consisting of a large number of people
than would be on an airplane. It is a common observation in the security business that in hardening
a particular facility against perpetrators, you may deflect attack to a more opportune location…In
41
my discussions with former high officials at TSA, they express frustration with this problem,
which has evaded solution.
However, the solution has been to create a culture of unease to sort of justify
various actions of negligible or unproven efficacy that create hassles for travelers, and
have more sinister repercussions for those individuals who bear markers that exclude
them from easy passage at the security gate. As Lyon (2006) notes, “an intensification of
surveillance will likely produce more generalized suspicion, something that has been
patently obvious since 9/11 (Lyon 2003a)” (p. 406). What that generalized suspicion does
do, however, is support an increasingly bulky security apparatus that seeks out more and
more costly, and not necessarily effective, surveillance technologies. More information
does not mean more identified risk – it means that the increasing number of those who
are identified as risky experience more problems at the border. This theoretically enables
potential terrorists to identify what categories of risk exist, and then to create further
categories so as to consume the energies of the DHS or CBP, and then to outwit that
system by appearing as something that is not under closer scrutiny in a broad surveillance
system. Kamenitz is an example of someone whose profile came under closer scrutiny
because stigmatizing information from her non-criminal police record was available to
CBP, not because she threatened national security.
A few well-meaning individuals are fostering some public awareness of this issue.
The leading figures in this effort are human rights lawyer Ryan Fritsch and Kamenitz
herself, who became an activist on this issue after her border ordeal. Fritsch’s interest
originated at the Psychiatric Patient Advocacy Office where Kamenitz registered her
complaint, although he has since left the PPAO. He founded the Mental Health Police
42
Record Check Coalition (PRCC) in July 2011 with five other co-chairs who are
connected to various mental health and patient rights organizations, including the Human
Rights Commission, and took up the issue there. The work of the PRCC is primarily
limited to offering guidelines to Ontario police on how to minimize references to mental
health in the records they keep, and guidelines to mental health consumers on trouble
they can encounter at the border. Beyond offering advice to Ontario police on keeping
mental health terminology out of police records, the PRCC has not had significant
activity since May 2012, despite setting up social media outposts earlier in the year to
prospectively disseminate further information. Canada’s Privacy Commissioner is the one
other significant source of warnings about privacy issues associated with all kinds of
surveillance, but there has been no flurry of media activity or gripping political or public
debate about the hazards of bilateral information-sharing practices.
And yet, mobility is one of the most prized privileges one can have, especially in an
increasingly globalized world. Murakami Wood and Graham (2004:1) observe that,
Mobility has always been configured by borders and boundaries composed of a multiplicity of hybrid
objects, from infrastructure and technology to law and culture. These boundaries are permeable to
different degrees creating a society that is differentiated by speed and access, reflecting deeper trends
towards privatisation, social polarisation and the development of a risk-society…there is a tendency
towards technological lock-in which threatens to divide contemporary societies into high-speed, highmobility, connected and low-speed, low-mobility, disconnected, classes. Levels of permeability are
increasingly determined by automated systems of surveillance which continuously categorise, encode
those categorisations and enforce them upon individuals or groups based on the perceived danger that
they pose. This is leading to an increasingly coded or software-sorted society and ‘splintered’ urban
landscape characterised by highly differentiated mobility: corridors of high mobility and easy access
for some, and slow travel and difficult, expensive and blocked access for the majority.
The collection and use of private information, like mental health issues, for the
purpose of broad surveillance and security at the border leads to discriminatory security
screening practices of vulnerable populations; they are selected for increased scrutiny,
and in some cases, denied entry to the U.S. if their data is considered ‘risky’. There have
43
been more infamous cases of this like that of Maher Arar, who was deported to Syria by
U.S. security authorities and tortured during his investigation after he was nabbed on his
way back to Canada from Tunisia via the U.S. He was nabbed because of the type of
collaboration of Canada and the U.S. that is described in relation to the Kamenitz case.
The Kamenitz case is a good example, however, of what happens when ‘democratic
decency’ ceases to apply to the way that Canadians are allowed to be treated by the U.S.,
and that same attitude can result in extraordinary rendition or deportation. Her case
exemplifies better the real and potential vulnerabilities of people to databases used as
instruments of surveillance. Indeed,
Databases… are the modern apparatus of a particular form of knowledge about the human and the
international that collects and weighs massive quantities of information to be organized into
attributes and objects, presented in rows and columns. This information is inherently instrumental,
it is produced through what Max Weber referred to as ‘knowledge of the techniques by which
life—both external things and the behaviour of people—can be ruled through calculation (Ansorge
2011:2).
To this end, it is worth outlining what opportunity Canadians who have had their
health information retrieved by the DHS have to rectify the red-flag on their record, or to
‘void the calculation’.
If an individual is rejected at the border for medical reasons, they are given
paperwork for one of the three U.S. panel-appointed physicians who work in Canada to
fill out and submit back to CBP. In Toronto, this physician is Dr. Seiden, who runs a
practice that specializes in medical evaluations for immigration purposes. He charges
$250 CAD for an examination of an individual who is denied entry to the U.S. for
medical reasons, and the process can take four to six weeks.
44
A patient who undergoes this medical evaluation is unlikely to be physically seen
by the U.S. panel-appointed physician. Instead, the patient sends some forms to their
personal physician(s), if they happen to have one, and signs a consent form releasing that
or those physician(s) from keeping their records confidential. Subsequently, the personal
physician(s) answers several questions in writing that more or less ask if that patient has
ever caused harm to his or herself, or to others; what the patient has been diagnosed with
previously; and the treatment regimes prescribed for any such illnesses.
After these forms are sent to a U.S. panel-appointed physician, s/he can either rely
on the content of these forms to decide whether the patient will be put into Class A or
Class B, or s/he can follow-up with the patient. If further consultation is required with the
patient’s personal physician, the patient can be charged $500 an hour for this work.9 If an
individual returns to the border after being categorized as Class B (admissible), then they
can apply for entry again, although they could still be rejected by the CBP. This means
that medical classifications are not a free pass, but they help guide CBP officers in
determining the risk posed by individual travelers.
Class A disorders, which indicate that a person demonstrates harmful behavior
ranging from suicide attempts to substance abuse, are inadmissible, although those with
substance abuse problems can get their records re-evaluated after three to six months to
prove that they have ‘stayed clean’ (Serotte 2011:5). Incidentally, physicians who
conduct this evaluation are prohibited from sharing the evaluation document, which is
submitted directly to CBP by fax, with the individuals who are undergoing the
evaluation. This process underscores the sense of negative uncertainty that individuals
9
This information was obtained from several unrecorded telephone conversations with the secretary of the
Office of Dr. Seiden at 365 Bloor St. East, Suite 1400, Toronto, ON, in June, 2012.
45
with mental illness are subjected to by these protocols. Individuals cannot know what risk
they are perceived to pose, and therefore how to appeal their categorization (Cohen 2012:
234). At the border, an individual is only as good as their digital record indicates, or what
proof they have on paper to verify their identity and records. One can only hope that there
is no miscommunication or lost paperwork between a U.S. panel-appointed physician and
CBP. The question remains, why would Canada put some of its citizens into such a
vulnerable position? Or, in a broader sense, why is it so cooperative with the U.S. in
issues of National Security? One theory is that its cooperation is born out of its history of
mutual and neighbourly interests; the more sinister aspect of this is how easily a
neighbourly quality in bilateral relations can lend itself to coercive economic and security
regimes that put the sovereignty of Canada into question.
Good Neighbours
President Franklin Roosevelt once observed in a speech given at Queen’s
University in Kingston, Ontario in 1938 on Canada and the U.S.
We, as good neighbors, are true friends, because we maintain our own rights with
frankness…because we settle our disputes by consultation, and because we discuss our common
problems in the spirit of common good (Eagleburger 1989:59).
Then again, as Woody Allen once observed, “The lion will share the lamb’s bed, but the
lamb won’t sleep very well” (Pelletier 1989:226). The uneasy relationship between
Canada and the U.S. is, evidently, an outcome of the power disparity that exists between
the two countries. The U.S. is Canada’s largest trading partner, although Canada is not
the majority trading partner of the U.S.
According to Statistics Canada, 86% of Canada’s merchandise exports went to the
U.S. in 1999, for example (Haggart 2001:NP), and the U.S. continues to be Canada’s
46
largest trading partner. In 2011, 72% of Canada’s total merchandise exports went to the
U.S. (Statistics Canada 2012:NP). Evidently, Canadian government authorities are
motivated to find ways to relieve a ‘thickening’ of the border (more secure, theoretically,
but with long wait times). As Hier and Walby (2009) observe, “For the U.S. government
and, to a lesser extent, the Canadian government, information is a key weapon in the
‘War on Terror’” (p.12). Canada is one of many countries subscribing to the U.S.
domination of security ideas as a function of its economic subservience, although it is the
only country that will be discussed here. Molotch (2012:118) observes that, “U.S.
domination over security regimes stems from the country’s predominance in setting
standards for world commerce by making its own policies ipso facto global policies.”
Whether Canada participates in U.S. security regimes out of mutual interest, or out of
neighbourliness, or out of coercion, it is important to note that the disparity in power
between the two states is part of the framework for Canada’s participation in U.S.-led
border security initiatives. Moreover, substantial literature on U.S.-Canadian border
securitization indicates that Canada’s information sharing and risk management policies
are made in response to U.S. concerns. Political scientist Benjamin Muller (2008) notes
that,
The interests of cultural, political and market factors with long standing histories of cross border
collaboration and cooperation in borderlands have been neglected, ignored, or in the most
nefarious reading of the situation, intentionally disempowered. The reliance on RM [risk
management] strategies in border security leads almost inevitably to a “zero risk” approach to
border security (p. 2).
While the RM strategies that Muller speaks of will be addressed later in this essay, it is
important to note how the collaboration that Muller describes can lead to worrying
attitudes about sovereignty, and imbalances in Canada-U.S. relations.
47
The American attitude toward Canadian security, and sovereignty in that matter,
is summed up well by this recent photo, taken by the Associated Press, and featured in a
Huffington Post article entitled “Canada, Mexico become part of U.S. ‘homeland’ during
NSA [National Security Agency] Senate hearing” (Radia 2013):
It is worth noting the absence of Canadian sovereignty in this map.
Within Canada, “national security” and “trade” have been presented as two sides of the
same coin, as is evident in the title of a December 2011 agreement entitled the “CanadaU.S. Perimeter Security and Economic Competitiveness Action Plan.” Prior to this
agreement, however, other initiatives were introduced after 9/11 to make clear that a
secure border is necessary for secure trade. For example, in November 2001, the U.S.
48
launched a voluntary supply chain security program with its trading partners, including
Canada, called the “Customs-Trade Partnership Against Terrorism” (C-TPAT).
The implication of Canada’s voluntary subscription to C-TPAT is that a secure
border is necessary for secure trade, one of the major strongholds of the Canadian
economy. The less explicit implication is that Canada seems willing to play a lesser
sovereign role, or a greater cooperative, almost neighbourly role, in bilateral border
security talks, perhaps out of fear that the trade economy would suffer in the wake of
9/11. Indeed, Moens and Gabler (2012) observe that, “One enduring consequence of 9/11
was the damage to the commercial interaction between Canada and the US, which had
been growing for well over a decade (p.5).” Beyond the scope of economic coercion,
there is something to be said for the fact that Canadians “…remain deeply attached to our
vision of a model bilateral relationship with the United States, within a broader context of
multilateralism and collective security…” (Taylor 1989:243). While that vision
permeates Canadian-American relations, it should not act as a rationale for blindness on
the consequences of this cooperation. As Canadian poet and literary critic W.H. New
(1998) observes,
Because the American options are so readily accessible, Canadians are often strongly tempted to
mistake American priorities for domestic ones, and (at least temporarily) to blur cultural
differences…Merely to accept all American options, however, even in the name of openness,
would be to invoke a social closure of a different kind (p. 41).
Recent discussions between the U.S. and Canada about the border have brought
together the two issues of trade and national security into a singular bilateral concern.
Canada’s Minister for Public Safety, a ministry which was established in 2003 as
Canada’s version of the U.S. Department of Homeland Security (DHS), announced in
November 2010 at the 11th Canada-United States Cross-Border Crime Forum Ministerial
49
that,
This Forum is another demonstration of our Government’s commitment to working with our longtime friend and ally to combat crime at our shared border. Our discussion focused on how we can
build upon existing cooperation that addresses our mutual concerns, in a way that promotes
competitiveness and economic prosperity. We face the same threats, and share the same concerns
(Public Safety Canada NP).
C-TPAT was followed by the “Smart Border Declaration” from the U.S. and
Canada in December 2001, which culminated in the “Canada-U.S. Perimeter Security and
Economic Competitiveness Action Plan” in December 2011. The Action Plan outlined
the ways in which Canada and the U.S. would create a common perimeter for the passage
and of people and goods through a singular binational security ring in order to reduce
security threats, purportedly by allowing the U.S. to take the lead on Canada’s border
security, and to speed up waits at the border to achieve better trade relations. As one
scholar on Canadian-American relations has noted,
As the less powerful country on this continent, Canada has always had to stake out fences for
protection, not from American imperialism but from the force of continental pressures (Holmes
1989:27).
Canada was quick to come to terms with U.S. concerns through the “Smart Border
Accord,” an initiative that was implemented in 2002 in the aftermath of 9/11. While post9/11 bilateral information-sharing practices plans expand upon “already existing
measures, practices, and processes” (Lyon 2006:399) in regards to security and
surveillance. As well, bilateral information-sharing practices have antecedents in the pre9/11 world, “…Canada had been pressing for a “smart border” agreement for some time,
but 9/11 seemed to offer the vital opportunity” (Ibid.). This
Under the Accord, Canada and the U.S. formed Integrated Border Enforcement
Teams (IBETs) to provide a coordinated identification system of tracking passengers who
cross the border. The social impact of this coordinated surveillance on Canadians has not
50
been taken into account in these comprehensive agreements. Parliament of Canada (2009)
responded to the privacy concerns raised in the Privacy Commissioner’s audit in its
official Government Response, it noted that the CBSA was making progress by having,
“Started a series of initiatives to harmonize risk-scoring practices with the United States
Customs and Border Protection” (NP). In other words, Canada is cooperative, and will try
to think of Canadian security and risks posed to it in the same terms and constructs that
inform U.S. national security. However, Bennett and Raab (1998) argue, “…data
protection systems are better oriented toward understanding the functional variety of data
users than the sociological variety of data subjects…” (p.4). Therefore, the trend towards
bilateral, harmonized information-sharing practices and risk assessments is an
increasingly and ambiguously risky business for Canadians who wish to travel freely
between the U.S. and Canada, given the sociological variety and availability of digital
data, like, but not limited to, mental health records on them.
What Does Canada’s Cooperation Involve?
In November 2001, two months after the events of 9/11, legislative amendments
were made to Bill C-11, the Immigration and Refugee Protection Act, that required
commercial and charter carriers to provide the Canada Border Services Agency (CBSA)
with access to “…all reservation information held by the commercial transporter on
passengers to be carried to Canada” (Bennett 2005:129). At airport crossings, the CBSA
collects passenger information including “name, date of birth, gender, citizenship, travel
document data, itinerary, address, ticket payment information, baggage details and
contact telephone numbers” (Office of the Privacy Commissioner of Canada 2010:NP).
51
This information is obtained from a Passenger Name Record (PNR), which is often
created under the Galileo reservation system. Galileo is part of a larger network of global
distribution systems used by many Canadian travel agents (Bennett 2005:115).
Additional information can be included in or gauged from a PNR, to reveal,
where you went, when, with whom, for how long, and at whose expense. Behind the closed doors
of your hotel room, with a particular other person, they show whether you asked for one bed or
two. … Through meeting codes used for convention and other discounts, PNRs reveal affiliations
– even with organizations whose membership lists are closely-held secrets not required to be
divulged to the government. Through special service codes, they reveal details of travelers’
physical and medical conditions (Hasbrouck 2004 quoted in Bennett 2005:118).
This information is collected by the CBSA for the explicit purpose of performing a risk
assessment of travelers prior to their arrival in Canada as part of the Advance Passenger
Information/Passenger Name Record program. According to the CBSA, the Passenger
Information System (PAXIS) has a Passenger Assessment Unit that systematically
analyzes API/PNR data and red flags persons in high-risk categories for further
inspection (CBSA 2006). Lyon has noted that,
After 9/11, not only consumer data from airline passengers but also data relating to consumptions
of many kinds of commodities, from gasoline to motels to convenience-store goods, immediately
become of interest to criminal justice and intelligence personnel” (Lyon 2006:404).
Explicitly, “Canada and the United States have an agreement to share API/PNR data
under the terms of initiative number 8 of the Canada-U.S. “ Declaration and associated
32-point Action Plan” (CBSA 2008). However, according to an audit of the CBSA by the
Office of the Privacy Commissioner of Canada (2006), the CBSA lacks, and therefore,
…needs a coordinated method of identifying and tracking all flows of its trans-border data. The
Agency cannot, with a reasonable degree of certainty, report either on the extent to which it shares
personal information with the United States, or how much and how often it shares this information
(NP).
The ambiguity of information-sharing practices between the U.S. and Canada
continues to be a problem with consequences that are still developing. Kamenitz’s
incident is one example of how a seemingly non-pernicious system of dataveillance
52
(Clarke 1987:NP) and risk assessment can have a significant and negative impact on
those who are identified as risky. As Bennett (2005) points out,
The crucial process, therefore, is not the capture and transmission of the information, but the prior
procedures, and the assumptions that underpin them, about who is or is not a high-risk traveller (p.
132).
Bilateral agreements between the U.S. and Canada have found legislative support
within Canada, despite similar concerns raised by select members of Parliament. One
legislative example of this collaborative effort in Canada is an amendment that was
recently made to The Aeronautics Act through Bill C-42, which was initially proposed as
The Public Safety Act and is now called the Strengthening Aviation Security Act: An Act
to amend the Aeronautics Act, and which was last introduced to Parliament in March
2011 and is now an official law. Section 4.83(1) of Bill C-42 (Parliament of Canada
2011: 1) reads,
Despite section 5 of the Personal Information Protection and Electronic Documents Act… an
operator of an aircraft departing from Canada that is due to land in a foreign state or fly over a
foreign state and land outside Canada or of a Canadian aircraft departing from any place outside
Canada that is due to land in or fly over a foreign state may, in accordance with the regulations,
provide to a competent authority in that foreign state any information that is in the operator’s
control relating to persons on board or expected to be on board the aircraft and that is required by
the laws of the foreign state.
Bill C-42 was created in response to the U.S. Transportation Security
Administration’s (TSA) Secure Flight Program, initiated after 9/11, which requires
airlines to collect and share passenger information so that it can be matched to the U.S.
‘No-Fly’ watch list. This list is used to identify passengers who have been identified as a
security threat and the sharing of further details on each passenger is meant to reduce the
chance that a passenger with the same name as someone on the watch list is
misidentified. Before Bill C-42 passed into law,
53
NDP Member of Parliament Don Davies warned that Bill C-42 would give U.S. security agencies
unprecedented access to Canadians' personal information… This includes, “credit card
information, who we are travelling with, our hotel, other booking information such as tours or
rental cars, any medical condition of the passenger that may have been disclosed, dietary
preferences, our email address, our employer information, our telephone information, our baggage
information.” Davis also added, “This bill would effectively allow the United States to determine
when Canadians can leave Canada to fly to many destinations in the world that have nothing to do
with the United States. This bill violates Canadians' freedoms. It violates Canadians' mobility
rights” (Dana 2010: NP).
According to The Council of Canadians, a social justice activist and research
group, “75 per cent of all domestic flights in Canada will be covered by the U.S. Secure
Flight rules” (Trew 2011:NP) which effectively puts a large proportion of mobile
Canadians under U.S. surveillance, far beyond the scope of the threat that could be
reasonably contained by a watch list matching system. Notably, TSA agents cover
security for all domestic flights within the U.S., and they operate in tandem with CBP
officers for international flights.
Mobility is arguably one of the greatest assets to Canadian citizens in an increasingly
globalized economy of international networks and communities. Being unable to
participate in mobile networks of family, friends, business relationships, etc. renders
individuals less able than their freely mobile counterparts to participate in the global
economy. This restriction of movement denies them a level of privilege and function that
is life-altering. When one group of citizens is privileged over another group, it raises
questions about the justification of that gap, and the methods by which it is wrought.
As it stands now, Canadians have no sovereignty over their information after it
migrates across the border to the U.S., from where it is out of Canadian control. For
example, Jennifer Stoddart (2005), the Privacy Commissioner of Canada, notes that the
…US Privacy Act does not apply to foreign nationals, thereby depriving Canadians and the
citizens of other countries of certain privacy protections—including access and redress rights—
under American law. If data is held in Canada, my office can view the records even if they are
54
held by law enforcement and national security, but that is no longer the case once the data crosses
the border (NP).
In a tangential but telling example of the dangers of third-party access to private
information on passengers who cross the border by land, the Electronic Privacy
Information Center (EPIC) made headlines in the media in August 2012 for revealing that
U.S. Customs both tracks license plate information and shares it with insurance
companies. A spokesperson for EPIC raised a lot of questions that could equally apply to
all of the information Canada has agreed to share with the U.S.:
Who can these third parties share their data with? What other ways might it be shared? You have to
think about the ways this data slowly spreads out to third parties, and who then has access to it. It
shouldn’t be shared, and if it is, there should be more transparency about the details of who’s doing
the sharing, how it’s used and how long the data is retained (Greenberg 2012:1).
Greenberg’s observation is quite pertinent to the way the non-criminal police records on
Canadians can contain data that is hazardous to the mobility of those for whom the record
is created. Those hazards have clearly been overlooked or obscured by the Canadian
government, perhaps because the consumer and economic benefits of further
collaboration with the U.S. has been the publicized highlight of bilateral relations since
9/11.
Consumer v. Citizen
The duty that the Canadian government has to ensure the best interests and rights of
all of its citizens in terms of civil rights and privacy has been subsumed to the
commercial interests of the consumer-citizens, and the economic and security interests of
the state. This is evident in the types of surveillance that have emerged over Canadian
citizens in the interests of placating U.S. security concerns, and the types of economic
and security arrangements that Canada has entered into with the U.S.
55
Bauman (2005: 45) theorizes that,
The once complete and integral sovereignty of the state-nation evaporates upwards in to the
anonymous realm of global forces evading territorial allegiance and commitment…No longer in
full charge of the economy, security, or culture, the state cannot promise its subjects the whole-life
protection from the cradle to the grave which it not so long ago strove to provide. Fewer promises
mean, however, less need for the patriotic dedication and spiritual mobilization of its subjects. On
the soil of impoverished expectations, no longer fertilized by promises and hopes, heroic
patriotism is unlikely to grow; as it happens though, in the age of small professional armies the
state no longer needs heroes. Satisfied consumers, busy running after their own affairs, are doing
splendidly, thank you…
Although Bauman’s observation seems to encompass a more abstracted circumstance, his
note about ‘satisfied consumers’ applies quite readily to the Canadian government’s own
actual promotion of it’s goals. For example, In April 2012, the Privacy Commissioner of
Canada, Jennifer Stoddard, alerted Ottawa to pressing privacy concerns implicit in the
Action Plan (Savage 2012: NP). Subsequently, in May 2012, Canada and the U.S. issued
a Statement of Privacy Principles, mentioned earlier. It is significant to note, however,
that following on the heels of the Privacy Principles announcement, literally in the same
month of May, Canada raised the amount of goods that could be brought back duty-free
from the U.S. from $400 to $800 for a travel period of 48 hours (Davison 2012:NP). The
‘improved trade relations’ here helped to divert public attention away from scrutiny about
privacy issues and towards the ‘reward’ offered to Canadians who have to undergo
increased screening and surveillance at the border. However, while there have been
online consultations surrounding the perimeter security agreement, there has yet to be any
open public hearings or congressional and parliamentary debates (Dana 2012:NP).
Statistics Canada reported that Canadians took 807 000 trips overseas in June
2012, while Canadians took approximately 1.9 million overnight trips to the U.S. in that
same month, shortly after the duty-free limits were raised (The Canadian Press 2012:NP).
56
Given the sheer volume of Canadian travelers to the U.S., the lack of public debate on the
merits or consequences of the types of sensitive information on its citizens that Canada
shares with the U.S. that can affect so many Canadians is odd. This pitfall in part reflects
a purposeful governmental obscuration of the agreements and information-sharing
practices between the two countries, in part by calling those agreements things like ‘smart
border accords’ or ‘economic competitiveness action plan’.
As well, there is a notion within Canada that both countries have quite similar
concerns, being neighbours, and there is real precedent prior to 9/11 for bilateral
information-sharing in the area of criminal justice in the post-9/11 era. It is perhaps this
precedent that Canada has been drawing on in the last few years to extend its history of
U.S. collaboration in issues of crime that involve trans-border criminals into a system of
collaborative national security. Indeed, the RCMP and the FBI as well as the DHS have
asserted that they “…share the same “number one” mandate of criminal justice” (Dewart
2012:11). However, the effect of imagining criminal justice as the number one mandate
of border crossings can make everyone who crosses the border seem like a potential
criminal.
To be clear, neither Canada nor the U.S. has made any report to the effect that
mental health, or a history of mental health, has anything to do with national security.
However, it is common to associate mental health with criminal activity (which is not the
same thing as a threat to national security, but at least a history of criminal activity has a
longstanding history of being a criterion for reducing travel privileges. Dewart (2012)
57
observes that Kamenitz, “prior to her suicide attempt…had virtually no interaction with
the Toronto Police Service, and had no involvement in the criminal justice system” (p. 4).
Police Responses to Kamenitz
In July 2010, about six months after Lois Kamenitz was rejected at the border
after her medical records became available to CBP through a criminal record check, the
Ontario Association of Chiefs of Police (OACP) responded to this potential breach of
privacy law by overhauling the variable guidelines, which formerly differed from police
station to station (PPAOc 2011:1), which instruct police officers on how and what
information is recorded on the individuals they encounter. OACP produced the LEARN
guideline for police record checks that are meant to become a province-wide standard.
According to the PPAO (PPAOd 2011:11), the
Guideline concretely defines three levels of screening:
58
For PIC and VSC, review of police contact information limited to past five years. 10
These guidelines advise front-line officers and emergency care responders to
protect the privacy of people with mental illness when they enter their reports into police
databases. The guidelines explicitly state that, “The police criminal record check will
NOT [original text] include…any reference to incidents involving mental health contact
that did not result in a conviction” or that did not result in a criminal charge (OACP
2011:3). The record check will still list any court dispositions where an individual was
deemed not criminally responsible by reason of mental disorder (Ibid. 4). Moreover, the
Police Vulnerable Sector Check (PVSC), which is conducted on people who seek
volunteer or employment positions in an area with vulnerable persons, like children or
people with disabilities, will not include Mental Health Act terminology (Ibid. 5). The
Mental Health Act governs how mental health care records are kept and assessed (Ibid.
37). However, in an individual’s PVSC, mental health contact information can be
disclosed, even if a criminal charge was not laid if the police report indicates that the
individual placed themselves or others in harm’s way (Ibid. 34). While these guidelines
encourage police in Ontario to be very cautious when making reference to mental illness
and in disclosing this information to third-parties, OACP has not yet implemented a
system for ensuring compliance or accountability in the application of LEARN.
However, the PPAO and the Ontario Mental Health Police Record Check Coalition have
started training police on how to apply the LEARN guidelines in the course of duty
(OACP 2011:NP).
10
Original source: LEARN Draft Guideline for Police Records Checks. Presentation to Police Records
Check Coalition. February 25, 2011.
59
Kamenitz’s case highlights the negative impact that medical and police
surveillance can have not only on the life of a stigmatized individual, but also on the
sovereignty Canada has over the private information on its citizens. Moreover, how
Canadians’ medical and police record information is recorded, stored and shared with the
U.S. that raises concerns which extends beyond the border into the medical field, and in
society. If medical surveillance is used as a mechanism of social control at the border,
will physicians take this into account when they conduct mental health evaluations of
their patients? Will individuals be less likely to accept medical labels or to seek them out
if they know their medical records can impact their freedom of mobility? Canada more
generally seeks to avoid conflating criminal conduct with mental illness incidents that
involve the police. As such, the Kamenitz case reflects a conflict of values between the
way in which Canada allows its citizens with mental illness records to be treated by a
foreign government, versus the way they are treated at home. This is evidenced by the
development of Canada’s Mental Health Courts.
Decriminalizing the Mentally Ill
One of the issues with using police records as a context for records of mental
illness is that the context lends an element of criminality to an already stigmatized label.
This element takes on another level of amplified meaning when it is put in the context of
national security. This, in turn, serves to enhance the suspect nature of mental illness, as
it is understood in a social, stigmatized, and non-clinical way. That process is counterproduct to the significant efforts that have been made in Canada to avoid criminalizing
the mentally ill. To explore this effort, this essay will use the example of Canada’s mental
60
health courts. The Canadian legal system aims to avoid criminalizing the mentally ill by
diverting them to mental health courts when they are involved in criminal activity, away
from a punitive criminal justice system and towards a model of therapeutic justice. For
example, the current presiding judge of Toronto’s Mental Health Court, the Honourable
Mr. Justice Richard D. Schneider, is both a trained lawyer and a clinical psychologist.
This kind of approach to the intersection between the law and mental health indicates that
mental health can be treated positively in the legal system to avoid standard criminal
proceedings for criminal issues that may have more to do with illness than any criminal
intent. The mental health courts in Canada were established in 1997 in response to the
broad-scale de-institutionalization of the mentally ill (Toronto Mental Health Court
2008a:NP). This deinstitutionalization was in part effected by the implementation of the
Charter; it has been and continues to be mobilized by people with mental illness to
challenge legal processes and practices that undermine their Charter rights, specifically
their right to life, liberty, and security of person under section 7 and the right not to be
arbitrarily detained under section 9 (Ibid. 2008b:NP). However, to some extent these
Charter rights continue to be negotiable in order to facilitate therapeutic forms of justice.
Prior to the advent of the Charter, legal advocates for the mentally ill would avoid
the insanity defense for all but the most serious offenses because the presumption was
that their client would be detained indefinitely without legal recourse in a mental hospital,
based on British laws that were incorporated into Canada’s Criminal Code in 1892.
Indeed, “No matter what the mental status of an accused at the time of the alleged
offense, anyone found “unfit” to stand trial on account of insanity would also be held at
the pleasure of the Lieutenant Governor” (Pilon 2002:NP). This section of the Code was
61
amended to replace the Insanity Defense with the Mental Disorder Defense in 1991
through Bill C-30 because the original section did not comply with the Charter, according
to a Supreme Court ruling made in R. v. Swain.11
If police, lawyers, or other agents of the criminal justice system identify an
individual who commits a crime with a mental illness, that individual can be diverted to
the mental health courts, primarily for minor to moderate level offences (Schneider et al
2007:6). These courts emphasize therapeutic justice rather than punitive justice and the
goal of these courts is to ensure that those with mental illness are not treated as criminals
(Ibid.). They view criminal conduct by the mentally ill as a reflection of their mental
disorder(s), rather than as a reflection of criminality (Ibid.).
In the two decades before the rights of the mentally ill were being recognized in
the legal system, psychiatric models for treating the mentally ill were undergoing a
paradigm shift that lessened the authority wielded by psychiatrists in the legal system. In
the 1960s and 1970s, psychiatry was coming under heavy criticism as a science, and
questions were being raised about the ability of psychiatrists to identify mental illness
and to treat it. Asylums started closing down on the premise that, “One does not, after all,
deprive persons of liberty because they have elected to communicate distress in
idiosyncratic ways” (Applebaum 1994: 6).
In this sense, the legal rights and social privileges of mobility depend on the
surveillance of medical data that is normally considered private; and on how that
information is sorted, and by whom (police, psychologists, CBP…). People become
11
In R. v. Swain, the Supreme Court of Canada determined that in certain circumstances, the Crown can
override the accused’s objection to raising the Insanity defense in certain circumstances; and, the period in
which the accused is being assessed for ‘dangerousness’ cannot be indeterminate because this violates
Sections 7 and 9 of the Charter (Schneider et al 2007:20).
62
normalized into the profiles they are organized into because they are treated according to
what they represent in any variety of circumstances. If a characteristic of their profiles
indicates something stigmatized, that stigma can travel with them through numerous
databases and into their real life interactions so that they come to embody the stigma
assigned to them. This normalization paves the way for various actors, including the state
or multiple states, to control and discriminate between citizens in areas of society beyond
the border. Or, in the words of Cohen (2012:46)
…networked information and communication technologies play an increasingly significant role in
constructing embodied experience. The relationship between the embodied self and networked
digital technologies is not a one-way street, in which “technology” is an object of “experience.”
Rather, the relationship between the embodied self and technology is a mutually constituted one.
Mental health information flows across governmental, and inter-governmental networks
can lead to greater stigma for mental illness. A person who cannot travel from Canada to
the U.S., as so many Canadians are wont to do, is unable to participate in some of the
family, community, job, or travel functions that are characteristic of a mobile society, and
they must explain why to the people who invite them abroad. Kamenitz, for instance, was
trying to attend Thanksgiving dinner with family in California (Bridge 2011:NP).
Moreover, this has potential implications for the way that diagnoses are performed. For
example, if a physician knows that a medical diagnosis and label will have consequences
well beyond a treatment regimen, is it important for him to acknowledge the extramedical impact of his medical opinion on his patient’s life? Will a patient avoid seeking
treatment in order to avoid being labeled, coded, packaged, and disseminated? How
medical labels are managed in Canadian courts are perhaps much more telling about the
63
appropriate approach to negotiating ‘unknown criminal risks’ than they are managed in a
CBP screening station.
In the mental health courts, the privacy of medical records that is normally
protected by doctor-patient confidentiality is lifted in order to offer legal protection to
individuals with mental illness who have violated the law, in an effort to avoid
criminalizing them. The medical label that a physician applies to a patient is used as a
diagnostic tool, and it is subject to change. This is acknowledged in a forum run by a
lawyer-psychologist, but it is not acknowledged in a CBP interview, and that is an
important distinction for determining when privacy on mental health issues should be
lifted. While a CBP officer can redirect the troubled traveler to Dr. Seiden’s office for
more expert evaluation, it is an onerous process. Moreover, it is being imposed on
someone who has not actually committed a criminal offence. When a non-medical
institution appropriates that label, that label imputes certain inherent and immutable
characteristics to a given individual. In Kamenitz’s case, an observation about her mental
health by a police officer became sufficient evidence of a permanent mental illness and
an inherent feature of her identity at the border. Summarily, an identity that is informed
by a medical event has consequences that are difficult to negotiate with without the aid of
a medical expert on hand to grapple with border controls.
Chart(er)ing the Border: Where Should Canadians Draw The Line?
The border functions to maintain peaceful relations between two democratic
countries, and yet it offers no guarantees of civic rights and freedoms, including a right to
privacy, that are associated with democracies. On the U.S. side of the Canadian border,
64
the Charter does not apply. The Charter would normally protect Canadians’ civil liberties,
and would help to define what constitutes criminal behaviour, both on the part of customs
officers and of people undergoing inspection. In the Canadian constitutional context, the
Supreme Court of Canada confirmed in 2007 in R. v. Hape that Canadians are not
protected by the Charter from foreign or even by Canadian police investigations when
they are abroad. Justice Binnie, did, comment in this case, without dissenting, that,
Issues of more far-reaching importance will soon confront Canadian courts, especially in the
context of the 'war on terror' and its progeny…we should, in my view, avoid premature
pronouncements that restrict the application of the charter ... (Canwest News Service 2007:NP).
At U.S. CBP checkpoints that exist inside Canada, for example, at Toronto’s
Pearson International Airport, there is no prohibition levied against unreasonable
searches of persons or against the seizure of goods when passengers are undergoing
security inspections by American or Canadian agents, a method which would normally be
deemed in violation of Section 8 of the Charter.12 Since the Charter does not apply to
these inspections, especially since Canadians are considered to be in U.S. territory while
they are in Toronto if they are inside the U.S. security checkpoint, civil liberties are
effectively null and void in foreign space on Canadian soil.
A discussion in this area is quite pertinent to continuing developments in CanadaU.S. cooperation at the border, and the confusion that results from confusion over
sovereignty. As recently as June 2013, there was a somewhat comical confusion over a
cancelled Air Canada flight at Toronto’s Pearson International Airport bound for New
York. As the Globe and Mail tells it,
The flight was slated to leave Toronto Pearson International Airport at 5:15 p.m. for New York’s
LaGuardia Airport, but it was cancelled after sitting on the tarmac for more than an hour. Having
The Canadian Charter of Rights and Freedoms, section 8, reads, “Everyone has the right to be secure
against unreasonable search and seizure” (The Government of Canada 1982: Section 7).
12
65
precleared U.S. customs, the passengers had technically entered the U.S. But they hadn’t physically
left Canada, let alone the runway. (Blaze Carlson 2013:NP)
Passengers were prevented from disembarking in a timely manner because no one was
sure whether the pre-cleared passengers who had not, in physical terms, left Canada, but
who had technically entered the U.S. by passing through U.S. customs, had to re-enter
Canada through Canadian Customs and Immigration. There was also confusion over
whether passengers trying to board a different flight would have to go through U.S.
Customs again if they re-entered the airport. They were ultimately requested to do so by
the U.S. While this sort of confusion might be passed off as a sort of tussle between
benign neighbours, the principles of collaboration that lead to confusion over U.S.
authority within Canada’s borders deserves greater opprobrium.
For example, a pilot project meant to have U.S. and Canadian customs and security
officers working together on Canadian soil to pre-clear cargo headed for U.S. soil,
entitled the Next Generation policing project, is underway. An internal RCMP memo
raises concerns that,
The United States wants its police officers to be exempt from Canadian law if they agree to take part in
a highly touted cross-border policing initiative (Bronskill 2013).
With regard to the implications of this pilot, one Liberal MP, Sean Casey (2013), from
Prince Edward Island, gave vent to the ire that Canadians may be subsequently
experiencing, in a specific attack on the Canadian Conservative government agenda, as
follows:
Bit by bit, agreement by agreement, Canada is giving away more and more in the name of trade.
To Conservatives, none of this is a threat to our sovereignty, as if the very act of stating so makes
it so.
But let us consider this fantasy scenario: RCMP officers stopping American citizens on the
Buffalo side of their border. Picture the horrified expression of those resilient New Yorkers as they
are forced to slow down on their Interstate highway so as to be greeted by a smiling RCMP officer
66
who is to inspect their property, ask questions about where they live, where they've come from,
and the like -- all part of a so called "pre-clearing" program.
Of course, this scene would never occur. The United States protects, obsessively, their
sovereignty. But here in Canada, armed American police officers will now be able to stop
Canadians, in Canada, inspecting, checking and asking questions.
Again, the Conservatives will tell us that an armed American cop in Canada is all about trade, jobs
and security, not sovereignty.
As was previously mentioned, the Charter does not apply once a Canadian steps onto
U.S. territory (even if this territorial space is located inside of Toronto’s Pearson
International Airport). How it applies to a U.S. officer operating on Canadian soil, like in
Canadian pre-clearance stations, is also unclear (Bronskill 2013). This is also true in a
murkier sense, in that the way that the Charter application to information-sharing
practices between Canadian law enforcement authorities and U.S. border authorities is
unclear.
The Charter’s recognition of equal rights for all Canadians is a necessary
condition of democratic citizenship, and its application should go beyond creating an
environment of tolerance for people of unequal capabilities if it intends to achieve
substantial, not formal, equality. Indeed,
Canadian equality jurisprudence in the Charter era has been marked from the beginning by its
rejection of a formal equality approach in favor of the pursuit of substantial equality (Réaume
2006:143).
That is to say that the courts recognize that laws which apply equally to all
citizens, and which treat all citizens as though they are the same, can have a
disadvantageous impact on some segments of society. In an effort to achieve substantive
equality, the Charter is applied in such a way that the courts take into account the social
context to examine the effect of a law on vulnerable groups. As Hannah Arendt has
pointed out, “Sameness is not equality, and “political equality, therefore is the very
opposite of the equality before death or of equality before God” (Lasch 1996:88). At the
67
border, all citizens are treated with equal suspicion, but the assignation of risk to certain
characteristics has the effect of subjecting vulnerable groups to unequal and
discriminatory screening processes at the border. Whether or not the Canadian courts
have upheld the idea of substantive equality is another area for debate, and that is a topic
for another essay. However, I hope that I have drawn attention to an area where the
Charter could offer some useful guidelines as privacy advocates seek out ways to prevent
‘collateral damage’ to civil liberties when Canada and the US make collaborative efforts
to achieve border security through overly broad surveillance systems.
Conclusion
The Kamenitz case highlights the frightening ease with which Canadians have
surrendered their actual privacy and mobility for a narrative about U.S. national security.
It examines how that freedom was surrendered for no governmentally promoted benefit
to Canadians other than the promise that cooperation in matters of border security would
increase trade efficiency. This cooperative stance plays on the oft-held idea in Canada
that it is similar to its neighbour, and therefore has similar interests in numerous areas.
This makes it even more important for Canada to make clear distinctions between what it
stands for apart from its neighbour’s values and intentions. It is evident that the surrender
of Canadian privacy, and sovereignty, to the whims and uses of the U.S. government
reduces Canadian freedom overall, and stands in direct conflict with notions of privacy
and civil liberties in an open and free Canadian society.
Kamenitz’s border troubles began because of two main items: (1) she had a police
record of mental health issues; and (2) information in Canada’s police databases have
68
become more broadly accessible to U.S. border guards as a result of post-9/11 bilateral
information-sharing practices. Subsequently, the outcome of broad surveillance systems,
zero-risk management strategies, and bilateral information flows is a significant reduction
of the mobility of Canadians with mental health records at the border.
Evidently, the Canadian government enables a security regime that allows some of its
citizens to be marginalized by sharing information that can reveal ‘suspect’
characteristics about its citizens to the U.S. To profile Canadians into categories of risk,
the DHS relies in part on information it receives from Canadian governmental
organizations. This essay examined the breadth of what is considered suspicious, and
whether or not that breadth is justified – does the type of broad surveillance being
implemented increase security? The research outlined in this essay suggests that it
actually worsens security by relying on stigmatized identities to amplify fears about
unknown terror, rather than applying more discretionary or competent security measures.
Canada’s responsibility to care for its more marginalized citizens has lapsed in its
enthusiasm to come to neighbourly terms with the U.S. However, as Lyon notes, in
reference to the snowballing surveillance he and others witnessed after 9/11,
From that commitment to responsibility for the Other proceeds peace and prosperity, freedom and
security, sought otherwise through false priorities. This is a city whose gates are never shut. It is a
place of inclusion and trust. (Lyon:2003, as cited in Bauman and Lyon 2013:119-120).
In order to maintain a free and open society with a commitment to civil liberties, it is
important to examine the security regimen that Canada is willing to implement, and its
implications for the way that private information on Canadian citizens is handled. The
publicizing of private information to a foreign nation is the key issue here -- one over
which Canadian governmental authorities, both federal and local, have the power, and
69
duty, to stop, as was demonstrated by the police response to Kamenitz’s case. Use of very
broad, often indiscriminate categorizations based on “mental illness” for security reduces
large sectors of the population’s mobility privileges.
The broad swathe of people it potentially, and seemingly arbitrarily affects, raises
questions about the efficacy of broad surveillance and security measures. Clearly,
allowing Canadians to become more vulnerable to U.S. ideas about National Security is a
questionable government policy; obscuring that effect by failing to implement
appropriate privacy controls to protect Canadians from unnecessary damage to their civil
liberties and to the their mobility deserves opprobrium and reform. Without making it to
clear to Canadians what they are giving up when they join U.S. National Security
agendas to advance ‘economic competitiveness’, the Canadian government is providing a
harmful precedent in terms of sovereignty and in terms of the types of discrimination it
allows, enables, or supports.
70
Works Cited
Applebaum, Paul S. 1994. Almost a Revolution: Mental Health Law and the Limits of
Change. New York: Oxford University Press, Inc.
Agamben, Giorgio. 2005. State of Exception. Translated by Kevin Attell. Chicago:
University of Chicago Press.
Ansorge, Josef Teboho. 2011. “Digital Power in World Politics: Databases, Panopticon,
and Erwin Cuntz.” Originally published in Millenium: Journal of International
Studies 40: p. 65-83. Retrieved from the Social Science Research Network on
June 20, 2012 (http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2041402).
American Civil Liberties Association (ACLU). 2009. “ACLU Letter to DoD”. ACLU,
June 10. Retrieved Sept. 02, 2013
(https://www.aclunc.org/docs/aclu_letter_to_dod.pdf).
Bauman, Zygmunt. 2005. Liquid Life. Malden, MA and Cambridge, UK: Polity Press.
Bauman, Zygmunt and David Lyon. 2013. Liquid Surveillance. Malden, MA and
Cambridge, UK: Polity Press.
Bauman, Zygmunt. 2006. Liquid Fear. Cambridge: Polity Press.
BC Civil Liberties Association. 2012.“Canadian Police Information Center (CPIC).”
Retrieved November 22 (http://www.bccla.org/privacy/privacy7-14.html).
Beck, Ulrich. 2006. “Living in the world risk society.” Economy and Society 35(3): 329
345. Retrieved January 11, 2012 (http://hudson2.skidmore.edu/~rscarce/Soc-Th
Env/Env%20Theory%20PDFs/Beck--WorldRisk.pdf).
Beck, Ulrich. 2009. “World Risk Society and Manufactured Uncertainties.” European
Journal of Philosophy and Public Debate 1(2): 291-299. Retrieved April 3, 2012.
Available (http://www.fupress.net/index.php/iris/article/view/3304/2906).
Bennett, Colin J. 2005. “What happens when you book an airline ticket? The collection
and processing of passenger data post-9/11.” Pp. 115-127 in Global Surveillance
and Policing, edited by E. Zureik and M.B. Salter. Portland: Wilan. Retrieved
February 12, 2012
(http://www.colinbennett.ca/Recent%20publications/What_happens_when_you_b
ook_an-airline_ticket.pdf).
Bennett, Colin J. and Charles D. Raab. 1998. “The Distribution of Privacy Risks.”
Available at The Annenberg School For Communication at the University of
Pennsylvania. Retrieved Dec. 2, 2011
71
(http://www.asc.upenn.edu/usr/ogandy/Gandy%20Comm664/raab%20the%20distribution%20of%20privacy%20risks.pdf).
Blaze Carlson, Kathryn. 2013. “Cancelled Air Canada flight causes customs confusion.”
Globe and Mail, June 13. Retrieved August 10, 20013
(http://www.theglobeandmail.com/news/national/cancelled-flight-causescustoms-confusion/article12444783/).
Bridge, Sarah. 2005. “Canadians with mental illness denied entry to the U.S.” CBC News,
September 9, 2011. Retrieved May 04, 2012
(http://www.cbc.ca/news/canada/story/2011/09/08/f-border-mental-healthprivacy.html).
Bronskill, Jim. 2013. “Canada-U.S. Border: American Police Want Legal Exemptions,
RCMP Says.” July 30. The Huffington Post, Retrieved August 2, 2013
(http://www.huffingtonpost.ca/2013/07/30/border-security-us-police-legalexemptions_n_3678240.html).
Canada Border Services Agency (CBSA). 2006. “Advance Passenger
Information/Passenger Name Record.” Retrieved July 15, 2012 (http://www.cbsaasfc.gc.ca/security-securite/api_ipv_note-eng.html).
Canada Border Services Agency (CBSA). 2008. “Fact Sheet.” Retrieved July 01, 2012
(http://www.cbsa-asfc.gc.ca/media/facts-faits/004-eng.html).
Canadian Mental Health Association (CMHA). 2012. “Mental Health and the Criminal
Justice System.” Retrieved August 21, 2013 (http://www.cmha.bc.ca/getinformed/public-issues/justice).
The Canadian Press. “Canadian travel abroad hits 40-year high.” CBC News, August 21,
2012. Retrieved August 23, 2012
(http://www.cbc.ca/news/business/story/2012/08/21/canada-travel-june.html)
Casey, Sean. 2013. “American Cops Don’t Belong in Canada.” August 2. The Huffington
Post, Retrieved August 3, 2013 (http://www.huffingtonpost.ca/sean-casey/bordersecurity-canada_b_3691387.html).
Cavoukian, Ann. 2007. “What is involved if you are asked to provide a
Police Background Check.” Office of the Information and Privacy Commissioner
of Ontario. Retrieved February 21, 2012
(http://www.ipc.on.ca/images/resources/up-1policebkg.pdf).
Canwest News Service. “Charter protections end at the Canadian border, top court rules.”
Canada.com, June 8, 2007. Retrieved March 15, 2012
72
(http://www.cbc.ca/news/canada/story/2011/09/08/f-border-mental-healthprivacy.html).
Center for the Study of Social Policy. March 2012. “Results-Based Public Policy
Strategies for Promoting Children’s Social, Emotional, Behavioral Health.”
Retrieved April 3, 2012 (http://www.cssp.org/policy/papers/Promote-ChildrensSocial-Emotional-and-Behavioral-Health.pdf)/
“CIA releases declassified 9/11 documents.” NYDailyNews, June 19, 2012. Retrieved
June 21, 2012 (http://articles.nydailynews.com/2012-0619/news/32321459_1_cia-s-bin-laden-cia-unit-documents).
Clarke, Roger. 1987. “Information Technology and Dataveillance.” Roger Clarke’s Web
Site. Retrieved July 9, 2012 (http://www.rogerclarke.com/DV/CACM88.html).
Cohen, Julie E. 2012. “Configuring the Networked Self: Law, Code, And The Play Of
Everyday Practice.” New Haven, CT: Yale University Press. Also used in the
Kindle edition.
Corrigan, Patrick W. 2000. “Mental Health Stigma as Social Attribution: Implications for
Research Methods and Attitude Change.” Clinical Psychology: Science and
Practice V7 N1 Spring: 48-67. Retrieved through ResearchGate, August 3, 2013.
Currier, Cora. 2013. “Gitmo Soldiers Get 9/11 History Lessons.” August 27, ProPublica.
Retrieved August 27, 2013 (http://www.propublica.org/article/gitmo-soldiers-get9-11-history-lessons).
Davidson, Joe. “TSA reputation comes under fire.” The Washington Post, June 11, 2012.
Retrieved June 16 2012 (http://www.washingtonpost.com/politics/tsa-reputationunder-fire/2012/06/11/gJQADnv0VV_story.html).
Dodge, Martin and Rob Kitchin. 2007. “‘Outlines of a world coming into existence’:
pervasive computing and the ethics of forgetting.” Environment and Planning B:
Planning and Design Vol. 34: 431-445.
Davison, Janet. “New duty-free limits will challenge Canadian retailers.” CBC News,
May 31, 2012. Retrieved June 1, 2012
(http://www.cbc.ca/news/business/story/2012/05/31/f-duty-free-limits.html).
Deleuze, Gilles. 1992. “Postscript on the Societies of Control.” October 59 (Winter): p.
3-7. Retrieved April 4, 2012
(http://www.n5m.org/n5m2/media/texts/deleuze.htm).
73
Dewart, Sean. 2012. “Applicant’s Factum: Lois Kamenitz (Applicant) and Toronto Police
Services Board and Attorney General of Canada (Respondent).” Filed in Ontario
Superior Court of Justice, October 29. Retrieved August 8, 2013, by email
correspondence.
Dewey, John. 1984. The Later Works of John Dewey, Volume 4, 1925-1953: 1929 The
Quest for Certainty. Edited by Jo Ann Boydston. Illinois: The Board of Trustees
of Southern Illinois University. Available through Google Books.
Diaz, Jesus. “Woman Strips Down to Her Lingere, Gets TSA Pat Down Anyway – Twice
[Updated].” Gizmodo, Dec. 1, 2010. Retrieved Dec. 10, 2010
(http://gizmodo.com/5703878/the-most-stupid-tsa-action-to-date-defies-belief).
Duerson, Meena Hart. “Florida woman says TSA agent she groped, groped her.”
NYDailyNews, June 19, 2012. Retrieved June 20, 2012
(http://articles.nydailynews.com/2012-06-19/news/32321409_1_tsa-agent-floridawoman-airport-security).
Dumit, Joseph. 2005. "The depsychiatrisation of mental illness." Journal of Public
Mental Health. Pp. 8-13. Retrieved November 6
(http://pierprofessional.metapress.com/index/k25xjp575r0777k7.pdf), p. 9.
“Journeys: The Peopling of America Center, 1550-1890.” Ellis Island Immigration
Museum. Ellis Island, New York, NY. July 3, 2012.
Erickson, SK, Campbell JD, Lamberti JS. 2006. “Variations in Mental Health Courts:
Challenges, Opportunities, and a Call for Caution.” Community Mental Health
Journal. 42(4): 335-343. Retrieved January 2012
(http://www.springerlink.com/content/k19v16850l64x623/).
Eagleburger, Lawrence S. 1989. “Canadian-American Relations.” Pp. 51-59 in Friends
so Different, edited by L. Lamont and J. D. Edmonst. Published for the Americas
Society in Ottawa, ON: University of Ottawa Press.
Frazzetto, Giovannie and Cornelius Gross. 2007. “Beyond susceptibility.” European
Molecular Biology Organization 8(S1): S3–S6. Retrieved July 1, 2012
(http://www.ncbi.nlm.nih.gov/pmc/articles/PMC3327531/)
Frauenfelder, Mark. July 3, 2012. “No jury trial for naked TSA protestor.” boingboing.
Retrieved July 4, 2012 (http://boingboing.net/2012/07/03/no-jury-trial-for-nakedtsa-pr.html#more-168940)
Frischling, Steven. 2011. “10 Years Ago Today Airline Travelers Lost Their Shoes.”
December 22, Flying with Fish. Retrieved August 20, 2013
(http://boardingarea.com/flyingwithfish/2011/12/22/10-years-ago-today-airlinetravelers-lost-their-shoes/).
74
Greenberg, Andy. 2012. “U.S. Customs Tracks Millions of License Plates And Has
Shared Data With Insurance Firms.” Forbes, August 21. Retrieved August 21,
2012 (http://www.forbes.com/sites/andygreenberg/2012/08/21/documents-showu-s-customs-tracking-millions-of-license-plates-and-sharing-data-with-insurancefirms/).
The Government of Canada. 2011. Beyond the Border: A Shared Vision for Perimeter
Security and Economic Competitiveness. Retrieved March 1, 2012
(http://actionplan.gc.ca/grfx/psec-scep/pdfs/bap_report-paf_rapport-engdec2011.pdf).
The Government of Canada. 2011. What Canadians Told Us. Retrieved July 2, 2012
(http://actionplan.gc.ca/grfx/psec-scep/pdfs/BBWG-GTPF_Eng.pdf).
The Government of Canada. 1982. “Canadian Charter of Rights and Freedoms.”
Published by the Department of Justice. Retrieved August 3, 2012 (http://lawslois.justice.gc.ca/eng/Const/page-15.html#h-39).
Gabriel, Dana. “Canada Surrenders Sovereignty and Privacy to U.S. “Secure Flight
Program.” Center for Research on Globalization, Nov 30, 2010. Retrieved
November 22 (http://www.globalresearch.ca/index.php?context=va&aid=22174).
Gabriel, Dana. “Towards a North American Police State and Security Perimeter: US
Canada “Beyond the Border Agreement.” Center for Research on Globalization,
May 14, 2012. Retrieved June 1, 2012 (http://www.globalresearch.ca/towards-anorth-american-police-state-and-security-perimeter-us-canada-beyond-the-borderagreement/)
Gove, W.R. 1982. “Labeling theory’s explanation of mental illness: An update of recent
evidence. Deviant Behavior, 3, p. 307-327.
Hacking, Ian. 2004. “Between Michel Foucault and Erving Goffman: Between discourse
in the abstract and face-to-face interaction’.” Economy and Society, 33 (3): p.
277-302.
Haddal, Chris C. 2010. “Border Security: The Role of the U.S. Border Patrol.” August
10, Congressional Research Service. Retrieved August 20, 2013
(http://www.fas.org/sgp/crs/homesec/RL32562.pdf).
Haggart, Blayne. 2001. “Canada and the United States: Trade, Investment, Integration
and the Future.” Government of Canada, Economics Division, April 2. Retrieved
November 17 (http://dsp-psd.pwgsc.gc.ca/Collection-R/LoPBdP/BP/prb013e.htm).
75
Henderson, William. 2013. “Changes to the Security Clearance Mental Health Question.”
ClearanceJobs.com, July 6. Retrieved August 2, 2013
(http://news.clearancejobs.com/2013/07/06/changes-to-the-security-clearancemental-health-question/).
Holmes, John W. 1989. “Crises in Canadian-American Relations: A Canadian
Perspective.” Pp. 17-41 in Friends so Different. Edited by L. Lamont and J. D.
Edmonst. Published for the Americas Society in Ottawa, ON: University of
Ottawa Press.
Huffine, C.L. and J.A. Clausen. 1979. “Madness and work: Short- and long-term effects
of mental illness
on occupational careers.” Social Forces, 57, p. 1049-1062.
International Civil Liberties Monitoring Group (ICLMG). 2010. “Report Critical Of
Abusive Border Controls and No-Fly Lists.” Watch Lists and Border Controls
Research Group. Retrieved March 11, 2012 (http://www.travelwatchlist.ca./)
John Howard Society of Alberta. 2000. “Accessing Criminal Records.” Understanding
Criminal Records. Retrieved March 23, 2012
(http://www.johnhoward.ab.ca/pub/A5.htm#Q1).
Koskela, Hille. 2000. “The Gaze Without Eyes: Video Surveillance and the Changing
Nature of Urban Space.” Progress in Human Geography 24.2 (June): 243-65.
Kramer, Mattea and Chris Hellman. 2013. “Homeland Security: The Second Defense
Department - The Trillion-Dollar Concept That No One Can Define.” February
28, National Priorities Project. Retrieved August 20, 2013
(http://nationalpriorities.org/en/analysis/2013/homeland-security-second-defensedepartment/).
Kravets, David. 2012. “Judge Oks Nudity at TSA Checkpoint.” WIRED, July 19.
Retrieved July 20, 2012 (http://www.wired.com/threatlevel/2012/07/tsacheckpoint-nudity/).
Lasch, Christopher. 1996. The Revolt of the Elites and the Betrayal of Democracy. United
States of America: Norton.
Lehman, S., V. Joy, D. Kreisman, & Simmons, S. 1976. “Responses to viewing
symptomatic behaviors and labeling prior to mental illness. Journal of Community
Psychology, 4, p. 327-334.
Link, B.G. 1982. “Mental patient status, work and income: An examination of the effects
of a psychiatric label.” American Sociological Review, 47, p.202-215.
76
Link, B.G. 1987. “Understanding labeling effects in the area of mental disorders: An
assessment of the effects of expectations of rejection.” American Sociological
Review, 52, p. 96-112.
Link, B.G., F.T. Cullen, J. Frank, & J.F. Wozniak. 1987. “The social rejection of former
mental patients: Understanding why labels matter.” American Journal of
Sociology, 92, p. 1461-1500.
Locke, Bonnie. 2005. “Information Sharing: Powered by NLETs.” The Police Chief, May
5. Retrieved June 04, 2012
(http://www.policechiefmagazine.org/magazine/index.cfm?fuseaction=display_ar
ch&article_id=584&issue_id=52005).
Lyon, David. 2006. “Airport screening, surveillance, and social sorting: Canadian
responses to 9/11 in Context.” The Canadian Journal of Criminology and Justice,
48(3), p. 397-411. Retrieved June 5, 2012
(http://muse.jhu.edu/journals/ccj/summary/v048/48.3lyon.html).
Lyon, David. 2003. Surveillance after September 11. Cambridge: Polity Press.
Lyon, David. 2007. “Surveillance Studies: An Overview.” Malden, MA: Polity Press.
Masnick, Mike. 2012. “TSA Freaks Out, Gets Longtime Critic Bruce Schneier Kicked
Off Of Oversight Hearing.” Techdirt, March 26. Retrieved April 2, 2012
(http://www.techdirt.com/articles/20120326/16160618252/tsa-freaks-out-getslongtime-critic-bruce-schneier-kicked-off-oversight-hearing.shtml).
McGrath, John E. 2004. “Loving Big Brother: Performance, Privacy And Surveillance
Space.” London and New York: Routledge.
Mental Health Commission of Canada (MHCC). 2013. “A Study of How People with
Mental Illness Perceive and Interact with the Police.” March 25. Retreived August
23, 2013 (http://www.mentalhealthcommission.ca/English/document/437/studyhow-people-mental-illness-perceive-and-interact-police).
Moens, Alexander and Nachum Gabler. 2012. Measuring the Costs of the Canada-US
Border. The Fraser Institute. Retrieved August 30, 2012
(http://www.fraserinstitute.org/uploadedFiles/fraser-ca/Content/researchnews/research/publications/measuring-the-costs-of-the-canada-us-border.pdf).
Molotch, Harvey. 2012. “Against Security: How We Go Wrong At Airports, Subways,
and Other Sites of Ambiguous Danger.” New Jersey: Princeton University Press.
Muller, Benjamin J. 2008. Governing through Risk at the Canada/US Border: Liberty,
Security, Technology. Border Policy Research Institute, (2). Retrieved November
30, 2011 (http://www.wwu.edu/depts/bpri/files/2008_Sep_WPNo2.pdf.)
77
Murakami Wood, David and Stephen Graham. 2006. “Permeable Boundaries in the
Software-Sorted Society: Surveillance and the Differentiation of Mobility.”
Originally published in Mobile Technologies of the City, eds. Mimi Sheller and
John Urry. Retrieved July 25, 2013 from
(http://www.academia.edu/1069340/Permeable_Boundaries_in_the_Softwaresorted_Society_Surveillance_and_Differentiations_of_Mobility).
Murphy, Christopher. 2007. “Securitizing” Canadian Policing: A New Policing Paradigm
For the Post-9/11 Security State?” The Canadian Journal of Sociology Volume
32(4): 1-29. Retrieved February 3, 2012
(http://canada.metropolis.net/pdfs/CMurphy%20security%20polcing%20article.p
df).
National Commission on Terrorist Attacks upon the United States. (Philip Zelikow,
Executive Director; Bonnie D. Jenkins, Counsel; Ernest R. May, Senior Advisor).
The 9/11 Commission Report. New York: W.W. Norton & Company, 2004.
Retrieved August 17, 2013
(http://govinfo.library.unt.edu/911/report/911Report.pdf).
National Mental Health Consumer & Career Forum (NMHCCF). 2009. Issue: Mental
Health Facts and Figures. Retrieved August 31, 2012
(http://nmhccf.org.au/documents/Mental%20Health%20Facts%20and%20Figures
.pdf).
Norris, Clive, Jade Moran and Gary Armstrong (eds). 1998. Surveillance, Closed Circuit
Television and Social Control. Aldershot: Ashgate.
O’Connor, Daniel and William de Lint. “Frontier Government: The Folding of the
Canada-US Border.” Studies in Social Justice, Volume 3, Issue 1, 39-66, 2009.
Office of the Director of National Intelligence. 2013. “Director of National Intelligence
Issues New Security Clearance Guidelines.” Media Release, April 05. Retrieved
July 28, 2013 (http://www.dni.gov/index.php/newsroom/press-releases/191-pressreleases-2013/828-director-of-national-intelligence-issues-new-securityclearance-guidance).
Office of the Privacy Commissioner of Canada. 2010. “Checking in.” Retrieved April 3,
2012 (http://www.priv.gc.ca/fs-fi/02_05_d_45_e.cfm).
Office of the Privacy Commissioner of Canada. 2006. “Audit of the Personal Information
Management Practices of the Canada Border Services Agency.” Retrieved
February 10, 2012 (http://www.priv.gc.ca/information/pub/arvr/cbsa_060620_e.asp).
78
Office of the Privacy Commissioner of Canada. 2005. “Privacy Protection in a World of
Transborder Data Flows.” Retrieved July 1, 2012
(http://www.priv.gc.ca/media/sp-d/2005/sp-d_051003_e.asp).
Office of Dr. Seiden. 2011. Telephone conversation. July 15, 365 Bloor St. East, suite
1400, Toronto, ON, M4W 3L4.
O’Keefe, Ed. 2010. “TSA Using Pizza Boxes to Recruit New Workers.” The Washington
Post, July 14. Available (http://voices.washingtonpost.com/federaleye/2010/07/tsa_using_pizza_boxes_to_recru.html).
Oliver, Maria Isabel, Nicky Pearson, Nicola Coe, and David Gunnell. 2005. “Help
seeking behaviour in men and women with common mental health problems:
cross-sectional study.” The British Journal of Psychiatry 186: 297-301. Retrieved
March 1, 2012 (http://bjp.rcpsych.org/content/186/4/297.short).
O’Malley, Pat. 2006. “Risks , Ethics , and Airport Security.” Canadian Journal of
Criminology and Justice, 48(3): 413-421.
Ontario Association of Chiefs of Police (OACP). 2011. “LEARN Guideline.” Retrieved
November 1, 2012.
(http://www.oacp.ca/upload5/news/GUIDELINES_FOR_RECORD_CHECKS__
_FINAL.pdf).
“Ontario Association of Chiefs of Police releases new guidelines for Police Record
Checks.” Mental Health Commission of Canada. Retrieved December 1, 2011.
(http://www.mentalhealthcommission.ca/English/Pages/Police_Record_Checks.as
px).
Ontario Human Rights Commission. 2009. “Human Rights Mental Health Strategy:
Public Consultation Paper. Retrieved August 1, 2013 through Queen’s University
Library
(http://site.ebrary.com.proxy.queensu.ca/lib/queen/docDetail.action?docID=10374
833).
Ontario Superior Court of Justice. n.d. Court File No. CV-11-4366444. Toronto, ON:
CND. Sent by email correspondence from Ryan Fritsch, December 11, 2011.
“Overview of the Court.” 2008a.Toronto Mental Health Court. Retrieved March 14, 2012
(http://mentalhealthcourt.ca/pages/2/Overview.htm).
Parliament of Canada. House of Commons. Bill C-42. 40th Parliament, 3rd session, 2011.
Retrieved June 11, 2012
(http://parl.gc.ca/HousePublications/Publication.aspx?Language=E&Mode=1&D
ocId=5075716).
79
Parliament of Canada. House of Commons. 2009. “Government Response.” Retrieved
June 30, 2012
(http://www.parl.gc.ca/HousePublications/Publication.aspx?DocId=4017698&Mo
de=1&Parl=40&Ses=2&Language=E).
Pelletier, Gérard. 1989. “Canadian-American Relations.” Pp. 225-231 in Friends So
Different, edited by L. Lamont and J. D. Edmonst. Published for the Americas
Society in Ottawa: University of Ottawa Press.
Pilon, Marilyn. Mental Disorder and Canadian Criminal Law. 1999. Revised 2002.
Mental Disorder and Canadian Criminal Law, Law and Government Division,
PRB 99-22E. Retrieved April 5, 2012 (http://publications.gc.ca/CollectionR/LoPBdP/BP/prb9922-e.htm).
Psychiatric Patient Advocate Office (PPAO)a. 2011. “Police Record Checks and
Vulnerable Persons Screening.” Government of Ontario. Retrieved November 4,
2011(http://www.sse.gov.on.ca/mohltc/ppao/en/Pages/InfoGuides/PersonalHealth
Information_A.aspx?openMenu=smenu_PersonalHealth).
Psychiatric Patient Advocate Office (PPAO)b. 2011. “PPAO takes stand
against cross border mental health disclosures.” Government of Ontario.
Retrieved November 4, 2011
(http://www.sse.gov.on.ca/mohltc/ppao/en/Pages/Blogs/Post.aspx?List=%7B33A
158C8-A480-42EE-AF7C-A421E5182630%7D&ID=13).
Psychiatric Patient Advocate Office (PPAO)c. 2011. “PPAO Commends Ontario
Association of Chiefs of Police for Sealing Mental Health Records.” Government
of Ontario. Retrieved November 2, 2011
(http://www.sse.gov.on.ca/mohltc/ppao/en/default.aspx)
Psychiatric Patient Advocate Office (PPAO)d. 2011. “Mental Health Police Records:
Issues and Solutions.” Nov. 22. Retrieved June 1, 2013
(http://www.mentalhealthpolicerecords.ca/docs/presentations/11.11.22%20%20police%20record%20check%20presentation.pdf)
Public Safety Canada. 2010. “Canada and the United States meet to discuss cross-border
crime and border security at the 11th Cross-Border Crime Forum Ministerial.”
Retrieved November 22, 2011
(http://www.publicsafety.gc.ca/media/nr/2010/nr20101110-eng.aspx?rss=true).
Public Health Agency of Canada. October 10, 2002. “Mental Illness Facts and Figures.”
Retrieved November 30, 2011 (http://www.phac-aspc.gc.ca/cd-mc/mimm/mi_figures-mm_figures-eng.php).
80
Radia, Andy. 2013. “Canada, Mexico become part of U.S. ‘homeland’ during NSA
Senate briefing.” August 1. Yahoo News Canada, Retrieved August 2, 2013.
(http://ca.news.yahoo.com/blogs/canada-politics/canada-mexico-united-statesidentified-homeland-during-senate-192128693.html).
Réaume, Denise G. 2006. “Discrimination and Dignity.” Louisiana Law Review Volume
18: 143-188.
“Relevant Case Law.” 2008b. Toronto Mental Health Court. Retrieved March 14, 2012
(http://mentalhealthcourt.ca/pages/11/relevant.htm).
Rosenbloom, Stephanie. 2013. “Private Flying for (Some of) the Rest of Us.” August 22,
The New York Times. Retrieved August 25, 2013
(http://travel.nytimes.com/2013/08/25/travel/private-flying-for-some-of-the-restof-us.html?src=dayp).
Ross, Winston. 2012. “Man’s Airport Strip Meant to Highlight Intrusive and Ineffective
TSA Security.” May 9, U.S. News. Retrieved May 11, 2012
(http://www.thedailybeast.com/articles/2012/05/09/man-s-airport-strip-meant-tohighlight-intrusive-and-ineffective-tsa-security.html).
Royal Canadian Mounted Police (RCMP). 2005. “Privacy Impact Assessment – Canadian
Police Information Center.” Retrieved June 15, 2012 (http://www.rcmpgrc.gc.ca/pia-efvp/cpic-cipc-eng.htm).
Royal Canadian Mounted Police (RCMP). 2006. “Canadian Police Information Centre.”
Retrieved August 20, 2013 (http://www.rcmp-grc.gc.ca/nps-snp/cpic-cipceng.htm).
Royal Canadian Mounted Police (RCMP). “Plans for the Future.” Retrieved November
30, 2011 (http://www.rcmp-grc.gc.ca/viclas-salvac/index-eng.htm).
Royal Canadian Mounted Police (RCMP). “RCMP Violent Crime Linkage Analysis
System (ViCLAS).” Retrieved November 30, 2011 (Error! Hyperlink reference
not valid.).
Royal Canadian Mounted Police (RCMP). 2009. “Criminal Records Information
Management Services.” Retrieved November 17 (http://205.193.86.86/cr-cj/le-fo
eng.htm#CriminalRecordsInformation).
Rittgers, David. 2011. “Abolish the Department of Homeland Security.” The Cato
Institute. Retrieved March 1, 2012 (http://www.cato.org/pubs/pas/PA683.pdf).
Ryan Fritsch, email correspondence, November 25, 2011.
81
Schmidt, Michael S. and Eric Lichtblau. 2012. “Racial Profiling Rife at Airport, U.S.
Officers Say.” The New York Times, August 11. Retrieved August 11, 2012
(http://www.nytimes.com/2012/08/12/us/racial-profiling-at-boston-airportofficials-say.html?pagewanted=1&_r=3pagewanted=all).
Savage, Luiza Ch. April 2, 2012. “Privacy commissioners warn Ottawa on perimeter
security deal.” Bilateralist. Retrieved June 2, 2012
(http://www.bilateralist.com/2012/04/02/privacy-commissioners-warn-ottawaperimeter-security-deal/).
Serotte, Michael I. “Class A and B Medical Conditions.” Serotte, Scarborough &
Associates. Retrieved March 20, 2012 from email correspondence.
Schneier, Bruce. 2008. Schneier on Security. Indianapolis, Indiana: Wiley Publishing Inc.
Retrieved July 1, 2012 (http://www.amazon.com/Schneier-SecurityBruce/dp/0470395354/ref=pd_sim_b_3/187-9825936-1904761).
Schneier, Bruce. 2006. “We’re Giving Up Privacy and Getting Little in Return.”
Schneier.com. Originally published in the Minneapolis Star Tribune, May 16.
Retrieved June 15, 2012 (http://www.schneier.com/essay-115.html).
Schneider, R.D., H. Bloom and M. Heerema. 2007. Decriminalizing the Mentally Ill.
Toronto: Irwin Law. Retrieved March 25, 2012
(http://lib.myilibrary.com/Open.aspx?id=94013&loc=&srch=undefined&src=0)
Schmitt, C. 1979. Der Bergoff des Politischen. Berlin: Dunker and Humblot. (Original
work published in 1932.
Stark, Luke. “Personal Statement.” Retrieved from email correspondence, August
12, 2012.
“Stigma of mental illness common among Canadians: report.” CBC news,
Health Section, August 18, 2008. Retrieved November 3
(http://www.cbc.ca/news/health/story/2008/08/15/mental-health.html).
Statistics Canada. 2012. Imports, exports and trade balance of goods on a
balance-of-payments basis, by country or country grouping.
http://www.statcan.gc.ca/tables-tableaux/sum-som/l01/cst01/gblec02a-eng.htm
Stoddart, Jennifer. 2005. “Privacy Protection in a world of transborder data flows.”
Office of the Privacy Commissioner of Canada. Retrieved Dec. 2, 2011
(http://www.priv.gc.ca/media/sp-d/2005/sp-d_051003_e.asp).
82
Szasz, Thomas S. The Myth of Mental Illness. 1960. First published in American
Psychologist, 15, 113-118. Retrieved Nov. 22
(http://psychclassics.yorku.ca/Szasz/myth.htm).
Surveillance Studies Centre. 2011. “IRSP III: Consequences of 9/11.” Lecture by Kevin
Haggarty. Video. Retrieved June 5, 2012
(http://www.sscqueens.org/media/irsp3.mov).
Taylor, James A. 1989. “Bilateral Relations in the Global Context: A Canadian
Perspective.” Pp. 240-250 in Friends so Different, edited by L. Lamont and J. D.
Edmonst. Published for the Americas Society in Ottawa, ON: University of
Ottawa Press.
Taipale, Kim. 2012. The Eye of God: The Social Construction of Omniveillance. The
Center For Advanced Studies In Science And Technology Policy. Retrieved July
8, 2012 (http://surveillance-society.info/).
Transportation Security Adminstration (TSA). 2011. “TSA’s Risk-Based Security
Initiatives.” December 5. Retrieved January 5, 2012
(http://www.tsa.gov/assets/pdf/ASAC_RBSBrief_Dec152011.pdf)
Transportation Security Administration (TSA). 2012. “Expanded
Behavior Detection Pilot.” Retrieved August 8, 2012
(http://www.tsa.gov/what_we_do/ebdo.shtm).
Transportation Security Adminstration (TSA). 2013. “3-1-1 for Carry-ons.” Retrieved
August 01, 2013 (http://www.tsa.gov/traveler-information/3-1-1-carry-ons).
Trew, Stuart. “Bill C042, Harper’s “Secure Flight” legislation becomes law.” The
Council of Canadian Trade Blog, entry March 25, 2011. Retrieved November 30
(http://www.canadians.org/tradeblog/?p=1419).
Winick, B.J. and D.B.Wexler [eds.]. 2003. Judging in a Therapeutic Key: Therapeutic
Jurisprudence and the Courts. Durham, NC: Carolina Academic Press.
World Health Organization. 2012. Gender and Women’s Mental Health. Retrieved
September 1, 2012
(http://www.who.int/mental_health/prevention/genderwomen/en/).
New, W.H. 1998. “The Edge of Everything.” Pp. 35-68 in Borderlands. Vancouver, B.C.:
UBC Press.
U.S. Citizenship and Immigration Services. 1988. Sec. 212.7 Waiver of certain grounds
of excludability. Retrieved July 25, 2012
(http://www.uscis.gov/ilink/docView/SLB/HTML/SLB/0-0-0-1/0-0-0-11261/0-00-15905/0-0-0-16484.html).
83
U.S. Customs and Border Protection (CBP). 2012. C-TPAT Overview. Retrieved
September 1, 2012
(http://www.cbp.gov/linkhandler/cgov/trade/cargo_security/ctpat/ctpat_program_i
nformation/what_is_ctpat/ctpat_overview.ctt/ctpat_overview.pdf).
U.S. Department of Homeland Security. 2010. What Can I Expect to
Happen at a Port of Entry. December 17, Admission into United States. Retrieved
November 21
(http://www.cbp.gov/xp/cgov/travel/id_visa/legally_admitted_to_the_u_s.xml).
U.S. House of Representatives. 2011. TSA Reform Report by U.S. House of
Representatives, 112th Congress, Nov. 16. Retrieved January 2, 2012
(http://republicans.transportation.house.gov/Media/file/112th/Aviation/2011-1116-TSA_Reform_Report.pdf).
U.S. Department of State. 1995. Ineligibilities and Waivers: Laws. Travel.state.gov.
Retrieved April 29, 2012
(http://www.travel.state.gov/visa/frvi/ineligibilities/ineligibilities_1364.html).
United States Parachute Association (USPA). “Traveling with Skydiving Gear within the
United States.” Retrieved July 2, 2012
(http://www.uspa.org/USPAMembers/Membership/Travel/WithintheUS/tabid/311
/Default.aspx).
Victorian Government Solicitor’s Office. 2008. Memoranda of Understanding.
Retrieved July 2, 2012 (http://www.vgso.vic.gov.au/node/259).
Walby, Kevin, & Hier, Sean P. 2009. “Risk Technologies and the Securitization of Post
9/11 Citizenship: The Case of National ID Cards in Canada.” Socialist Studies /
ÉTudes Socialistes, 1(2), p. 12.
Wikileaks. 2011. "04OTTAWA3410, Canada: 2004 Annual Terrorism Report.”
Retrieved December 6, 2011
(http://wikileaks.org/cable/2004/12/04OTTAWA3410.html#).
Whittington, Les and MacCharles, Tonda. 2011. “Canada kept U.S. border talks under
wraps: document.” The Star, Feb. 8. Retrieved December 3, 2011
(http://www.thestar.com/article/934675#.Tt1BbFTE6Dg.twitter).
Wright, Gary L and Gavin Off. 2012. “Name on watch list stuns local activist James Ian
Tyson: ‘I am not a terrorist’.” The Charlotte Observor, Sept. 04. Retrieved Sept.
09, 2013 (http://www.charlotteobserver.com/2012/09/04/3504248/name-onwatch-list-stuns-local.html#.UjIjoWTwJTU).
Zetter, Kim. 2010. “Another Hacker’s Laptop, Cellphones Searched at Border.” WIRED,
84
Nov. 18. Retrieved Nov. 1, 2011
(http://www.wired.com/threatlevel/2010/11/hacker-border-search/).
85
Download