Book chapter 2232 views 225 downloads
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
Routledge Handbook of Law and Terrorism, Pages: 147 - 162
Swansea University Author:
Stuart Macdonald
-
PDF | Accepted Manuscript
Download (358.8KB)
Abstract
In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unkn...
| Published in: | Routledge Handbook of Law and Terrorism |
|---|---|
| Published: |
Abingdon
Routledge
2015
|
| Online Access: |
http://www.routledge.com/books/details/9780415870375/ |
| URI: | https://cronfa.swan.ac.uk/Record/cronfa18076 |
| first_indexed |
2015-10-01T01:58:28Z |
|---|---|
| last_indexed |
2019-02-04T19:06:25Z |
| id |
cronfa18076 |
| recordtype |
SURis |
| fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2019-02-04T14:23:50.4043118</datestamp><bib-version>v2</bib-version><id>18076</id><entry>2014-07-01</entry><title>Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2014-07-01</date><deptcode>HRCL</deptcode><abstract>In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns.</abstract><type>Book chapter</type><journal>Routledge Handbook of Law and Terrorism</journal><paginationStart>147</paginationStart><paginationEnd>162</paginationEnd><publisher>Routledge</publisher><placeOfPublication>Abingdon</placeOfPublication><keywords>Dataveillance, counterterrorism, privacy, human rights</keywords><publishedDay>21</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-07-21</publishedDate><doi/><url>http://www.routledge.com/books/details/9780415870375/</url><notes></notes><college>COLLEGE NANME</college><department>Hillary Rodham Clinton Law School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>HRCL</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2019-02-04T14:23:50.4043118</lastEdited><Created>2014-07-01T09:50:42.9947321</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author></authors><documents><document><filename>0018076-04022019142216.pdf</filename><originalFilename>18076.pdf</originalFilename><uploaded>2019-02-04T14:22:16.3770000</uploaded><type>Output</type><contentLength>341349</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2017-01-21T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
| spelling |
2019-02-04T14:23:50.4043118 v2 18076 2014-07-01 Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2014-07-01 HRCL In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns. Book chapter Routledge Handbook of Law and Terrorism 147 162 Routledge Abingdon Dataveillance, counterterrorism, privacy, human rights 21 7 2015 2015-07-21 http://www.routledge.com/books/details/9780415870375/ COLLEGE NANME Hillary Rodham Clinton Law School COLLEGE CODE HRCL Swansea University 2019-02-04T14:23:50.4043118 2014-07-01T09:50:42.9947321 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 0018076-04022019142216.pdf 18076.pdf 2019-02-04T14:22:16.3770000 Output 341349 application/pdf Accepted Manuscript true 2017-01-21T00:00:00.0000000 true eng |
| title |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
| spellingShingle |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence Stuart Macdonald |
| title_short |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
| title_full |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
| title_fullStr |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
| title_full_unstemmed |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
| title_sort |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
| author_id_str_mv |
933e714a4cc37c3ac12d4edc277f8f98 |
| author_id_fullname_str_mv |
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald |
| author |
Stuart Macdonald |
| author2 |
Stuart Macdonald |
| format |
Book chapter |
| container_title |
Routledge Handbook of Law and Terrorism |
| container_start_page |
147 |
| publishDate |
2015 |
| institution |
Swansea University |
| publisher |
Routledge |
| college_str |
Faculty of Humanities and Social Sciences |
| hierarchytype |
|
| hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
| hierarchy_top_title |
Faculty of Humanities and Social Sciences |
| hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
| hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
| department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
| url |
http://www.routledge.com/books/details/9780415870375/ |
| document_store_str |
1 |
| active_str |
0 |
| description |
In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns. |
| published_date |
2015-07-21T03:33:59Z |
| _version_ |
1851090680988827648 |
| score |
11.089572 |

