The Investigatory Powers Act 2016: The human rights conformist

Simon Hale-Ross

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

Abstract

This chapter outlines the way in which terrorist groups and individual terrorists use communicational technology in the digital age. Using Islamic State (IS) as a case study, this chapter will highlight terrorist exploitation of legitimate technological growth, resulting in a potential unquantifiable threat to UK national security. The rationale for focusing on the IS terrorist group is their efficient and prolific use of 21st Century digital technology. The effect of terrorist communication will be analysed, demonstrating the difficulties facing UK lawmakers and UK law enforcement, specifically with regards to encryption technology and the growth of the darknet.
Original languageEnglish
Title of host publicationTerrorism and State Surveillance of Communications
EditorsSimon Hale-Ross, David Lowe
PublisherRoutledge
Chapter4
ISBN (Print)9780367025403
Publication statusPublished - 29 May 2019

Keywords

  • Terrorism
  • Counterterrorism
  • Darknet
  • Internet
  • Communications
  • Electronic
  • Surveillance
  • Police
  • Policing
  • Law Enforcement
  • Islamic State
  • Threat
  • Digital
  • Technology

Fingerprint

Dive into the research topics of 'The Investigatory Powers Act 2016: The human rights conformist'. Together they form a unique fingerprint.

Cite this