Scientists with little or no background in security and security professionals with little or no background in science and technology often have difficulty communicating in order to implement the best counterterrorism strategies. The Science and Technology of Counterterrorism offers the necessary theoretical foundation to address real-world terrorism scenarios, effectively bridging the gap. It provides a powerful security assessment methodology, coupled with counterterrorism strategies that are applicable to all terrorism attack vectors. These include biological, chemical, radiological, electromagnetic, explosive, and electronic or cyber attacks. In addition to rigorous estimates of threat vulnerabilities and the effectiveness of risk mitigation, it provides meaningful terrorism risk metrics.
The Science and Technology of Counterterrorism teaches the reader how to think about terrorism risk, and evaluates terrorism scenarios and counterterrorism technologies with sophistication punctuated by humor. Both students and security professionals will significantly benefit from the risk assessment methodologies and guidance on appropriate counterterrorism measures contained within this book.
- Offers a simple but effective analytic framework to assess counterterrorism risk and realistic measures to address threats
- Provides the essential scientific principles and tools required for this analysis
- Explores the increasingly important relationship between physical and electronic risk in meaningful technical detail
- Evaluates technical security systems to illustrate specific risks using concrete examples
Please Note: This is an On Demand product, delivery may take up to 11 working days after payment has been received.
Section I-Modeling Terrorism Risk 1: Terrorism Threats, Risk and Counterterrorism Strategies 2: Terrorism Scenario Analysis 3: Terrorism and Uncertainty 4: Physical Models of Terrorism Threats 5: Measuring Terrorism Risk Section II-Analyzing Terrorism Threats 6: Conventional Explosive Threats 7: Radiological, Biological, Chemical, and Electromagnetic Weapons 8: Electronic Terrorism Threats 9: Electronic Security Meets Physical Security Section III-Counterterrorism Controls 10: Affiliation, Authentication and Authorization 11: Closed Circuit Television (CCTV) 12: Physical Access Restriction and Security Incident Monitoring/Detection Appendices: 1-Linearity, Non-linearity, and Scaling 2-Exponents, Logarithms and Measuring Sensitivity to Change; 3- The Exponential Function, ex 4-Parameters for Anti-Explosive Window Treatments 5-Half-Life 6-High-Level Counterterrorism Technical Strategies 7-RFID Effects on Credit Cards in Close Proximity
Carl S. Young is a recognized subject matter expert in information and physical security risk management. He is currently a Managing Director and the Chief Security Officer at Stroz Friedberg, an international security risk consulting firm. He is the former Global Head of Physical Security Technology at Goldman Sachs as well as a former Senior Executive and Supervisory Special Agent at the FBI. He was also a consultant to the JASON Defense Advisory Group. Mr. Young is the author of Metrics and Methods for Security Risk Management (Syngress, 2010), and The Science and Technology of Counterterrorism (Butterworth-Heinemann, 2014) as well as numerous journal publications. In 1997 he was awarded the President's Foreign Intelligence Advisory Board (PFIAB) James R. Killian Award by the White House for significant individual contributions to U.S. national security. Mr. Young received undergraduate and graduate degrees in mathematics and physics from the Massachusetts Institute of Technology.