Levi surveys the issue of nuclear terrorism and explores the decisions a terrorist leader might take in pursuing a nuclear plot. Terrorism online politics, law and technology taylor. Terrorism, technology and apocalyptic futures ebook, 2019. Terrorists, on the other hand, regard it as a means to an end. Dauber despite the fact that there is a robust conversation regarding terrorism and technology, that discussion is as near as we can tell uniformly about the back end, that is to say exclusively addressing the dissemination of what terrorists have already produced. All journal articles featured in journal of policing, intelligence and counter terrorism vol 15 issue 1. Used for political, not military, purposes, and most typically by groups too weak to mount open assaults, it is a modern tool of the alienated, and its psychological impact on the public has increased because of extensive coverage by the media. The book intertwines politics and power and space engineering in a story that also includes terrorism and some believably characters. Modern technology, which once seemed to hold only promise, now seems to harbor the potential for danger and destruction. For most of the 20th century, counterterrorism and technology coexisted in a onesided relationship.
Despite the fact that there is a robust conversation regarding terrorism and technology, that discussion is as near as we can tell uniformly about the back end, that is to say exclusively addressing the dissemination of what terrorists have already produced. This book is an important work in rethinking the impact of technology in society. Facebook is hardly alone hereit works with other social media platforms and companies to tackle the problem, using shared technology that fingerprints extremist images and videos. Nuclear terrorism and nuclear weapons systems, threats, and safeguards. The bombings of the world trade center and the oklahoma city federal building have shown that terrorist attacks can happen anywhere in the united states. Massive effort needs to be initiated to counter this force as the propensity for a future attack is high as the technology behind them will get better and more groundbreaking with time. This book centers on the power of mythical narratives and technology in creating the idea of a world that should be purged, not only discussing the nature of bottom days, but explores other related subthemes such as capitalism, terrorism, dark tourism, the essence of evil and the power of prophecy. Taking into account these practical considerations, the second edition of science and technology of terrorism and counterterrorism discusses the nature of terrorism. Through the book s engagement with questions of law, politics, technology and beyond, the volume offers a. Covering a broad range of topics, the book examines. Nov 24, 2015 preventing terrorist plots is harder than ever.
The role of technology is crucial to any adequate assessment of the terrorist threat and the measures needed to combat it effectively. The science and technology of counterterrorism 1st edition. The new threat for the millennium 3 the more traditional terrorists, the activities of these groups are much less likely to be mediadriven. We are living a very difficult period, the terrorism is threatening the society and cultures on a global scale, and differently from the past, it has reached a global dimension. Violent extremists like isis meet in the open on facebook or twitter. Science and technology of terrorism and counterterrorism. Popular terrorism books meet your next favorite book. An evenhanded look at how democracies can fight terrorism while maintaining a healthy society. The best books on terrorism recommended by mary habeck. Terrorism involves activities such as assassinations, bombings, random killings, and hijackings.
How does this book relate to your own work on terrorism. Recent rapid technological change that allows terrorists to reach a large audience quickly and directly has enabled. Terrorism, technology and apocalyptic futures book, 2019. It delivers a global audience this article is more than 1 year old. Through an examination of the history of terrorism, the editors present a series of questions to assist in the development of prevention and emergency management programs. Structuring security effort,3 was delivered to the committees in september 1990. Facebook details how it fights terrorism and extremists wired. Dec 04, 2015 the technology proficiency of terrorist organizations is on a swift rise. Exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism. Real tigers by mick herron, patriot games by tom clancy, bel canto by ann patchett, bruny by heather rose, and the tr. During this period, dynamite was the most weapons that were highly advocated for by various groups such as french anarchists. Nuclear deterrence in the age of nuclear terrorism mit.
Although we have faced some longlived groups in recent years, the average age of a terrorist group is about eight years. The silent terrorist one of the most consistent actions immediately following terrorist events of past decades was the predictable demand for credit by the group responsible. Governments see technology as conferring a decisive advantage in the struggle against terrorism, and often treat it as an end itself. Terrorism is an ancient phenomenon and, at its heart, a weak tactic. The best books on terrorism a five books interview with. List of books and articles about terrorism online research. In order to aid their recruitment, they adapt their tactics and strategy and structure their organizations accordingly. New terrorist tools technology has had a great impact on the development of the terrorist threts emerging since the end of the second world war. Journal of policing, intelligence and counter terrorism.
Mar 17, 2019 technology is terrorisms most effective ally. The future of antiterrorism technologies the heritage. Facebook details how it fights terrorism and extremists. Paul wilkinson who passed away in 2011, was one of the founders of terrorism studies in the early 1970s and became one of its most prominent experts. Traditionally, resources on terrorism and counterterrorism tend to focus on the social, behavioral, and legal aspects of the subject, with minimal emphasis on the scientific and technological aspects. My research demonstrates that there are six classic patterns of endings for a group. Jul 05, 2017 modern technology, which once seemed to hold only promise, now seems to harbor the potential for danger and destruction. The technology proficiency of terrorist organizations is on a swift rise.
Through the book s engagement with questions of law, politics, technology and beyond, the volume offers a holistic approach to cyberterrorism which provides a unique and invaluable contribution to this subject matter. Journal of cyber warfare and terrorism, university of kwazulu natal, south africa in this book, the author brings to bear an insightful collage of perspectives to critique todays apocalyptic global culture. Around the globe, massacres, hijackings, and bombings of airliners are frequent reminders of the threat of terrorism. Beyond startup programs, university partnerships and prize competitions, there are still countless ways to promote public safety innovation.
And technology is both the problem and the solution. In his 2007 book on nuclear terrorism, author michael a. Technology is central to both terrorism and counterterrorism, but each side views technology differently. So the book looks at how important it is to remember that how you end a war is more momentous than what is happening in the midst of it. As governments continue to unravel the planning behind the paris attacks, groups such as the islamic state and boko haram. The contributors to this volume are interested in the broader culture, and how terrorism affects that cultureincluding how people go about researching terrorism. The professor of strategic studies at johns hopkins university picks five books you must read to understand the war on terror, starting with one that tries to define what terrorism is. By looking at the forces that influence trends in terrorist tactics, targets and tradecraft, attacks can be placed in context, enabling observers to anticipate the next evolution in terrorism. Bioterrorism and the manufacture, detection, and delivery of biological agents. The book is a kind of intellectual godfather to the research i have tried to do on the endings of terrorist campaigns. Bruce hoffman, one of the foremost authorities on terrorism, describes his views on terrorism trends and prospects, while the authors of netwar, arquilla, ronfeldt, and zanini discuss networks, netwar, and informationage terrorism. Technology and terrorism fills a huge gap in the literature and reflects the latest thinking of scientists, technologists and analysts of terrorism. The cttso identifies and develops capabilities to combat terrorism and irregular adversaries and to deliver these capabilities to dod components and interagency partners through rapid research and development, advanced studies and technical innovation, and provision of support to u. Loyalka crc press, aug 10, 2010 social science 604 pages.
Access to new erorlst tools, the broadening of the terrorist market, and the. The science and technology of counterterrorism offers the necessary theoretical foundation to address realworld terrorism scenarios, effectively bridging the gap. Wilkinson continues his assessment of the terrorism threat, which he outlined in his earlier seminal book, terrorism and the liberal state, first published in. Aug 10, 2010 science and technology of terrorism and counterterrorism, second edition mark a. Intelligently presented and thoroughly referenced and indexed, the book offers a good balance of scientific and managerial information.
It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. The best books on terrorism five books expert recommendations. Bush and senator john kerry featured the issue of terrorism in their foreign policy. Allison explains that terrorists have been striving to acquire and then use nuclear weapons against the united states. The role of science and technology in countering terrorism, concludes that such detection is technically feasible. Recent rapid technological change that allows terrorists to reach a large audience quickly and directly has. Taking into account these practical considerations, the second edition of science and technology of. Extremists have sought to exploit the latest media technology to instill fear in target populations and elicit support from sympathetic audiences. In large part, law enforcement and the military adapted the technologies that were commercially. Hence, terrorism may thrive within the present world and its technological marvels.
Reading his book will stimulate your thinking about what. The ultimate preventable catastrophe is a 2004 book by harvard scholar graham allison. The everyday technology helping terrorists plot evil. The first chapter looks at the link between the use of technology and the larger concept of terrorism. It summarized the research programs developed by many government agencies for countering terrorist activities and investigated the state of the art of some airline security technologies, notably explosives detectors. A post911 study by the national research council nrc, making the nation safer. The book describes the connection between the energy policies of various countries, their foreign policies and the wars that break out at various parts of the globe, since all three are closely related. Mar 24, 2015 exploring these themes, the book engages with a range of contemporary case studies and different forms of terrorism. Terrorism always seems near at least when it happens in an environment.
Countering the new terrorism is a compilation of articles from some of the best and brightest analysts at rand. This book is pure ben bova including his political views. Levi points out the many obstacles that such a terrorist scheme may encounter, which in turn leads to a host of possible ways that any terrorist plan could be foiled. The first part of this series examined the importance of ideology and terrorist theory. Chemical terrorism, including manufacture, detection, delivery, and decontamination.
Technology plays a crucial part in any effective assessment of terrorism and the strategies required overcoming it. Levi points out the many obstacles that such a terrorist scheme may encounter, which in turn leads to a host of possible ways that any terrorist plan could be. Technology is a foundation of modern society, it governs its dynamics, and therefore, it is normal that also the terrorism will benefit from it. Maximiliano korstanje maximiliano korstanje weaves a brilliant reflective documentary of our terrordriven world culture. This used to be the case in the past years especially in the 19 th century. Oct 20, 2008 a post911 study by the national research council nrc, making the nation safer. Jul 06, 2018 beyond startup programs, university partnerships and prize competitions, there are still countless ways to promote public safety innovation. This book is part of the grand tour series of books set in the 21st century of humanitys early expansion into space.
1150 164 608 201 825 1367 410 813 691 673 1601 559 1628 288 62 227 1601 569 1609 897 1587 1106 637 506 800 1186 1396 356 1190 576 122 260 463 447