IUKL Library
Normal view MARC view ISBD view

Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.

By: Henschke, Adam.
Contributor(s): Reed, Alastair | Robbins, Scott | Miller, Seumas.
Material type: materialTypeLabelBookSeries: Advanced Sciences and Technologies for Security Applications Series: Publisher: Cham : Springer International Publishing AG, 2021Copyright date: �2021Edition: 1st ed.Description: 1 online resource (231 pages).Content type: text Media type: computer Carrier type: online resourceISBN: 9783030902216.Genre/Form: Electronic books.Online resources: Click to View
Contents:
Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.
5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?.
1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References.
Tags from this library: No tags from this library for this title. Log in to add tags.
Item type Current location Collection Call number Copy number Status Date due Item holds
E-book E-book IUKL Library
Subscripti 1 Available
Total holds: 0

Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.

5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?.

1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2023. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

There are no comments for this item.

Log in to your account to post a comment.
The Library's homepage is at http://library.iukl.edu.my/.