Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
By: Henschke, Adam.
Contributor(s): Reed, Alastair | Robbins, Scott | Miller, Seumas.
Material type: BookSeries: Advanced Sciences and Technologies for Security Applications Series: Publisher: Cham : Springer International Publishing AG, 2021Copyright date: �2021Edition: 1st ed.Description: 1 online resource (231 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9783030902216.Genre/Form: Electronic books.Online resources: Click to ViewItem type | Current location | Collection | Call number | Copy number | Status | Date due | Item holds |
---|---|---|---|---|---|---|---|
E-book | IUKL Library | Subscripti | 1 | Available |
Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.
5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?.
1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
There are no comments for this item.