Cover image for Intensification of Surveillance : Crime, Terrorism and Warfare in the Information Age.
Intensification of Surveillance : Crime, Terrorism and Warfare in the Information Age.
Title:
Intensification of Surveillance : Crime, Terrorism and Warfare in the Information Age.
Author:
Ball, Kirstie.
ISBN:
9781849641746
Personal Author:
Physical Description:
1 online resource (192 pages)
Contents:
Contents -- 1 The Intensification of Surveillance -- Kirstie Ball and Frank Webster 2 Surveillance after September 11, 2001 -- David Lyon 3 Data Mining and Surveillance in the Post- 9/ -- Environment -- Oscar H. Gandy 4 Joined- up Surveillance: The Challenge to Privacy -- Charles D. Raab 5 They Don t Even Know We re There : The Electronic Monitoring of Offenders in England and Wales -- Mike Nellis 6 Information Warfare, Surveillance and Human Rights -- Frank Webster 7 Mapping out Cybercrimes in a Cyberspatial Surveillant Assemblage -- David S. Wall 8 The Constant State of Emergency? : Surveillance after 9/ 11 -- David Wood, Eli Konvitz and Kirstie Ball Notes on Contributors -- Bibliography -- Index -- Abrams, P. 16-17 -- Accrue 33 -- ACLU 148 -- advertising, and data mining techniques -- 30 -- 34 -- 38-9 -- Afghanistan -- 94 -- 102 -- 103 -- 104 -- 105 -- 106 -- 108 -- airport security -- 16 -- 18 -- 142-3 -- al-Qaeda 99 -- Amnesty International 107 -- Amoco 40-1 -- Amsterdam airport 18 -- anti-terrorist legislation -- 16 -- 17-18 -- 21-2 -- 35 -- 60 -- APACS [Association for Payment Clearing Services] 133 -- Arendt, Hannah 17 -- arms manufacturers, and civilian market 145-6 -- ARPANET 145 -- Association of Chief Officers of Probation [ACOP] 65 -- asylum seekers, ID cards -- 18 -- 142 -- Automated Socio-Technical Environments [ASTEs] 142 -- aviation accidents, analysis of 31 -- AWACS aircraft -- 90 -- 104 -- Balkans War [1999] -- 94 -- 102 -- 103 -- 107-8 -- Baudrillard, J. -- 23 -- 105 -- Bauman, Z. -- 17 -- 72 -- 144 -- Bentham, Jeremy -- 5 -- 112 -- bin Laden, Osama -- 16 -- 99 -- biometric ID -- 59 -- 142 -- Blair, Tony 108 -- Bloomfield, B. -- 78-9 -- 81 -- Bogard, W. 23 -- Booth, Cherie 9 -- Boothby, Robert 97 -- Bosnia 107 -- Brain Fingerprinting 143 -- Braverman, H. 9-10 -- Brenner, S. 113 -- Bulger, Jamie, murder of 141.

C3I [command, control, communi-cations and intelligence] 101 -- Cambodia 94 -- Cameron, James 94 -- Canada 17-18 -- Canadian Immigration Card 18 -- CARNIVORE 18 -- Castells, M. 102 -- categorical care -- 7 -- 8 -- categorical exposure -- 7 -- 8-9 -- categorical seduction -- 7 -- 8 -- categorical suspicion -- 7-8 -- 22 -- CCTV -- 9 -- 16 -- 19 -- 20 -- 22 -- 23 -- 77 -- 144 -- 148 -- change in emphasis -- 73-4 -- 81 -- 83 -- and civic disqualification 74 -- and managerialism 74 -- and managerialism 81 -- see also electronic monitoring [EM] of offenders Computer Assisted Passenger Pre-Screening [CAPPS] 143 -- Cherkasky, M.G. 18 -- Cherry, Claire 40 -- Chile -- 94 -- 109 -- China -- 10 -- 108 -- Chubb 70 -- CIA 143 -- civil liberties -- 15 -- 61 -- 72 -- Clementine Service 33 -- Clinton, Bill -- 9 -- 107 -- Committee on Women's Imprisonment 69-70 -- Communications Security Establishment, Canada 17-18 -- Communism, collapse of -- 92 -- 97 -- 102 -- 107 -- Communities of Practice 149 -- community penalties -- 67 -- 69-70 -- 73-6 -- 79 -- Computer Emergency Response Team [CERT] 131 -- Conservative government, and electronic monitoring of offenders -- 62 -- 64 -- 65 -- Convict.Net 129 -- credit card transactions -- 1-2 -- 28 -- 30 -- crime -- 2-3 -- and impact of Internet 114-16 -- and impact of Internet 117-18 -- law enforce-ment Crime and Disorder Act 50 -- law enforce-ment Crime and Disorder Act 51 -- organized 8 -- organized 114 -- traditional 118-19 -- cross-selling 33 -- Crovitz, L. 36 -- curfew orders -- 64 -- 65 -- 66 -- 67 -- 69 -- 74 -- Custodial Care National Training Organisation 71 -- customer relationship management [CRM] 33-4 -- cyber-terrorism -- 115 -- 116 -- 117 -- 120 -- 121 -- cybercrimes -- 112-13 -- 121 -- 132 -- 140-1 -- analysis of behaviours 114-16 -- and multi-directional information flow 119-30.

and multi-directional information flow 135 -- and multiple information flows 130-2 -- and multiple information flows 135 -- and prosecution 121 -- and prosecution 131 -- and prosecution 132 -- and reliable data about 132-3 -- and reliable data about 135 -- and traditional crimes 118-19 -- and trans-jurisdictionality 119 -- and trans-jurisdictionality 122-3 -- and trans-jurisdictionality 126 -- characteristics of offenders 120 -- computer security breaches 131-2 -- definitions of 113-14 -- definitions of 134 -- matrix of 115 -- media sensitization 132-4 -- policing 46-8 -- policing 121-2 -- policing 130-2 -- public perceptions of 123 -- public perceptions of 132-3 -- reporting of 131-2 -- types of 117-18 -- victimization 120-1 -- victimization 135 -- Daily Mail 9 -- Data Protection Act -- 51 -- data see personal data data mining -- 26-41 -- 138 -- and discrimination 31-2 -- and discrimination 36-9 -- and discrimination 40-1 -- and discrimination 138 -- and prevention of terrorism 3-4 -- and prevention of terrorism 34-5 -- and prevention of terrorism 41 -- and prevention of terrorism 138 -- and privacy 27 -- and privacy 28 -- and privacy 40 -- and privacy 41 -- and privacy 138 -- associative rules 29-31 -- customer segmentation 33 -- customer segmentation 38-40 -- goals of 29-32 -- increased demand for applica-tions 34-6 -- of celebrities' tax returns 135 -- risk minimization 30-1 -- risk minimization 138 -- social implications of 36-41 -- software 27 -- software 33-4 -- technology of 32-3 -- data-sharing in criminal justice system -- 45-52 -- 58 -- and privacy 42-3 -- and privacy 44-5 -- De Landa, M. 145 -- Dectel -- 147 -- 148 -- Defence Evaluation and Research Agency [DERA] 145 -- Deleuze, G. 20 -- Dennis, S. 9 -- Detention and Training Orders -- 67 -- 75 -- digiMine 33 -- Digital Silhouettes 38.

disease registers, and informed consent 58 -- DNA databanks 19 -- DoubleClick -- 27 -- 38-9 -- Douglas, M. 142 -- drivers, data on -- 31-2 -- classification of text 29 -- e-mail address lists 124-5 -- interception 17 -- Echelon 90 -- Economist 101 -- electronic monitoring [EM] of offenders -- 62-84 -- 139-40 -- acceptance of 69-70 -- administering companies 70-1 -- administering companies 139 -- and civil liberties 72 -- and community penalties 67 -- and community penalties 69-70 -- and community penalties 73-6 -- and community penalties 79 -- and community penalties 81-2 -- and early release 66 -- and early release 139 -- and exclusion orders 67-8 -- and exclusion orders 74 -- and managerialism 79-80 -- and managerialism 84 -- and post-release supervision 68 -- and seamless sentences 75-6 -- and sex offenders 68 -- and tracking technology 68 -- and women 69-70 -- as punishment 72-3 -- as punishment 79 -- as punishment 83 -- as punishment 139 -- as solution to prison overcrowd-ing 66 -- as solution to prison overcrowd-ing 69 -- as solution to prison overcrowd-ing 72 -- creation of digital personae 78 -- curfeworders 64 -- curfeworders 65 -- curfeworders 66 -- curfeworders 67 -- curfeworders 69 -- curfeworders 74 -- dream of omniperception 76-7 -- dream of omniperception 80-1 -- dream of omniperception 83-4 -- failures of 82 -- introduction into Britain 64-6 -- monitoring staff 71 -- monitoring staff 76 -- monitoring staff 139 -- of bailees 64 -- of bailees 67 -- of bailees 72 -- of bailees 79 -- opposition to 64-5 -- opposition to 72-3 -- opposition to 79 -- opposition to 139 -- press reaction to 72 -- press reaction to 79 -- press reaction to 81 -- public debate 68-73 -- Elegant, R. 95 -- Ellison, L. 18 -- Ellul, J. 19 -- encryption 59 -- Ericson, R.V. -- 77 -- 122.

European Union and computer crime -- 48 -- ID cards 142 -- regulation of UBEs 126 -- Europol 48 -- exclusion orders -- 67-8 -- 74 -- Experian -- 131 -- 133 -- FaceIT -- 147 -- 148 -- facial recognition technologies -- 19 -- 147-8 -- FBI -- 20 -- 34 -- 35 -- 41 -- 143 -- Federal Probation 83 -- Federal Trade Commission [FTC] 39 -- Feeley, M. 82 -- Fionda, J. 80 -- Fischer-Hubner, S. 12-13 -- Fisk, Robert 94 -- Fletcher, H. 68 -- Foreign Intelligence Surveillance Court 41 -- Foucault, M. -- 6 -- 20 -- 22 -- 112 -- fundamentalism 98-9 -- Gandy, O. 6 -- Garland, D. 81 -- Geografix 70 -- Giddens, A. -- 98 -- 99 -- globalization -- 91-2 -- and democracy and human rights 97 -- and democracy and human rights 107 -- and growth of fundamentalism 98-9 -- and inequalities 98 -- and military surveillance 145 -- and nation state 91-2 -- and nation state 96-9 -- and nation state 107 -- and peace and conflict 98-9 -- effect of economic matters 97-8 -- of media 2 -- of media 92-6 -- of media 106 -- Gnutella 134 -- Goffman, E. 15 -- Goldenberg, S. 94 -- governments, and data mining applications 34-6 -- GPS 68 -- Greek, C. 83 -- Group 4 Falke 70-1 -- GSSC Europe 71 -- Guardian 94 -- Guattari, F. 20 -- Gulf War [1991] -- 101 -- 102-3 -- 105 -- Gulf War [2003] -- 102 -- 103 -- hacking/cracking -- 115 -- 117 -- 120 -- 132 -- Haggerty, K. -- 77 -- 122 -- Halliday, J. -- 75-6 -- 79 -- Hardy, Bert 94 -- Havel, Václav -- 108 -- 109 -- health and welfare services -- 8 -- 28-9 -- 58 -- Heath, Edward 5 -- Hersh, Seymour 94 -- Home Detention Curfew Scheme [HDC] -- 66 -- 69 -- 76 -- 82 -- Howard League -- 64 -- 139 -- Huber, P. 137 -- Hughes, T.P. 143 -- human rights and facial recognition technology -- 148 -- and intervention 107-9 -- and media 106-7 -- see also privacy protection Human Rights Watch 107 -- ID cards -- 18 -- 58 -- 141-2 -- ID numbers -- 7.

59.
Local Note:
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2017. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Added Author:
Electronic Access:
Click to View
Holds: Copies: