The Ethical Limits We Should Place on Intelligence Gathering as Part of an Integrated CT Strategy

This chapter first describes the importance of secret intelligence in protecting the public from terrorist attacks. The use of intelligence in deriving the strategic aim of the integrated U.K. counter-terrorism strategy, CONTEST, and supporting its delivery is examined. The ethical issues associated...

Full description

Saved in:  
Bibliographic Details
Main Author: Omand, David (Author)
Format: Electronic Article
Language:English
Published: 2021
In: Terrorism and political violence
Year: 2021, Volume: 33, Issue: 2, Pages: 290-301
Online Access: Volltext (lizenzpflichtig)
Journals Online & Print:
Drawer...
Check availability: HBZ Gateway
Keywords:

MARC

LEADER 00000naa a22000002 4500
001 1752575431
003 DE-627
005 20210326160211.0
007 cr uuu---uuuuu
008 210326s2021 xx |||||o 00| ||eng c
024 7 |a 10.1080/09546553.2021.1880225  |2 doi 
035 |a (DE-627)1752575431 
035 |a (DE-599)KXP1752575431 
040 |a DE-627  |b ger  |c DE-627  |e rda 
041 |a eng 
084 |a 2,1  |2 ssgn 
100 1 |a Omand, David  |d 1947-  |e VerfasserIn  |0 (DE-588)142615722  |0 (DE-627)638042038  |0 (DE-576)332382672  |4 aut 
109 |a Omand, David 1947-  |a Omand, David Bruce 1947- 
245 1 4 |a The Ethical Limits We Should Place on Intelligence Gathering as Part of an Integrated CT Strategy 
264 1 |c 2021 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
520 |a This chapter first describes the importance of secret intelligence in protecting the public from terrorist attacks. The use of intelligence in deriving the strategic aim of the integrated U.K. counter-terrorism strategy, CONTEST, and supporting its delivery is examined. The ethical issues associated with the general practice of secret intelligence are identified by referencing the Just War tradition establishing ethical restraints on armed conflict. Parallels are drawn to derive jus ad intelligentiam and jus in intelligentio ethical concepts to govern the acquisition and use of secret intelligence. The chapter concludes by applying these ideas to the techniques currently in use for counter-terrorism, especially the role of digital intelligence gathering today in helping uncover terrorist networks and frustrate attacks. Specific areas of counterterrorism work that nevertheless continue to raise significant ethical issues are identified. 
650 4 |a Ethics 
650 4 |a Strategy 
650 4 |a Intelligence 
650 4 |a Terrorism 
773 0 8 |i Enthalten in  |t Terrorism and political violence  |d London : Cass, 1989  |g 33(2021), 2, Seite 290-301  |h Online-Ressource  |w (DE-627)349234795  |w (DE-600)2080322-9  |w (DE-576)113563507  |x 1556-1836  |7 nnns 
773 1 8 |g volume:33  |g year:2021  |g number:2  |g pages:290-301 
856 4 0 |u https://doi.org/10.1080/09546553.2021.1880225  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
935 |a mkri 
936 u w |d 33  |j 2021  |e 2  |h 290-301 
951 |a AR 
ELC |a 1 
LOK |0 000 xxxxxcx a22 zn 4500 
LOK |0 001 3894697881 
LOK |0 003 DE-627 
LOK |0 004 1752575431 
LOK |0 005 20210326061532 
LOK |0 008 210326||||||||||||||||ger||||||| 
LOK |0 035   |a (DE-2619)KrimDok#2021-03-25#205F73A431E08CD7BE7B6F16F82A7031B2F2BD08 
LOK |0 040   |a DE-2619  |c DE-627  |d DE-2619 
LOK |0 092   |o n 
LOK |0 852   |a DE-2619 
LOK |0 852 1  |9 00 
LOK |0 935   |a zota 
OAS |a 1 
ORI |a SA-MARC-krimdoka001.raw