TY - BOOK
T1 - Counter-terrorism, ethics and technology
T2 - Emerging challenges at the frontiers of counter-terrorism
A2 - Henschke, Adam
A2 - Reed, Alastair
A2 - Robbins, Scott
A2 - Miller, Seumas
PY - 2021
Y1 - 2021
N2 - This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technologys exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
AB - This open access book brings together a range of contributions that seek to explore the ethical issues arising from the overlap between counter-terrorism, ethics, and technologies. Terrorism and our responses pose some of the most significant ethical challenges to states and people. At the same time, we are becoming increasingly aware of the ethical implications of new and emerging technologies. Whether it is the use of remote weapons like drones as part of counter-terrorism strategies, the application of surveillance technologies to monitor and respond to terrorist activities, or counterintelligence agencies use of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data, technologies play a significant role in modern counter-terrorism. However, each of these technologies carries with them a range of ethical issues and challenges. How we use these technologies and the policies that govern them have broader impact beyond just the identification and response to terrorist activities. As we are seeing with China, the need to respond to domestic terrorism is one of the justifications for their rollout of the "social credit system." Counter-terrorism technologies can easily succumb to mission creep, where a technologys exceptional application becomes normalized and rolled out to society more generally. This collection is not just timely but an important contribution to understand the ethics of counter-terrorism and technology and has far wider implications for societies and nations around the world.
KW - Terrorism and technology
KW - Counter-terrorism ethics
KW - social media and terrorism
KW - artificial intelligence and counter-terrorism
KW - bulk data collection terrorism
KW - ethics of technology
KW - open access
U2 - 10.1007/978-3-030-90221-6
DO - 10.1007/978-3-030-90221-6
M3 - Edited book
SN - 9783030902209
T3 - Advanced Sciences and Technologies for Security Applications
BT - Counter-terrorism, ethics and technology
PB - Springer
CY - Cham, Switzerland
ER -