Wildy Logo
(020) 7242 5778
enquiries@wildy.com

Book of the Month

Cover of Disclosure in Criminal Proceedings

Disclosure in Criminal Proceedings

Edited by: Paul Jarvis, Oliver Glasgow
Price: £110.00

Drink and Drug-Drive
Case Notes 4th ed




 P. M. Callow


Welcome to Wildys

Watch


Enquiries of Local Authorities
and Water Companies:
A Practical Guide 7th ed



 Keith Pugsley, Ken Miles


Offers for Newly Called Barristers & Students

Special Discounts for Newly Called & Students

Read More ...


Secondhand & Out of Print

Browse Secondhand Online

Read More...


Artificial Intelligence, Counter-Terrorism and the Rule of Law: At the Heart of National Security


ISBN13: 9781803928333
Published: May 2025
Publisher: Edward Elgar Publishing Limited
Country of Publication: UK
Format: Hardback
Price: £90.00



Despatched in 4 to 6 days.

This insightful book examines the use of advanced technology, specifically artificial intelligence (AI), both as a tool in the hands of terrorists and as a powerful security counter-measure. It sheds light on the legal issues arising from the presence of AI in national security matters and identifies how AI can be regulated in this sensitive field.

Arianna Vedaschi and Chiara Graziani illustrate the importance of safeguarding human rights while utilising advanced counter-terrorism tools and analyse the consequent legal challenges posed by AI . Adopting a comparative legal perspective, this book provides a comprehensive overview of counter-terrorism in Western democracies and advocates for a regulatory framework on the use of AI in national security.

This book is an essential resource for scholars and students of comparative law, constitutional and administrative law, global and transnational law and terrorism and security law. Judicial and human rights practitioners will also benefit from this volume.

Subjects:
IT, Internet and Artificial Intelligence Law
Contents:
Introduction: the complex relationship between advanced technology, security and rights ix

PART I. TECHNOLOGY AS A ‘TERRORIST TOOL’
1. The use of technology in terrorist activities in the ‘real digital world’ 7
2. The use of technology in terrorist activities in the ‘real digital world’ 30
A final overview on technology as a terrorist tool 37
Appendix to Part I: a taxonomy of the terrorist use of technology 39

PART II. TECHNOLOGY AS A “COUNTER-TERRORISM TOOL”
A general introductory overview: technology as a tool to respond to terrorism 41
3. Identifying the threat: surveillance through the collection and retention of metadata 47
4. Identifying the threat by scanning the web: the flagging and removal of terrorist content 58
5. Identifying the threat by relying on biometric data 73
6. ‘Chasing’ the terrorist threat: technologies for ‘personalised’ surveillance 102
7. Technology and counter-terrorism: shaping the public opinion 121
A final overview on technology as a counter-terrorism tool 127
Appendix to Part II 129
Conclusions: artificial intelligence in the field of security –
rule of law concerns, regulatory challenges and geopolitical
impact 130