The Ethical Limits We Should Place on Intelligence Gathering as Part of an Integrated CT Strategy
This chapter first describes the importance of secret intelligence in protecting the public from terrorist attacks. The use of intelligence in deriving the strategic aim of the integrated U.K. counter-terrorism strategy, CONTEST, and supporting its delivery is examined. The ethical issues associated...
Main Author: | |
---|---|
Format: | Electronic Article |
Language: | English |
Published: |
2021
|
In: |
Terrorism and political violence
Year: 2021, Volume: 33, Issue: 2, Pages: 290-301 |
Online Access: |
Volltext (lizenzpflichtig) |
Journals Online & Print: | |
Check availability: | HBZ Gateway |
Keywords: |
MARC
LEADER | 00000naa a22000002 4500 | ||
---|---|---|---|
001 | 1752575431 | ||
003 | DE-627 | ||
005 | 20210326160211.0 | ||
007 | cr uuu---uuuuu | ||
008 | 210326s2021 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1080/09546553.2021.1880225 |2 doi | |
035 | |a (DE-627)1752575431 | ||
035 | |a (DE-599)KXP1752575431 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
084 | |a 2,1 |2 ssgn | ||
100 | 1 | |a Omand, David |d 1947- |e VerfasserIn |0 (DE-588)142615722 |0 (DE-627)638042038 |0 (DE-576)332382672 |4 aut | |
109 | |a Omand, David 1947- |a Omand, David Bruce 1947- | ||
245 | 1 | 4 | |a The Ethical Limits We Should Place on Intelligence Gathering as Part of an Integrated CT Strategy |
264 | 1 | |c 2021 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a This chapter first describes the importance of secret intelligence in protecting the public from terrorist attacks. The use of intelligence in deriving the strategic aim of the integrated U.K. counter-terrorism strategy, CONTEST, and supporting its delivery is examined. The ethical issues associated with the general practice of secret intelligence are identified by referencing the Just War tradition establishing ethical restraints on armed conflict. Parallels are drawn to derive jus ad intelligentiam and jus in intelligentio ethical concepts to govern the acquisition and use of secret intelligence. The chapter concludes by applying these ideas to the techniques currently in use for counter-terrorism, especially the role of digital intelligence gathering today in helping uncover terrorist networks and frustrate attacks. Specific areas of counterterrorism work that nevertheless continue to raise significant ethical issues are identified. | ||
650 | 4 | |a Ethics | |
650 | 4 | |a Strategy | |
650 | 4 | |a Intelligence | |
650 | 4 | |a Terrorism | |
773 | 0 | 8 | |i Enthalten in |t Terrorism and political violence |d London : Cass, 1989 |g 33(2021), 2, Seite 290-301 |h Online-Ressource |w (DE-627)349234795 |w (DE-600)2080322-9 |w (DE-576)113563507 |x 1556-1836 |7 nnns |
773 | 1 | 8 | |g volume:33 |g year:2021 |g number:2 |g pages:290-301 |
856 | 4 | 0 | |u https://doi.org/10.1080/09546553.2021.1880225 |x Resolving-System |z lizenzpflichtig |3 Volltext |
935 | |a mkri | ||
936 | u | w | |d 33 |j 2021 |e 2 |h 290-301 |
951 | |a AR | ||
ELC | |a 1 | ||
LOK | |0 000 xxxxxcx a22 zn 4500 | ||
LOK | |0 001 3894697881 | ||
LOK | |0 003 DE-627 | ||
LOK | |0 004 1752575431 | ||
LOK | |0 005 20210326061532 | ||
LOK | |0 008 210326||||||||||||||||ger||||||| | ||
LOK | |0 035 |a (DE-2619)KrimDok#2021-03-25#205F73A431E08CD7BE7B6F16F82A7031B2F2BD08 | ||
LOK | |0 040 |a DE-2619 |c DE-627 |d DE-2619 | ||
LOK | |0 092 |o n | ||
LOK | |0 852 |a DE-2619 | ||
LOK | |0 852 1 |9 00 | ||
LOK | |0 935 |a zota | ||
OAS | |a 1 | ||
ORI | |a SA-MARC-krimdoka001.raw |