2 options
Technological dimensions of defence against terrorism / edited by U. Feyyaz Aydoğdu.
- Format:
- Book
- Conference/Event
- Author/Creator:
- Technological Dimensions of Defence Against Terrorism (Workshop), Corporate Author.
- Conference Name:
- Technological Dimensions of Defence Against Terrorism (Workshop) (2011 : Ankara, Turkey)
- Technological Dimensions of Defence Against Terrorism (Workshop)
- Series:
- NATO science for peace and security series. Human and societal dynamics ; E, v. 115.
- NATO Science for Peace and Security Series, E: Human and societal dynamics, 1879-8268 ; Volume 115
- Language:
- English
- Subjects (All):
- Terrorism--Prevention--Technological innovations--Congresses.
- Terrorism.
- Physical Description:
- 1 online resource (152 p.)
- Edition:
- 1st ed.
- Place of Publication:
- Amsterdam, Netherlands : IOS Press, 2013.
- Language Note:
- English
- Summary:
- The technological developments of recent years have influenced both the threat of terrorist attacks and the defence against them, and continue to be the focus of attention. Terrorist groups are not slow to exploit new technological developments and adapt them to their own ends, and the forces of counterterrorism cannot afford to fall behind in their understanding of potential threats. This book presents the proceedings of the NATO Centre of Excellence - Defence against Terrorism (COE-DAT) Advanced Research Workshop, ""Technological Dimensions of Defence against Terrorism"", held in Ankara, Tur
- Contents:
- TECHNOLOGICAL DIMENSIONS OF DEFENCE AGAINST TERRORISM; Preface; Contents; A Brief Theory of Terrorism and Technology Revisited; Introduction; 1.Description of Terrorism; 2.Technology and Terrorism; 2.1 Transportation; 2.2 Communications; 2.3 Weapons; 2.4 Potential New Weapons; Conclusion; Bibliography; Current Technological Advances and their Impact on Terrorism and Counterterrorism Efforts; Introduction; 1. The Relationship between Technology and Terrorism; 2. Convergence of Technologies; 3. RTO and its Activities in DAT; 1.1 Applied Vehicle Technology (AVT) Panel
- 1.2 Human Factors and Medicine (HFM) Panel1.3 Information Systems and Technology (IST) Panel; 1.4 NATO Modeling & Simulation Group (NMSG); 1.5 System Analysis and Studies (SAS) Panel; 1.6 Systems Concepts and Integration (SCI) Panel; 1.7 Sensors and Electronics Technology (SET) Panel; Conclusion; Bibliography; The Role of the Commercial World in Defence against Terrorism; Introduction; 1. Technology, Organisation and People; 2. Defence Companies and their Smaller Competitors; 3. Defence against Terrorism; 4. NATO Actions; Conclusion
- Weaponization and Delivery Systems that Terrorists Use for Biological and Chemical AgentsIntroduction; 1. Chemical Terrorism; 1.1. Chemical Warfare History; 1.2. Some Possible Chemical Agents that Could Be Used by Terrorists; 1.3. Aerosol Dynamics; 1.4. History and Weaponization of Chemical Weapons; 1.5. Case Study Analysis of Chemical Terrorism; 2. Biological Terrorism; 2.1. Biological Warfare History; 2.2. Some Possible Biological Agents that Could be Used by Terrorists; 2.3. Production and Weaponization of Biological Weapons; 2.4. Case Study Analysis of Biological Terrorism
- 3. Analysis of Chemical and Biological Terrorism Extrapolate to the Future; Conclusion; Bibliography; Appendix A; Measures to Counter the Threat of WMD Terrorism; Introduction; 1. The Nature of the Threat; 1.1 WMD Threats; 1.2 Employment; 2. Countering the Threat; 3. The Role of NGOs and the Private Sector; Conclusion; Bibliography; Transportation Technology and Its Effect on the Speed, Distance and Magnitude of Terrorist Attacks; Introduction; 1. The Historical Background; 2. Globalization and Modern Terrorism; 3. Intermodal Passenger Systems; 4. Intermodal Freight Systems; Conclusion
- BibliographyTerrorist Threats to Energy Critical Infrastructure Technology and Protection Systems; Introduction; 1. Energy Security and Critical Energy Infrastructure; 2. Critical Energy Infrastructure and Terrorism; Conclusion; Bibliography; Terrorist Use of Communication Technology and Social Networks; Introduction; 1. Recruitment; 2. Radicalization; 3. Training; 4. Communication: Internal and External; 5. Tactical Uses; 6. Command and Control; 7. Fundraising; 8. Cyberattacks; Conclusion; Bibliography; Use of Cyberspace and Technology by Terrorists; Introduction; 1. What is Cyberspace?
- 2. How Terrorists Exploit Cyberspace
- Notes:
- Description based upon print version of record.
- Includes bibliographical references and indexes.
- Description based on print version record.
- ISBN:
- 1-61499-317-3
- OCLC:
- 867820508
The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.