Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309134447
Category : Computers
Languages : en
Pages : 376

Get Book Here

Book Description
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.

Counter-Terrorism Strategies in a Fragmented International Legal Order

Counter-Terrorism Strategies in a Fragmented International Legal Order PDF Author: Larissa J. Herik
Publisher: Cambridge University Press
ISBN: 1107025389
Category : Law
Languages : en
Pages : 799

Get Book Here

Book Description
An exploration of the relationship between different branches of international law and their applicability to terrorism.

Protecting Individual Privacy in the Struggle Against Terrorists

Protecting Individual Privacy in the Struggle Against Terrorists PDF Author: National Research Council
Publisher: National Academies Press
ISBN: 0309134447
Category : Computers
Languages : en
Pages : 376

Get Book Here

Book Description
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.

Targeted Killing

Targeted Killing PDF Author: Thomas B. Hunter
Publisher: Thomas Hunter
ISBN: 143925205X
Category : Assassination
Languages : en
Pages : 55

Get Book Here

Book Description
This is an objective, strategic assessment of the role, usefulness, and logistical concerns posed by state-sponsored targeted killing and its overall efficiency in the current war on global terrorism.

Counter-Terrorism and the Use of Force in International Law

Counter-Terrorism and the Use of Force in International Law PDF Author:
Publisher: DIANE Publishing
ISBN: 1428960821
Category :
Languages : en
Pages : 107

Get Book Here

Book Description
In this paper, Michael Schmitt explores the legality of the attacks against Al Qaeda and the Taliban under the "jus ad bellum," that component of international law that governs when a State may resort to force as an instrument of national policy. Although States have conducted military counterterrorist operations in the past, the scale and scope of Operation Enduring Freedom may signal a sea change in strategies to defend against terrorism. This paper explores the normative limit on counterterrorist operations. Specifically, under what circumstances can a victim State react forcibly to an act of terrorism? Against whom? When? With what degree of severity? And for how long? The author contends that the attacks against Al Qaeda were legitimate exercises of the rights of individual and collective defense. They were necessary and proportional, and once the Taliban refused to comply with U.S. and United Nations demands to turn over the terrorists located in Afghanistan, it was legally appropriate for coalition forces to enter the country for the purpose of ending the ongoing Al Qaeda terrorist campaign. However, the attacks on the Taliban were less well grounded in traditional understandings of international law. Although the Taliban were clearly in violation of their legal obligation not to allow their territory to be used as a terrorist sanctuary, the author suggests that the degree and nature of the relationship between the Taliban and Al Qaeda may not have been such that the September 11 attacks could be attributed to the Taliban, thereby disallowing strikes against them in self-defense under traditional understandings of international law. Were the attacks, therefore, illegal? Not necessarily. Over the past half-century the international community's understanding of the international law governing the use of force by States has been continuously evolving. The author presents criteria likely to drive future assessments of the legality of counterterrorist operatio7.

International Law and New Wars

International Law and New Wars PDF Author: Christine Chinkin
Publisher: Cambridge University Press
ISBN: 1107171210
Category : History
Languages : en
Pages : 611

Get Book Here

Book Description
Examines the difficulties in applying international law to recent armed conflicts known as 'new wars'.

Science and Technology of Terrorism and Counterterrorism, Second Edition

Science and Technology of Terrorism and Counterterrorism, Second Edition PDF Author: Mark A. Prelas
Publisher: CRC Press
ISBN: 1420071823
Category : Social Science
Languages : en
Pages : 606

Get Book Here

Book Description
Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects. Taking into account these practical considerations, the second edition of Science and Technology of Terrorism and Counterterrorism discusses the nature of terrorism and the materials used by terrorists. It describes how intelligence professionals and law enforcement personnel can detect and destroy these materials, and how they can deal with terrorist groups. This volume begins by introducing the shift in analysis of terrorist attacks after September 11, 2001 and summarizes selected case studies. It discusses the origin and nature of terrorism and the factors involved in diplomacy. Covering a broad range of topics, the book examines: Aerosol dispersion of toxic materials Bioterrorism and the manufacture, detection, and delivery of biological agents Agricultural terrorism Nuclear terrorism and nuclear weapons systems, threats, and safeguards Chemical terrorism, including manufacture, detection, delivery, and decontamination Cyber-terrorism Personal protective equipment The role of government at federal, state, and local levels The role of international agencies and their resources, capabilities, and responsibilities The National Infrastructure Protection Plan As terrorist activities increase globally, it is critical that those charged with protecting the public understand the myriad of ways in which terrorists operate. While we cannot predict where, when, and how terrorists will strike, our vigilance in staying abreast of the terrorist threat is the only way to have a fighting chance against those who seek to destroy our world.

Science and Technology to Counter Terrorism

Science and Technology to Counter Terrorism PDF Author: International Strategic and Security Studies Programme of the National Institute of Advanced Studies
Publisher: National Academies Press
ISBN: 0309104998
Category : Political Science
Languages : en
Pages : 180

Get Book Here

Book Description
This volume presents the papers and summarizes the discussions of a workshop held in Goa, India, in January 2004, organized by the Indian National Institute of Advanced Science (NIAS) and the U.S. Committee on International Security and Arms Control (CISAC). During the workshop, Indian and U.S. experts examined the terrorist threat faced in both countries and elsewhere in the world, and explored opportunities for the U.S. and India to work together. Bringing together scientists and experts with common scientific and technical backgrounds from different cultures provided a unique opportunity to explore possible means of preventing or mitigating future terrorist attacks.

The Long Shadow of 9/11

The Long Shadow of 9/11 PDF Author: Brian Michael Jenkins
Publisher: Rand Corporation
ISBN: 083305838X
Category : History
Languages : en
Pages : 227

Get Book Here

Book Description
This book provides a multifaceted array of answers to the question, In the ten years since the 9/11 terrorist attacks, how has America responded? In a series of essays, RAND authors lend a farsighted perspective to the national dialogue on 9/11's legacy. The essays assess the military, political, fiscal, social, cultural, psychological, and even moral implications of U.S. policymaking since 9/11. Part One of the book addresses the lessons learned from America's accomplishments and mistakes in its responses to the 9/11 attacks and the ongoing terrorist threat. Part Two explores reactions to the extreme ideologies of the terrorists and to the fears they have generated. Part Three presents the dilemmas of asymmetrical warfare and suggests ways to resolve them. Part Four cautions against sacrificing a long-term strategy by imposing short-term solutions, particularly with respect to air passenger security and counterterrorism intelligence. Finally, Part Five looks at the effects of the terrorist attacks on the U.S. public health system, at the potential role of compensation policy for losses incurred by terrorism, and at the possible long-term effects of terrorism and counterterrorism on American values, laws, and society.--Publisher description.

Psychology of Terrorism

Psychology of Terrorism PDF Author:
Publisher:
ISBN:
Category :
Languages : en
Pages : 222

Get Book Here

Book Description
In compiling this annotated bibliography on the psychology of terrorism, the author has defined terrorism as "acts of violence intentionally perpetrated on civilian noncombatants with the goal of furthering some ideological, religious or political objective." The principal focus is on nonstate actors. The task was to identify and analyze the scientific and professional social science literature pertaining to the psychological and/or behavioral dimensions of terrorist behavior (not on victimization or effects). The objectives were to explore what questions pertaining to terrorist groups and behavior had been asked by social science researchers; to identify the main findings from that research; and attempt to distill and summarize them within a framework of operationally relevant questions. To identify the relevant social science literature, the author began by searching a series of major academic databases using a systematic, iterative keyword strategy, mapping, where possible, onto existing subject headings. The focus was on locating professional social science literature published in major books or in peer-reviewed journals. Searches were conducted of the following databases October 2003: Sociofile/Sociological Abstracts, Criminal Justice Abstracts (CJ Abstracts), Criminal Justice Periodical Index (CJPI), National Criminal Justice Reference Service Abstracts (NCJRS), PsycInfo, Medline, and Public Affairs Information Service (PAIS). Three types of annotations were provided for works in this bibliography: Author's Abstract -- this is the abstract of the work as provided (and often published) by the author; Editor's Annotation -- this is an annotation written by the editor of this bibliography; and Key Quote Summary -- this is an annotation composed of "key quotes" from the original work, edited to provide a cogent overview of its main points.

Emergency Response to Terrorism

Emergency Response to Terrorism PDF Author:
Publisher: DIANE Publishing
ISBN: 1428981195
Category : Disaster relief
Languages : en
Pages : 103

Get Book Here

Book Description