Counterterrorism and Open Source Intelligence

Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a...

Full description

Bibliographic Details
Other Authors: Wiil, Uffe (Editor)
Format: eBook
Language:English
Published: Vienna Springer Vienna 2011, 2011
Edition:1st ed. 2011
Series:Lecture Notes in Social Networks
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 01765nmm a2200313 u 4500
001 EB000392047
003 EBX01000000000000000245100
005 00000000000000.0
007 cr|||||||||||||||||||||
008 130626 ||| eng
020 |a 9783709103883 
100 1 |a Wiil, Uffe  |e [editor] 
245 0 0 |a Counterterrorism and Open Source Intelligence  |h Elektronische Ressource  |c edited by Uffe Wiil 
250 |a 1st ed. 2011 
260 |a Vienna  |b Springer Vienna  |c 2011, 2011 
300 |a XVIII, 458 p. 182 illus  |b online resource 
653 |a Complex Systems 
653 |a System theory 
653 |a Data protection 
653 |a Mathematical physics 
653 |a Data and Information Security 
653 |a Theoretical, Mathematical and Computational Physics 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Lecture Notes in Social Networks 
028 5 0 |a 10.1007/978-3-7091-0388-3 
856 4 0 |u https://doi.org/10.1007/978-3-7091-0388-3?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.8 
520 |a Since the 9/11 terrorist attacks in the United States, serious concerns were raised on domestic and international security issues. Consequently, there has been considerable interest recently in technological strategies and resources to counter acts of terrorism. In this context, this book provides a state-of-the-art survey of the most recent advances in the field of counterterrorism and open source intelligence, demonstrating how various existing as well as novel tools and techniques can be applied in combating covert terrorist networks. A particular focus will be on future challenges of open source intelligence and perspectives on how to effectively operate in order to prevent terrorist activities