Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Counterterrorism and cybersecurity : total information awareness (2nd ed.)
Lee N., Springer Publishing Company, Incorporated, New York, NY, 2015. 489 pp. Type: Book (978-3-319172-43-9)
Date Reviewed: Oct 12 2015

Bentham’s panopticon [1] has often been evoked, in recent times, in relation to findings of government-sponsored mass surveillance initiatives. Large quantities of sensitive documents leaked to the press have shown how progress in computing and networking was applied by intelligence agencies in innovative, focused, and scalable ways, to sustain counterterrorism efforts on a global scale, raising, at the same time, concerns on the privacy implications and on the soundness of the underlying legal frameworks.

The second edition of this book, written by Newton Lee, editor-in-chief of ACM Computers in Entertainment, presents a comprehensive account of past and current initiatives in the field of total information awareness, examining history, strategies, and technologies with a thought-provoking approach that will appeal to both technical and nontechnical readers.

The first three parts of the book are used to provide historical perspective (“Counterterrorism History: Then and Now”), summarize strategies (“Counterterrorism Strategies: Causes and Cures, War and Peace”), and to give an introduction to technologies in the field of counterterrorism (“Counterterrorism Technologies: Total Information Awareness”). The other two parts discuss cyberwarfare fundamentals, together with techniques for attack prevention and response. Sociological aspects are presented, such as the role of cybersecurity training in higher education, as well as options to engage with “Generation Z” students (those born after 2000) as a precursor to recruitment with government service. Applications of artificial intelligence and gamification are also introduced, and references are provided to the Defense Advanced Research Projects Agency (DARPA) Cyber Grand Challenge (2014-2016), “to build high-performance computers that can play Capture the Flag (CTF), a computer security competition format pioneered and refined by the hacker community over the past two decades.”

This is a very rich, accurate, and well-documented book, full of references to press sources, which can help in getting a sense of how many initiatives, concerns, and approaches exist in the field of counterterrorism and cybersecurity. At the same time, the numerous examples quoted in the text challenge the effectiveness and the cost of the approaches discussed, both in financial terms and terms of impact on individual privacy.

This contribution should be seen as a useful reference within the debate on ethics and appropriateness of mass surveillance initiatives that is still unfolding, and is likely to continue for years to come, while technological progress continues to provide the tools to realize the visions conceived by thinkers and writers of our past.

More reviews about this item: Amazon, Goodreads

Reviewer:  Alessandro Berni Review #: CR143845 (1512-1042)
1) https://www.ucl.ac.uk/Bentham-Project/who/panopticon (09/19/2015).
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy