No Cover Image

Book Chapter 495 views 4 downloads

Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence / Stuart Macdonald

Routledge Handbook of Law and Terrorism, Pages: 147 - 162

Swansea University Author: Macdonald, Stuart

Abstract

In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unkn...

Full description

Published in: Routledge Handbook of Law and Terrorism
Published: Abingdon Routledge 2015
Online Access: http://www.routledge.com/books/details/9780415870375/
URI: https://cronfa.swan.ac.uk/Record/cronfa18076
Tags: Add Tag
No Tags, Be the first to tag this record!
first_indexed 2015-10-01T01:58:28Z
last_indexed 2019-02-04T19:06:25Z
id cronfa18076
recordtype SURis
fullrecord <?xml version="1.0"?><rfc1807><datestamp>2019-02-04T14:23:50Z</datestamp><bib-version>v2</bib-version><id>18076</id><entry>2014-07-01</entry><title>Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence</title><alternativeTitle></alternativeTitle><author>Stuart Macdonald</author><firstname>Stuart</firstname><surname>Macdonald</surname><active>true</active><ORCID>0000-0002-7483-9023</ORCID><ethesisStudent>false</ethesisStudent><sid>933e714a4cc37c3ac12d4edc277f8f98</sid><email>73adc6f37a779687c19be764ac7fbd45</email><emailaddr>l7WWMBTMlQGiRAtwCFF36hXCE6Z9OGBXOD9D5JU4+T4=</emailaddr><date>2014-07-01</date><deptcode>LAWD</deptcode><abstract>In today&#x2019;s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen &#x2013; even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes &#x2013; which have been the subject of much discussion and controversy since the Snowden revelations of 2013 &#x2013; have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals&#x2019; data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns.</abstract><type>Chapter in book</type><journal>Routledge Handbook of Law and Terrorism</journal><volume/><journalNumber/><paginationStart>147</paginationStart><paginationEnd>162</paginationEnd><publisher>Routledge</publisher><placeOfPublication>Abingdon</placeOfPublication><isbnPrint/><isbnElectronic/><issnPrint/><issnElectronic/><keywords>Dataveillance, counterterrorism, privacy, human rights</keywords><publishedDay>21</publishedDay><publishedMonth>7</publishedMonth><publishedYear>2015</publishedYear><publishedDate>2015-07-21</publishedDate><doi></doi><url>http://www.routledge.com/books/details/9780415870375/</url><notes></notes><college>Hillary Rodham Clinton School of Law</college><department>Legal Studies</department><CollegeCode>CLAW</CollegeCode><DepartmentCode>LAWD</DepartmentCode><institution/><researchGroup>Criminal Justice and Criminology</researchGroup><supervisor>Clive Walker, Genevieve Lennon</supervisor><sponsorsfunders/><grantnumber/><degreelevel/><degreename>None</degreename><lastEdited>2019-02-04T14:23:50Z</lastEdited><Created>2014-07-01T09:50:42Z</Created><path><level id="1">Hillary Rodham Clinton School of Law</level><level id="2">Law</level></path><authors><author><firstname>Stuart</firstname><surname>Macdonald</surname><orcid/><order>1</order></author></authors><documents><document><filename>0018076-04022019142216.pdf</filename><originalFilename>18076.pdf</originalFilename><uploaded>2019-02-04T14:22:16Z</uploaded><type>Output</type><contentLength>341349</contentLength><contentType>application/pdf</contentType><version>AM</version><cronfaStatus>true</cronfaStatus><action>Published to Cronfa</action><actionDate>04/02/2019</actionDate><embargoDate>2017-01-21T00:00:00</embargoDate><documentNotes/><copyrightCorrect>true</copyrightCorrect><language>eng</language></document></documents></rfc1807>
spelling 2019-02-04T14:23:50Z v2 18076 2014-07-01 Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence Stuart Macdonald Stuart Macdonald true 0000-0002-7483-9023 false 933e714a4cc37c3ac12d4edc277f8f98 73adc6f37a779687c19be764ac7fbd45 l7WWMBTMlQGiRAtwCFF36hXCE6Z9OGBXOD9D5JU4+T4= 2014-07-01 LAWD In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns. Chapter in book Routledge Handbook of Law and Terrorism 147 162 Routledge Abingdon Dataveillance, counterterrorism, privacy, human rights 21 7 2015 2015-07-21 http://www.routledge.com/books/details/9780415870375/ Hillary Rodham Clinton School of Law Legal Studies CLAW LAWD Criminal Justice and Criminology Clive Walker, Genevieve Lennon None 2019-02-04T14:23:50Z 2014-07-01T09:50:42Z Hillary Rodham Clinton School of Law Law Stuart Macdonald 1 0018076-04022019142216.pdf 18076.pdf 2019-02-04T14:22:16Z Output 341349 application/pdf AM true Published to Cronfa 04/02/2019 2017-01-21T00:00:00 true eng
title Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
spellingShingle Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
Macdonald, Stuart
title_short Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
title_full Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
title_fullStr Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
title_full_unstemmed Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
title_sort Dataveillance and Terrorism: Swamps, Haystacks and the Eye of Providence
author_id_str_mv 933e714a4cc37c3ac12d4edc277f8f98
author_id_fullname_str_mv 933e714a4cc37c3ac12d4edc277f8f98_***_Macdonald, Stuart
author Macdonald, Stuart
author2 Stuart Macdonald
format Book Chapter
container_title Routledge Handbook of Law and Terrorism
container_start_page 147
publishDate 2015
institution Swansea University
publisher Routledge
college_str Hillary Rodham Clinton School of Law
hierarchytype
hierarchy_top_id hillaryrodhamclintonschooloflaw
hierarchy_top_title Hillary Rodham Clinton School of Law
hierarchy_parent_id hillaryrodhamclintonschooloflaw
hierarchy_parent_title Hillary Rodham Clinton School of Law
department_str Law{{{_:::_}}}Hillary Rodham Clinton School of Law{{{_:::_}}}Law
url http://www.routledge.com/books/details/9780415870375/
document_store_str 1
active_str 1
researchgroup_str Criminal Justice and Criminology
description In today’s pre-crime society it is easy to understand the appeal of a technology that promises to identify terrorist plots and stop attacks before they happen – even when the would-be perpetrators have never previously attracted the attention of the authorities or aroused any suspicion (unknown unknowns, in Rumsfeldian terminology). Mass dataveillance programmes – which have been the subject of much discussion and controversy since the Snowden revelations of 2013 – have been claimed to offer this degree of predictive potential. This chapter first of all examines the effectiveness of pattern-based queries, arguing that there are significant problems in terms of modelling, false positives and false negatives. Given that pattern-based queries involve suspicion-less searches of individuals’ data, the chapter then examines legal protection of the right to privacy in this context and considers the significance of these privacy-based concerns.
published_date 2015-07-21T04:22:51Z
_version_ 1647790388073725952
score 10.860345