State Sponsored Cyber Surveillance


Book Description

This insightful book focuses on the application of mass surveillance, its impact upon existing international human rights and the challenges posed by mass surveillance. Through the judicious use of case studies State Sponsored Cyber Surveillance argues for the need to balance security requirements with the protection of fundamental rights.




Terrorism and State Surveillance of Communications


Book Description

This book brings together leading counterterrorism experts, from academia and practice, to form an interdisciplinary assessment of the terrorist threat facing the United Kingdom and the European Union, focusing on how terrorists and terrorist organisations communicate in the digital age. Perspectives drawn from criminological, legalistic, and political sciences, allow the book to highlight the problems faced by the state and law enforcement agencies in monitoring, accessing, and gathering intelligence from the terrorist use of electronic communications, and how such powers are used proportionately and balanced with human rights law. The book will be a valuable resource for scholars and students of terrorism and security, policing and human rights. With contributions from the fields of both academia and practice, it will also be of interest to professionals and practitioners working in the areas of criminal law, human rights and terrorism.




Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.




The War On Our Freedoms


Book Description

In each generation, for different reasons, America witnesses a tug of war between the instinct to suppress and the instinct for openness. Today, with the perception of a mortal threat from terrorists, the instinct to suppress is in the ascendancy. Part of the reason for this is the trauma that our country experienced on September 11, 2001, and part of the reason is that the people who are in charge of our government are inclined to use the suppression of information as a management strategy. Rather than waiting ten or fifteen years to point out what's wrong with the current rush to limit civil liberties in the name of "national security," these essays by top thinkers, scholars, journalists, and historians lift the veil on what is happening and why the implications are dangerous and disturbing and ultimately destructive of American values and ideals. Without our even being aware, the judiciary is being undermined, the press is being intimidated, racial profiling is rampant, and our privacy is being invaded. The "war on our freedoms " is just as real as the "war on terror " -- and, in the end, just as dangerous.




The NSA Report


Book Description

The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.




Media and Terrorism in the 21st Century


Book Description

Presents writings from international scholars on the many different aspects of media and terror relations. The book explores key topics like new media, religion and terror, propaganda, counterterrorism strategies, and more from new perspectives.




Media, Terrorism and Society


Book Description

This book provides new insights on contemporary terrorism and media research, opening the door for fresh perspectives and trends exploring theories and concepts in the field. Advances in technology have increased the threat of terrorism, as the Internet has helped terrorists to recruit new members, plan their attacks, and amplify their messages. As technology continues to evolve, it is not difficult to imagine how the advanced information and technology of the new millennium could cause more terrifying realities in the world today. During this period of profound technological change, we need to understand the relationships between media, society, and the new paradigm of terrorism. In our global society where the war on terrorism knows no borders, countries are increasingly recognizing the importance of improving terrorism coverage domestically and globally. This book is a valuable resource, offering key directions for assessing the ongoing revolutionary changes and trends in communicating terrorism in the digital age. This book was originally published as a special issue of Mass Communication and Society.




In the Name of Security Secrecy, Surveillance and Journalism


Book Description

The terrorist attacks on the World Trade Center in New York on 11 September 2001 saw the start of the so-called war on terror. The aim of ‘In the Name of Security – Secrecy, Surveillance and Journalism’ is to assess the impact of surveillance and other security measures on in-depth public interest journalism. How has the global fear-driven security paradigm sparked by 11 September affected journalism? At the core of the book sits what the authors have labeled the ‘trust us dilemma’. Governments justify passing, at times, oppressive and far-reaching anti-terror laws to keep citizens safe from terror. By doing so governments are asking the public to trust their good intentions and the integrity of the security agencies. But how can the public decide to trust the government and its agencies if it does not have access to information on which to base its decision? ‘In the Name of Security – Secrecy, Surveillance and Journalism’ takes an internationally comparative approach using case studies from the powerful intelligence-sharing group known as the Five Eyes consisting of the US, Canada, the UK, Australia and New Zealand. Chapters assessing a selection of EU countries and some of the BRICS countries provide additional and important points of comparison to the English-speaking countries that make up the Five Eyes.




Intelligence and State Surveillance in Modern Societies


Book Description

Offering a compelling understanding of contemporary state surveillance dynamics, this second edition is a timely update that lands at the critical intersection of cutting-edge technology and international security.




Journalism After Snowden


Book Description

Edward Snowden's release of classified NSA documents exposed the widespread government practice of mass surveillance in a democratic society. The publication of these documents, facilitated by three journalists, as well as efforts to criminalize the act of being a whistleblower or source, signaled a new era in the coverage of national security reporting. The contributors to Journalism After Snowden analyze the implications of the Snowden affair for journalism and the future role of the profession as a watchdog for the public good. Integrating discussions of media, law, surveillance, technology, and national security, the book offers a timely and much-needed assessment of the promises and perils for journalism in the digital age. Journalism After Snowden is essential reading for citizens, journalists, and academics in search of perspective on the need for and threats to investigative journalism in an age of heightened surveillance. The book features contributions from key players involved in the reporting of leaks of classified information by Edward Snowden, including Alan Rusbridger, former editor-in-chief of The Guardian; ex-New York Times executive editor Jill Abramson; legal scholar and journalist Glenn Greenwald; and Snowden himself. Other contributors include dean of Columbia Graduate School of Journalism Steve Coll, Internet and society scholar Clay Shirky, legal scholar Cass Sunstein, and journalist Julia Angwin. Topics discussed include protecting sources, digital security practices, the legal rights of journalists, access to classified data, interpreting journalistic privilege in the digital age, and understanding the impact of the Internet and telecommunications policy on journalism. The anthology's interdisciplinary nature provides a comprehensive overview and understanding of how society can protect the press and ensure the free flow of information.