Book description
Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics.
The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book.
- Offers a simple but effective analytic framework to assess counterterrorism risk and realistic measures to address threats
- Provides the essential scientific principles and tools required for this analysis
- Explores the increasingly important relationship between physical and electronic risk in meaningful technical detail
- Evaluates technical security systems to illustrate specific risks using concrete examples
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Dedication
- Acknowledgments
- About the Author
- Preface
-
Part I: Modeling Terrorism Risk
-
Chapter 1: Terrorism Threats, Risk, and Risk Assessments
- 1.1 Introduction: Decisions and Risk
- 1.2 Threats and the Components of Risk
- 1.3 Risk Assessments
- 1.4 Security Risk Trade-Offs
- 1.5 Security Risk in Context
- 1.6 Risk Factors
- 1.7 Counterterrorism Controls
- 1.8 Counterterrorism Methods
- 1.9 Operational Requirements
- 1.10 Performance Specifications
- 1.11 Security Risk Assessment Frameworks, Security Standards, and Security Risk Metrics
- Summary
- Problems
- Chapter 2: Organizing and Assessing Terrorism Risk
- Chapter 3: Uncertainty and Terrorism
- Chapter 4: Physical Models of Terrorism
- Chapter 5: Exploiting Terrorism Uncertainty
-
Chapter 1: Terrorism Threats, Risk, and Risk Assessments
-
Part II: Measuring Terrorism Risk
-
Chapter 6: Conventional Explosive Threats and Risk Mitigation
- 6.1 Introduction
- 6.2 Applying the Single Degree of Freedom Model
- 6.3 Explosive Overpressure and Impulse Parametric Scaling
- 6.4 Blast Effects: A Qualitative Description
- 6.5 The Effects of Distance and Payload
- 6.6 Vehicle-Borne Explosives
- 6.7 Vehicle-Borne Explosive Risk: A Simple Calculation
- 6.8 Barriers and Bollards
- 6.9 Assessing Bollard Effectiveness
- 6.10 Antiblast Film
- 6.11 Explosive Detection
- 6.12 X-Ray Inspection Technology
- 6.13 The Dangling Crane: Terror Without Terrorists
- Summary
- Problems
- Chapter 7: Nontraditional Terrorist Threats and Risk Mitigation
- Chapter 8: Electronic Terrorism Threats, Risk, and Risk Mitigation
-
Chapter 9: The Convergence of Electronic and Physical Security Risk
- 9.1 Introduction: Cultural and Organizational Drivers of Security
- 9.2 Electronic and Physical Security Vulnerabilities of a Physical Access Control System
- 9.3 Physical Security of Data Centers
- 9.4 An Indicative Data Center Physical Security Standard
- 9.5 Virtualized Environments and the Concentration of Information Security Risk
- 9.6 The Integration of Physical and Electronic Security within Active Directory
- 9.7 Physical Security Risk and Electronic Vulnerabilities
- Summary
- Problems
-
Chapter 6: Conventional Explosive Threats and Risk Mitigation
-
Part III: Counterterrorism Controls
-
Chapter 10: Authentication, Authorization, and Affiliation
- 10.1 Introduction
- 10.2 Organizational Affiliation
- 10.3 Background Investigations
- 10.4 Insider Threats and Risk Mitigation
- 10.5 A Mantra for Affiliation
- 10.6 Confirming Authorization for Access to Restricted Space
- 10.7 Physical Access Control IDs and Credentials
- 10.8 Contactless Smart Cards and Proximity Cards
- 10.9 Radiofrequency IDs (RFID)
- 10.10 The Security of Contactless Smart Cards Versus Magnetic Stripe Technologies
- 10.11 Multifactor Authentication of Identity
- 10.12 Biometric Authentication of Identity
- Summary
- Problems
-
Chapter 11: Closed Circuit Television
- 11.1 Introduction
- 11.2 Analog and IP CCTV Cameras
- 11.3 CCTV Cameras and Optics
- 11.4 Lighting
- 11.5 Focal Length and f-Number
- 11.6 Angle-of-View and Field-of-View
- 11.7 Depth-of-Field
- 11.8 Sensitivity
- 11.9 Signal-to-Noise (S/N) Ratio
- 11.10 CCTV Image Creation
- 11.11 CCTV Image Recording
- 11.12 CCTV Signal Bandwidth and Storage Requirements
- 11.13 CCTV Image Resolution
- 11.14 Resolution Requirements for Submegapixel CCTV Systems
- 11.15 Resolution Requirements for Megapixel CCTV Systems
- 11.16 CCTV Video Compression
- 11.17 CCTV and Security Systems Integration
- 11.18 CCTV Cabling
- 11.19 CCTV Signal Security
- 11.20 CCTV Operational Summary
- 11.21 Special CCTV System Requirements
- 11.22 CCTV System Performance Specifications
- Summary
-
Chapter 12: Physical Access Restriction, Incident Detection, and Scenario Monitoring
- 12.1 Introduction
- 12.2 Electric Strikes and Magnetic Locks
- 12.3 Doors and Portals
- 12.4 The Ten Plus One Commandments of Physical Access
- 12.5 The Importance of Physical Access Control System Specifications
- 12.6 Physical Access Control System Architecture and Signaling
- 12.7 Physical Access Control System Specifications
- 12.8 Security Incident Monitoring and Detection
- Summary
- Problems
-
Chapter 10: Authentication, Authorization, and Affiliation
- Epilogue
- Appendix A: Linearity, Nonlinearity, and Parametric Scaling
- Appendix B: Exponents, Logarithms, and Sensitivity to Change
- Appendix C: The Exponential Functions ex and e− x
- Appendix D: The Decibel (dB)
- Appendix E: Parameters for Anti-Explosive and Bullet-Resistant Window Treatments
- Appendix F: Half-Life
- Appendix G: Near Fields from Radiated Radio-Frequency Identification (RFID) Power Data
- Index
Product information
- Title: The Science and Technology of Counterterrorism
- Author(s):
- Release date: February 2014
- Publisher(s): Butterworth-Heinemann
- ISBN: 9780124200616
You might also like
book
Handbook on Securing Cyber-Physical Critical Infrastructure
The worldwide reach of the Internet allows malicious cyber criminals to coordinate and launch attacks on …
book
Business Continuity Strategies: Protecting Against Unplanned Disasters, 3rd Edition
Cost-efficient business contingency and continuity planning for a post-9/11 and Katrina world Disasters can happen. Contingency …
book
Impact of Healthcare Informatics on Quality of Patient Care and Health Services
Recent healthcare reform and its provisions have pushed health information technology (HIT) into the forefront. Higher …
book
Multimodal Scene Understanding
Multimodal Scene Understanding: Algorithms, Applications and Deep Learning presents recent advances in multi-modal computing, with a …