Intelligence gathering is in a state of flux. Enabled by massive computing power, new modes of communications analysis now touch the lives of citizens around the globe โ not just those conventionally thought of as suspicious or threatening. In this astute collection, leading academics, civil society
Big Data Surveillance and Security Intelligence
โ Scribed by David Lyon; David Murakami Wood
- Publisher
- UBC Press
- Year
- 2020
- Tongue
- English
- Leaves
- 303
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
"Intelligence gathering is in a state of flux. Enabled by massive computing power, new modes of communications analysis now touch the lives of citizens around the globe - not just those conventionally thought of as suspicious or threatening. In this astute collection, leading academics, civil society experts, and regulators debate the pressing questions raised by current security intelligence and surveillance practices in Canada. Big Data Surveillance and Security Intelligence reveals the profound shift to "big data" practices that security agencies have made in recent years, as the increasing volume of information from social media and open sources challenges traditional ways of gathering intelligence. Working together, the Five Eyes intelligence partners - Australia, Canada, New Zealand, the United Kingdom, and the United States - are using new methods of data analysis to identify and pre-empt risks to national security. In Canada, the Canadian Security Intelligence Service, the RCMP, and the Communication Security Establishment face an uncertain regulatory environment and seemingly incompatible demands: to extend their surveillance, data gathering, and disruption/intervention powers while increasing accountability and transparency in the name of democratic values. But at what cost to civil liberties, human rights, and privacy protection?"
โฆ Table of Contents
Cover
Contents
List of Figures and Tables
Preface
List of Abbreviations
Introduction
Part 1: Understanding Surveillance, Security, and Big Data
1 Collaborative Surveillance with Big Data Corporations: Interviews with Edward Snowden and Mark Klein
2 On Denoting and Concealing in Surveillance Law
3 Big Data against Terrorism
4 Algorithms as Suspecting Machines: Financial Surveillance for Security Intelligence
Part 2: Big Data Surveillance and Signals Intelligence in Canadian Security Organizations
5 From 1967 to 2017: The Communications Security Establishment's Transition from the Industrial Age to the Information Age
6 Pixies, Pop-Out Intelligence, and Sandbox Play: The New Analytic Model and National Security Surveillance in Canada
7 Limits to Secrecy: What Are the Communications Security Establishment's Capabilities for Intercepting Canadians' Internet Communications?
Part 3: Legal Challenges to Big Data Surveillance in Canada
8 Gleanings from the Security Intelligence Review Committee about the Canadian Security Intelligence Service's Bulk Data Holdings and the Bill C-59 "Solution"
9 Bill C-59 and the Judicialization of Intelligence Collection
10 The Challenges Facing Canadian Police in Making Use of Big Data Analytics
Part 4: Resistance to Big Data Surveillance
11 Confronting Big Data: Popular Resistance to Government Surveillance in Canada since 2001
12 Protesting Bill C-51: Reflections on Connective Action against Big Data Surveillance
Part 5: Policy and Technical Challenges of Big Data Surveillance
13 Horizontal Accountability and Signals Intelligence: Lessons Drawing from Annual Electronic Surveillance Reports
14 Metadata โ Both Shallow and Deep: The Fraught Key to Big Data Mass State Surveillance
Afterword
Contributors
Index
๐ SIMILAR VOLUMES
This book covers IoT and Big Data from a technical and business point of view. The book explains the design principles, algorithms, technical knowledge, and marketing for IoT systems.ใ It emphasizes applications of big data and IoT. It includes scientific algorithms and key techniques for fusion
<p>In the dawning era of Intelligent Computing and Big-data Services, security issues will be an important consideration in promoting these new technologies into the future. This book presents the proceedings of the 2017 International Conference on Security with Intelligent Computing and Big-data Se
This book sets out the big data landscape, comprising data abundance, digital connectivity and ubiquitous technology, and shows how it is impacting national security. The main themes are that big data is transforming intelligence production as well as changing the national security environment broad
This book sets out the big data landscape, comprising data abundance, digital connectivity and ubiquitous technology, and shows how it is impacting national security. The main themes are that big data is transforming intelligence production as well as changing the national security environment broad
<p><p>This book presents the proceedings of the 2018 International Conference on Security with Intelligent Computing and Big-data Services (SICBS 2018). With the proliferation of security with intelligent computing and big-data services, the issues of information security, big data, intelligent comp