Book Description
Offering a compelling understanding of contemporary state surveillance dynamics, this second edition is a timely update that lands at the critical intersection of cutting-edge technology and international security.
Author : Frederic Lemieux
Publisher : Emerald Group Publishing
Page : 281 pages
File Size : 23,71 MB
Release : 2024-09-13
Category : Political Science
ISBN : 1835490972
Offering a compelling understanding of contemporary state surveillance dynamics, this second edition is a timely update that lands at the critical intersection of cutting-edge technology and international security.
Author : Frederic Lemieux
Publisher : Emerald Group Publishing
Page : 273 pages
File Size : 25,63 MB
Release : 2018-11-16
Category : Social Science
ISBN : 1787691713
Since the dissolution of the Soviet Union in the early 1990’s, Western state surveillance and intelligence activities have drastically adapted to new domestic and global challenges. This book examines the evolution of state surveillance in modern societies and provides an international perspective on influential trends affecting these activities.
Author : Gary T. Marx
Publisher : University of Chicago Press
Page : 427 pages
File Size : 33,64 MB
Release : 2016-05-31
Category : Law
ISBN : 022628591X
In Windows into the Soul, Gary T. Marx sums up a lifetime of work on issues of surveillance and social control by disentangling and parsing the empirical richness of watching and being watched. Ultimately, Marx argues, recognizing complexity and asking the right questions is essential to bringing light and accountability to the darker, more iniquitous corners of our emerging surveillance society.
Author : Adam Henschke
Publisher : Springer Nature
Page : 231 pages
File Size : 40,32 MB
Release : 2021-12-14
Category : Political Science
ISBN : 3030902218
This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the “social credit system.” Counter-terrorism technologies can easily succumb to mission creep, where a technology’s exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
Author : Patrick Biltgen
Publisher : Artech House
Page : 481 pages
File Size : 18,42 MB
Release : 2016-01-01
Category : Technology & Engineering
ISBN : 1608078779
This new resource presents the principles and applications in the emerging discipline of Activity-Based Intelligence (ABI). This book will define, clarify, and demystify the tradecraft of ABI by providing concise definitions, clear examples, and thoughtful discussion. Concepts, methods, technologies, and applications of ABI have been developed by and for the intelligence community and in this book you will gain an understanding of ABI principles and be able to apply them to activity based intelligence analysis. The book is intended for intelligence professionals, researchers, intelligence studies, policy makers, government staffers, and industry representatives. This book will help practicing professionals understand ABI and how it can be applied to real-world problems.
Author : Josh Chin
Publisher : St. Martin's Press
Page : 216 pages
File Size : 42,14 MB
Release : 2022-09-06
Category : Political Science
ISBN : 1250249309
Where is the line between digital utopia and digital police state? Surveillance State tells the gripping, startling, and detailed story of how China’s Communist Party is building a new kind of political control: shaping the will of the people through the sophisticated—and often brutal—harnessing of data. It is a story born in Silicon Valley and America’s “War on Terror,” and now playing out in alarming ways on China’s remote Central Asian frontier. As ethnic minorities in a border region strain against Party control, China’s leaders have built a dystopian police state that keeps millions under the constant gaze of security forces armed with AI. But across the country in the city of Hangzhou, the government is weaving a digital utopia, where technology helps optimize everything from traffic patterns to food safety to emergency response. Award-winning journalists Josh Chin and Liza Lin take readers on a journey through the new world China is building within its borders, and beyond. Telling harrowing stories of the people and families affected by the Party’s ambitions, Surveillance State reveals a future that is already underway—a new society engineered around the power of digital surveillance.
Author : President's Review Group on Intelligence and Communications Technologies, The
Publisher : Princeton University Press
Page : 287 pages
File Size : 26,71 MB
Release : 2014-03-31
Category : Political Science
ISBN : 1400851270
The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.
Author : Simon Chesterman
Publisher :
Page : 0 pages
File Size : 29,20 MB
Release : 2018
Category :
ISBN :
What limits, if any, should be placed on a government's efforts to spy on its citizens in the name of national security? Spying on foreigners has long been regarded as an unseemly but necessary enterprise. Spying on one's own citizens in a democracy, by contrast, has historically been subject to various forms of legal and political restraint. For most of the twentieth century these regimes were kept distinct. That position is no longer tenable. Modern threats do not respect national borders. Changes in technology make it impractical to distinguish between 'foreign' and 'local' communications. And our culture is progressively reducing the sphere of activity that citizens can reasonably expect to be kept from government eyes. The main casualty of this transformed environment will be privacy. Recent battles over privacy have been dominated by fights over warrantless electronic surveillance and CCTV; the coming years will see debates over DNA databases, data mining, and biometric identification. There will be protests and lawsuits, editorials and elections resisting these attacks on privacy. Those battles are worthy. But the war will be lost. Modern threats increasingly require that governments collect such information, governments are increasingly able to collect it, and citizens increasingly accept that they will collect it. This book proposes a move away from questions of whether governments should collect information and onto more problematic and relevant questions concerning its use. By reframing the relationship between privacy and security in the language of a social contract, mediated by a citizenry who are active participants rather than passive targets, the book offers a framework to defend freedom without sacrificing liberty.
Author : Aziz Choudry
Publisher : Pluto Press (UK)
Page : 0 pages
File Size : 36,99 MB
Release : 2019
Category : Democracy
ISBN : 9780745337814
In this age of unchecked emphasis on national security, even liberal democracies seem prone to forgetting the histories of political policing and surveillance undergirding what we think of as our safety. Challenging this social amnesia, Aziz Choudry asks: What can we learn about the power of the state from the very people targeted by its security operations? Drawing on the knowledge of activists and academics from the United States, the United Kingdom, Canada, New Zealand, Australia, South Africa, and Chile, Activists and the Surveillance State delves into the harassment, infiltration, and disruption that has colored state responses to those deemed threats to national security. The book shows that, ultimately, movements can learn from their own repression, developing a critical and complex understanding of the nature of states and capital today that can crucially inform the struggles of tomorrow.
Author : Laura K. Donohue
Publisher : Oxford University Press
Page : 209 pages
File Size : 29,35 MB
Release : 2016-02-23
Category : Law
ISBN : 019023539X
Since the Revolutionary War, America's military and political leaders have recognized that U.S. national security depends upon the collection of intelligence. Absent information about foreign threats, the thinking went, the country and its citizens stood in great peril. To address this, the Courts and Congress have historically given the President broad leeway to obtain foreign intelligence. But in order to find information about an individual in the United States, the executive branch had to demonstrate that the person was an agent of a foreign power. Today, that barrier no longer exists. The intelligence community now collects massive amounts of data and then looks for potential threats to the United States. As renowned national security law scholar Laura K. Donohue explains in The Future of Foreign Intelligence, global communications systems and digital technologies have changed our lives in countless ways. But they have also contributed to a worrying transformation. Together with statutory alterations instituted in the wake of 9/11, and secret legal interpretations that have only recently become public, new and emerging technologies have radically expanded the amount and type of information that the government collects about U.S. citizens. Traditionally, for national security, the Courts have allowed weaker Fourth Amendment standards for search and seizure than those that mark criminal law. Information that is being collected for foreign intelligence purposes, though, is now being used for criminal prosecution. The expansion in the government's acquisition of private information, and the convergence between national security and criminal law threaten individual liberty. Donohue traces the evolution of U.S. foreign intelligence law and pairs it with the progress of Fourth Amendment jurisprudence. She argues that the bulk collection programs instituted by the National Security Agency amount to a general warrant, the prevention of which was the reason the Founders introduced the Fourth Amendment. The expansion of foreign intelligence surveillanceleant momentum by advances in technology, the Global War on Terror, and the emphasis on securing the homelandnow threatens to consume protections essential to privacy, which is a necessary component of a healthy democracy. Donohue offers a road map for reining in the national security state's expansive reach, arguing for a judicial re-evaluation of third party doctrine and statutory reform that will force the executive branch to take privacy seriously, even as Congress provides for the collection of intelligence central to U.S. national security. Alarming and penetrating, this is essential reading for anyone interested in the future of foreign intelligence and privacy in the United States.