Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism.
Main Author: | |
---|---|
Other Authors: | , , |
Format: | eBook |
Language: | English |
Published: |
Cham :
Springer International Publishing AG,
2021.
|
Edition: | 1st ed. |
Series: | Advanced Sciences and Technologies for Security Applications Series
|
Subjects: | |
Online Access: | Click to View |
Table of Contents:
- Intro
- Acknowledgments
- Introduction
- Contents
- Technology as Terrorism: Police Control Technologies and Drone Warfare
- 1 The Concept of Technology
- 1.1 Technology and Moral Mediation
- 1.2 Technology and Bias
- 1.3 What Is Terrorism?
- 2 Police Control Technologies as Terrorist Display
- 2.1 Riot Control Technologies
- 2.2 Tasers and Stun Guns
- 2.3 Implications
- 3 Drone Warfare
- 3.1 The US Drone Program
- 3.2 Drone Warfare as Terrorism
- 4 Conclusion: Terrorism from the Victim's Point of View
- References
- On the Moral Significance of Narrative, Imagery, and Social Signalling in Counterterrorism Targeted Killing Operations
- 1 Introduction
- 2 Irregular Warfare
- 3 Broad Counterterrorism Ethics Considerations
- 4 The Moral Significance of Narrative, Social Signalling, and Imagery
- 5 Application to Counterterrorism Drone Operations
- 6 Conclusion
- References
- Sunlight Glinting on Clouds: Deception and Autonomous Weapons Systems
- 1 Introduction
- 2 Autonomous Weapons Systems
- 3 Arguments Against the Use of Autonomous Weapons Systems
- 4 Deception in Armed Conflict
- 4.1 So, What Is Deception and Could a Weapon Be Deceived?
- 5 Deception and AWS
- 6 Conclusions
- References
- Weapons of Mass Destruction-Conceptual and Ethical Issues with Regard to terrorism
- 1 Introduction
- 2 The (Never-Ending) History of WMD and CBRN
- 3 Abandoning WMD Altogether?
- 4 WMD and Terrorism
- 5 Alternative Concepts for Terrorist Weapons of Mass Destruction
- 6 The Terrorist Weapon Rating System
- 7 Conclusion
- References
- Terrorism and the Internet of Things: Cyber-Terrorism as an Emergent Threat
- 1 Cyber Terrorism Has Not Taken Place
- 2 The IoT: Cyber-Physical Systems That Will Span The Globe
- 3 So What? An Inventory of Features
- 4 Will IoT Enabled Cyber-Attacks Be Acts of Terrorism?.
- 5 Ethics and Responsibilities for IoT Enabled Cyber-Terrorism
- References
- Facial Recognition for Counter-Terrorism: Neither a Ban Nor a Free-for-All
- 1 Introduction
- 2 The Basics of Facial Recognition
- 3 Arguments for an FRT Ban
- 3.1 Disparate Impact
- 3.2 Chills Behavior
- 3.3 Scope Creep
- 3.4 An Outright Ban
- 4 Conditions for the Use of Facial Recognition
- 4.1 Reasonable Expectation of Privacy
- 4.2 Cause for the State's Use of FRTs
- 4.3 Reliance on Third-Party Technology
- 5 Conclusion
- References
- The Rise of the Modern Intelligence State
- 1 Introduction
- 2 The Normalisation of Surveillance
- 2.1 Surveillance as Control
- 2.2 Ethical Boundaries of the Surveillance State
- 3 Technological Evolution of the Surveillance State
- 3.1 The Security State
- 3.2 The Surveillance State
- 3.3 The Intelligence State
- 4 The Dividual and the Intelligence State
- 4.1 The Transparent Self
- 4.2 Emerging Technologies of Control
- 5 Conclusions
- References
- "No Cracks, no Blind Spots, no Gaps": Technologically-Enabled "Preventative" Counterterrorism and Mass Repression in Xinjiang, China
- 1 Introduction
- 2 Chinese Colonialism and Uyghur 'Terrorism' in Xinjiang
- 3 China's Counterterrorism Policy: Toward 'Enduring Peace'
- 4 Seeing Like the CCP: 'Social Management', Counterterrorism and 'Re-Education'
- 5 Conclusion
- References
- Privacy, Encryption and Counter-Terrorism
- 1 Privacy/Confidentiality, Autonomy and Security
- 2 Encryption
- 3 Ethical Analysis
- References
- An End to Encryption? Surveillance and Proportionality in the Crypto-Wars
- 1 Introduction
- 2 Terrorist Use of E2EE
- 3 Countering E2EE
- 4 Privacy and E2EE
- 5 Security Versus Security
- 6 Proportionality
- 7 Maintaining Perspective
- 8 Conclusion
- References
- Who Should Regulate Extremist Content Online?.
- 1 Framing the Problem
- 2 The Status Quo: Regulation and Self-Regulation
- 3 Terrorism as a Driver for Deplatforming: From ISIS to Political Extremists
- 4 A Deeper Cut: De-Platforming the Platforms
- 5 Ethical Challenges
- 5.1 Moral Legitimacy of Private Actors
- 5.2 Concentration of Power
- 5.3 Lack of Separation of Power
- 6 Different Institutions, Different Ethical Responsibilities
- 7 Conclusion: Is Co-Regulation a Solution?
- References
- White Knights, Black Armour, Digital Worlds: Exploring the Efficacy of Analysing Online Manifestos of Terrorist Actors in the Counter Terrorism Landscape
- 1 Introduction
- 2 Background
- 3 Manifestos as the Script, Violence as the Final Act
- 4 Cues and Liner Notes: World-Building and Motivations of Terrorist Actors
- 5 Analysing BT's Manifesto
- 5.1 The Self as 'The Pseudocommando'
- 5.2 Intense Anger at Injustice and Seeking Revenge Against Others
- 5.3 Unbalanced Existential Concerns
- 6 The (Digital) World We Live in or the (Digital) Battleground We Fight in?
- 7 Conclusion
- References.