Counter-Terrorism, Ethics and Technology : : Emerging Challenges at the Frontiers of Counter-Terrorism.

Saved in:
Bibliographic Details
Superior document:Advanced Sciences and Technologies for Security Applications Series
:
TeilnehmendeR:
Place / Publishing House:Cham : : Springer International Publishing AG,, 2021.
©2021.
Year of Publication:2021
Edition:1st ed.
Language:English
Series:Advanced Sciences and Technologies for Security Applications Series
Online Access:
Physical Description:1 online resource (231 pages)
Tags: Add Tag
No Tags, Be the first to tag this record!
Table of Contents:
  • Intro
  • Acknowledgments
  • Introduction
  • Contents
  • Technology as Terrorism: Police Control Technologies and Drone Warfare
  • 1 The Concept of Technology
  • 1.1 Technology and Moral Mediation
  • 1.2 Technology and Bias
  • 1.3 What Is Terrorism?
  • 2 Police Control Technologies as Terrorist Display
  • 2.1 Riot Control Technologies
  • 2.2 Tasers and Stun Guns
  • 2.3 Implications
  • 3 Drone Warfare
  • 3.1 The US Drone Program
  • 3.2 Drone Warfare as Terrorism
  • 4 Conclusion: Terrorism from the Victim's Point of View
  • References
  • On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations
  • 1 Introduction
  • 2 Irregular Warfare
  • 3 Broad Counterterrorism Ethics Considerations
  • 4 The Moral Significance of Narrative, Social Signalling, and Imagery
  • 5 Application to Counterterrorism Drone Operations
  • 6 Conclusion
  • References
  • Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems
  • 1 Introduction
  • 2 Autonomous Weapons Systems
  • 3 Arguments Against the Use of Autonomous Weapons Systems
  • 4 Deception in Armed Conflict
  • 4.1 So, What Is Deception and Could a Weapon Be Deceived?
  • 5 Deception and AWS
  • 6 Conclusions
  • References
  • Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism
  • 1 Introduction
  • 2 The (Never-Ending) History of WMD and CBRN
  • 3 Abandoning WMD Altogether?
  • 4 WMD and Terrorism
  • 5 Alternative Concepts for Terrorist Weapons of Mass Destruction
  • 6 The Terrorist Weapon Rating System
  • 7 Conclusion
  • References
  • Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat
  • 1 Cyber Terrorism Has Not Taken Place
  • 2 The IoT: Cyber-Physical Systems That Will Span The Globe
  • 3 So What? An Inventory of Features
  • 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.
  • 5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism
  • References
  • Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All
  • 1 Introduction
  • 2 The Basics of Facial Recognition
  • 3 Arguments for an FRT Ban
  • 3.1 Disparate Impact
  • 3.2 Chills Behavior
  • 3.3 Scope Creep
  • 3.4 An Outright Ban
  • 4 Conditions for the Use of Facial Recognition
  • 4.1 Reasonable Expectation of Privacy
  • 4.2 Cause for the State's Use of FRTs
  • 4.3 Reliance on Third-Party Technology
  • 5 Conclusion
  • References
  • The Rise of the Modern Intelligence State
  • 1 Introduction
  • 2 The Normalisation of Surveillance
  • 2.1 Surveillance as Control
  • 2.2 Ethical Boundaries of the Surveillance State
  • 3 Technological Evolution of the Surveillance State
  • 3.1 The Security State
  • 3.2 The Surveillance State
  • 3.3 The Intelligence State
  • 4 The Dividual and the Intelligence State
  • 4.1 The Transparent Self
  • 4.2 Emerging Technologies of Control
  • 5 Conclusions
  • References
  • "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China
  • 1 Introduction
  • 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang
  • 3 China's Counterterrorism Policy: Toward 'Enduring Peace'
  • 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education'
  • 5 Conclusion
  • References
  • Privacy, Encryption and Counter-Terrorism
  • 1 Privacy/Confidentiality, Autonomy and Security
  • 2 Encryption
  • 3 Ethical Analysis
  • References
  • An End to Encryption? Surveillance and Proportionality in the Crypto-Wars
  • 1 Introduction
  • 2 Terrorist Use of E2EE
  • 3 Countering E2EE
  • 4 Privacy and E2EE
  • 5 Security Versus Security
  • 6 Proportionality
  • 7 Maintaining Perspective
  • 8 Conclusion
  • References
  • Who Should Regulate Extremist Content Online?.
  • 1 Framing the Problem
  • 2 The Status Quo: Regulation and Self-Regulation
  • 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists
  • 4 A Deeper Cut: De-Platforming the Platforms
  • 5 Ethical Challenges
  • 5.1 Moral Legitimacy of Private Actors
  • 5.2 Concentration of Power
  • 5.3 Lack of Separation of Power
  • 6 Different Institutions, Different Ethical Responsibilities
  • 7 Conclusion: Is Co-Regulation a Solution?
  • References
  • White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape
  • 1 Introduction
  • 2 Background
  • 3 Manifestos as the Script, Violence as the Final Act
  • 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors
  • 5 Analysing BT's Manifesto
  • 5.1 The Self as 'The Pseudocommando'
  • 5.2 Intense Anger at Injustice and Seeking Revenge Against Others
  • 5.3 Unbalanced Existential Concerns
  • 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in?
  • 7 Conclusion
  • References.