We are living in an era in which terrorism demands our constant attention. Few people in North America or Western Europe have the capacity to study and analyze the wide scale number and kinds of threats facing us as a civilization. Even fewer can make constructive suggestions on how to meet and eliminate these threats in an effective way. Van Hipp discusses the full range of threats. Not just the constant threats of suicide bombers, airplane hijacking and odious beheadings, but the threats from military and cyber sources. He stresses the need to upgrade our missile defenses, protect ourselves from cyber attacks, and eliminate the dangers posed by our porous borders. He calls upon our national leadership to undertake the steps that will protect us all from these threats.
Counterterrorism: Reassessing the Policy Response promotes a more nuanced understanding of the effectiveness of current counterterrorism practices and the need for reform. It challenges government, media, and academic accounts that exaggerate terrorist threats, particularly in comparison to other threats such as organized crime. Author Benoît Gomis responds to the problem of overreaction with guidelines that address terrorism as a problem to be managed rather than as an existential threat that can be eradicated. He proposes a more realistic assessment of the threat from terrorism, domestic or international, by relating terrorism to broader security, social, and political contexts.
The book examines current issues in counterterrorism, including the opportunity costs of counterterrorism policies, their psychological impact, the role of the media and experts, and the risks associated with oversimplifying the challenges posed by terrorism. It also explores less prominent areas of terrorism studies such as right-wing extremism, links between terrorism and organized crime, and citizen privacy.
Continue reading “Counterterrorism: Reassessing the Policy Response”
What people are saying about Inside Cyber Warfare
"The necessary handbook for the 21st century."
Continue reading “Inside Cyber Warfare: Mapping the Cyber Underworld”
Terrorist groups are currently using information and communication technologies to orchestrate their conventional attacks. More recently, terrorists have been developing a new form of cyber-capability to coordinate cyber attacks. This book explores the possibility that cyber-terrorists may have developed or may have future capabilities to attack critical infrastructure by accessing Supervisory Control and Data Acquisition (SCADA) systems within Australia and throughout the world. The book characterises the Australian security and terrorism environment and discusses the vulnerability of Australian computer systems and control systems. It also discusses the cyber-capability of various terrorist groups, SCADA risk evaluation methods and presents a framework to measure and protect SCADA systems from the threat of cyber-terrorism within Australia. This framework forms the main basis of this research and is examined by three focus group interviews, signifying the need for new counter-terrorism security models to assist with assessing new cyber security threats such as cyber-terrorism. This contribution is of great value to the SCADA community and organisations.
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed terrorist cells, the gathering of target intelligence, and the use of cyber criminal activities as a force multiplier for both physical attacks and infrastructure destabilization. This book identifies the underlying technologies of the global information infrastructure as a means for presenting how critical this emerging domain has become. It then discusses the current attack methods and lays out a series of scenarios for key industry sectors. Lastly, Cyber Terrorism: Political and Economic Implications puts forward prevention and response policies for reducing cyber terrorism activities in the context of traditional information security objectives.