Skip to main content

2018 | OriginalPaper | Buchkapitel

13. Social Networks for Surveillance and Security: ‘Using Online Techniques to Make Something Happen in the Real or Cyber World’

verfasst von : Ben Harbisher

Erschienen in: Surveillance in Action

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This chapter examines the use of Social Networks for Surveillance and Security in relation to the deployment of intelligence resources in the UK. The chapter documents the rise of Military Intelligence agencies during both World Wars (such as GCHQ and MI5), and the subsequent use of these institutions to maintain order during peacetime. In addition to the way in which military organisations have used clandestine techniques such as double agents, spies, and various programmes designed for conducting Signals Intelligence, the Chapter offers an insight into how contemporary modes of communication (via mobile devices and the internet), shape the way in which intelligence agencies now gather information. The chapter also considers how the UK’s intelligence community responds to National Security issues such as international terror attacks, and how additional threats such as political subversion are framed in National Security discourse as being the legitimising factors behind mass surveillance. Thereafter, the chapter examines how online techniques are used by Britain’s intelligence agencies to maintain National Security, and how counter-intelligence strategies are being turned against the population to encourage political compliance. The chapter examines how online espionage techniques for entrapment, coercion, and misdirection, are being used to make something happen in the real or digital world.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Cabinet Office (2008) The national security strategy of the United Kingdom. Cabinet Office, London Cabinet Office (2008) The national security strategy of the United Kingdom. Cabinet Office, London
3.
Zurück zum Zitat Andrew C (2012) The defence of the realm. Penguin, London Andrew C (2012) The defence of the realm. Penguin, London
7.
Zurück zum Zitat Aldrich R (2010) GCHQ: the uncensored story of Britain’s most secret intelligence agency. Harper Press, London Aldrich R (2010) GCHQ: the uncensored story of Britain’s most secret intelligence agency. Harper Press, London
8.
Zurück zum Zitat Campbell D, Hosenball M (1976) The eavesdroppers. Time Out, pp 8–9 Campbell D, Hosenball M (1976) The eavesdroppers. Time Out, pp 8–9
9.
Zurück zum Zitat Campbell D (1988) Somebody’s listening. New Statesman Campbell D (1988) Somebody’s listening. New Statesman
10.
Zurück zum Zitat Schmid G (2001) Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system). European Parliament, Brussels Schmid G (2001) Report on the existence of a global system for the interception of private and commercial communications (ECHELON interception system). European Parliament, Brussels
13.
Zurück zum Zitat Harbisher B (2016) The million mask march: language, legitimacy, and dissent. Crit Discourse Stud 13(3): Discourse and Protest Events Harbisher B (2016) The million mask march: language, legitimacy, and dissent. Crit Discourse Stud 13(3): Discourse and Protest Events
15.
Zurück zum Zitat Dhami K (2011) Behavioural science support for JTRIG’s (Joint Threat Research and Intelligence Group’s) effects and online HUMINT operations. DTSL, Porton Down Dhami K (2011) Behavioural science support for JTRIG’s (Joint Threat Research and Intelligence Group’s) effects and online HUMINT operations. DTSL, Porton Down
22.
Zurück zum Zitat HMSO (2016) Investigatory powers act 2016. Her Majesty’s Stationary Office, London HMSO (2016) Investigatory powers act 2016. Her Majesty’s Stationary Office, London
23.
Zurück zum Zitat Milne S (2004) The Enemy within. Verso Books, London Milne S (2004) The Enemy within. Verso Books, London
24.
Zurück zum Zitat HMSO (2004) Civil contingencies act 2004. Her Majesty’s Stationary Office, London HMSO (2004) Civil contingencies act 2004. Her Majesty’s Stationary Office, London
25.
Zurück zum Zitat HMSO (1948) Defence act 1948. Her Majesty’s Stationary Office, London HMSO (1948) Defence act 1948. Her Majesty’s Stationary Office, London
26.
Zurück zum Zitat HMSO (1920) Emergency powers act 1920. Her Majesty’s Stationary Office, London HMSO (1920) Emergency powers act 1920. Her Majesty’s Stationary Office, London
27.
Zurück zum Zitat Harbisher B (2015) Unthinking extremism: radicalising narratives that legitimise surveillance. Surveill Soc 13(3/4):474–486 Harbisher B (2015) Unthinking extremism: radicalising narratives that legitimise surveillance. Surveill Soc 13(3/4):474–486
28.
Zurück zum Zitat Monaghan J, Walby K (2012) Making up ‘Terror Identities’: security intelligence, Canada’s integrated threat assessment centre and social movement suppression. Polic Soc: Intl J Res Policy 22(2):133–151CrossRef Monaghan J, Walby K (2012) Making up ‘Terror Identities’: security intelligence, Canada’s integrated threat assessment centre and social movement suppression. Polic Soc: Intl J Res Policy 22(2):133–151CrossRef
29.
Zurück zum Zitat Jones C (2014) “Call it intercontinental collaboration”: radicalisation, violent extremism and fusion centres. Statewatch, London Jones C (2014) “Call it intercontinental collaboration”: radicalisation, violent extremism and fusion centres. Statewatch, London
30.
Zurück zum Zitat Monahan T (2010) The future of security? Surveillance operations at homeland security fusion centres. Soc Just 37(2–3):84–98 Monahan T (2010) The future of security? Surveillance operations at homeland security fusion centres. Soc Just 37(2–3):84–98
33.
Zurück zum Zitat Stoychef E (2016) Under surveillance: examining facebook’s spiral of silence effects in the wake of NSA internet monitoring. J Mass Commun Q 93(2):296–311 Stoychef E (2016) Under surveillance: examining facebook’s spiral of silence effects in the wake of NSA internet monitoring. J Mass Commun Q 93(2):296–311
Metadaten
Titel
Social Networks for Surveillance and Security: ‘Using Online Techniques to Make Something Happen in the Real or Cyber World’
verfasst von
Ben Harbisher
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-68533-5_13