Intelligence agencies routinely use surveillance technology to perform surveillance on digital data. This practice raises many questions that feed a societal debate, including whether the surveillance technology is effective in achieving the given security goal, whether it is cost-efficient, and whether it is proportionate. Oversight bodies are important actors in this debate, overseeing budgets, legal and privacy matters, and the performance of intelligence agencies. This paper examines how oversight bodies evaluate the questions above, using documents produced by American and British oversight mechanisms.Safety and Security Scienc
Presented by Professor Lyria Bennett Moses. This paper is about oversight of law enforcement intelli...
Combating crime is a complex task with cultural, political, and legal dimensions. In technologically...
How should society respond to police surveillance technologies? This question has been at the center...
Intelligence agencies routinely use surveillance technology to perform surveillance on digital data....
Surveillance of communications data is a contentious topic, typically centering on privacy vs. secur...
In recent years, Western governments have come under sharp criticism for their use of surveillance t...
The evaluation of the effectiveness of surveillance technology in intelligence agencies and oversigh...
Item does not contain fulltextThe evaluation of the effectiveness of surveillance technology in inte...
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting ...
This chapter looks at conceptual and practical issues concerning ‘privacy’ and ‘security’ as they af...
The revelations by NSA whistleblower Edward Snowden have illustrated the scale and extent of digital...
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting ...
In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
Surveillance is becoming ubiquitous in our society. We can also see the emergence of "smart" surveil...
Presented by Professor Lyria Bennett Moses. This paper is about oversight of law enforcement intelli...
Combating crime is a complex task with cultural, political, and legal dimensions. In technologically...
How should society respond to police surveillance technologies? This question has been at the center...
Intelligence agencies routinely use surveillance technology to perform surveillance on digital data....
Surveillance of communications data is a contentious topic, typically centering on privacy vs. secur...
In recent years, Western governments have come under sharp criticism for their use of surveillance t...
The evaluation of the effectiveness of surveillance technology in intelligence agencies and oversigh...
Item does not contain fulltextThe evaluation of the effectiveness of surveillance technology in inte...
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting ...
This chapter looks at conceptual and practical issues concerning ‘privacy’ and ‘security’ as they af...
The revelations by NSA whistleblower Edward Snowden have illustrated the scale and extent of digital...
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting ...
In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
Surveillance is becoming ubiquitous in our society. We can also see the emergence of "smart" surveil...
Presented by Professor Lyria Bennett Moses. This paper is about oversight of law enforcement intelli...
Combating crime is a complex task with cultural, political, and legal dimensions. In technologically...
How should society respond to police surveillance technologies? This question has been at the center...