Book chapter 1667 views 147 downloads
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
Routledge Handbook of Law and Terrorism, Pages: 147 - 162
Swansea University Author: Stuart Macdonald
-
PDF | Accepted Manuscript
Download (358.8KB)
Abstract
In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unkn...
Published in: | Routledge Handbook of Law and Terrorism |
---|---|
Published: |
Abingdon
Routledge
2015
|
Online Access: |
http://www.routledge.com/books/details/9780415870375/ |
URI: | https://cronfa.swan.ac.uk/Record/cronfa18076 |
first_indexed |
2015-10-01T01:58:28Z |
---|---|
last_indexed |
2019-02-04T19:06:25Z |
id |
cronfa18076 |
recordtype |
SURis |
fullrecord |
<?xml version="1.0"?><rfc1807><datestamp>2019-02-04T14:23:50.4043118</datestamp><bib-version>v2</bib-version><id>18076</id><entry>2014-07-01</entry><title>Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2014-07-01</date><deptcode>HRCL</deptcode><abstract>In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns.</abstract><type>Book chapter</type><journal>Routledge Handbook of Law and Terrorism</journal><paginationStart>147</paginationStart><paginationEnd>162</paginationEnd><publisher>Routledge</publisher><placeOfPublication>Abingdon</placeOfPublication><keywords>Dataveillance, counterterrorism, privacy, human rights</keywords><publishedDay>21</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-07-21</publishedDate><doi/><url>http://www.routledge.com/books/details/9780415870375/</url><notes></notes><college>COLLEGE NANME</college><department>Hillary Rodham Clinton Law School</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>HRCL</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2019-02-04T14:23:50.4043118</lastEdited><Created>2014-07-01T09:50:42.9947321</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author></authors><documents><document><filename>0018076-04022019142216.pdf</filename><originalFilename>18076.pdf</originalFilename><uploaded>2019-02-04T14:22:16.3770000</uploaded><type>Output</type><contentLength>341349</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2017-01-21T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807> |
spelling |
2019-02-04T14:23:50.4043118 v2 18076 2014-07-01 Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2014-07-01 HRCL In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns. Book chapter Routledge Handbook of Law and Terrorism 147 162 Routledge Abingdon Dataveillance, counterterrorism, privacy, human rights 21 7 2015 2015-07-21 http://www.routledge.com/books/details/9780415870375/ COLLEGE NANME Hillary Rodham Clinton Law School COLLEGE CODE HRCL Swansea University 2019-02-04T14:23:50.4043118 2014-07-01T09:50:42.9947321 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 0018076-04022019142216.pdf 18076.pdf 2019-02-04T14:22:16.3770000 Output 341349 application/pdf Accepted Manuscript true 2017-01-21T00:00:00.0000000 true eng |
title |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
spellingShingle |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence Stuart Macdonald |
title_short |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
title_full |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
title_fullStr |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
title_full_unstemmed |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
title_sort |
Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence |
author_id_str_mv |
933e714a4cc37c3ac12d4edc277f8f98 |
author_id_fullname_str_mv |
933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald |
author |
Stuart Macdonald |
author2 |
Stuart Macdonald |
format |
Book chapter |
container_title |
Routledge Handbook of Law and Terrorism |
container_start_page |
147 |
publishDate |
2015 |
institution |
Swansea University |
publisher |
Routledge |
college_str |
Faculty of Humanities and Social Sciences |
hierarchytype |
|
hierarchy_top_id |
facultyofhumanitiesandsocialsciences |
hierarchy_top_title |
Faculty of Humanities and Social Sciences |
hierarchy_parent_id |
facultyofhumanitiesandsocialsciences |
hierarchy_parent_title |
Faculty of Humanities and Social Sciences |
department_str |
Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law |
url |
http://www.routledge.com/books/details/9780415870375/ |
document_store_str |
1 |
active_str |
0 |
description |
In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns. |
published_date |
2015-07-21T00:40:17Z |
_version_ |
1821363947978096640 |
score |
11.04748 |