Coverart for item
The Resource Counter-Terrorism Technologies : A Critical Assessment, by Peter Lehr, (electronic resource)

Counter-Terrorism Technologies : A Critical Assessment, by Peter Lehr, (electronic resource)

Label
Counter-Terrorism Technologies : A Critical Assessment
Title
Counter-Terrorism Technologies
Title remainder
A Critical Assessment
Statement of responsibility
by Peter Lehr
Creator
Subject
Language
eng
Summary
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies – weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a ‘silver bullet’ approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?--
Member of
Assigning source
Provided by publisher
http://library.link/vocab/creatorName
Lehr, Peter
Image bit depth
0
Literary form
non fiction
Nature of contents
dictionaries
Series statement
  • Springer eBooks.
  • Springer eBooks
  • Advanced Sciences and Technologies for Security Applications,
http://library.link/vocab/subjectName
  • Crime
  • Political science
  • Political violence
  • Risk management
  • System safety
  • Terrorism
Label
Counter-Terrorism Technologies : A Critical Assessment, by Peter Lehr, (electronic resource)
Link
http://ezproxy.eui.eu/login?url=http://dx.doi.org/10.1007/978-3-319-90924-0
Instantiates
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Introduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: ‘Sinful’ Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: ‘Our Silicon Will Win’: The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies
Control code
978-3-319-90924-0
Dimensions
unknown
Extent
1 online resource (VII, 217 pages)
File format
multiple file formats
Form of item
  • online
  • electronic
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9783319909240
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)1044733866
Label
Counter-Terrorism Technologies : A Critical Assessment, by Peter Lehr, (electronic resource)
Link
http://ezproxy.eui.eu/login?url=http://dx.doi.org/10.1007/978-3-319-90924-0
Publication
Antecedent source
mixed
Carrier category
online resource
Carrier category code
cr
Carrier MARC source
rdacarrier
Color
not applicable
Content category
text
Content type code
txt
Content type MARC source
rdacontent
Contents
Introduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: ‘Sinful’ Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: ‘Our Silicon Will Win’: The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies
Control code
978-3-319-90924-0
Dimensions
unknown
Extent
1 online resource (VII, 217 pages)
File format
multiple file formats
Form of item
  • online
  • electronic
Governing access note
Use of this electronic resource may be governed by a license agreement which restricts use to the European University Institute community. Each user is responsible for limiting use to individual, non-commercial purposes, without systematically downloading, distributing, or retaining substantial portions of information, provided that all copyright and other proprietary notices contained on the materials are retained. The use of software, including scripts, agents, or robots, is generally prohibited and may result in the loss of access to these resources for the entire European University Institute community
Isbn
9783319909240
Level of compression
uncompressed
Media category
computer
Media MARC source
rdamedia
Media type code
c
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
(OCoLC)1044733866

Library Locations

    • Badia FiesolanaBorrow it
      Via dei Roccettini 9, San Domenico di Fiesole, 50014, IT
      43.803074 11.283055
Processing Feedback ...