Law and order, war and peace

R. Baecker
{"title":"Law and order, war and peace","authors":"R. Baecker","doi":"10.1093/oso/9780198827085.003.0011","DOIUrl":null,"url":null,"abstract":"Most computers during the Second World War, such as the British code-breaking Colussus machine, had been developed for military use. The effects on law and order and war and peace of computerization, worldwide telecommunications, social media, artificial intelligence (AI), and robotics is the topic of Chapter 6. As in Chapter 5, the most compelling visions of the potential opportunities and dangers have been in science fiction and in film; we begin the chapter by reviewing some memorable examples. We then discuss how technology is used by the police, such as the use of video evidence to sometimes exonerate the police against false accusations of needless brutality. We also examine how citizens are using social media to protect themselves and alert others to what they believe is unwarranted violence or unjust actions by law enforcement. We expand upon Section 5.7’s discussion of citizen mobilization by social media with the goal of regime change. In this context, we discuss how the government (especially police and security services) gains leverage via the surveillance of the digital information and communications of citizens. This surveillance has significantly increased due to security concerns post-9/11. We will examine these developments in the USA, Canada, and the UK, as well as in other parts of the world. We shall also discuss cases of organizations trying to subvert societies that repress and forbid access to the internet, with the goal of enabling its citizens to access the internet freely. Next, we consider ways in which tools of digital disruption are used by a country or government or a set of individuals against others. The timely and current case study explored is on governmental use of hacking and other aggressive digital means to interfere with the electoral processes of another country, or even to disrupt or destabilize the other country. At the extreme, governments engage in cyberterrorism or even cyberwar­fare. We shall discuss several recent examples of this and argue that weapons of cyberwar­fare could be as catastrophic as nuclear or biological weapons. The technology of warfare has also evolved.","PeriodicalId":111342,"journal":{"name":"Computers and Society","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers and Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780198827085.003.0011","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Most computers during the Second World War, such as the British code-breaking Colussus machine, had been developed for military use. The effects on law and order and war and peace of computerization, worldwide telecommunications, social media, artificial intelligence (AI), and robotics is the topic of Chapter 6. As in Chapter 5, the most compelling visions of the potential opportunities and dangers have been in science fiction and in film; we begin the chapter by reviewing some memorable examples. We then discuss how technology is used by the police, such as the use of video evidence to sometimes exonerate the police against false accusations of needless brutality. We also examine how citizens are using social media to protect themselves and alert others to what they believe is unwarranted violence or unjust actions by law enforcement. We expand upon Section 5.7’s discussion of citizen mobilization by social media with the goal of regime change. In this context, we discuss how the government (especially police and security services) gains leverage via the surveillance of the digital information and communications of citizens. This surveillance has significantly increased due to security concerns post-9/11. We will examine these developments in the USA, Canada, and the UK, as well as in other parts of the world. We shall also discuss cases of organizations trying to subvert societies that repress and forbid access to the internet, with the goal of enabling its citizens to access the internet freely. Next, we consider ways in which tools of digital disruption are used by a country or government or a set of individuals against others. The timely and current case study explored is on governmental use of hacking and other aggressive digital means to interfere with the electoral processes of another country, or even to disrupt or destabilize the other country. At the extreme, governments engage in cyberterrorism or even cyberwar­fare. We shall discuss several recent examples of this and argue that weapons of cyberwar­fare could be as catastrophic as nuclear or biological weapons. The technology of warfare has also evolved.
法律与秩序,战争与和平
第二次世界大战期间的大多数计算机,如英国的密码破译机Colussus,都是为军事用途而开发的。计算机化、全球电信、社交媒体、人工智能(AI)和机器人技术对法律与秩序以及战争与和平的影响是第6章的主题。正如在第五章中,最引人注目的潜在机会和危险的愿景已经在科幻小说和电影;我们以回顾一些难忘的例子开始本章。然后,我们讨论了警察如何使用技术,例如使用视频证据,有时可以免除警察不必要的暴行的错误指控。我们还研究了公民如何使用社交媒体来保护自己,并提醒他人注意他们认为执法部门的无端暴力或不公正行为。我们将在第5.7节讨论以政权更迭为目标的社会媒体公民动员的基础上进行扩展。在此背景下,我们将讨论政府(尤其是警察和安全部门)如何通过监控公民的数字信息和通信来获得杠杆作用。由于9/11事件后的安全考虑,这种监视大大增加。我们将研究这些发展在美国,加拿大,英国,以及在世界其他地区。我们还将讨论一些组织试图颠覆压制和禁止使用互联网的社会,目的是使其公民能够自由使用互联网。接下来,我们将考虑一个国家或政府或一群个人使用数字颠覆工具来对抗他人的方式。这个及时且最新的案例研究探讨的是政府使用黑客和其他侵略性的数字手段来干涉另一个国家的选举过程,甚至破坏或破坏另一个国家的稳定。在极端情况下,政府会参与网络恐怖主义甚至网络战争。我们将讨论最近的几个例子,并认为网络战争的武器可能像核武器或生物武器一样具有灾难性。战争技术也在不断发展。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信