National Security, Surveillance and Terror


Book Description

This edited collection brings together leading scholars to comparatively investigate national security, surveillance and terror in the early 21st century in two major western jurisdictions, Canada and Australia. Observing that much debate about these topics is dominated by US and UK perspectives, the volume provides penetrating analysis of national security and surveillance practices in two under-studied countries that reveals critical insights into current trends. Written by a wide range of experts in their respective fields, this book addresses a fascinating array of timely questions about the relationship among national security, privacy and terror in the two countries and beyond. Chapters include critical assessments of topics such as: National Security Intelligence Collection since 9/11, The Border as Checkpoint in an Age of Hemispheric Security and Surveillance, Unmanned Aerial Vehicles and Law Enforcement, as well as Federal Government Departments and Security Regimes. An engaging and empirically driven study, this collection will be of great interest to scholars of security and surveillance studies, policing, and comparative criminology.




The Future of Foreign Intelligence


Book Description

Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of intelligence. Absent information about foreign threats, the thinking went, the country and its citizens stood in great peril. To address this, the Courts and Congress have historically given the President broad leeway to obtain foreign intelligence. But in order to find information about an individual in the United States, the executive branch had to demonstrate that the person was an agent of a foreign power. Today, that barrier no longer exists. The intelligence community now collects massive amounts of data and then looks for potential threats to the United States. As renowned national security law scholar Laura K. Donohue explains in The Future of Foreign Intelligence, global communications systems and digital technologies have changed our lives in countless ways. But they have also contributed to a worrying transformation. Together with statutory alterations instituted in the wake of 9/11, and secret legal interpretations that have only recently become public, new and emerging technologies have radically expanded the amount and type of information that the government collects about U.S. citizens. Traditionally, for national security, the Courts have allowed weaker Fourth Amendment standards for search and seizure than those that mark criminal law. Information that is being collected for foreign intelligence purposes, though, is now being used for criminal prosecution. The expansion in the government's acquisition of private information, and the convergence between national security and criminal law threaten individual liberty. Donohue traces the evolution of U.S. foreign intelligence law and pairs it with the progress of Fourth Amendment jurisprudence. She argues that the bulk collection programs instituted by the National Security Agency amount to a general warrant, the prevention of which was the reason the Founders introduced the Fourth Amendment. The expansion of foreign intelligence surveillanceleant momentum by advances in technology, the Global War on Terror, and the emphasis on securing the homelandnow threatens to consume protections essential to privacy, which is a necessary component of a healthy democracy. Donohue offers a road map for reining in the national security state's expansive reach, arguing for a judicial re-evaluation of third party doctrine and statutory reform that will force the executive branch to take privacy seriously, even as Congress provides for the collection of intelligence central to U.S. national security. Alarming and penetrating, this is essential reading for anyone interested in the future of foreign intelligence and privacy in the United States.




US National Security, Intelligence and Democracy


Book Description

This volume examines the investigation by the 1975 Senate Select Committee (‘Church Committee’) into US intelligence abuses during the Cold War, and considers its lessons for the current ‘war on terror’. This report remains the most thorough public record of America’s intelligence services, and many of the legal boundaries operating on US intelligence agencies today are the direct result of reforms proposed by the Church Committee, including the Foreign Intelligence Surveillance Act. The Church Committee also drew attention to the importance of constitutional government as a Congressional body overseeing the activities of the Executive branch. Placing the legacy of the Church Committee in the context of the contemporary debate over US national security and democratic governance, the book brings together contributions from distinguished policy leaders and scholars of law, intelligence and political science.




Engaging Privacy and Information Technology in a Digital Age


Book Description

Privacy is a growing concern in the United States and around the world. The spread of the Internet and the seemingly boundaryless options for collecting, saving, sharing, and comparing information trigger consumer worries. Online practices of business and government agencies may present new ways to compromise privacy, and e-commerce and technologies that make a wide range of personal information available to anyone with a Web browser only begin to hint at the possibilities for inappropriate or unwarranted intrusion into our personal lives. Engaging Privacy and Information Technology in a Digital Age presents a comprehensive and multidisciplinary examination of privacy in the information age. It explores such important concepts as how the threats to privacy evolving, how can privacy be protected and how society can balance the interests of individuals, businesses and government in ways that promote privacy reasonably and effectively? This book seeks to raise awareness of the web of connectedness among the actions one takes and the privacy policies that are enacted, and provides a variety of tools and concepts with which debates over privacy can be more fruitfully engaged. Engaging Privacy and Information Technology in a Digital Age focuses on three major components affecting notions, perceptions, and expectations of privacy: technological change, societal shifts, and circumstantial discontinuities. This book will be of special interest to anyone interested in understanding why privacy issues are often so intractable.




Confronting Terror


Book Description

After the September 11, 2001 attacks the United States went to war. With thousands of Americans killed, billions of dollars in damage, and aggressive military and security measures in response, we are still living with the war a decade later. A change of presidential administration has not dulled controversy over the most fundamental objectives, strategies and tactics of the war, or whether it is even a war. This book clears the air over the meaning of 9/11, and sets the stage for a reasoned, clear, and considered discussion of the future with a collection of essays commemorating the 10th anniversary of the attacks. The contributors include supporters and critics of the war on terrorism, policymakers and commentators, insiders and outsiders, and some of the leading voices inside and outside government.




In the Name of Security Secrecy, Surveillance and Journalism


Book Description

The terrorist attacks on the World Trade Center in New York on 11 September 2001 saw the start of the so-called war on terror. The aim of ‘In the Name of Security – Secrecy, Surveillance and Journalism’ is to assess the impact of surveillance and other security measures on in-depth public interest journalism. How has the global fear-driven security paradigm sparked by 11 September affected journalism? At the core of the book sits what the authors have labeled the ‘trust us dilemma’. Governments justify passing, at times, oppressive and far-reaching anti-terror laws to keep citizens safe from terror. By doing so governments are asking the public to trust their good intentions and the integrity of the security agencies. But how can the public decide to trust the government and its agencies if it does not have access to information on which to base its decision? ‘In the Name of Security – Secrecy, Surveillance and Journalism’ takes an internationally comparative approach using case studies from the powerful intelligence-sharing group known as the Five Eyes consisting of the US, Canada, the UK, Australia and New Zealand. Chapters assessing a selection of EU countries and some of the BRICS countries provide additional and important points of comparison to the English-speaking countries that make up the Five Eyes.




The NSA Report


Book Description

The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.




Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.




Mass Surveillance and State Control


Book Description

This book details the factors contributing to the degenerative trend of mass, warrantless government surveillance which imperils civil liberties, and specifies recommendations for constructive change. It also provides a platform for grassroots efforts to stop the decline before it is too late.




Community Interests Across International Law


Book Description

This book explores the extent to which contemporary international law expects states to take into account the interests of others - namely third states or their citizens - when they form and implement their policies, negotiate agreements, and generally conduct their relations with other states. It systematically considers the various manifestations of what has been described as 'community interests' in many areas regulated by international law and observes how the law has evolved from a legal system based on more or less specific consent and aimed at promoting particular interests of states, to one that is more generally oriented towards collectively protecting common interests and values. Through essays by experts in the field, this book explores topics such as the sources of international law and the institutional aspects of developing the law and covers a range of areas within the law.