Online Surveillance and Terrorism

Online interaction is becoming as significant as physical peer-to-peer contact. Much of what we call “community” has moved online. With the emergence of online radicalisation, individuals engaging in cultures of political violence are spatially dispersed. From the far-right to jihadi terrorism, we are moving away from geographically specific communities to “commons” that share psycho-social indicators: employment status, gender, prison time, music tastes, or history of violence are more potent identifiers than one’s mosque of choice or ethnic background. 

TACTICS talks to Quirine Eijkman, who is Professor of Access to Justice at the Research Centre for Social Innovation about the issue of online governance and how a potential terrorist is identified online “…in a democracy we have to ask ourselves who identifies whom and what are the indicators that somebody might pose a threat online”, she says, adding that “the transparency in relation to the indicators that might be an indication of online radicalisation are not so clear. prednisone for dogs without a vet prescription – prednisone over the counter walmart. Very often after a terrorist attack, people might say he or she got the information or was radicalised online and in reality its far more complex why somebody radicalises. It might be that they are inspired because of information/social relations online but very often it’s much more complex and it’s not easy to identify what these indicators are…”

Professor Eijkman highlights that this is  a “problematic” process because “there is so much information about all citizens online, the question is if you are not monitoring this on the basis of clear indicators, then you might even identify people that are just politically engaged rather than radicalised.”

In that case, how do we hold those doing the monitoring accountable? As Eijkman tells us “the problem is that in the last decade, these laws have become so broad that the intelligence services in most Western European countries and, certainly, also in the United States, have broad powers to monitor,” and adds “So it is actually legal or lawful but the question is, is it proportionate or not?”

To find out what the best way forward is to watch the full interview with Professor Eijkman below:

Image courtesy of Pixabay by Pete 

Share this page:

Related content

CTCCS Withdrawal Exposes Ethical Fault Lines in UK Counter-Terror

CTCCS Withdrawal Exposes Ethical Fault Lines in UK Counter-Terror

Ctccs Withdrawal Exposes Ethical Fault Lines United Kingdom Counter-Terror Analysis following the decision by Birmingham and Solihull Mental Health NHS Foundation Trust to exit the Counter Terrorism Clinical Consultancy Service…
Pre-Planned Precision: Counter-Terror Tactics in Urban UK Settings

Pre-Planned Precision: Counter-Terror Tactics in Urban UK Settings

Pre-Planned Precision Counter-Terror Tactical Urban UK Settings is a representation of the 10-year development of the security posture of the United Kingdom, during which intelligence-led disruption has replaced the reactive…
ProtectEU Strategy Targets Digital Extremism in Evolving EU Threats

ProtectEU Strategy Targets Digital Extremism in Evolving EU Threats

The ProtectEU Strategy Targets Digital Extremism at a moment when the European Union’s security institutions are reassessing how terrorism and radicalization manifest in an increasingly digital and decentralized environment. Announced…