Search results

1 – 10 of 54
Open Access
Article
Publication date: 6 December 2022

Pieter Lagerwaard

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core…

1987

Abstract

Purpose

In 2019, FIU-the Netherlands celebrated its 25th anniversary. This study takes the occasion to reflect on the role of the FIU in financial surveillance and to describe its core practices of collecting, analysing and disseminating financial intelligence.

Design/methodology/approach

Because FIU practices are often secret and its transaction data classified as state secrets, the FIU’s daily operational activities remain obscure. Drawing on interviews, public reports and an online training course, this study encircles secrecy and offers a fine-grained analysis of the FIU's core activities.

Findings

The article finds that the FIU plays a pivotal role in financial surveillance because it can operate at various intersections. An FIU operates at the intersection of finance and security, in between the public and private sector and at the national and international domain. This pivotal role makes the FIU indispensable in the surveillance of payment systems and spending behavior.

Social implications

The article poses that the desirability and effectiveness of financial surveillance has to date not received sufficient consideration, while it affects (the privacy of) anyone with a bank account. The article asks: is it ethically justifiable that transaction information is declared suspect, investigated, and shared nationally and internationally, without the individual or entity concerned officially being notified and legally named a suspect?

Originality/value

This case-study is not only relevant for the study of finance/security, AML/CFT and financial surveillance, but also to policy makers and the broader public who merit an understanding of how their financial behaviour is being surveilled.

Details

Journal of Money Laundering Control, vol. 26 no. 7
Type: Research Article
ISSN: 1368-5201

Keywords

Open Access
Book part
Publication date: 17 August 2021

Mike Hynes

Abstract

Details

The Social, Cultural and Environmental Costs of Hyper-Connectivity: Sleeping Through the Revolution
Type: Book
ISBN: 978-1-83909-976-2

Open Access
Article
Publication date: 1 October 2021

Osama Mahmoud Mohamed Abd Elgawad

This study is not intended to be a prescriptive blueprint for any nation or region to fight terrorism, but rather it aims to analyze the development of policies supporting…

1021

Abstract

Purpose

This study is not intended to be a prescriptive blueprint for any nation or region to fight terrorism, but rather it aims to analyze the development of policies supporting terrorism and their impact on regional as well as international relations. It is an examination of relevant facts, which might hopefully benefit policy makers and practitioners who diligently work on reducing or eliminating terrorist activities.

Design/methodology/approach

In order to achieve the objectives of the paper and in light of the pool of the available literature and data, the study adopts the system-analysis method in analyzing the impact of policies supporting terrorism and the countermeasures to apply based on the inputs, outputs and conversions associated with the phenomenon of terrorism.

Findings

Policies supporting terrorism differ from a state to another starting from providing safe haven to terrorist groups to providing direct finance and armaments to directly intervening militarily in a targeting country. Or deter such policies. This raised the concerns of many States in the region regarding the domination tendency of Turkey and called for a firm and pragmatic international, regional and Arab stand beyond verbal condemnation to deter Turkey from pursuing such policies.

Originality/value

The importance of the academic study stems from the importance of addressing one of the central issues in the field of regional and international relations, which is the policies some states adopt to support terrorism, not only by financing terrorism but also by incubating terrorism. Most studies on terrorism focus on the concept and situations and not on policies that support terrorism and their impact on regional and international relations and the means of encountering terrorism.

Details

Journal of Humanities and Applied Social Sciences, vol. 4 no. 5
Type: Research Article
ISSN: 2632-279X

Keywords

Open Access
Book part
Publication date: 9 December 2021

Alfonso Alfonsi and Maresa Berliri

This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and…

Abstract

This chapter, based on a sociological approach, addresses the ethical issues of surveillance research from the perspective of the profound transformations that science and innovation are undergoing, as part of a broader shift from modern to post-modern society, affecting also other major social institutions (such as government, religion, family, and public administration). The change occurring in the science and technology system is characterised by diminishing authority, uncertainty about internal mechanisms and standards, and a declining and increasingly difficult access to resources. Such changes, also related to globalisation and new digital technologies, have transformed the way research is conducted and disseminated. Research is now more open and its results more easily accessible to citizens.

Scientific research is also put under increased public scrutiny, while, at the same time, public distrust and disaffection towards science is rising. In such a context, it is more important than ever to make sure that research activities are not compromised by fraudulent and unethical practices. The legitimate expectations of citizens to enjoy their rights, including the ability to protect their private sphere, are growing. Scientific and technological development is deeply interrelated with the widespread awareness of these rights and the possibility of exercising them, but it produces also new risks, while a widespread sense of insecurity increases. The digital revolution, while improving people’s quality of life, offers at the same time new opportunities for crime and terrorism, which in turn has produced a demand to strengthen security systems through increasingly advanced and intrusive surveillance technologies. Misconduct in the field of surveillance may not only undermine the quality of research, but also further impair society’s trust in research and science as well as in the State and its institutions.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Book part
Publication date: 9 December 2021

Kevin Macnish

Large-scale data analytics have raised a number of ethical concerns. Many of these were introduced in a seminal paper by boyd and Crawford and have been developed since by others…

Abstract

Large-scale data analytics have raised a number of ethical concerns. Many of these were introduced in a seminal paper by boyd and Crawford and have been developed since by others (boyd & Crawford, 2012; Lagoze, 2014; Martin, 2015; Mittelstadt, Allo, Taddeo, Wachter, & Floridi, 2016). One such concern which is frequently recognised but under-analysed is the focus on correlation of data rather than on the causative relationship between data and results. Advocates of this approach dismiss the need for an understanding of causation, holding instead that the correlation of data is sufficient to meet our needs. In crude terms, this position holds that we no longer need to know why X+Y=Z. Merely acknowledging that the pattern exists is enough.

In this chapter, the author explores the ethical implications and challenges surrounding a focus on correlation over causation. In particular, the author focusses on questions of legitimacy of data collection, the embedding of persistent bias, and the implications of future predictions. Such concerns are vital for understanding the ethical implications of, for example, the collection and use of ‘big data’ or the covert access to ‘secondary’ information ostensibly ‘publicly available’. The author’s conclusion is that by failing to consider causation, the short-term benefits of speed and cost may be countered by ethically problematic scenarios in both the short and long term.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

Open Access
Article
Publication date: 12 November 2018

Heba Zahra

The USA has been suffering from international/transnational terrorism for decades. There is no consensus on whether this situation is a result of the international status of the…

2655

Abstract

Purpose

The USA has been suffering from international/transnational terrorism for decades. There is no consensus on whether this situation is a result of the international status of the USA and the principles it upholds or the policies it embraces in its interaction with the outside world.

Design/methodology/approach

This study adopts both the “American Primacy” theory and the “anti-Americanism” theory in its effort to reach a conclusion concerning this issue. This study aims to examine previous research that linked international terrorism to the US hegemony and the principles it abides by and showed the relevance of this perception to the “American Primacy” theory. It also examines the research that considered international/transnational terrorism as a result of the American foreign policy in its various aspects (economic, military, assistance or a whole combination of policies).

Findings

This literature on the American foreign policy and international/transnational terrorism was extensive and manifested the explanatory power of the “anti-Americanism” theory, especially in its three variants: issue-oriented, ideological and instrumental. While examining the foreign policy terrorism studies, the relevance of the “American Primacy” theory appeared at very few instances.

Originality/value

The study was able to prove that explaining the international/transnational terrorism is related to the foreign policy decisions taken by the American policymakers and cause harm to the outside world. The envy of “American Primacy” is of secondary importance.

Details

Review of Economics and Political Science, vol. 3 no. 3/4
Type: Research Article
ISSN: 2631-3561

Keywords

Open Access
Book part
Publication date: 16 August 2023

Ian J. Warren and Emma Ryan

This chapter argues that the Americanisation of online policing has questionable impacts in Australian prosecutions involving drugs obtained and distributed through dark web…

Abstract

This chapter argues that the Americanisation of online policing has questionable impacts in Australian prosecutions involving drugs obtained and distributed through dark web cryptomarkets. The authors describe several Australian prosecutions of mid- and low-level dealers who have accessed drugs through the dark web and contrast these with the United States (US) case against the cryptomarket, AlphaBay. The discussion in this study emphasises how Australian police and courts view the relative weight of dark web activity associated with the domestic and transnational supply of illicit drugs that result in formal prosecutions. The authors suggest that large-scale forms of online and dark web police surveillance undertaken by US enforcement agencies reflect Ethan Nadelmann’s (Cops across borders: the internationalization of US criminal law enforcement, University Park: Pennsylvania State University Press, 1993) thesis on the Americanisation of global policing through transnational communications networks. The authors then explain how key elements of transnational dark web drug supply appear to have a marginal bearing on criminal investigations into low- and mid-level traffickers in Australia, which rely on conventional surveillance tactics to identify clandestine mail pickups, physical distribution methods, and irregular money trails. However, the authors then illustrate how the Americanisation of online policing that targets high-level entrepreneurs and seeks to dismantle or eliminate dark web cryptomarkets has important implications on Australian reforms aimed at enhancing online surveillance powers to target a range of crimes that are often wrongly associated with illicit drug cryptomarkets. The authors conclude by demonstrating how intensive dark web surveillance has limited direct impact on routine drug policing in Australia, with dark web communications simply another medium for facilitating the physical detection of illicit transnational drug transactions.

Details

Digital Transformations of Illicit Drug Markets: Reconfiguration and Continuity
Type: Book
ISBN: 978-1-80043-866-8

Keywords

Open Access
Article
Publication date: 19 May 2020

Wael Zakaria Farag

The purpose of this paper is to examine evolution of the American strategy toward terrorism in the aftermath of the events of September 11, 2001. In other words, this study…

3594

Abstract

Purpose

The purpose of this paper is to examine evolution of the American strategy toward terrorism in the aftermath of the events of September 11, 2001. In other words, this study revolves around a key question: How and why the American security strategy toward terrorism evolved in the aftermath of the September 11 attacks in 2001? Based on the neorealist approach in international relations, this paper attempted to answer that question: first, through defining the concept of terrorism and how the Americans perceive it; second, via pinpointing the characteristic of the American counter-terrorism strategy before September 11 attacks; and third, through examining the effects of those terrorist attacks on that strategy.

Design/methodology/approach

The nature of the subject of this study calls for reliance on the analytical descriptive approach to highlight the role and strategy of the USA in the fight against terrorism following the events of September 11, in addition to the use of the system analysis methodology, which can identify the inputs and outputs of the system that had an impact in formulating the US counter-terrorism strategy.

Findings

This study has come up with seven findings. The first finding was that the 9/11 attacks served as a turning point of the US counter-terrorism strategy and restructured its agenda. Confronting the communist threat had been its primary objective, until terrorism came to the fore and became its first and foremost priority. The USA vowed that terrorism is its enemy and waged the war on terror to thwart its risk as a global threat. The second finding revolves around the idea of double standards in the American foreign policy. True to its long-standing tradition of favoring its own interests, in complete disregard of the interests of any other party, the USA continued to uphold the double-standards policy.

Originality/value

This study adds a new study to the Arab Library in the field of counter-terrorism studies, national security strategies and American foreign policy. In addition, the researcher seeks to complete the scientific effort to study the US strategy against terrorism, with a clear impact on the development of the situation in the region. This study contributes to the study of how one of the great powers in the international system, the USA, deals with the terrorist organizations that have become widespread in the Arab region.

Details

Review of Economics and Political Science, vol. 5 no. 4
Type: Research Article
ISSN: 2356-9980

Keywords

Open Access
Article
Publication date: 30 June 2007

Nilufer Oral

The Black Sea region has become as an important energy transit route for Caspian and Russian oil and natural gas to western markets. Since 1996 the quantity of oil exported from…

Abstract

The Black Sea region has become as an important energy transit route for Caspian and Russian oil and natural gas to western markets. Since 1996 the quantity of oil exported from the Black Sea through the Turkish Straits and the number of transiting tankers has doubled and will continue to expand. However, these are also two waterways where the risk of either an accidental or intentional disaster is significant bringing serious repercussions for energy supply security. This paper will analyze measures taken by Black Sea coastal States to provide for secure ports and shipping against accidental and intentional disasters. The paper will examine the role of technology, such as satellite based VTS providers in the Black Sea, implementation of the ISPS Code, the role of the relatively new BlackSeaFor in providing both port and navigational security. The paper will further make recommendations for further improvements for enhancement of security emergency response planning. In addition, the paper will examine current security measures taken by the Turkish Administration for oil transportation through the Turkish Straits.

Details

Journal of International Logistics and Trade, vol. 5 no. 1
Type: Research Article
ISSN: 1738-2122

Keywords

Open Access
Book part
Publication date: 9 December 2021

Hartmut Aden

Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU…

Abstract

Since the European Union’s (EU) Charter of Fundamental Rights became binding in 2009, data protection has attained the status of a fundamental right (Article 8) throughout the EU. This chapter discusses the relevance of data protection in the context of security. It shows that data protection has been of particular relevance in the German context – not only against the backdrop of rapidly evolving information technology, but also of the historical experiences with political regimes collecting information in order to oppress citizens.

Details

Ethical Issues in Covert, Security and Surveillance Research
Type: Book
ISBN: 978-1-80262-414-4

Keywords

1 – 10 of 54