![]() |
![]() |
Your cart is empty |
||
Showing 1 - 4 of 4 matches in All Departments
Growing dependence on cyberspace for commerce, communication, governance, and military operations has left society vulnerable to a multitude of security threats. Mitigating the inherent risks associated with the use of cyberspace poses a series of thorny public policy problems. In this volume, academics, practitioners from both private sector and government, along with former service members come together to highlight sixteen of the most pressing contemporary challenges in cybersecurity, and to offer recommendations for the future. As internet connectivity continues to spread, this book will offer readers greater awareness of the threats of tomorrow-and serve to inform public debate into the next information age. Contributions by Adrienne Allen, Aaron Brantly, Lauren Boas Hayes, Jane Chong, Joshua Corman, Honorable Richard J. Danzig, Kat Dransfield, Ryan Ellis, Mailyn Fidler, Allan Friedman, Taylor Grossman, Richard M. Harrison , Trey Herr, Drew Herrick, Jonah F. Hill, Robert M. Lee, Herbert S. Lin, Anastasia Mark, Robert Morgus, Paul Ohm , Eric Ormes, Jason Rivera, Sasha Romanosky, Paul Rosenzweig , Matthew Russell, Nathaniel Tisa, Abraham Wagner, Rand Waltzman, David Weinstein, Heather West , and Beau Woods. * Learn more at the book's website at http://www.cyberinsecuritybook.org
The terrorist attacks of September 11, 2001, brought together two related but distinct phenomena. First, they presented the calling card of al Qaeda and more generally of militant Islam. These attacks were rightly perceived as an act of war by a group seeking to catalyze a political-religious movement. Much of America's effort since then has been to destroy that group, its sanctuaries, and its affiliates; some of the effort has been to counter the psychological, social, and political appeal of militant (predominantly Wahabi) Islam.
The terrorist attacks of September 11, 2001, brought together two related but distinct phenomena. First, they presented the calling card of al Qaeda and more generally of militant Islam. These attacks were rightly perceived as an act of war by a group seeking to catalyze a political-religious movement. Much of America's effort since then has been to destroy that group, its sanctuaries, and its affiliates; some of the effort has been to counter the psychological, social, and political appeal of militant (predominantly Wahabi) Islam. Second, these attacks introduced the public to a more general phenomenon: our vulnerability to acts of terror on a greater scale than anything America had experienced. It is remarkable that in the turbulent 20th century, which witnessed some 200 million deaths from politically driven violence and war, no single attack on American soil equaled the estimated 3,000 deaths on 9/11. The implications for America are the graver because the capability to inflict carnage at this level-and at much higher levels-is not confined to a group or movement. It lies at hand as an instrument that can be used by any belligerent group (or state, or individual). It will survive the destruction of al Qaeda and the abandonment of jihad. These two strands-jihadi terrorism and our general vulnerability to terror on a large scale-intertwine but are independent. The tendency to confuse them is accentuated when policymakers rhetorically jump from one to the other; the effect resembles one produced by the thaumatrope, a popular 19th-century toy now encountered only as a curiosity. A horse is depicted on one side of a disk or card and a man on the other, or a cage on one side and a bird on the other. When the object is spun quickly, the rider appears on the horse, or the bird in the cage. Our inability to separate images shown us in rapid succession merges the two in our minds. We speak of a "war on terror" (not just on al Qaeda) and have devoted significant resources to controlling and preparing for the consequences of "weapons of mass destruction," but these efforts overwhelmingly focus on the present challenge of jihadi fundamentalism. Our inherent vulnerability to large-scale terrorism is more troubling but less addressed. Our vulnerability to the use of chemical, biological, radiological, nuclear, and other technologies to create terror is a risk. These technologies provide instruments that can be seized upon by any group for use as weapons of terror. So long as grievances exist and those who hold grievances are willing to resort to violence, the use of such weapons will be an enduring risk. The sweep of history suggests that these risks cannot be eradicated. Apart from the dum-dum bullet, we cannot point to examples of effective weapons that have not been used. Once used successfully, weapons tend to proliferate. That proliferation is abetted when the skills that can produce a weapon are closely related to civilian skills and equipment that are themselves proliferating. To cope with our inherent vulnerability to weapons of terror, we must find strategies of risk management.
This paper draws together several years of work in an attempt to suggest the outlines of this thinking about the risk that I regard as most pernicious: biological terrorism. It is written for those who desire a better understanding of this risk and its implications for policymakers. Section I delineates the problem that confronts us. It describes the character and magnitude of the risk of biological terrorism and identifies the factors that differentiate bioterrorism from other modes of terrorism. This section also comments on why biological terrorism has not yet emerged as an important instrument of terror and offers judgments about the likelihood of its manifestation over the next decade. Section II enumerates four factors that have confused, confounded, and constrained the U.S. response to this threat. Section III, the most operational part of this paper, offers my top 10 recommendations for moving ahead.
|
![]() ![]() You may like...
Handbook Of Public Relations
Irma Meyer, Dalien Rene Benecke, …
Paperback
R592
Discovery Miles 5 920
The Bomb - South Africa's Nuclear…
Nic Von Wielligh, Wielligh-Steyn von
Paperback
R679
Discovery Miles 6 790
Solid-state Microwave Power Oscillator…
Eric L. Holzman, Ralston S. Robertson
Hardcover
R4,268
Discovery Miles 42 680
|