The Investigatory Powers Act 2016: The human rights conformist

Research output: Chapter in Book/Report/Conference proceedingChapter

Abstract

This chapter outlines the way in which terrorist groups and individual terrorists use communicational technology in the digital age. Using Islamic State (IS) as a case study, this chapter will highlight terrorist exploitation of legitimate technological growth, resulting in a potential unquantifiable threat to UK national security. The rationale for focusing on the IS terrorist group is their efficient and prolific use of 21st Century digital technology. The effect of terrorist communication will be analysed, demonstrating the difficulties facing UK lawmakers and UK law enforcement, specifically with regards to encryption technology and the growth of the darknet.
Original languageEnglish
Title of host publicationThe Investigatory Powers Act 2016: The human rights conformist
EditorsSimon Hale-Ross, David Lowe
PublisherRoutledge
ISBN (Print)9780367025403
Publication statusAccepted/In press - 26 Feb 2019

Fingerprint

human rights
act
national security
law enforcement
exploitation
Group
threat
communication

Keywords

  • Terrorism
  • Counterterrorism
  • Darknet
  • Internet
  • Communications
  • Electronic
  • Surveillance
  • Police
  • Policing
  • Law Enforcement
  • Islamic State
  • Threat
  • Digital
  • Technology

Cite this

Hale-Ross, S. (Accepted/In press). The Investigatory Powers Act 2016: The human rights conformist. In S. Hale-Ross, & D. Lowe (Eds.), The Investigatory Powers Act 2016: The human rights conformist Routledge.
Hale-Ross, Simon. / The Investigatory Powers Act 2016: The human rights conformist. The Investigatory Powers Act 2016: The human rights conformist. editor / Simon Hale-Ross ; David Lowe. Routledge, 2019.
@inbook{79e53df9804541d2827b1d7e0084b6d8,
title = "The Investigatory Powers Act 2016: The human rights conformist",
abstract = "This chapter outlines the way in which terrorist groups and individual terrorists use communicational technology in the digital age. Using Islamic State (IS) as a case study, this chapter will highlight terrorist exploitation of legitimate technological growth, resulting in a potential unquantifiable threat to UK national security. The rationale for focusing on the IS terrorist group is their efficient and prolific use of 21st Century digital technology. The effect of terrorist communication will be analysed, demonstrating the difficulties facing UK lawmakers and UK law enforcement, specifically with regards to encryption technology and the growth of the darknet.",
keywords = "Terrorism, Counterterrorism, Darknet, Internet, Communications, Electronic, Surveillance, Police, Policing, Law Enforcement, Islamic State, Threat, Digital, Technology",
author = "Simon Hale-Ross",
year = "2019",
month = "2",
day = "26",
language = "English",
isbn = "9780367025403",
editor = "Simon Hale-Ross and David Lowe",
booktitle = "The Investigatory Powers Act 2016: The human rights conformist",
publisher = "Routledge",
address = "United Kingdom",

}

Hale-Ross, S 2019, The Investigatory Powers Act 2016: The human rights conformist. in S Hale-Ross & D Lowe (eds), The Investigatory Powers Act 2016: The human rights conformist. Routledge.

The Investigatory Powers Act 2016: The human rights conformist. / Hale-Ross, Simon.

The Investigatory Powers Act 2016: The human rights conformist. ed. / Simon Hale-Ross; David Lowe. Routledge, 2019.

Research output: Chapter in Book/Report/Conference proceedingChapter

TY - CHAP

T1 - The Investigatory Powers Act 2016: The human rights conformist

AU - Hale-Ross, Simon

PY - 2019/2/26

Y1 - 2019/2/26

N2 - This chapter outlines the way in which terrorist groups and individual terrorists use communicational technology in the digital age. Using Islamic State (IS) as a case study, this chapter will highlight terrorist exploitation of legitimate technological growth, resulting in a potential unquantifiable threat to UK national security. The rationale for focusing on the IS terrorist group is their efficient and prolific use of 21st Century digital technology. The effect of terrorist communication will be analysed, demonstrating the difficulties facing UK lawmakers and UK law enforcement, specifically with regards to encryption technology and the growth of the darknet.

AB - This chapter outlines the way in which terrorist groups and individual terrorists use communicational technology in the digital age. Using Islamic State (IS) as a case study, this chapter will highlight terrorist exploitation of legitimate technological growth, resulting in a potential unquantifiable threat to UK national security. The rationale for focusing on the IS terrorist group is their efficient and prolific use of 21st Century digital technology. The effect of terrorist communication will be analysed, demonstrating the difficulties facing UK lawmakers and UK law enforcement, specifically with regards to encryption technology and the growth of the darknet.

KW - Terrorism

KW - Counterterrorism

KW - Darknet

KW - Internet

KW - Communications

KW - Electronic

KW - Surveillance

KW - Police

KW - Policing

KW - Law Enforcement

KW - Islamic State

KW - Threat

KW - Digital

KW - Technology

M3 - Chapter

SN - 9780367025403

BT - The Investigatory Powers Act 2016: The human rights conformist

A2 - Hale-Ross, Simon

A2 - Lowe, David

PB - Routledge

ER -

Hale-Ross S. The Investigatory Powers Act 2016: The human rights conformist. In Hale-Ross S, Lowe D, editors, The Investigatory Powers Act 2016: The human rights conformist. Routledge. 2019