{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T10:43:31Z","timestamp":1759401811467},"reference-count":36,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7,1]]},"abstract":"<p>Decentralized organizational approaches to security provision introduce new challenges for controlling information-sharing practices, safeguarding civil liberties, and ensuring accountability. Department of Homeland Security \u201cfusion centers,\u201d and the multiple organizations and databases that are part of fusion centers, engender an environment in which information is migrating beyond original purposes of counterterrorism. Indeed, based on intensive qualitative research, the authors have found that fusion centers that were originally oriented toward \u201ccounterterrorism\u201d have quickly broadened their scope to include all crimes, and those that began as \u201call crimes\u201d have migrated only marginally to terrorism. This is the result of three quite predictable factors: fusion centers have to be valuable to their states, there is too little activity that is clearly terrorism related, and fusion center personnel have to use their time and skills constructively. Nonetheless, even if local policing needs are met through fusion-center funding and support, many of the activities of fusion-center analysts lend themselves to mission creep and violations of civil liberties.<\/p>","DOI":"10.4018\/jep.2013070101","type":"journal-article","created":{"date-parts":[[2013,11,12]],"date-time":"2013-11-12T19:37:27Z","timestamp":1384285047000},"page":"1-14","source":"Crossref","is-referenced-by-count":19,"title":["Beyond Counterterrorism"],"prefix":"10.4018","volume":"4","author":[{"given":"Priscilla M.","family":"Regan","sequence":"first","affiliation":[{"name":"Department of Public and International Affairs,George Mason University, Fairfax, VA, USA"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Torin","family":"Monahan","sequence":"additional","affiliation":[{"name":"Department of Communication Studies, The University of North Carolina at Chapel Hill, Chapel Hill, NC, USA"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"2432","reference":[{"key":"jep.2013070101-0","unstructured":"American Civil Liberties Union. (2010, June 29). More about suspicious activity reporting. Retrieved October 30, 2012, from http:\/\/www.aclu.org\/spy-files\/more-about-suspicious-activity-reporting"},{"key":"jep.2013070101-1","year":"1994","journal-title":"Understanding community policing: A framework for action"},{"key":"jep.2013070101-2","year":"2005","journal-title":"Intelligence-led policing: The new intelligence architecture"},{"key":"jep.2013070101-3","doi-asserted-by":"publisher","DOI":"10.1525\/can.2004.19.2.250"},{"key":"jep.2013070101-4","first-page":"1441","article-title":"Network accountability for the domestic intelligence apparatus.","volume":"62","author":"D. K.Citron","year":"2011","journal-title":"The Hastings Law Journal"},{"key":"jep.2013070101-5","unstructured":"Electronic Privacy Information Center. (2007, June). National network of fusion centers raises specter of COINTELPRO. Retrieved October 30, 2012, from http:\/\/epic.org\/privacy\/surveillance\/spotlight\/0607\/"},{"key":"jep.2013070101-6","unstructured":"Federal Bureau of Investigation. (2012a). Law enforcement online. Retrieved October 30, 2012, from http:\/\/www.fbi.gov\/about-us\/cjis\/leo"},{"key":"jep.2013070101-7","unstructured":"Federal Bureau of Investigation. (2012b). Privacy impact assessment for the eguardian threat tracking system. Retrieved October 30, 2012, from http:\/\/www.fbi.gov\/foia\/privacy-impact-assessments\/eguardian-threat"},{"key":"jep.2013070101-8","unstructured":"Geiger, H. (2009, December 15). Fusion centers get new privacy orders via DHS grants. Retrieved June 2, 2010, from http:\/\/www.cdt.org\/blogs\/harley-geiger\/fusion-centers-get-new-privacy-orders-dhs-grants"},{"key":"jep.2013070101-9","unstructured":"German, M., & Stanley, J. (2007, December). What's wrong with fusion centers? Retrieved from http:\/\/www.aclu.org\/files\/pdfs\/privacy\/fusioncenter_20071212.pdf"},{"key":"jep.2013070101-10","unstructured":"German, M., & Stanley, J. (2008, July). ACLU fusion center update. Retrieved from http:\/\/www.aclu.org\/pdfs\/privacy\/fusion_update_20080729.pdf"},{"key":"jep.2013070101-11","unstructured":"Government Accountability Office. (2010, September 29). Information sharing: Federal agencies are helping fusion centers build and sustain capabilities and protect privacy, but could better measure results (GAO-10-972). Retrieved October 30, 2012, from http:\/\/www.gao.gov\/products\/GAO-10-972"},{"key":"jep.2013070101-12","unstructured":"Government Accountability Office. (2011, July 21). Information sharing environment: Better road map needed to guide implementation and investments (GAO-11-455). Retrieved October 30, 2012, from http:\/\/www.gao.gov\/new.items\/d11455.pdf"},{"key":"jep.2013070101-13","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8306.2005.00490.x"},{"key":"jep.2013070101-14","unstructured":"InfraGard. (2012). InfraGard -- Public private partnership. Retrieved October 30, 2012, from http:\/\/www.infragard.net\/about.php?mn=1&sm=1-0"},{"key":"jep.2013070101-15","author":"T. H.Kean","year":"2004","journal-title":"The 9\/11 commission report: Final report of the national commission on terrorist attacks upon the United States"},{"key":"jep.2013070101-16","unstructured":"Masse, T., O\u2019Neil, S., & Rollins, J. (2007, July 6). Fusion centers: Issues and options for congress. Congressional Research Service. Retrieved October 30, 2012, from http:\/\/epic.org\/privacy\/fusion\/crs_fusionrpt.pdf"},{"key":"jep.2013070101-17","unstructured":"Microsoft. (2012). Microsoft fusion core solution. Retrieved October 30, 2012, from http:\/\/www.microsoft.com\/industry\/government\/solutions\/Fusion_Core_Solution\/default.aspx"},{"issue":"2-3","key":"jep.2013070101-18","first-page":"84","article-title":"The future of security? Surveillance operations at homeland security fusion centers.","volume":"37","author":"T.Monahan","year":"2011","journal-title":"Social Justice (San Francisco, Calif.)"},{"key":"jep.2013070101-19","doi-asserted-by":"publisher","DOI":"10.1177\/0967010609350314"},{"key":"jep.2013070101-20","doi-asserted-by":"crossref","unstructured":"Monahan, T., & Regan, P. M. (2012). Zones of opacity: Data fusion in post-9\/11 security organizations. Canadian Journal of Law and Society, 27(3), 301-317. doi:10.1353\/jls.2012.0033","DOI":"10.1017\/S0829320100010528"},{"key":"jep.2013070101-21","author":"J.Napolitano","year":"2009","journal-title":"Remarks by homeland security secretary Janet Napolitano to the national fusion center conference in Kansas City, Mo. on March 11, 2009"},{"issue":"1","key":"jep.2013070101-22","doi-asserted-by":"crossref","first-page":"43","DOI":"10.24908\/ss.v8i1.3473","article-title":"The rise of the fusion-intelligence complex: A critique of political surveillance after 9\/11.","volume":"8","author":"A. B.Newkirk","year":"2010","journal-title":"Surveillance & Society"},{"key":"jep.2013070101-23","unstructured":"Nojeim, G. T. (2009, March 18). Homeland security intelligence: Its relevance and limitations (testimony before the house committee on homeland security, subcommittee on intelligence, information sharing, and terrorism risk assessment). Retrieved October 2013, from https:\/\/http:\/\/www.cdt.org\/testimony\/testimony-greg-nojeim-homeland-security-intelligence-its-relevance-and-limitations"},{"key":"jep.2013070101-24","unstructured":"O'Harrow, R., Jr. (2008, April 2). Centers tap into personal databases. Washington Post. Retrieved August 20, 2008, from http:\/\/www.washingtonpost.com\/wp-dyn\/content\/article\/2008\/04\/01\/AR2008040103049.html"},{"key":"jep.2013070101-25","unstructured":"Partnership for Civil Justice Fund. (2012, December 22). FBI documents reveal secret nationwide occupy monitoring. Partnership for Civil Justice Fund. January 4, 2013, from http:\/\/www.justiceonline.org\/commentary\/fbi-files-ows.html"},{"key":"jep.2013070101-26","unstructured":"Permanent Subcommittee on Investigations. (2012, October 3). Federal support for and involvement in state and local fusion centers. U.S. Senate. Retrieved October 30, 2012, from http:\/\/www.hsgac.senate.gov\/download\/?id=49139e81-1dd7-4788-a3bb-d6e7d97dde04"},{"key":"jep.2013070101-27","unstructured":"Randol, M. A. (2009, November 5). Terrorism information sharing and the nationwide suspicious activity report initiative: Background and issues for congress (CRS 7-7500). Retrieved October 30, 2012, from http:\/\/www.ijis.org\/docs\/NSI Report_R40901.pdf"},{"key":"jep.2013070101-28","first-page":"1","article-title":"Intelligence-led policing.","volume":"248","author":"J. H.Ratcliffe","year":"2003","journal-title":"Trends and Issues in Crime and Criminal Justice"},{"key":"jep.2013070101-29","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2004.08.003"},{"key":"jep.2013070101-30","author":"J.Rollins","year":"2008","journal-title":"Fusion centers: Issues and options for congress"},{"key":"jep.2013070101-31","doi-asserted-by":"publisher","DOI":"10.1177\/0308275X08090549"},{"key":"jep.2013070101-32","unstructured":"Steiner, J. E. (2010). More is better: The analytic case for a robust suspicious activity reports program. Homeland Security Affairs, 6(3), 1-12. Retrieved October 30, 2012, from http:\/\/www.hsaj.org\/?article=6.3.5"},{"key":"jep.2013070101-33","unstructured":"U.S. Department of Homeland Security. (2006, July 7). DHS strengthens Intel sharing at state and local fusion centers. Retrieved December 19, 2012, from https:\/\/http:\/\/www.hsdl.org\/?view&did=476394"},{"key":"jep.2013070101-34","year":"2008","journal-title":"DHS' role in state and local fusion centers is evolving"},{"key":"jep.2013070101-35","unstructured":"U.S. Department of Homeland Security and Department of Justice. (2010, April). Fusion process technical assistance programs and services. Fusion Center Privacy Policy Development: Privacy, Civil Rights and Civil Liberties Policy Template. Retrieved October 30, 2012, from http:\/\/it.ojp.gov\/docdownloader.aspx?ddid=1269"}],"container-title":["International Journal of E-Politics"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=93128","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T01:32:55Z","timestamp":1654133575000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/jep.2013070101"}},"subtitle":["Data Sharing, Privacy, and Organizational Histories of DHS Fusion Centers"],"short-title":[],"issued":{"date-parts":[[2013,7,1]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2013,7]]}},"URL":"https:\/\/doi.org\/10.4018\/jep.2013070101","relation":{},"ISSN":["1947-9131","1947-914X"],"issn-type":[{"value":"1947-9131","type":"print"},{"value":"1947-914X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,7,1]]}}}