4 research outputs found

    Terror from behind the keyboard: conceptualising faceless detractors and guarantors of security in cyberspace

    Get PDF
    By reflecting on active public-domain government documents and statements, this article seeks to develop securitisation theory’s articulation of the dichotomy between legitimate and illegitimate violence as it is reflected in British government policy. This dichotomy has (re)developed through a process wherein GCHQ and MI5 are portrayed as ‘faceless guarantors’ of security, in Manichean juxtaposition to the discursively-created phantom cyberterrorists, who are presented as ‘faceless detractors’ of security. It has previously been stated that the terrorism discourse associated with the present ‘War on Terror’ is attributed, in part, to mechanics of fantasy. I argue that, within the securitised discourse of cyberterrorism, the limits of fantasy possesses a murky nuance, which in turn, allows for a deeper - or at least more entrenched - securitisation. The official discourse surrounding the intelligence services’ online surveillance apparatus operates with a similar opaque quality, but this is upheld by securitising actors as a strength to be maintained

    Handling and communicating intelligence information: a conceptual, historical and information design analysis

    Get PDF
    Effective communication of information is essential to intelligence work. This paper identifies the main obstacles to good communication: policy-related challenges; cognitive impediments; resource limitations; cultural and structural issues within intelligence communities; and technical information. To illustrate, it examines four cases when poor communication contributed to intelligence shortcomings. Via questionnaire and document survey, the study identifies the current state of practice in UK intelligence communities. The survey of visualization documents currently in use revealed errors against established principles of Information Design. Thus, to ensure better handling and dissemination of intelligence, there is a distinct need to apply Information Design principles
    corecore