This book offers a legal analysis of sharing of passenger data from the EU to the US in light of the EU legal framework protecting individuals’ privacy and personal data.
All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.
Since the 9.11 attacks in North America and the accession of the Schengen Accord in Europe there has been widespread concern with international borders, the passage of people and the flow of information across borders. States have fundamentally changed the ways in which they police and monitor this mobile population and its personal data. This book brings together leading authorities in the field who have been working on the common problem of policing and surveillance at physical and virtual borders at a time of increased perceived threat. It is concerned with both theoretical and empirical aspects of the ways in which the modern state attempts to control its borders and mobile population. It will be essential reading for students, practitioners, policy makers.
*** Winner of the 2013 Julian Minghi Outstanding Research Award presented at the American Association of Geographers annual meeting *** Two decades after the fall of the Berlin Wall, why are leading democracies like the United States, India, and Israel building massive walls and fences on their borders? Despite predictions of a borderless world through globalization, these three countries alone have built an astonishing total of 5,700 kilometers of security barriers. In this groundbreaking work, Reece Jones analyzes how these controversial border security projects were justified in their respective countries, what consequences these physical barriers have on the lives of those living in these newly securitized spaces, and what long-term effects the hardening of political borders will have in these societies and globally. Border Walls is a bold, important intervention that demonstrates that the exclusion and violence necessary to secure the borders of the modern state often undermine the very ideals of freedom and democracy the barriers are meant to protect.
The Mumbai blasts of 1993, the attack on the Indian Parliament in 2001, Mumbai 26/11—cross-border terrorism has continued unabated. What can India do to motivate Pakistan to do more to prevent such attacks? In the nuclear times that we live in, where a military counter-attack could escalate to destruction beyond imagination, overt warfare is clearly not an option. But since outright peace-making seems similarly infeasible, what combination of coercive pressure and bargaining could lead to peace? The authors provide, for the first time, a comprehensive assessment of the violent and non-violent options available to India for compelling Pakistan to take concrete steps towards curbing terrorism originating in its homeland. They draw on extensive interviews with senior Indian and Pakistani officials, in service and retired, to explore the challenges involved in compellence and to show how non-violent coercion combined with clarity on the economic, social and reputational costs of terrorism can better motivate Pakistan to pacify groups involved in cross-border terrorism. Not War, Not Peace? goes beyond the much discussed theories of nuclear deterrence and counterterrorism strategy to explore a new approach to resolving old conflicts.
The official report that has shaped the international debate about NSA surveillance "We cannot discount the risk, in light of the lessons of our own history, that at some point in the future, high-level government officials will decide that this massive database of extraordinarily sensitive private information is there for the plucking. Americans must never make the mistake of wholly 'trusting' our public officials."—The NSA Report This is the official report that is helping shape the international debate about the unprecedented surveillance activities of the National Security Agency. Commissioned by President Obama following disclosures by former NSA contractor Edward J. Snowden, and written by a preeminent group of intelligence and legal experts, the report examines the extent of NSA programs and calls for dozens of urgent and practical reforms. The result is a blueprint showing how the government can reaffirm its commitment to privacy and civil liberties—without compromising national security.
Edward Alden presents a[n] ... investigation into the consequences of America's effort to secure its borders since 9/11. The result is a[n] ... assessment of the dangers faced by a U.S. that cuts itself off from the rest of the world--[Source unknown]
In a post-Cold War world of political unease and economic crisis, processes of securitisation are transforming nation-states, their citizens and non-citizens in profound ways. This book shows how contemporary Europe is now home to a vast security industry which uses biometric identification systems, CCTV and quasi-military techniques to police migrants and disadvantaged neighbourhoods. This is the first collection of anthropological studies of security with a particular but not exclusive emphasis on Europe. The Anthropology of Security draws together studies on the lived experiences of security and policing from the perspective of those most affected in their everyday lives. The anthropological perspectives in this volume stretch from the frontlines of policing and counter-terrorism to border control.
This report describes for the first time the totality and evolution since the mid-1980s of the current-day immigration enforcement machinery. The report's key findings demonstrate that the nation has reached an historical turning point in meeting long-standing immigration enforcement challenges. The question is no longer whether the government is willing and able to enforce the nation's immigration laws, but how enforcement resources and mandates can best be mobilized to control illegal immigration and ensure the integrity of the nation's immigration laws and traditions.