Terrorism and State Surveillance of Communications


Book Description

This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.




Network Technologies for Networked Terrorists


Book Description

Terrorist organizations use many technologies as they plan and stage attacks. This book explores the purpose and manner of the use of communication and computer technologies, their net effect, and security forces' possible responses. The authors conclude that, instead of developing direct counters to these technologies, exploiting their use and the information they manage to enable more direct security force operations is a more promising option.




Digital Privacy, Terrorism and Law Enforcement


Book Description

This book examines the UK’s response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of ‘darknet’; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a ‘digital rights criterion’ from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.




Mass Government Surveillance


Book Description

The Patriot Act, which was passed shortly after the September 11, 2001 terrorist attacks, has allowed the government to monitor communication by phone, email, or social media, to access credit and bank reports, or to track activity on the internet. This book examines the new methods used by the government to spy on citizens, the reasons it became necessary, and the tradeoffs between increased safety and a loss of privacy, and the moral arguments for and against these tradeoffs.




Going Dark


Book Description




Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.




Does State Spying Make Us Safer?


Book Description

Does government surveillance make us safer? The thirteenth Munk Debate, held in Toronto on Friday, May 2, 2014, pitted Michael Hayden and Alan Dershowitz against Glenn Greenwald and Alexis Ohanian to debate whether state surveillance is a legitimate defence of our freedom — the democratic issue of the moment. In a risk-filled world, democracies are increasingly turning to large-scale state surveillance, at home and abroad, to fight complex and unconventional threats — but is it justified? For some, the threats more than justify the current surveillance system, and the laws and institutions of democracies are more than capable of balancing the needs of individual privacy with collective security. But for others, we are in peril of sacrificing to a vast and unaccountable state surveillance apparatus the civil liberties that guarantee citizens’ basic freedoms and our democratic way of life. In this edition of the Munk Debates, former head of the CIA and NSA Michael Hayden and civil liberties lawyer Alan Dershowitz square off against journalist Glenn Greenwald and reddit co-founder Alexis Ohanian to debate the legitimacy of state surveillance. With issues of Internet privacy increasingly gaining prominence, the Munk Debate on the Surveillance State asks: Should government be able to monitor our activities in order to keep us safe?




Surveillance, Counter-Terrorism and Comparative Constitutionalism


Book Description

The decade after 11 September 2001 saw the enactment of counter-terrorism laws around the world. These laws challenged assumptions about public institutions, human rights and constitutional law. Those challenges are particularly apparent in the context of the increased surveillance powers granted to many law enforcement and intelligence agencies. This book brings together leading legal scholars in the field of counter-terrorism and constitutional law, and focuses their attention on the issue of surveillance. The breadth of topics covered in this collection include: the growth and diversification of mechanisms of mass surveillance, the challenges that technological developments pose for constitutionalism, new actors in the surveillance state (such as local communities and private organisations), the use of surveillance material as evidence in court, and the effectiveness of constitutional and other forms of review of surveillance powers. The book brings a strong legal focus to the debate surrounding surveillance and counter-terrorism, and draws important conclusions about the constitutional implications of the expansion of surveillance powers after 9/11.




State Sponsored Cyber Surveillance


Book Description

This insightful book focuses on the application of mass surveillance, its impact upon existing international human rights and the challenges posed by mass surveillance. Through the judicious use of case studies State Sponsored Cyber Surveillance argues for the need to balance security requirements with the protection of fundamental rights.




In the Name of Security Secrecy, Surveillance and Journalism


Book Description

The terrorist attacks on the World Trade Center in New York on 11 September 2001 saw the start of the so-called war on terror. The aim of ‘In the Name of Security – Secrecy, Surveillance and Journalism’ is to assess the impact of surveillance and other security measures on in-depth public interest journalism. How has the global fear-driven security paradigm sparked by 11 September affected journalism? At the core of the book sits what the authors have labeled the ‘trust us dilemma’. Governments justify passing, at times, oppressive and far-reaching anti-terror laws to keep citizens safe from terror. By doing so governments are asking the public to trust their good intentions and the integrity of the security agencies. But how can the public decide to trust the government and its agencies if it does not have access to information on which to base its decision? ‘In the Name of Security – Secrecy, Surveillance and Journalism’ takes an internationally comparative approach using case studies from the powerful intelligence-sharing group known as the Five Eyes consisting of the US, Canada, the UK, Australia and New Zealand. Chapters assessing a selection of EU countries and some of the BRICS countries provide additional and important points of comparison to the English-speaking countries that make up the Five Eyes.