Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

1. Introduction: Terrorism as a Threat to Open Societies

verfasst von : Peter Lehr

Erschienen in: Counter-Terrorism Technologies

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In the introduction, I offer an overview of the book and the issues discussed in it. I introduce the individual chapters, but also familiarize readers with the basics of risk assessment and risk management as parts of the field of Critical Infrastructure Protection (CIP). In particular, I briefly talk about criticality, vulnerability, and threat, to then address questions on how to manage or mitigate risks posed by terrorism. In that regard, I highlight the role of technology in countering this threat and its relevance for both CIP and Critical Infrastructure Resilience (CIR). In a nutshell, the introduction aims at firmly anchoring the book in the field of CIP/CIR in order to give it a shelf life that goes beyond the current threat posed by Al Qaeda and ISIS/Daesh.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
According to HSPD-7, Critical Infrastructure or CI can be defined as “those systems and assets, whether physical or virtual, so vital to the United States that the incapacity or destruction of such systems and assets would have a debilitating impact on security, national economic security, national public health or safety, or any combination of those matters.” (HSPD-7, 17 December 2003). This definition also applies for any other modern state.
 
2
Threat is usually defined as the intention and capability of terrorists to carry out operations that can harm us.
 
3
It should be mentioned at least in passing that CIP normally employs an ‘all hazards’ approach – i.e. a risk management plan that is valid for all kinds of risks, be they terrorist, criminal, human error, or natural disasters such as floods, earthquakes, blizzards etc. In this book however, we only deal with risked posed by terrorists.
 
4
The key question according to Rosenzweig/Kochems (2005, 3) is [what] is the asset’s function or mission and how significant is it?”
 
5
Defined according to Roper 1999 as “a weakness that can be exploited to gain access to a given asset”.
 
6
Expressed as a formula, it would look as follows: R = f (C,V,T).
 
7
According to Nelson et al. (1999, 9), cyberterrorism can be defined as “the unlawful destruction or disruption of digital property to intimidate or coerce governments or societies in the pursuit of goals that are political, religious or ideological.” Dorothy Denning adds to that another crucial criterion: “Further, to qualify as cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear” (Denning 2000).
 
8
It should be noted that I will solely discuss passive counter-terrorism technologies – active defences such as new and non-lethal weapons systems will not be discussed in this book.
 
Literatur
Zurück zum Zitat Anderson M (2008) Counterterrorism as an objective of European police cooperation. In: Reinares F (ed) European democracies against terrorism. Governmental policies and intergovernmental cooperation. Ashgate, Aldershot, pp 227–243 Anderson M (2008) Counterterrorism as an objective of European police cooperation. In: Reinares F (ed) European democracies against terrorism. Governmental policies and intergovernmental cooperation. Ashgate, Aldershot, pp 227–243
Zurück zum Zitat Caldeira TPR (2000) City of walls: crime, segregation, and citizenship in São Paulo. University of California Press, Berkeley Caldeira TPR (2000) City of walls: crime, segregation, and citizenship in São Paulo. University of California Press, Berkeley
Zurück zum Zitat Collins PA, Baggett RK (2009) Homeland security and critical infrastructure protection. Praeger Security International, Westport, CT/London Collins PA, Baggett RK (2009) Homeland security and critical infrastructure protection. Praeger Security International, Westport, CT/London
Zurück zum Zitat Hunt AR, Kellerman KF (2000) Development of an analysis tool for performing civil aviation security risk assessment Hunt AR, Kellerman KF (2000) Development of an analysis tool for performing civil aviation security risk assessment
Zurück zum Zitat Jenkins BM (2006) The new age of terrorism. In: Kamien DG (ed) The McGraw-hill homeland security handbook. McGraw-Hill, New York et al, pp 117–130 Jenkins BM (2006) The new age of terrorism. In: Kamien DG (ed) The McGraw-hill homeland security handbook. McGraw-Hill, New York et al, pp 117–130
Zurück zum Zitat Jones K (2004) Trust and terror. In: DesAutels P, Walker MU (eds) Moral psychology: feminist ethics and social theory. Rowman & Littlefield, Lanham, MD, pp 3–18 Jones K (2004) Trust and terror. In: DesAutels P, Walker MU (eds) Moral psychology: feminist ethics and social theory. Rowman & Littlefield, Lanham, MD, pp 3–18
Zurück zum Zitat Kurzweil R (1999) The age of spiritual machines: when computers exceed human intelligence. Viking Press, New York Kurzweil R (1999) The age of spiritual machines: when computers exceed human intelligence. Viking Press, New York
Zurück zum Zitat Latour B (2005) Reassembling the social: an introduction to actor-network-theory. Oxford University Press (paperback ed.), Oxford et al. Latour B (2005) Reassembling the social: an introduction to actor-network-theory. Oxford University Press (paperback ed.), Oxford et al.
Zurück zum Zitat Mueller JE (2006) Overblown: how politicians and the terrorist industry inflate national security threats, and why we believe them. Free Press, New York Mueller JE (2006) Overblown: how politicians and the terrorist industry inflate national security threats, and why we believe them. Free Press, New York
Zurück zum Zitat Newman O (1972) Defensible space. People and Design in the Violent City. Architectural Press, London Newman O (1972) Defensible space. People and Design in the Violent City. Architectural Press, London
Zurück zum Zitat Roper K (1999) Risk Management for Security Professionals. Rothstein Associates, Brookfield Roper K (1999) Risk Management for Security Professionals. Rothstein Associates, Brookfield
Zurück zum Zitat Swindon P (2016) Anti-terror police: ‘Scotland is the safest part of the UK’,” Sunday Herald, 31 July Swindon P (2016) Anti-terror police: ‘Scotland is the safest part of the UK’,” Sunday Herald, 31 July
Zurück zum Zitat Wolfendale J (2007) Terrorism, security, and the threat of counterterrorism. Studies in Conflict & Terrorism 30 Wolfendale J (2007) Terrorism, security, and the threat of counterterrorism. Studies in Conflict & Terrorism 30
Metadaten
Titel
Introduction: Terrorism as a Threat to Open Societies
verfasst von
Peter Lehr
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-90924-0_1

Neuer Inhalt