International audienceWhen it comes to anticipating terrorism, do recent technological advancements fundamentally change the modus operandi of intelligence services? Recent scholarship has focused on the new modes of reasoning brought about by ‘hi-tech’ forms analysis such as data mining, graph visualization and the algorithmic treatment of big data. While this article recognizes the increasing influence of these techniques, it argues they should not overshadow much more low-tech modalities through which a large part of counterterrorism work takes place. Low-tech counter-terrorism, based on qualitative methods and conjectural reasoning, still matters. Drawing on the case of French domestic intelligence services and based on qualitative inte...
Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds,...
Security is one of the most dominant issues in the current political discourse. Almost every topic, ...
International audienceThis Brief presents the overarching framework in which each nation is developi...
The recent terrorist attacks and ongoing state of emergency in France have brought questions of poli...
Technology has penetrated the social fabric of security practices so deeply that it is often used wi...
The international 'data war' that is fought in the name of counter-terror is concerned with mobilisi...
Over the last decades, Machine Learning (ML) has been implemented in nearly every part of our daily ...
This chapter addresses the use of new technology – especially artificial intelligence and machine le...
This thesis examines the impact information technologies have had on the age-old phenomenon of terro...
This Article highlights some of the critical distinctions between small data surveillance and big da...
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies ...
Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds,...
Since 11 September 2001, many ‘hard’ and ‘soft’ security strategies have been introduced to enable m...
This work examines how the conceptualization of knowledge as both problem and solution reconfigured ...
New counterterrorism systems are spreading throughout the world. Many are based on behavior detectio...
Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds,...
Security is one of the most dominant issues in the current political discourse. Almost every topic, ...
International audienceThis Brief presents the overarching framework in which each nation is developi...
The recent terrorist attacks and ongoing state of emergency in France have brought questions of poli...
Technology has penetrated the social fabric of security practices so deeply that it is often used wi...
The international 'data war' that is fought in the name of counter-terror is concerned with mobilisi...
Over the last decades, Machine Learning (ML) has been implemented in nearly every part of our daily ...
This chapter addresses the use of new technology – especially artificial intelligence and machine le...
This thesis examines the impact information technologies have had on the age-old phenomenon of terro...
This Article highlights some of the critical distinctions between small data surveillance and big da...
Explores both counter-terrorism and enabling policy dimensions of emerging information technologies ...
Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds,...
Since 11 September 2001, many ‘hard’ and ‘soft’ security strategies have been introduced to enable m...
This work examines how the conceptualization of knowledge as both problem and solution reconfigured ...
New counterterrorism systems are spreading throughout the world. Many are based on behavior detectio...
Algorithms, biometrics and body scanners, computers and databases, infrastructures of various kinds,...
Security is one of the most dominant issues in the current political discourse. Almost every topic, ...
International audienceThis Brief presents the overarching framework in which each nation is developi...