Intelligence agencies routinely use surveillance technology to perform surveillance on digital data. This practice raises many questions that feed a societal debate, including whether the surveillance technology is effective in achieving the given security goal, whether it is cost-efficient, and whether it is proportionate. Oversight bodies are important actors in this debate, overseeing budgets, legal and privacy matters, and the performance of intelligence agencies. This paper examines how oversight bodies evaluate the questions above, using documents produced by American and British oversight mechanisms.</p
Presented by Professor Lyria Bennett Moses. This paper is about oversight of law enforcement intelli...
How should society respond to police surveillance technologies? This question has been at the center...
Everyone seems concerned about government surveillance, yet we have a hard time agreeing when and wh...
Intelligence agencies routinely use surveillance technology to perform surveillance on digital data....
Surveillance of communications data is a contentious topic, typically centering on privacy vs. secur...
In recent years, Western governments have come under sharp criticism for their use of surveillance t...
Item does not contain fulltextThe evaluation of the effectiveness of surveillance technology in inte...
The evaluation of the effectiveness of surveillance technology in intelligence agencies and oversigh...
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting ...
The revelations by NSA whistleblower Edward Snowden have illustrated the scale and extent of digital...
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting ...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
This chapter looks at conceptual and practical issues concerning ‘privacy’ and ‘security’ as they af...
In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal...
Combating crime is a complex task with cultural, political, and legal dimensions. In technologically...
Presented by Professor Lyria Bennett Moses. This paper is about oversight of law enforcement intelli...
How should society respond to police surveillance technologies? This question has been at the center...
Everyone seems concerned about government surveillance, yet we have a hard time agreeing when and wh...
Intelligence agencies routinely use surveillance technology to perform surveillance on digital data....
Surveillance of communications data is a contentious topic, typically centering on privacy vs. secur...
In recent years, Western governments have come under sharp criticism for their use of surveillance t...
Item does not contain fulltextThe evaluation of the effectiveness of surveillance technology in inte...
The evaluation of the effectiveness of surveillance technology in intelligence agencies and oversigh...
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting ...
The revelations by NSA whistleblower Edward Snowden have illustrated the scale and extent of digital...
Surveillance presents a conundrum: how to ensure safety, stability, and efficiency while respecting ...
The United States’ Terrorism Surveillance Program represents just one of many expansions in surveill...
This chapter looks at conceptual and practical issues concerning ‘privacy’ and ‘security’ as they af...
In this Discussion Paper, Dr. Quirine Eijkman discusses the use of surveillance, storage of personal...
Combating crime is a complex task with cultural, political, and legal dimensions. In technologically...
Presented by Professor Lyria Bennett Moses. This paper is about oversight of law enforcement intelli...
How should society respond to police surveillance technologies? This question has been at the center...
Everyone seems concerned about government surveillance, yet we have a hard time agreeing when and wh...