@inbook{79e53df9804541d2827b1d7e0084b6d8,
title = "The Investigatory Powers Act 2016: The human rights conformist",
abstract = "This chapter outlines the way in which terrorist groups and individual terrorists use communicational technology in the digital age. Using Islamic State (IS) as a case study, this chapter will highlight terrorist exploitation of legitimate technological growth, resulting in a potential unquantifiable threat to UK national security. The rationale for focusing on the IS terrorist group is their efficient and prolific use of 21st Century digital technology. The effect of terrorist communication will be analysed, demonstrating the difficulties facing UK lawmakers and UK law enforcement, specifically with regards to encryption technology and the growth of the darknet.",
keywords = "Terrorism, Counterterrorism, Darknet, Internet, Communications, Electronic, Surveillance, Police, Policing, Law Enforcement, Islamic State, Threat, Digital, Technology",
author = "Simon Hale-Ross",
year = "2019",
month = may,
day = "29",
language = "English",
isbn = "9780367025403",
editor = "Simon Hale-Ross and David Lowe",
booktitle = "Terrorism and State Surveillance of Communications",
publisher = "Routledge",
address = "United Kingdom",
}