Local cover image
Local cover image
Normal view

Counterterrorism and Cybersecurity : Total Information Awareness / Newton Lee.

By: Material type: TextTextPublisher: Cham : Springer International Publishing AG, 2024Copyright date: 2024Edition: 3rd edDescription: 1 online resource (629 pages)Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783031631269
Subject(s): Genre/Form: Additional physical formats: Print version:: Counterterrorism and Cybersecurity.Online resources:
Contents:
Intro -- Acknowledgments -- About the Book -- Contents -- About the Author -- Part I: Counterterrorism History: Then and Now -- Chapter 1: From September 11 Attacks to Israel's 9/11 -- 1.1 September 11, 2001 -- 1.2 Disney's Responses to the 9/11 Attacks -- 1.3 FBI Warning of Hollywood as a Terrorist Target -- 1.4 Hollywood Realism on Terrorism -- 1.5 A New Day of Infamy and America at War -- 1.6 September 11, 2012 -- 1.7 U.S. Capitol Attack on January 6, 2021 -- 1.8 Israel's 9/11 and Israel-Hamas War -- 1.9 Cyberterrorism -- Bibliography -- Chapter 2: FBI and U.S. Intelligence Community -- 2.1 Federal Bureau of Investigation (FBI) -- 2.2 "Need to Know" - Truths, Half Truths, and Lies -- 2.3 FBI Ten Most Wanted Fugitive: Osama Bin Laden -- 2.4 An American Hero Born in Lebanon -- 2.5 The FBI-CIA Bureaucratic Rivalries -- 2.6 Operational Failures of the U.S. Intelligence Community -- 2.7 Unity of Counterterrorism Effort Across U.S. Government -- 2.8 Transition from Need-to-Know to Need-to-Share and Need-to-Provide -- 2.9 Informed Interrogation Approach -- 2.10 U.S. Fusion Centers -- 2.11 International "Duty to Warn" Policy (Boston Marathon Bombing, Israel's 9/11, and Crocus City Hall Attack) -- 2.12 International Collaboration on Counterterrorism (Global Counterterrorism Forum CGTF) -- 2.13 January 6 U.S. Capitol Attack and Social Media -- 2.14 Hard Lessons from Pearl Harbor, 9/11, and U.S. Capitol Attack -- Bibliography -- Part II: Counterterrorism Strategies: Causes and Cures, War and Peace -- Chapter 3: Understanding Terrorism -- 3.1 Terrorism as a Disease -- 3.2 "Give a human face to people we consider our enemies" - The Americans -- 3.3 Bravery and Cowardice -- 3.4 Drones Kill Terrorists, Not Terrorism -- 3.5 War on Terror (Overseas Contingency Operation) -- 3.6 A Stubborn Terror (International and Domestic) -- 3.7 Economic Warfare.
3.8 Inside the Minds of Terrorists and Their Sympathizers -- 3.9 Questioning Terrorism and Destroying Stereotypes -- Bibliography -- Chapter 4: Cures for Terrorism -- 4.1 Treating Terrorism as a Disease -- 4.2 "Revenge is Sour" - George Orwell -- 4.3 "Govern your passions or they will be your undoing" - Mr. Spock -- 4.4 "Impossible to carry a grudge and a big dream at the same time" - Unknown -- 4.5 "Every truth has two sides" - Aesop -- 4.6 "Give everyone a voice" - Mark Zuckerberg -- 4.7 "The only security of all is in a free press" - Thomas Jefferson -- 4.8 "Free speech would not protect a man falsely shouting fire" - Oliver Wendell Holmes, Jr. -- 4.9 "198 Methods of Nonviolent Action" - Gene Sharp -- 4.10 "We do not have the right to resort to violence when we don't get our way" - President Bill Clinton -- 4.11 "Peace is the only path to true security" - President Barack Obama -- Bibliography -- Chapter 5: War and Peace -- 5.1 War as State-Sponsored Terrorism -- 5.2 Complacency in War -- 5.3 The Warrior's Code -- 5.4 Existential Risk, Artificial Intelligence, and the Doomsday Clock -- 5.5 Civilians Wanting Peace -- 5.6 Peace Entailing Sacrifice -- 5.7 Attainable Peace -- 5.8 A Just and Lasting Peace -- 5.9 Peace and Friendships on Facebook -- 5.10 One Small Step for an Individual -- One Giant Leap for Humankind -- 5.11 A Recipe for Peace -- Bibliography -- Part III: Counterterrorism Technologies: Total Information Awareness -- Chapter 6: The Rise and Fall of Total Information Awareness -- 6.1 President Ronald Reagan and Admiral John Poindexter -- 6.2 Defense Advanced Research Projects Agency (DARPA) -- 6.3 Information Awareness Office (IAO) -- 6.4 Perception of Privacy Invasion -- 6.5 Privacy Protection in Total Information Awareness (TIA) -- 6.6 Opposing Views on TIA -- 6.7 Demystifying IAO and TIA -- 6.8 Demise of IAO and TIA -- Bibliography.
Chapter 7: Reincarnation of Total Information Awareness and Edward Snowden's NSA Leaks -- 7.1 NSA's Terrorist Surveillance Program -- 7.2 President George W. Bush and NSA Warrantless Wiretapping -- 7.3 Poindexter's Policy Analysis Market -- 7.4 Project Argus: Bio-surveillance Priming System -- 7.5 President Barack Obama's Big Data R&amp -- D Initiative -- 7.6 Palantir Technologies Funded by CIA's In-Q-Tel -- 7.7 Microsoft and NYPD's Domain Awareness System -- 7.8 NSA's Utah Data Center: A 1.5 Billion Data-Mining and Spy Center -- 7.9 Global Surveillance and Abuse of Power -- 7.10 Edward Snowden's NSA Leaks and PRISM -- 7.11 Social Networks' Responses to NSA Leaks and PRISM -- 7.12 Reform Government Surveillance and Reset the Net -- 7.13 Reauthorization of Foreign Intelligence Surveillance Act (FISA) Section 702 -- Bibliography -- Chapter 8: Two-Way Street of Total Information Awareness -- 8.1 It's a Small World, with CCTVs -- 8.2 Facebook Nation: Total Information Awareness -- 8.3 Surveillance Satellites, Tracking Devices, Spyware, and Drones -- 8.4 A Two-Way Street of Total Information Awareness -- 8.5 No Doomsday for the Internet -- 8.6 Web 2.0 for Intelligence Community: Intellipedia, A-Space, Deepnet -- Bibliography -- Part IV: Cybersecurity: History, Strategies, and Technologies -- Chapter 9: Cyber Warfare: Weapon of Mass Disruption -- 9.1 Weapon of Mass Disruption -- 9.2 Financial Disruption -- 9.3 Infrastructure Disruption -- 9.4 Government and Military Disruption -- 9.5 Shodan and the Internet of Things -- 9.6 Backdoors and Counterfeit Parts -- 9.7 Proliferation of Cyber Weapons and Reverse Engineering -- 9.8 Cyber Espionage and Escalation of Cyber Warfare -- 9.9 Cyber Cold War -- 9.10 Psychological Cyber Warfare -- 9.11 Cyberterrorism and Digital Pearl Harbor -- 9.12 Sony-pocalypse: from Cyberattacks to Cyberterrorism.
9.13 The Human Toll of Cyberterrorism -- 9.14 Good, Bad-Internal/External-People Put an End to Business as Usual -- Bibliography -- Chapter 10: Cyberattacks, Prevention, and Countermeasures -- 10.1 FBI and Mother of All Breaches (MOAB) -- 10.2 Cybersecurity Acts -- 10.3 Cybersecurity Initiatives: CNCI, NICE, Presidential Executive Order -- 10.4 National Cyber Security Awareness Month (NCSAM) -- 10.5 Mitigation from Denial of Service (DoS, DDoS, DRDoS) Attacks -- 10.6 Data Breach Prevention -- 10.7 Fighting Back Against Phishing, Spoofing, and Deepfakes -- 10.8 Password Protection and Security Questions -- 10.9 Software Upgrades and Security Patches -- 10.10 Fake Software and Free Downloads -- 10.11 Smartphone Security Protection -- 10.12 Cybersecurity Awareness and Education: Everyone's Responsibility -- Bibliography -- Chapter 11: Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message -- 11.1 Introduction -- 11.2 Healthcare Cyberattacks -- 11.3 Value of Medical Data to Cybercriminals -- 11.4 Major Threats to Medical Data in Clinical Environments -- 11.5 Training Resources -- 11.6 Training Users to Prevent Cyber Breaches -- 11.7 User Communities and Current Training Methods -- 11.8 Types of Training Offered and Training Environment -- 11.9 Innovative Approaches -- 11.10 Conclusion -- Bibliography -- Chapter 12: Plan X and Generation Z -- 12.1 Plan X: Foundational Cyberwarfare -- 12.2 Cyber Battlespace Research and Development -- 12.3 National Centers of Academic Excellence in Cyber Operations -- 12.4 Generation Z, Teen Hackers, and Girl Coders -- 12.5 DEF CON Diversity Panel and IT Girls 2.0 -- 12.6 Control the Code, Control the World -- Bibliography -- Part V: Cybersecurity: Applications and Challenges -- Chapter 13: Artificial Intelligence and Data Mining.
13.1 Artificial Intelligence: From Hollywood to the Real World -- 13.2 Intelligent CCTV Cameras -- 13.3 Data Mining in the Age of Big Data -- 13.4 Knowledge Representation, Acquisition, and Inference -- 13.5 Dynamic Mental Models -- 13.6 Modeling Human Problem Solving -- 13.7 Structural Topology and Behavioral Causality -- 13.8 Component Clustering and Decoupling -- 13.9 Analytical Models and Experiential Knowledge -- 13.10 The DM2 Algorithm -- 13.11 AI Applications in Counterterrorism -- 13.12 Massive Multi-Participant Intelligence Amplification (MMPIA) -- Bibliography -- Chapter 14: Gamification of Penetration Testing -- 14.1 Win, Lose, or Something Else -- 14.2 Short and Long Engagements -- 14.3 A Game Already? -- 14.4 The Future: Continuous Penetration Testing -- Bibliography -- Chapter 15: USB Write Blocking and Forensics -- 15.1 Introduction -- 15.2 Brief History -- 15.3 Hardware -- 15.4 Software -- 15.5 Summary of USB Basics -- 15.6 USB Mass Storage Basics -- 15.7 Making Forensics Images and Duplicates -- 15.8 Blocking USB Writes -- 15.9 USB Impersonation -- 15.10 Leveraging Open Source -- 15.11 BadUSB -- Additional Resources -- Chapter 16: Team DESCARTES and DARPA's Cyber Grand Challenge -- 16.1 Cyber Grand Challenge Kick-Off -- 16.2 Costly Software Bugs -- 16.3 Disastrous Arithmetic Errors -- 16.4 DEF CON Capture the Flag -- 16.5 DESCARTES (Distributed Expert Systems for Cyber Analysis, Reasoning, Testing, Evaluation, and Security) -- 16.6 DESCARTES Overview -- 16.7 DESCARTES Automation Strategy -- 16.8 Static, Dynamic, and Hybrid Analysis for Vulnerability Scanning -- 16.9 Intermediate Representation (IR) -- 16.10 Overview of Open-Source Tools based on LLVM IR -- 16.11 An Algorithm for Autonomous Vulnerability Scanning and Patching of Binaries -- 16.12 Changes and New Features for Clang Static Analyzer.
16.13 Cyber Grand Challenge (CGC) Examples.
Summary: This book offers a sweeping analysis of counterterrorism and cybersecurity in the digital age. Newton Lee draws on historical events, intelligence strategies, and emerging technologies to explore how the U.S. and global actors confront terrorism and cyber threats. Topics include Total Information Awareness, cyber warfare, artificial intelligence, and the role of social media in national security. The third edition integrates recent developments such as Israel’s 9/11, the MOAB data breach, and FBI strategies, making it a vital resource for policymakers, technologists, and security professionals.
List(s) this item appears in: Electronic Books | الكتب الإلكترونية
Holdings
Item type Current library Call number URL Status Date due Barcode Item holds
Online Resource Online Resource UAE Federation Library | مكتبة اتحاد الإمارات Online Copy | نسخة إلكترونية Link to resource Not for loan
Total holds: 0

Intro -- Acknowledgments -- About the Book -- Contents -- About the Author -- Part I: Counterterrorism History: Then and Now -- Chapter 1: From September 11 Attacks to Israel's 9/11 -- 1.1 September 11, 2001 -- 1.2 Disney's Responses to the 9/11 Attacks -- 1.3 FBI Warning of Hollywood as a Terrorist Target -- 1.4 Hollywood Realism on Terrorism -- 1.5 A New Day of Infamy and America at War -- 1.6 September 11, 2012 -- 1.7 U.S. Capitol Attack on January 6, 2021 -- 1.8 Israel's 9/11 and Israel-Hamas War -- 1.9 Cyberterrorism -- Bibliography -- Chapter 2: FBI and U.S. Intelligence Community -- 2.1 Federal Bureau of Investigation (FBI) -- 2.2 "Need to Know" - Truths, Half Truths, and Lies -- 2.3 FBI Ten Most Wanted Fugitive: Osama Bin Laden -- 2.4 An American Hero Born in Lebanon -- 2.5 The FBI-CIA Bureaucratic Rivalries -- 2.6 Operational Failures of the U.S. Intelligence Community -- 2.7 Unity of Counterterrorism Effort Across U.S. Government -- 2.8 Transition from Need-to-Know to Need-to-Share and Need-to-Provide -- 2.9 Informed Interrogation Approach -- 2.10 U.S. Fusion Centers -- 2.11 International "Duty to Warn" Policy (Boston Marathon Bombing, Israel's 9/11, and Crocus City Hall Attack) -- 2.12 International Collaboration on Counterterrorism (Global Counterterrorism Forum CGTF) -- 2.13 January 6 U.S. Capitol Attack and Social Media -- 2.14 Hard Lessons from Pearl Harbor, 9/11, and U.S. Capitol Attack -- Bibliography -- Part II: Counterterrorism Strategies: Causes and Cures, War and Peace -- Chapter 3: Understanding Terrorism -- 3.1 Terrorism as a Disease -- 3.2 "Give a human face to people we consider our enemies" - The Americans -- 3.3 Bravery and Cowardice -- 3.4 Drones Kill Terrorists, Not Terrorism -- 3.5 War on Terror (Overseas Contingency Operation) -- 3.6 A Stubborn Terror (International and Domestic) -- 3.7 Economic Warfare.

3.8 Inside the Minds of Terrorists and Their Sympathizers -- 3.9 Questioning Terrorism and Destroying Stereotypes -- Bibliography -- Chapter 4: Cures for Terrorism -- 4.1 Treating Terrorism as a Disease -- 4.2 "Revenge is Sour" - George Orwell -- 4.3 "Govern your passions or they will be your undoing" - Mr. Spock -- 4.4 "Impossible to carry a grudge and a big dream at the same time" - Unknown -- 4.5 "Every truth has two sides" - Aesop -- 4.6 "Give everyone a voice" - Mark Zuckerberg -- 4.7 "The only security of all is in a free press" - Thomas Jefferson -- 4.8 "Free speech would not protect a man falsely shouting fire" - Oliver Wendell Holmes, Jr. -- 4.9 "198 Methods of Nonviolent Action" - Gene Sharp -- 4.10 "We do not have the right to resort to violence when we don't get our way" - President Bill Clinton -- 4.11 "Peace is the only path to true security" - President Barack Obama -- Bibliography -- Chapter 5: War and Peace -- 5.1 War as State-Sponsored Terrorism -- 5.2 Complacency in War -- 5.3 The Warrior's Code -- 5.4 Existential Risk, Artificial Intelligence, and the Doomsday Clock -- 5.5 Civilians Wanting Peace -- 5.6 Peace Entailing Sacrifice -- 5.7 Attainable Peace -- 5.8 A Just and Lasting Peace -- 5.9 Peace and Friendships on Facebook -- 5.10 One Small Step for an Individual -- One Giant Leap for Humankind -- 5.11 A Recipe for Peace -- Bibliography -- Part III: Counterterrorism Technologies: Total Information Awareness -- Chapter 6: The Rise and Fall of Total Information Awareness -- 6.1 President Ronald Reagan and Admiral John Poindexter -- 6.2 Defense Advanced Research Projects Agency (DARPA) -- 6.3 Information Awareness Office (IAO) -- 6.4 Perception of Privacy Invasion -- 6.5 Privacy Protection in Total Information Awareness (TIA) -- 6.6 Opposing Views on TIA -- 6.7 Demystifying IAO and TIA -- 6.8 Demise of IAO and TIA -- Bibliography.

Chapter 7: Reincarnation of Total Information Awareness and Edward Snowden's NSA Leaks -- 7.1 NSA's Terrorist Surveillance Program -- 7.2 President George W. Bush and NSA Warrantless Wiretapping -- 7.3 Poindexter's Policy Analysis Market -- 7.4 Project Argus: Bio-surveillance Priming System -- 7.5 President Barack Obama's Big Data R&amp -- D Initiative -- 7.6 Palantir Technologies Funded by CIA's In-Q-Tel -- 7.7 Microsoft and NYPD's Domain Awareness System -- 7.8 NSA's Utah Data Center: A 1.5 Billion Data-Mining and Spy Center -- 7.9 Global Surveillance and Abuse of Power -- 7.10 Edward Snowden's NSA Leaks and PRISM -- 7.11 Social Networks' Responses to NSA Leaks and PRISM -- 7.12 Reform Government Surveillance and Reset the Net -- 7.13 Reauthorization of Foreign Intelligence Surveillance Act (FISA) Section 702 -- Bibliography -- Chapter 8: Two-Way Street of Total Information Awareness -- 8.1 It's a Small World, with CCTVs -- 8.2 Facebook Nation: Total Information Awareness -- 8.3 Surveillance Satellites, Tracking Devices, Spyware, and Drones -- 8.4 A Two-Way Street of Total Information Awareness -- 8.5 No Doomsday for the Internet -- 8.6 Web 2.0 for Intelligence Community: Intellipedia, A-Space, Deepnet -- Bibliography -- Part IV: Cybersecurity: History, Strategies, and Technologies -- Chapter 9: Cyber Warfare: Weapon of Mass Disruption -- 9.1 Weapon of Mass Disruption -- 9.2 Financial Disruption -- 9.3 Infrastructure Disruption -- 9.4 Government and Military Disruption -- 9.5 Shodan and the Internet of Things -- 9.6 Backdoors and Counterfeit Parts -- 9.7 Proliferation of Cyber Weapons and Reverse Engineering -- 9.8 Cyber Espionage and Escalation of Cyber Warfare -- 9.9 Cyber Cold War -- 9.10 Psychological Cyber Warfare -- 9.11 Cyberterrorism and Digital Pearl Harbor -- 9.12 Sony-pocalypse: from Cyberattacks to Cyberterrorism.

9.13 The Human Toll of Cyberterrorism -- 9.14 Good, Bad-Internal/External-People Put an End to Business as Usual -- Bibliography -- Chapter 10: Cyberattacks, Prevention, and Countermeasures -- 10.1 FBI and Mother of All Breaches (MOAB) -- 10.2 Cybersecurity Acts -- 10.3 Cybersecurity Initiatives: CNCI, NICE, Presidential Executive Order -- 10.4 National Cyber Security Awareness Month (NCSAM) -- 10.5 Mitigation from Denial of Service (DoS, DDoS, DRDoS) Attacks -- 10.6 Data Breach Prevention -- 10.7 Fighting Back Against Phishing, Spoofing, and Deepfakes -- 10.8 Password Protection and Security Questions -- 10.9 Software Upgrades and Security Patches -- 10.10 Fake Software and Free Downloads -- 10.11 Smartphone Security Protection -- 10.12 Cybersecurity Awareness and Education: Everyone's Responsibility -- Bibliography -- Chapter 11: Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message -- 11.1 Introduction -- 11.2 Healthcare Cyberattacks -- 11.3 Value of Medical Data to Cybercriminals -- 11.4 Major Threats to Medical Data in Clinical Environments -- 11.5 Training Resources -- 11.6 Training Users to Prevent Cyber Breaches -- 11.7 User Communities and Current Training Methods -- 11.8 Types of Training Offered and Training Environment -- 11.9 Innovative Approaches -- 11.10 Conclusion -- Bibliography -- Chapter 12: Plan X and Generation Z -- 12.1 Plan X: Foundational Cyberwarfare -- 12.2 Cyber Battlespace Research and Development -- 12.3 National Centers of Academic Excellence in Cyber Operations -- 12.4 Generation Z, Teen Hackers, and Girl Coders -- 12.5 DEF CON Diversity Panel and IT Girls 2.0 -- 12.6 Control the Code, Control the World -- Bibliography -- Part V: Cybersecurity: Applications and Challenges -- Chapter 13: Artificial Intelligence and Data Mining.

13.1 Artificial Intelligence: From Hollywood to the Real World -- 13.2 Intelligent CCTV Cameras -- 13.3 Data Mining in the Age of Big Data -- 13.4 Knowledge Representation, Acquisition, and Inference -- 13.5 Dynamic Mental Models -- 13.6 Modeling Human Problem Solving -- 13.7 Structural Topology and Behavioral Causality -- 13.8 Component Clustering and Decoupling -- 13.9 Analytical Models and Experiential Knowledge -- 13.10 The DM2 Algorithm -- 13.11 AI Applications in Counterterrorism -- 13.12 Massive Multi-Participant Intelligence Amplification (MMPIA) -- Bibliography -- Chapter 14: Gamification of Penetration Testing -- 14.1 Win, Lose, or Something Else -- 14.2 Short and Long Engagements -- 14.3 A Game Already? -- 14.4 The Future: Continuous Penetration Testing -- Bibliography -- Chapter 15: USB Write Blocking and Forensics -- 15.1 Introduction -- 15.2 Brief History -- 15.3 Hardware -- 15.4 Software -- 15.5 Summary of USB Basics -- 15.6 USB Mass Storage Basics -- 15.7 Making Forensics Images and Duplicates -- 15.8 Blocking USB Writes -- 15.9 USB Impersonation -- 15.10 Leveraging Open Source -- 15.11 BadUSB -- Additional Resources -- Chapter 16: Team DESCARTES and DARPA's Cyber Grand Challenge -- 16.1 Cyber Grand Challenge Kick-Off -- 16.2 Costly Software Bugs -- 16.3 Disastrous Arithmetic Errors -- 16.4 DEF CON Capture the Flag -- 16.5 DESCARTES (Distributed Expert Systems for Cyber Analysis, Reasoning, Testing, Evaluation, and Security) -- 16.6 DESCARTES Overview -- 16.7 DESCARTES Automation Strategy -- 16.8 Static, Dynamic, and Hybrid Analysis for Vulnerability Scanning -- 16.9 Intermediate Representation (IR) -- 16.10 Overview of Open-Source Tools based on LLVM IR -- 16.11 An Algorithm for Autonomous Vulnerability Scanning and Patching of Binaries -- 16.12 Changes and New Features for Clang Static Analyzer.

16.13 Cyber Grand Challenge (CGC) Examples.

This book offers a sweeping analysis of counterterrorism and cybersecurity in the digital age. Newton Lee draws on historical events, intelligence strategies, and emerging technologies to explore how the U.S. and global actors confront terrorism and cyber threats. Topics include Total Information Awareness, cyber warfare, artificial intelligence, and the role of social media in national security. The third edition integrates recent developments such as Israel’s 9/11, the MOAB data breach, and FBI strategies, making it a vital resource for policymakers, technologists, and security professionals.

Description based on publisher supplied metadata and other sources.

Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2025. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries.

Click on an image to view it in the image viewer

Local cover image
Share

Abu Dhabi, United Arab Emirates

reference@ecssr.ae

+97124044780

Copyright © 2025 Emirates Center for Strategic Studies and Research All Rights Reserved