Publication Cover
The Information Society
An International Journal
Volume 34, 2018 - Issue 2
110,156
Views
21
CrossRef citations to date
0
Altmetric
Articles

The effectiveness of surveillance technology: What intelligence officials are saying

&
Pages 88-103 | Received 05 Oct 2016, Accepted 27 Nov 2017, Published online: 08 Mar 2018

References

  • Alexander, Y., ed. 2006. Counterterrorism strategies: Successes and failures of six nations. 1st ed. Washington, DC: Potomac Books, 2006.
  • Amicelle, A. April 2011. Towards a ‘new’ political anatomy of financial surveillance. Security Dialogue 42(2)(April 2011):161–78.
  • Armitage, R., G. Smyth, & K. Pease. 1999. Burnley CCTV evaluation. In Surveillance of public space: CCTV, street lighting and crime prevention, ed. K. Painter and N. Tilley, 225–250. Monsey, NY: Criminal Justice Press.
  • Bergen, P., D. Sterman, E. Schneider, and B. Cahall. January 2014. Do NSA's Bulk Surveillance Programs Stop Terrorists? New America Foundation.
  • Berghel, H. July 2013. Through the PRISM Darkly. Computer 46(7):86–90.
  • Bigo, D., S. Carrera, N. Hernanz, J. Jeandesboz, J. Parken, F. Ragazzi, and A. Scherrer. 2013. National Programmes for Mass Surveillance of Personal Data in EU Member States and Their Compatibility with EU Law. European Parliament.
  • Brennan, J. 2014. Remarks at the council on foreign relations. March 11.
  • Caplan, J. M., L. W. Kennedy, and G. Petrossian. September 2011. Police-monitored CCTV cameras in Newark, NJ: A quasi-experimental test of crime deterrence. Journal of Experimental Criminology 7(3):255–74.
  • Coaffee, J., and P. Fussey. (February 2015). Constructing resilience through security and surveillance: The politics, practices and tensions of security-driven resilience. Edited by Myriam Dunn Cavelty, Mareile Kaufmann, and Kristian Søby Kristensen. Security Dialogue 46(1):86–105.
  • Council on Foreign Relations. 2015. Homeland Security Implications of ISIS Attacks. http://www.cfr.org/homeland-security/homeland-security-implications-isis-attacks/p37320.
  • Currie, N., and K. Stiefvater. May 2003. Counter-terrorism technology assessment and methodology study. Final Technical Report. Rome: Air Force Research Laboratory Information Directorate.
  • Ditton, J., and E. Short. 1999. Yes, It Works, No, It Doesn't: Comparing the Effects of Open CCTV in Two Adjacent Scottish Town Centres, In Surveillance of public space: CCTV, street lighting and crime prevention, eds. K. Painter and N. Tilley, 201–224. Monsey, NY: Criminal Justice Press.
  • Drakos, K., and N. Giannakopoulos. April 2009. An econometric analysis of counterterrorism effectiveness: The impact on life and property losses. Public Choice 139(1–2):135–51.
  • Edwards, M., A. Rashid, and P. Rayson. June 2014. A systematic survey of online data mining technology intended for law enforcement. ACM Computing Surveys 48(1).
  • Ekblom, P. 2010. Crime prevention, security and community safety using the 5Is Framework. Houndmills, Basingstoke; New York, NY: Palgrave Macmillan.
  • Farrington, D. P., M. Gill, S. J. Waples, and J. Argomaniz. 2007. The effects of closed-circuit television on crime: Meta-analysis of an English national quasi-experimental multi-site evaluation. Journal of Experimental Criminology 3:21–38.
  • Gill, M., and A. Spriggs. February 2005. Assessing the impact of CCTV. Home Office Research, Development and Statistics Directorate.
  • Gill, M., A. Rose, K. Collins, and M. Hemming. 2006. Redeployable CCTV and drug-related crime: A case of implementation failure. Drugs: Education, Prevention and Policy, 113(5):451–460.
  • Greenwald, G. 2014. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State. First Edition. New York, NY: Metropolitan Books/Henry Holt.
  • Hayden, M. 2005. Balancing security and liberty: The challenge of sharing foreign signals intelligence. Notre Dame Journal of Law, Ethics and Public Policy 19(1):247–60.
  • Hayden, M. February 2014. Beyond Snowden: An NSA reality check. World Affairs Journal. http://www.worldaffairsjournal.org/article/beyond-snowden-nsa-reality-check.
  • Hayden, M. May 2014. Munk Debates – State Surveillance – Pre-Debate Interview. https://www.munkdebates.com/debates/state-surveillance.
  • Hayden, M. 2008. Remarks at the Atlantic Council. November 13.
  • Hayden, M. 2007. Remarks at the Council on Foreign Relations. September 7.
  • Hayden, M. 2002. Statement for the Record before the Joint Inquiry of the Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence.
  • Hayden, M. 2006. What American Intelligence & Especially the NSA Have Been Doing to Defend the Nation. National Press Club, January 23.
  • Hayden, M. V. 2016. To keep America safe, embrace drone warfare. The New York Times, February 19, http://www.nytimes.com/2016/02/21/opinion/sunday/drone-warfare-precise-effective-imperfect.html.
  • Her Majesty's Inspectorate of the Constabulary 2015. An Inspection of the National Crime Agency. Available at: https://www.justiceinspectorates.gov.uk/hmicfrs/wp-content/uploads/an-inspection-of-the-national-crime-agency.pdf ( accessed November 30, 2017).
  • Hewitt, C. January 2014. Law enforcement tactics and their effectiveness in dealing with American Terrorism: Organizations, autonomous cells, and lone wolves. Terrorism and Political Violence 26(1):58–68.
  • Interview 1, Former senior police officer from UK counter-terrorism network. April 20, 2015.
  • Interview 2, High level recipient of intelligence in Estonian government. June 10, 2015.
  • Interview 3, Former Intelligence Officer of U.S. Intelligence Community. July 28, 2015.
  • Interview 4, Former cryptanalyst with Dutch Militaire Inlichtingen- en Veiligheidsdienst. August 27, 2015.
  • Interview 5, Former senior U.S. government official. January 19, 2016.
  • Interview 6, Otter, S. Her Majesty's Inspector of Constabulary, Interview, May 7, 2015.
  • Interview 7, Smith, M. Detective Superintendent, Greater Manchester Police (former Senior Investigation Officer for Operation Pathway, UK North West Counter Terrorism Unit), Interview, May 28, 2015.
  • Interview 8, Smith, M. Detective Superintendent, Greater Manchester Police (former Senior Investigation Officer for Operation Pathway, UK North West Counter Terrorism Unit), Interview, September 9, 2015.
  • Jonas, J., and J. Harper. 2006. Effective counterterrorism and the limited role of predictive data mining. Policy Analysis. Washington D.C.: Cato Institute, December 11.
  • Lingel, S. L., L. Menthe, B. Alkire, K. Henry, S. A. Grossman, R. A. Guffey, and E. Wu. 2012. Methodologies for analyzing remotely piloted aircraft in future roles and missions. Documented Briefing. Santa Monica, CA: RAND.
  • Lobban, S. I.. “Valedictory Speech,” October 21, 2014. https://www.gchq.gov.uk/speech/sir-iain-lobbans-valedictory-speech-delivered.
  • Lobban, S. I., A. Parker, and S. J. Sawers. Nov. 7, 2013. Intelligence and Security Committee of Parliament: Uncorrected Transcript of Evidence.
  • Lowenthal, M. M. Intelligence: From secrets to policy. 5th ed. Los Angeles: SAGE/CQ Press, 2012.
  • Lum, C., L. W. Kennedy, and A. Sherley. January 2007. Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research. Journal of Experimental Criminology 2(4):489–516.
  • Mayer, J. May 23, 2011. The secret sharer. The New Yorker. www.newyorker.com/magazine/2011/05/23/the-secret-sharer.
  • Monahan, T. August 7, 2016. Built to Lie: Investigating technologies of deception, surveillance, and control. The Information Society 32(4):229–40.
  • Monahan, T., and N. A. Palmer. December 2009. The emerging politics of DHS fusion centers. Security Dialogue 40(6):617–36.
  • Morgan, S. A. 2014. Security vs. liberty: How to measure privacy costs in domestic surveillance programs. Master's thesis, Naval Postgraduate School.
  • Mueller, J. E., and M. G. Stewart. 2011. Terror, security, and money: Balancing the risks, benefits, and costs of homeland security. Oxford , New York: Oxford University Press.
  • Myhill, A., and P. Quinton. 2011. It's a fair cop? Police legitimacy, public cooperation, and crime reduction. National Policing Improvement Agency.
  • National Security Agency. August 9, 2013. The National Security Agency: Missions, Authorities, Oversight and Partnerships.
  • Omand, D. December 2005. Countering International Terrorism: The Use of Strategy. Survival 47(4):107–16.
  • Omand, D. March 2015. Understanding digital intelligence and the norms that might govern it. Global Commission on Internet Governance. Chatham House. https://www.cigionline.org/publications/understanding-digital-intelligence-and-norms-might-govern-it.
  • Omand, D. February 2014. Evidence for the intelligence and security committee of parliament.
  • Omand, D. October 2014. Intelligence and Security Committee of Parliament: Privacy and Security Inquiry, Public Evidence Session 8.
  • Omand, D. December 2015. Joint Committee on the Draft Investigatory Powers Bill – Oral Evidence.
  • Omand, D. 2014. The future of intelligence: What are the threats, the challenges and the opportunities? In The future of intelligence: Challenges in the 21st century. Oxon: Routledge.
  • Omand, D., J. Bartlett, and C. Miller. 2012. A balance between security and privacy online must be struck…. Demos.
  • Pepper, S. D. January 1, 2010. The business of Sigint: The role of modern management in the transformation of GCHQ. Public Policy and Administration 25(1):85–97.
  • Pepper, S. D. December 2010. Testimony on Iraq.
  • Perl, R. March 12, 2007. Combating terrorism: The challenge of measuring effectiveness. CRS Report for Congress. Congressional Research Institute.
  • Phillips, C. 1999. A review of CCTV evaluations: Crime reduction effects and attitudes towards its use. In Surveillance of public space: CCTV, street lighting and crime prevention, ed. K. Painter and N. Tilley, 123–155. Monsey, NY: Criminal Justice Press.
  • “Presidential Policy Directive – Signals Intelligence Activities.” Whitehouse.gov, January 17, 2014. https://www.whitehouse.gov/the-press-office/2014/01/17/presidential-policy-directive-signals-intelligence-activities.
  • Privacy and Civil Liberties Oversight Board (PCLOB). July 2, 2014. Report on the Surveillance Program Operated Pursuant to Section 702 of the Foreign Intelligence Surveillance Act.
  • Privacy and Civil Liberties Oversight Board (PCLOB). January 23, 2014. Report on the Telephone Records Program Conducted under Section 215 of the USA PATRIOT Act and on the Operations of the Foreign Intelligence Surveillance Court.
  • Putz, O. April 1, 2012. From non-places to non-events: The airport security checkpoint. Journal of Contemporary Ethnography 41(2):154–88.
  • Regan, P. M., and T. Monahan. 2013. Beyond counterterrorism: Data sharing, privacy, and organizational histories of DHS fusion centers. International Journal of E-Politics 4(3) (33):1–14.
  • Runciman, B. June 1, 2012. A Bigger Haystack…. ITNOW 54(2):36–37.
  • Sanders, C. B., C. Weston, and N. Schott. July 2015. Police innovations, ‘Secret Squirrels’ and accountability: Empirically studying intelligence-led policing in Canada. British Journal of Criminology 55(4):711–29.
  • Schneier, B. November 2009. Beyond Security Theater. Schneier on Security. https://www.schneier.com/blog/archives/2009/11/beyond_security.html.
  • Sproles, N. 1999. Measures of effectiveness: The standards for success. PhD Thesis, University of South Australia.
  • Stewart, M. G., and J. Mueller. January 16, 2011. Cost-benefit analysis of advanced imaging technology full body scanners for airline passenger security screening. Journal of Homeland Security and Emergency Management 8(1).
  • Tsvetovat, M., and K. M. Carley. November 8, 2006. On effectiveness of wiretap programs in mapping social networks. Computational and Mathematical Organization Theory 13(1):63–87.
  • van Dongen, T. December 2009. Break it down: An alternative approach to measuring effectiveness in counterterrorism. Economics of Security Working Paper 23, Berlin: Economics of Security.
  • van Dongen, T. 2015. The science of Fighting Terrorism: The relation between terrorist actor type and counterterrorism effectiveness. PhD Thesis, Leiden University.
  • van Gulijk, C., S. Sillem, and M. Cayford. 30-Sep-2013. SURVEILLE Deliverable 3.4: Design of a research methodology for assessing the effectiveness of selected surveillance systems in delivering improved security. Surveillance: Ethical Issues, Legal Limitation, and Efficiency Collaborative Project, Seventh Framework Programme.
  • van Um, E., and D. Pisoiu. 2011. Effective counterterrorism: What have we learned so far? Economics of Security Working Paper 55, Berlin: Economics of Security.
  • Welsh, B. C., and D. P. Farrington. May 1, 2003. Effects of closed-circuit television on crime. The ANNALS of the American Academy of Political and Social Science 587(1):110–35.
  • Welsh, B. C., and D. P. Farrington. December 2009. Public area CCTV and crime prevention: An updated systematic review and meta‐analysis. Justice Quarterly 26(4):716–45.
  • Willis, H. H., J. B. Predd, P. K. Davis, and W. P. Brown. 2010. Measuring the Effectiveness of Border Security Between Ports-of-Entry. Technical Report. RAND Corporation.
  • W&L Law Cybersurveillance Symposium Keynote: Gen. Michael Hayden, January 2015. https://www.youtube.com/watch?v = VUEuWiXMkBA.