Matches in SemOpenAlex for { <https://semopenalex.org/work/W3121469384> ?p ?o ?g. }
Showing items 1 to 65 of
65
with 100 items per page.
- W3121469384 endingPage "1209" @default.
- W3121469384 startingPage "1059" @default.
- W3121469384 abstract "The United States’ Terrorism Surveillance Program represents just one of many expansions in surveillance since 9/11, as legal controls previously introduced to protect citizens’ privacy and to prevent the misuse of surveillance powers have been relaxed. What makes the situation qualitatively different now is not just the lowering of the bar: digitization and the rapid advancement of technology mean that the type and volume of information currently available eclipse that of previous generations. The issue is not confined to the United States. Despite the incorporation of the European Convention of Human Rights into British law, the United Kingdom also appears to be losing privacy in its battle against terrorism. Part I of this article looks at the American institution of legal controls on the executive branch and their subsequent erosion post-9/11. It explores three changes incorporated in the USA PATRIOT Act: alterations to the Foreign Intelligence Surveillance Act; the introduction of Delayed Notice Search Warrants; and the expansion of National Security Letters. Outside of this legislation, the weakening of the Attorney General guidelines increased the FBI's ability to collect information. The article highlights the Department of Defense's (DOD) movement into the domestic surveillance realm. It discusses a number of operations both inside and outside the DOD, such as TALON, Echelon, Carnivore, Magic Lantern, TIPS, and the use of watch lists. Part I concludes with a discussion of the data mining efforts underway. The article argues that Total Information Awareness, ADVISE, and other projects catapult surveillance into another realm. Moreover, while any one program, such as the NSA initiative, may be considered on narrow grounds, the sheer breadth of current powers raises important concerns. Part II notes that, until recently, no laws governed police and intelligence service information-gathering authorities in the UK. Extraordinary stop and search powers for terrorist-related offences, and warrants for police interference with property provided exceptions. But physical searches of property conducted by the intelligence services, the interception of communications by law enforcement and intelligence agencies, the use of covert surveillance or electronic bugs, and the running of covert human intelligence sources operated under the legislative and judicial radars. Beginning in the mid-1980s, the European Court began to raise objections to the lack of safeguards and statutory framework. But each time the Court handed down a significant finding against the United Kingdom, the state responded not just by, at least on the surface, meeting the demands of the European Convention of Human Rights, but, it appears, by expanding executive surveillance authorities. Moreover, the warrant system introduced retained control within the executive branch. Not subject to judicial review, the standard applied is reasonable suspicion — considerably less robust than probable cause. Like the United States, Britain draws on new technologies; the country leads the world in its use of public surveillance systems. Having laid out legal developments on both sides of the Atlantic, Part III moves to policy concerns: it begins by briefly exploring the substantive, political, legal, social, and economic risks posed by such measures. It then considers six approaches that would help to mitigate the risks. First is the possibility of creating a property right in personal information. The second centers on the regulation of access, transfer, use, and retention of data. Such efforts would satisfy demands for accountability and transparency in both the public and private sector. A third possibility centers on scaling back the existing powers of the state. Fourth, both countries may contemplate placing limits on what constitutes national security. Fifth, alternative safeguards and oversight structures deserve attention — such as reporting requirements, random audits, the creation of ombudspersons, the insertion of the judiciary, and (in the UK) allowing intercepted communications to be used as evidence. Sixth, preventing countries from introducing ever greater powers of surveillance under the claim that they are only temporary in nature would force legislatures to consider the long-term impact of provisions beyond the immediate terrorist threat." @default.
- W3121469384 created "2021-02-01" @default.
- W3121469384 creator A5030479944 @default.
- W3121469384 date "2006-03-22" @default.
- W3121469384 modified "2023-09-23" @default.
- W3121469384 title "Anglo-American Privacy and Surveillance" @default.
- W3121469384 hasPublicationYear "2006" @default.
- W3121469384 type Work @default.
- W3121469384 sameAs 3121469384 @default.
- W3121469384 citedByCount "6" @default.
- W3121469384 countsByYear W31214693842019 @default.
- W3121469384 countsByYear W31214693842021 @default.
- W3121469384 crossrefType "journal-article" @default.
- W3121469384 hasAuthorship W3121469384A5030479944 @default.
- W3121469384 hasConcept C144133560 @default.
- W3121469384 hasConcept C17744445 @default.
- W3121469384 hasConcept C199539241 @default.
- W3121469384 hasConcept C203133693 @default.
- W3121469384 hasConcept C2777351106 @default.
- W3121469384 hasConcept C2778757428 @default.
- W3121469384 hasConcept C2778886770 @default.
- W3121469384 hasConcept C2779913896 @default.
- W3121469384 hasConcept C38652104 @default.
- W3121469384 hasConcept C41008148 @default.
- W3121469384 hasConceptScore W3121469384C144133560 @default.
- W3121469384 hasConceptScore W3121469384C17744445 @default.
- W3121469384 hasConceptScore W3121469384C199539241 @default.
- W3121469384 hasConceptScore W3121469384C203133693 @default.
- W3121469384 hasConceptScore W3121469384C2777351106 @default.
- W3121469384 hasConceptScore W3121469384C2778757428 @default.
- W3121469384 hasConceptScore W3121469384C2778886770 @default.
- W3121469384 hasConceptScore W3121469384C2779913896 @default.
- W3121469384 hasConceptScore W3121469384C38652104 @default.
- W3121469384 hasConceptScore W3121469384C41008148 @default.
- W3121469384 hasIssue "3" @default.
- W3121469384 hasLocation W31214693841 @default.
- W3121469384 hasOpenAccess W3121469384 @default.
- W3121469384 hasPrimaryLocation W31214693841 @default.
- W3121469384 hasRelatedWork W1509401556 @default.
- W3121469384 hasRelatedWork W1509813682 @default.
- W3121469384 hasRelatedWork W1514141817 @default.
- W3121469384 hasRelatedWork W1582425034 @default.
- W3121469384 hasRelatedWork W1588437906 @default.
- W3121469384 hasRelatedWork W2232726446 @default.
- W3121469384 hasRelatedWork W2297105304 @default.
- W3121469384 hasRelatedWork W2301278157 @default.
- W3121469384 hasRelatedWork W2319433130 @default.
- W3121469384 hasRelatedWork W2343086384 @default.
- W3121469384 hasRelatedWork W2495068563 @default.
- W3121469384 hasRelatedWork W2586375835 @default.
- W3121469384 hasRelatedWork W260875490 @default.
- W3121469384 hasRelatedWork W2766147046 @default.
- W3121469384 hasRelatedWork W2895832704 @default.
- W3121469384 hasRelatedWork W2975618026 @default.
- W3121469384 hasRelatedWork W3023745112 @default.
- W3121469384 hasRelatedWork W3121419989 @default.
- W3121469384 hasRelatedWork W3123798564 @default.
- W3121469384 hasRelatedWork W34686692 @default.
- W3121469384 hasVolume "96" @default.
- W3121469384 isParatext "false" @default.
- W3121469384 isRetracted "false" @default.
- W3121469384 magId "3121469384" @default.
- W3121469384 workType "article" @default.