The Science and Technology of Counterterrorism book cover

The Science and Technology of Counterterrorism

Measuring Physical and Electronic Security Risk

Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics.

The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book.

Audience

Security and counterterrorism practitioners; engineers and scientists in terrorism-related fields; students of security or security technologies

Paperback, 512 Pages

Published: March 2014

Imprint: Butterworth Heinemann

ISBN: 978-0-12-420056-2

Contents

  • Section I-Modeling Terrorism Risk
    1: Terrorism Threats, Risk and Counterterrorism Strategies
    2: Terrorism Scenario Analysis
    3: Terrorism and Uncertainty
    4: Physical Models of Terrorism Threats
    5: Measuring Terrorism Risk
    Section II-Analyzing Terrorism Threats
    6: Conventional Explosive Threats
    7: Radiological, Biological, Chemical, and Electromagnetic Weapons
    8: Electronic Terrorism Threats
    9: Electronic Security Meets
    Physical Security
    Section III-Counterterrorism Controls
    10: Affiliation, Authentication and Authorization
    11: Closed Circuit Television (CCTV)
    12: Physical Access Restriction and Security Incident Monitoring/Detection
    Appendices:
    1-Linearity, Non-linearity, and Scaling
    2-Exponents, Logarithms and Measuring Sensitivity to Change;
    3- The Exponential Function, ex
    4-Parameters for Anti-Explosive Window Treatments
    5-Half-Life
    6-High-Level Counterterrorism Technical Strategies
    7-RFID Effects on Credit Cards in Close Proximity

Advertisement

advert image