Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Counter-terrorism technologies = a c...
~
Lehr, Peter.
Linked to FindBook
Google Book
Amazon
博客來
Counter-terrorism technologies = a critical assessment /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Counter-terrorism technologies/ by Peter Lehr.
Reminder of title:
a critical assessment /
Author:
Lehr, Peter.
Published:
Cham :Springer International Publishing : : 2019.,
Description:
vii, 217 p. :ill., digital ;24 cm.
[NT 15003449]:
Introduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: 'Sinful' Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: 'Our Silicon Will Win': The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
Contained By:
Springer eBooks
Subject:
Terrorism - Prevention -
Online resource:
http://dx.doi.org/10.1007/978-3-319-90924-0
ISBN:
9783319909240
Counter-terrorism technologies = a critical assessment /
Lehr, Peter.
Counter-terrorism technologies
a critical assessment /[electronic resource] :by Peter Lehr. - Cham :Springer International Publishing :2019. - vii, 217 p. :ill., digital ;24 cm. - Advanced sciences and technologies for security applications,1613-5113. - Advanced sciences and technologies for security applications..
Introduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: 'Sinful' Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: 'Our Silicon Will Win': The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
ISBN: 9783319909240
Standard No.: 10.1007/978-3-319-90924-0doiSubjects--Topical Terms:
875412
Terrorism
--Prevention
LC Class. No.: HV6431 / .L447 2019
Dewey Class. No.: 363.32517
Counter-terrorism technologies = a critical assessment /
LDR
:03768nmm a2200325 a 4500
001
2176715
003
DE-He213
005
20180710110655.0
006
m d
007
cr nn 008maaau
008
191121s2019 gw s 0 eng d
020
$a
9783319909240
$q
(electronic bk.)
020
$a
9783319909233
$q
(paper)
024
7
$a
10.1007/978-3-319-90924-0
$2
doi
035
$a
978-3-319-90924-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
HV6431
$b
.L447 2019
072
7
$a
JPWL
$2
bicssc
072
7
$a
POL037000
$2
bisacsh
082
0 4
$a
363.32517
$2
23
090
$a
HV6431
$b
.L524 2019
100
1
$a
Lehr, Peter.
$3
923034
245
1 0
$a
Counter-terrorism technologies
$h
[electronic resource] :
$b
a critical assessment /
$c
by Peter Lehr.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2019.
300
$a
vii, 217 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Advanced sciences and technologies for security applications,
$x
1613-5113
505
0
$a
Introduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: 'Sinful' Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: 'Our Silicon Will Win': The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
520
$a
This book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
650
0
$a
Terrorism
$x
Prevention
$x
Technological innovations.
$3
875412
650
0
$a
National security
$x
Technological innovations.
$3
1995328
650
1 4
$a
Political Science and International Relations.
$3
2162818
650
2 4
$a
Terrorism and Political Violence.
$3
2182328
650
2 4
$a
Security Science and Technology.
$3
1531662
650
2 4
$a
Risk Management.
$3
608953
650
2 4
$a
Crime and Society.
$3
2182009
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer eBooks
830
0
$a
Advanced sciences and technologies for security applications.
$3
2180530
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-90924-0
950
$a
Political Science and International Studies (Springer-41174)
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9366584
電子資源
11.線上閱覽_V
電子書
EB HV6431
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login