| 000 | 05319cam a22006615i 4500 | ||
|---|---|---|---|
| 001 | 21681248 | ||
| 003 | OSt | ||
| 005 | 20220913162604.0 | ||
| 006 | m |o d | | ||
| 007 | cr ||||||||||| | ||
| 008 | 180710s2019 gw |||| o |||| 0|eng | ||
| 010 | _a 2019747504 | ||
| 020 | _a9783319909233 (hbk) | ||
| 024 | 7 |
_a10.1007/978-3-319-90924-0 _2doi |
|
| 035 | _a(DE-He213)978-3-319-90924-0 | ||
| 040 |
_aDLC _beng _epn _erda _cJKRC |
||
| 072 | 7 |
_aJPWL _2bicssc |
|
| 072 | 7 | _aJPWL | |
| 082 | 0 | 4 |
_a303.625 _223 _bLEH |
| 100 | 1 |
_aLehr, Peter. _eAuthor. _919292 |
|
| 245 | 1 | 0 |
_aCounter-Terrorism Technologies : _bA Critical Assessment / _cby Peter Lehr. |
| 250 | _a1st | ||
| 260 |
_aCham : _bSpringer International Publishing, _c2019. |
||
| 300 |
_aVII, 217 p. ; _c24 cm |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 365 |
_b99.99 _cEuro |
||
| 490 | 1 |
_aAdvanced Sciences and Technologies for Security Applications, _x1613-5113 |
|
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aIntroduction: Terrorism as a Threat to Open Societies -- Part 1: Barbarians at the Gates: 'Sinful' Cities -- Actions: The Return of Urban Guerillas -- Reactions: The New (Para-) Military Urbanism -- Consequences: The Urban Space as a (Limited) Battlespace. Part 2: 'Our Silicon Will Win': The Role of Technology in Urban Counter-Terrorism -- Identification: Biometrics, or a Real-Time 'Who is Who' -- Prediction and Postdiction: Real-Time Data Mining and Data Analytics -- Detection: Scanning and 'Sniffing' Technologies -- Surveillance and Observation: The All-Seeing Eye of Big Brother -- Protection: Defensible Spaces -- Threat Displacement Instead of Threat Eradication: Come Concluding Caveats -- Part 3: Brave New Cities: The Law of Unintended Consequences -- The Quest for Silver Bullets: Implications for our Construction of Citizenship -- Archipelagos of Fear: CT Technology and the Securitization of Everyday Life -- Undemocratic Means: The Rise of the Surveillance State -- Democracy Transfigured: The Dawn of the 'Umpire State' -- Outlook: The Need for 'Critical' Critical Infrastructure Studies. | |
| 520 | _aThis book critically discusses the role of technology for counter-terrorism in general, and for securing our vulnerable open societies in particular. It is set against the backdrop of the terrorist threat posed by the combined forces of Al Qaeda and ISIS/Daesh in the foreseeable future. The book commences by illuminating current and foreseeable tactics and weapons used by these implacable enemies - weapons that may well include chemical, biological, radiological and potentially even nuclear (CBRN) devices. In a second part, it introduces technologies already available or in development that promise an increase in safety and security when it comes to the dangers posed by these terrorists. This part also includes a critical discussion of advantages and disadvantages of such technologies that are, quite often, sold as a 'silver bullet' approach in the fight against terrorism. Controversies such as those triggered by the abuse of millimeter wave scanners deployed at several Western European airports will demonstrate that there are costs involved with regard to human rights. The third, analytical part takes the critical discussion further by arguing that the uncritical fielding of new surveillance and control technologies in parallel with the on-going outsourcing and privatization of key services of the state could well lead to dystopias as envisaged in a rather prescient way by the so-called cyperpunk novels of the 1980s. The book concludes with the question that any liberal democracy should ask itself: how far can we go with regard to hardening our societies against terrorist threats? | ||
| 588 | _aDescription based on publisher-supplied MARC data. | ||
| 650 | 0 |
_aCrime-Sociological aspects. _919293 |
|
| 650 | 0 |
_aPolitical violence. _91875 |
|
| 650 | 0 |
_aRisk management. _917485 |
|
| 650 | 0 |
_aSystem safety. _919294 |
|
| 650 | 0 | _aTerrorism. | |
| 650 | 1 | 4 |
_aTerrorism and Political Violence. _0https://scigraph.springernature.com/ontologies/product-market-codes/912090 _919295 |
| 650 | 2 | 4 |
_aCrime and Society. _0https://scigraph.springernature.com/ontologies/product-market-codes/1B3000 _919296 |
| 650 | 2 | 4 |
_aRisk Management. _0https://scigraph.springernature.com/ontologies/product-market-codes/612040 _917485 |
| 650 | 2 | 4 |
_aSecurity Science and Technology. _0https://scigraph.springernature.com/ontologies/product-market-codes/P31080 _919297 |
| 653 | _aTerrorism--Prevention--Technological innovations | ||
| 653 | _aRisk management | ||
| 653 | _aTerrorism | ||
| 653 | _aCrime--Sociological aspects | ||
| 653 | _aPolitical science | ||
| 653 | _aPolitical violence | ||
| 653 | _aSystem safety | ||
| 776 | 0 | 8 |
_iPrint version: _tCounter-terrorism technologies _z9783319909233 _w(DLC) 2018942531 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783030081324 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783319909233 |
| 776 | 0 | 8 |
_iPrinted edition: _z9783319909257 |
| 830 | 0 |
_aAdvanced Sciences and Technologies for Security Applications, _x1613-5113 _919298 |
|
| 906 |
_a0 _bibc _corigres _du _encip _f20 _gy-gencatlg |
||
| 942 |
_2ddc _c1 _e23 _n0 |
||
| 999 |
_c412176 _d412176 |
||