No Cover Image

Book chapter 1289 views 92 downloads

Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence

Stuart Macdonald Orcid Logo

Routledge Handbook of Law and Terrorism, Pages: 147 - 162

Swansea University Author: Stuart Macdonald Orcid Logo

Abstract

In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unkn...

Full description

Published in: Routledge Handbook of Law and Terrorism
Published: Abingdon Routledge 2015
Online Access: http://www.routledge.com/books/details/9780415870375/
URI: https://cronfa.swan.ac.uk/Record/cronfa18076
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2015-10-01T01:58:28Z
last_indexed 2019-02-04T19:06:25Z
id cronfa18076
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2019-02-04T14:23:50.4043118</datestamp><bib-version>v2</bib-version><id>18076</id><entry>2014-07-01</entry><title>Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence</title><swanseaauthors><author><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><ORCID>0000-0002-7483-9023</ORCID><firstname>Stuart</firstname><surname>Macdonald</surname><name>Stuart Macdonald</name><active>true</active><ethesisStudent>false</ethesisStudent></author></swanseaauthors><date>2014-07-01</date><deptcode>LAWD</deptcode><abstract>In today&#x2019;s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen &#x2013; even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes &#x2013; which have been the subject of much discussion and controversy since the Snowden revelations of 2013 &#x2013; have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals&#x2019; data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns.</abstract><type>Book chapter</type><journal>Routledge Handbook of Law and Terrorism</journal><paginationStart>147</paginationStart><paginationEnd>162</paginationEnd><publisher>Routledge</publisher><placeOfPublication>Abingdon</placeOfPublication><keywords>Dataveillance, counterterrorism, privacy, human rights</keywords><publishedDay>21</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-07-21</publishedDate><doi/><url>http://www.routledge.com/books/details/9780415870375/</url><notes></notes><college>COLLEGE NANME</college><department>Law</department><CollegeCode>COLLEGE CODE</CollegeCode><DepartmentCode>LAWD</DepartmentCode><institution>Swansea University</institution><apcterm/><lastEdited>2019-02-04T14:23:50.4043118</lastEdited><Created>2014-07-01T09:50:42.9947321</Created><path><level id="1">Faculty of Humanities and Social Sciences</level><level id="2">Hilary Rodham Clinton School of Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid>0000-0002-7483-9023</orcid><order>1</order></author></authors><documents><document><filename>0018076-04022019142216.pdf</filename><originalFilename>18076.pdf</originalFilename><uploaded>2019-02-04T14:22:16.3770000</uploaded><type>Output</type><contentLength>341349</contentLength><contentType>application/pdf</contentType><version>Accepted Manuscript</version><cronfaStatus>true</cronfaStatus><embargoDate>2017-01-21T00:00:00.0000000</embargoDate><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents><OutputDurs/></rfc1807>
spelling 2019-02-04T14:23:50.4043118 v2 18076 2014-07-01 Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence 933e714a4cc37c3ac12d4edc277f8f98 0000-0002-7483-9023 Stuart Macdonald Stuart Macdonald true false 2014-07-01 LAWD In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns. Book chapter Routledge Handbook of Law and Terrorism 147 162 Routledge Abingdon Dataveillance, counterterrorism, privacy, human rights 21 7 2015 2015-07-21 http://www.routledge.com/books/details/9780415870375/ COLLEGE NANME Law COLLEGE CODE LAWD Swansea University 2019-02-04T14:23:50.4043118 2014-07-01T09:50:42.9947321 Faculty of Humanities and Social Sciences Hilary Rodham Clinton School of Law Stuart Macdonald 0000-0002-7483-9023 1 0018076-04022019142216.pdf 18076.pdf 2019-02-04T14:22:16.3770000 Output 341349 application/pdf Accepted Manuscript true 2017-01-21T00:00:00.0000000 true eng
title Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
spellingShingle Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
Stuart Macdonald
title_short Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
title_full Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
title_fullStr Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
title_full_unstemmed Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
title_sort Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
author_id_str_mv 933e714a4cc37c3ac12d4edc277f8f98
author_id_fullname_str_mv 933e714a4cc37c3ac12d4edc277f8f98_***_Stuart Macdonald
author Stuart Macdonald
author2 Stuart Macdonald
format Book chapter
container_title Routledge Handbook of Law and Terrorism
container_start_page 147
publishDate 2015
institution Swansea University
publisher Routledge
college_str Faculty of Humanities and Social Sciences
hierarchytype
hierarchy_top_id facultyofhumanitiesandsocialsciences
hierarchy_top_title Faculty of Humanities and Social Sciences
hierarchy_parent_id facultyofhumanitiesandsocialsciences
hierarchy_parent_title Faculty of Humanities and Social Sciences
department_str Hilary Rodham Clinton School of Law{{{_:::_}}}Faculty of Humanities and Social Sciences{{{_:::_}}}Hilary Rodham Clinton School of Law
url http://www.routledge.com/books/details/9780415870375/
document_store_str 1
active_str 0
description In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns.
published_date 2015-07-21T03:21:05Z
_version_ 1763750618553384960
score 10.99342