Law in the Internet Society

View   r2  >  r1  ...
JulienMaudetSecondEssay 2 - 15 Dec 2016 - Main.JulienMaudet
Line: 1 to 1
 
META TOPICPARENT name="SecondEssay"
Deleted:
<
<
 It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Line: 4 to 3
 It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.
Changed:
<
<

Governments and counter-terrorism: the convenient deal.

>
>

Counter-terrorism and Mass surveillance: the convenient deal.

 -- By JulienMaudet - 09 Dec 2016
Changed:
<
<

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

>
>

The deviations of the State of Emergency in France

 
Changed:
<
<

Section II

>
>
After the November 2015 attacks in Paris, the French president François Hollande declared the State of Emergency, which has since then always been re-conducted by the National Assembly. This exceptional measure was originally established to gain efficiency in the investigations and to better protect the population. Yet it may have been overused by law enforcement officials. In an article published in February 2016 by the NGO Human Rights Watch, the journalist Izza Leghtas states that ’Police officers have used their new powers due to the state of emergency in an abusive, discriminatory and unjustified manner’. As an example, many environment activists were assigned to residence prior to the COP21 that took place in Paris in November 2015. While officials argued that it was a necessary measure in order to ensure the security of the event, many journalists from Le Point, Le Figaro or Le Monde signaled these measures as a symbol of the deviation of the state of emergency.
 
Changed:
<
<

Subsection A

>
>

The overall acceptance of measures motivated by Counter-terrorism

 
Changed:
<
<

Subsection B

>
>
The former situation was an example of how counter terrorism and homeland security can be used by governments in order to achieve parallel goals. When it comes to give counter-terrorism as a pretext to develop internal mass surveillance tools, the phenomenon is actually even more perverse because it is backed up by the majority. CBS News conducted a poll on the acceptance of video scrutiny in April 2002 and some of their results are extremely insightful. In order to prevent potential terrorist attacks, 77% of the surveyed people approved the installation of surveillance cameras in public places, as they believed it would have a direct impact on terrorist attacks. But when these surveillance cameras were presented as a way to film people so as to reduce crime, only 49% approved it. What does it mean? Although figures show that more ‘usual’ crimes kill much more people than terrorism, the population is so frightened by terrorism that they would accept an infringement of their privacy with much fewer resistance.
 
Added:
>
>

Mass surveillance isn’t the solution to counter terrorism

 
Changed:
<
<

You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:
>
>
Counter-terrorism thus tends to be used as a pretext to develop mass surveillance tools. Governments promote mass surveillance based on an assumption according to which the more data is gathered, the more terrorist attacks will be anticipated and dismantled. There are actually two obstacles to this shining statement. The first one is that technology is not yet capable of crawling and analyzing such amount of data. As exposed in an article from the New York Times published in Nov. 2015, most of the people who conducted the Paris attacks were already listed by intelligence officials in France and Belgium. But overwhelmed by the amount of data, they were incapable of further investigating on these people. The french internal intelligence agency, the DGSI, has signed a contract last week with the data mining company Palantir stating that it was the only company able to scale up their surveillance capacities. However, it is unlikely to enable the DGSI to anticipate terrorist attacks.
 
Changed:
<
<
>
>
Indeed, improving the technology is far from being enough if the final goal is to prevent terrorist attacks. The issue of a terrorist attack is so specific that such anticipation can’t happen online without the human input from field analysts and specialists. In his book Thinking Like a Terrorist : Insights of a Former FBI Undercover Agent, Michael German, a former FBI agent who went undercover in white supremacist groups, explains how digital and online surveillance are unefficient and misleaded in their attempts to predict radicalization and attacks. Big data technology could be used in the following way : One can investigate a posteriori on a person when they have deliberately committed a terrorist action. Agents could then backtrack the successions of actions, meetings and activities of this person in order to find potential patterns in their behavior, thanks to large and accessible databases. Using the detected pattern, one could then try to find other individuals who are involved in a similar pattern and start investigating on them. Yet this has never been effective. The simple reason is that there are no typical behaviors in becoming a terrorist, no recipe, no curriculum. Furthermore, how would a machine make a difference between an individual who is curious about ISIS and wonders how to make a bomb and an actual terrorist ? The machine would put red flags on tens of thousands of individuals and they couldn’t all be further investigated.
 
Deleted:
<
<
Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.
 \ No newline at end of file
Added:
>
>
At the time Osama Bin Laden were still alive, Cory Doctorow rather rounded what I consider as the actual situation, in his statement: “Funny, for all surveillance, Osama bin Laden is still free and we're not. Guess who's winning the 'war on terror'?”
 \ No newline at end of file

JulienMaudetSecondEssay 1 - 09 Dec 2016 - Main.JulienMaudet
Line: 1 to 1
Added:
>
>
META TOPICPARENT name="SecondEssay"

It is strongly recommended that you include your outline in the body of your essay by using the outline as section titles. The headings below are there to remind you how section and subsection titles are formatted.

Governments and counter-terrorism: the convenient deal.

-- By JulienMaudet - 09 Dec 2016

Section I

Subsection A

Subsub 1

Subsection B

Subsub 1

Subsub 2

Section II

Subsection A

Subsection B


You are entitled to restrict access to your paper if you want to. But we all derive immense benefit from reading one another's work, and I hope you won't feel the need unless the subject matter is personal and its disclosure would be harmful or undesirable. To restrict access to your paper simply delete the "#" character on the next two lines:

Note: TWiki has strict formatting rules for preference declarations. Make sure you preserve the three spaces, asterisk, and extra space at the beginning of these lines. If you wish to give access to any other users simply add them to the comma separated ALLOWTOPICVIEW list.


Revision 2r2 - 15 Dec 2016 - 06:52:30 - JulienMaudet
Revision 1r1 - 09 Dec 2016 - 22:35:07 - JulienMaudet
This site is powered by the TWiki collaboration platform.
All material on this collaboration platform is the property of the contributing authors.
All material marked as authored by Eben Moglen is available under the license terms CC-BY-SA version 4.
Syndicate this site RSSATOM