Counter-Terrorism, Ethics and Technology : : Emerging Challenges at the Frontiers of Counter-Terrorism.

Saved in:
Bibliographic Details
Superior document:Advanced Sciences and Technologies for Security Applications Series
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2021.
©2021.
Year of Publication:2021
Edition:1st ed.
Language:English
Series:Advanced Sciences and Technologies for Security Applications Series
Online Access:
Physical Description:1 online resource (231 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 5006827145
ctrlnum (MiAaPQ)5006827145
(Au-PeEL)EBL6827145
(OCoLC)1289369443
collection bib_alma
record_format marc
spelling Henschke, Adam.
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
1st ed.
Cham : Springer International Publishing AG, 2021.
©2021.
1 online resource (231 pages)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
Advanced Sciences and Technologies for Security Applications Series
Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.
5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?.
1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References.
Description based on publisher supplied metadata and other sources.
Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.
Electronic books.
Reed, Alastair.
Robbins, Scott.
Miller, Seumas.
Print version: Henschke, Adam Counter-Terrorism, Ethics and Technology Cham : Springer International Publishing AG,c2021 9783030902209
ProQuest (Firm)
https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6827145 Click to View
language English
format eBook
author Henschke, Adam.
spellingShingle Henschke, Adam.
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
Advanced Sciences and Technologies for Security Applications Series
Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.
5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?.
1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References.
author_facet Henschke, Adam.
Reed, Alastair.
Robbins, Scott.
Miller, Seumas.
author_variant a h ah
author2 Reed, Alastair.
Robbins, Scott.
Miller, Seumas.
author2_variant a r ar
s r sr
s m sm
author2_role TeilnehmendeR
TeilnehmendeR
TeilnehmendeR
author_sort Henschke, Adam.
title Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_sub Emerging Challenges at the Frontiers of Counter-Terrorism.
title_full Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_fullStr Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_full_unstemmed Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_auth Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
title_new Counter-Terrorism, Ethics and Technology :
title_sort counter-terrorism, ethics and technology : emerging challenges at the frontiers of counter-terrorism.
series Advanced Sciences and Technologies for Security Applications Series
series2 Advanced Sciences and Technologies for Security Applications Series
publisher Springer International Publishing AG,
publishDate 2021
physical 1 online resource (231 pages)
edition 1st ed.
contents Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.
5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?.
1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References.
isbn 9783030902216
9783030902209
callnumber-first J - Political Science
callnumber-subject JC - Political Theory
callnumber-label JC328
callnumber-sort JC 3328.6 265
genre Electronic books.
genre_facet Electronic books.
url https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6827145
illustrated Not Illustrated
oclc_num 1289369443
work_keys_str_mv AT henschkeadam counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism
AT reedalastair counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism
AT robbinsscott counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism
AT millerseumas counterterrorismethicsandtechnologyemergingchallengesatthefrontiersofcounterterrorism
status_str n
ids_txt_mv (MiAaPQ)5006827145
(Au-PeEL)EBL6827145
(OCoLC)1289369443
carrierType_str_mv cr
hierarchy_parent_title Advanced Sciences and Technologies for Security Applications Series
is_hierarchy_title Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
container_title Advanced Sciences and Technologies for Security Applications Series
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
marc_error Info : MARC8 translation shorter than ISO-8859-1, choosing MARC8. --- [ 856 : z ]
_version_ 1792331061223489536
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>07241nam a22004573i 4500</leader><controlfield tag="001">5006827145</controlfield><controlfield tag="003">MiAaPQ</controlfield><controlfield tag="005">20240229073845.0</controlfield><controlfield tag="006">m o d | </controlfield><controlfield tag="007">cr cnu||||||||</controlfield><controlfield tag="008">240229s2021 xx o ||||0 eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030902216</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9783030902209</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(MiAaPQ)5006827145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(Au-PeEL)EBL6827145</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289369443</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">MiAaPQ</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">MiAaPQ</subfield><subfield code="d">MiAaPQ</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">JC328.6-.65</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Henschke, Adam.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Counter-Terrorism, Ethics and Technology :</subfield><subfield code="b">Emerging Challenges at the Frontiers of Counter-Terrorism.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham :</subfield><subfield code="b">Springer International Publishing AG,</subfield><subfield code="c">2021.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (231 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Advanced Sciences and Technologies for Security Applications Series</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Intro -- Acknowledgments -- Introduction -- Contents -- Technology as Terrorism: Police Control Technologies and Drone Warfare -- 1 The Concept of Technology -- 1.1 Technology and Moral Mediation -- 1.2 Technology and Bias -- 1.3 What Is Terrorism? -- 2 Police Control Technologies as Terrorist Display -- 2.1 Riot Control Technologies -- 2.2 Tasers and Stun Guns -- 2.3 Implications -- 3 Drone Warfare -- 3.1 The US Drone Program -- 3.2 Drone Warfare as Terrorism -- 4 Conclusion: Terrorism from the Victim's Point of View -- References -- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations -- 1 Introduction -- 2 Irregular Warfare -- 3 Broad Counterterrorism Ethics Considerations -- 4 The Moral Significance of Narrative, Social Signalling, and Imagery -- 5 Application to Counterterrorism Drone Operations -- 6 Conclusion -- References -- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems -- 1 Introduction -- 2 Autonomous Weapons Systems -- 3 Arguments Against the Use of Autonomous Weapons Systems -- 4 Deception in Armed Conflict -- 4.1 So, What Is Deception and Could a Weapon Be Deceived? -- 5 Deception and AWS -- 6 Conclusions -- References -- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism -- 1 Introduction -- 2 The (Never-Ending) History of WMD and CBRN -- 3 Abandoning WMD Altogether? -- 4 WMD and Terrorism -- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction -- 6 The Terrorist Weapon Rating System -- 7 Conclusion -- References -- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat -- 1 Cyber Terrorism Has Not Taken Place -- 2 The IoT: Cyber-Physical Systems That Will Span The Globe -- 3 So What? An Inventory of Features -- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism -- References -- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All -- 1 Introduction -- 2 The Basics of Facial Recognition -- 3 Arguments for an FRT Ban -- 3.1 Disparate Impact -- 3.2 Chills Behavior -- 3.3 Scope Creep -- 3.4 An Outright Ban -- 4 Conditions for the Use of Facial Recognition -- 4.1 Reasonable Expectation of Privacy -- 4.2 Cause for the State's Use of FRTs -- 4.3 Reliance on Third-Party Technology -- 5 Conclusion -- References -- The Rise of the Modern Intelligence State -- 1 Introduction -- 2 The Normalisation of Surveillance -- 2.1 Surveillance as Control -- 2.2 Ethical Boundaries of the Surveillance State -- 3 Technological Evolution of the Surveillance State -- 3.1 The Security State -- 3.2 The Surveillance State -- 3.3 The Intelligence State -- 4 The Dividual and the Intelligence State -- 4.1 The Transparent Self -- 4.2 Emerging Technologies of Control -- 5 Conclusions -- References -- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China -- 1 Introduction -- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang -- 3 China's Counterterrorism Policy: Toward 'Enduring Peace' -- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education' -- 5 Conclusion -- References -- Privacy, Encryption and Counter-Terrorism -- 1 Privacy/Confidentiality, Autonomy and Security -- 2 Encryption -- 3 Ethical Analysis -- References -- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars -- 1 Introduction -- 2 Terrorist Use of E2EE -- 3 Countering E2EE -- 4 Privacy and E2EE -- 5 Security Versus Security -- 6 Proportionality -- 7 Maintaining Perspective -- 8 Conclusion -- References -- Who Should Regulate Extremist Content Online?.</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">1 Framing the Problem -- 2 The Status Quo: Regulation and Self-Regulation -- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists -- 4 A Deeper Cut: De-Platforming the Platforms -- 5 Ethical Challenges -- 5.1 Moral Legitimacy of Private Actors -- 5.2 Concentration of Power -- 5.3 Lack of Separation of Power -- 6 Different Institutions, Different Ethical Responsibilities -- 7 Conclusion: Is Co-Regulation a Solution? -- References -- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape -- 1 Introduction -- 2 Background -- 3 Manifestos as the Script, Violence as the Final Act -- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors -- 5 Analysing BT's Manifesto -- 5.1 The Self as 'The Pseudocommando' -- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others -- 5.3 Unbalanced Existential Concerns -- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in? -- 7 Conclusion -- References.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on publisher supplied metadata and other sources.</subfield></datafield><datafield tag="590" ind1=" " ind2=" "><subfield code="a">Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. </subfield></datafield><datafield tag="655" ind1=" " ind2="4"><subfield code="a">Electronic books.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Reed, Alastair.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Robbins, Scott.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Miller, Seumas.</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Henschke, Adam</subfield><subfield code="t">Counter-Terrorism, Ethics and Technology</subfield><subfield code="d">Cham : Springer International Publishing AG,c2021</subfield><subfield code="z">9783030902209</subfield></datafield><datafield tag="797" ind1="2" ind2=" "><subfield code="a">ProQuest (Firm)</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Advanced Sciences and Technologies for Security Applications Series</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ebookcentral.proquest.com/lib/oeawat/detail.action?docID=6827145</subfield><subfield code="z">Click to View</subfield></datafield></record></collection>