000 05319cam a22006615i 4500
001 21681248
003 OSt
005 20220913162604.0
006 m |o d |
007 cr |||||||||||
008 180710s2019 gw |||| o |||| 0|eng
010 _a 2019747504
020 _a9783319909233 (hbk)
024 7 _a10.1007/978-3-319-90924-0
_2doi
035 _a(DE-He213)978-3-319-90924-0
040 _aDLC
_beng
_epn
_erda
_cJKRC
072 7 _aJPWL
_2bicssc
072 7 _aJPWL
082 0 4 _a303.625
_223
_bLEH
100 1 _aLehr, Peter.
_eAuthor.
_919292
245 1 0 _aCounter-Terrorism Technologies :
_bA Critical Assessment /
_cby Peter Lehr.
250 _a1st
260 _aCham :
_bSpringer International Publishing,
_c2019.
300 _aVII, 217 p. ;
_c24 cm
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
365 _b99.99
_cEuro
490 1 _aAdvanced Sciences and Technologies for Security Applications,
_x1613-5113
504 _aIncludes bibliographical references and index.
505 0 _aIntroduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: 'Sinful' Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: 'Our Silicon Will Win': The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies.
520 _aThis book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats?
588 _aDescription based on publisher-supplied MARC data.
650 0 _aCrime-Sociological aspects.
_919293
650 0 _aPolitical violence.
_91875
650 0 _aRisk management.
_917485
650 0 _aSystem safety.
_919294
650 0 _aTerrorism.
650 1 4 _aTerrorism and Political Violence.
_0https://scigraph.springernature.com/ontologies/product-market-codes/912090
_919295
650 2 4 _aCrime and Society.
_0https://scigraph.springernature.com/ontologies/product-market-codes/1B3000
_919296
650 2 4 _aRisk Management.
_0https://scigraph.springernature.com/ontologies/product-market-codes/612040
_917485
650 2 4 _aSecurity Science and Technology.
_0https://scigraph.springernature.com/ontologies/product-market-codes/P31080
_919297
653 _aTerrorism--Prevention--Technological innovations
653 _aRisk management
653 _aTerrorism
653 _aCrime--Sociological aspects
653 _aPolitical science
653 _aPolitical violence
653 _aSystem safety
776 0 8 _iPrint version:
_tCounter-terrorism technologies
_z9783319909233
_w(DLC) 2018942531
776 0 8 _iPrinted edition:
_z9783030081324
776 0 8 _iPrinted edition:
_z9783319909233
776 0 8 _iPrinted edition:
_z9783319909257
830 0 _aAdvanced Sciences and Technologies for Security Applications,
_x1613-5113
_919298
906 _a0
_bibc
_corigres
_du
_encip
_f20
_gy-gencatlg
942 _2ddc
_c1
_e23
_n0
999 _c412176
_d412176