This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that…mehr
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future.
The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at severalWestern European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
Produktdetails
Produktdetails
Advanced Sciences and Technologies for Security Applications
Peter Lehr is lecturer in terrorism studies at the Centre for the Study of Terrorism and Political Violence (CSTPV), University of St. Andrews, Scotland/UK. He worked on the nexus between piracy and maritime terrorism as Informa Group Research Fellow, also at the CSTPV, from September 2004 to August 2007. Prior to that, he was Lecturer at the Department of Political Science, South Asia Institute, University of Heidelberg, and Visiting Fellow at the Institute for Strategic and International Studies (ISIS), Chulalongkorn University, Bangkok/Thailand. Peter Lehr's teaching and research covers the following areas: critical infrastructure protection (CIP); maritime safety and security (including piracy and maritime terrorism); political violence and terrorism; and organized crime. He is the editor of Violence at Sea: Piracy in the Age of Global Terrorism (New York: Routledge 2007; paperback ed. 2011), and the co-editor (together with Rupert Herbert-Burns and Sam Bateman) of Lloyd's MIU Handbook of Maritime Security (Boca Raton: Taylor & Francis 2009). His newest publication, a monograph on piracy from ancient to modern times, titled Like a Parcel of Furies will be published in spring next year, while his most recent peer-reviewed article on the European Union and Aviation Security (co-authored with my colleague Dr Javier Argomaniz), has just been published in a special edition of the journal Studies in Conflict and Terrorism. With regard to teaching, Peter Lehr is the academic director of the CSTPV/Informa Group distance learning course on terrorism (http://terrorismstudies.com). For this certificate-level course he developed the modules on maritime terrorism, on critical infrastructure protection, and on radicalization/deradicalization. Additionally, he is teaching modules for 3 rd and 5 th year students at the CSTPV and the School of International Relations that include the topics of critical infrastructure protection as well as the role of technology for counter-terrorism. Peter Lehr earned his PhD (Dr. rer. pol.) from the University of Heidelberg, Germany, in April 2004.
Inhaltsangabe
Introduction: Terrorism as a Threat to Open Societies.- Part 1: Barbarians at the Gates: 'Sinful' Cities.- Actions: The Return of Urban Guerillas.- Reactions: The New (Para-) Military Urbanism.- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: 'Our Silicon Will Win': The Role of Technology in Urban Counter-Terrorism.- Identification: Biometrics, or a Real-Time 'Who is Who'.- Prediction and Postdiction: Real-Time Data Mining and Data Analytics.- Detection: Scanning and 'Sniffing' Technologies.- Surveillance and Observation: The All-Seeing Eye of Big Brother.- Protection: Defensible Spaces.- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats.- Part 3: Brave New Cities: The Law of Unintended Consequences.- The Quest for Silver Bullets: Implications for our Construction of Citizenship.- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life.- Undemocratic Means: The Rise of the Surveillance State.- Democracy Transfigured: The Dawn of the 'Umpire State'.- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
Introduction: Terrorism as a Threat to Open Societies.- Part 1: Barbarians at the Gates: ‘Sinful’ Cities.- Actions: The Return of Urban Guerillas.- Reactions: The New (Para-) Military Urbanism.- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: ‘Our Silicon Will Win’: The Role of Technology in Urban Counter-Terrorism.- Identification: Biometrics, or a Real-Time 'Who is Who'.- Prediction and Postdiction: Real-Time Data Mining and Data Analytics.- Detection: Scanning and 'Sniffing' Technologies.- Surveillance and Observation: The All-Seeing Eye of Big Brother.- Protection: Defensible Spaces.- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats.- Part 3: Brave New Cities: The Law of Unintended Consequences.- The Quest for Silver Bullets: Implications for our Construction of Citizenship.- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life.- Undemocratic Means: The Rise of the Surveillance State.- Democracy Transfigured: The Dawn of the 'Umpire State'.- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
Introduction: Terrorism as a Threat to Open Societies.- Part 1: Barbarians at the Gates: 'Sinful' Cities.- Actions: The Return of Urban Guerillas.- Reactions: The New (Para-) Military Urbanism.- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: 'Our Silicon Will Win': The Role of Technology in Urban Counter-Terrorism.- Identification: Biometrics, or a Real-Time 'Who is Who'.- Prediction and Postdiction: Real-Time Data Mining and Data Analytics.- Detection: Scanning and 'Sniffing' Technologies.- Surveillance and Observation: The All-Seeing Eye of Big Brother.- Protection: Defensible Spaces.- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats.- Part 3: Brave New Cities: The Law of Unintended Consequences.- The Quest for Silver Bullets: Implications for our Construction of Citizenship.- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life.- Undemocratic Means: The Rise of the Surveillance State.- Democracy Transfigured: The Dawn of the 'Umpire State'.- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
Introduction: Terrorism as a Threat to Open Societies.- Part 1: Barbarians at the Gates: ‘Sinful’ Cities.- Actions: The Return of Urban Guerillas.- Reactions: The New (Para-) Military Urbanism.- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: ‘Our Silicon Will Win’: The Role of Technology in Urban Counter-Terrorism.- Identification: Biometrics, or a Real-Time 'Who is Who'.- Prediction and Postdiction: Real-Time Data Mining and Data Analytics.- Detection: Scanning and 'Sniffing' Technologies.- Surveillance and Observation: The All-Seeing Eye of Big Brother.- Protection: Defensible Spaces.- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats.- Part 3: Brave New Cities: The Law of Unintended Consequences.- The Quest for Silver Bullets: Implications for our Construction of Citizenship.- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life.- Undemocratic Means: The Rise of the Surveillance State.- Democracy Transfigured: The Dawn of the 'Umpire State'.- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
Rezensionen
"Lehr's book is a very useful tool for both academics and practitioners to get an overview of how our social world has been changing by the complex coexistence of (still) open societies, the threat of terror, surveillance/security mechanisms, and the many aspects of digitalisation. Counter-Terrorism Technologies captures an intriguing age of transition that one day might make more sense for posterity than it does now for us. ... thanks to the critical-analytical approach." (Zsófia Hacsek, Behavioral Sciences of Terrorism and Political Aggression, December 22, 2020)
Es gelten unsere Allgemeinen Geschäftsbedingungen: www.buecher.de/agb
Impressum
www.buecher.de ist ein Internetauftritt der buecher.de internetstores GmbH
Geschäftsführung: Monica Sawhney | Roland Kölbl | Günter Hilger
Sitz der Gesellschaft: Batheyer Straße 115 - 117, 58099 Hagen
Postanschrift: Bürgermeister-Wegele-Str. 12, 86167 Augsburg
Amtsgericht Hagen HRB 13257
Steuernummer: 321/neu