-
9
-
-
0036461372
-
The Rise of Complex Terrorism
-
January/February
-
Thomas Homer-Dixon, "The Rise of Complex Terrorism," Foreign Policy (January/February 2002), p. 56.
-
(2002)
Foreign Policy
, pp. 56
-
-
Homer-Dixon, T.1
-
11
-
-
27944485748
-
-
note
-
Where is this not the case, as in many developing countries, massive and spectacular building failure is not uncommon.
-
-
-
-
12
-
-
27944436173
-
-
note
-
Ibid.
-
-
-
-
13
-
-
27944439331
-
-
Institute for Security Technology Studies, Dartmouth University, December
-
See "Cyber Security of the Electric Power Industry," Institute for Security Technology Studies, Dartmouth University, December 2002. Available at (http://www.ists.dartmouth.edu/ISTS/ ists_docs/cselectric.pdf) and
-
(2002)
Cyber Security of the Electric Power Industry
-
-
-
17
-
-
27944457997
-
-
Institute for Security Technology Studies, Dartmouth University
-
For a discussion of such problems see "Cyberterrorism: Regional and Local Response, A Virtual Socratic Dialogue," Institute for Security Technology Studies, Dartmouth University, available at (http://www.ists. dartmouth.edu/IML/cyberterrorism/).
-
Cyberterrorism: Regional and Local Response, a Virtual Socratic Dialogue
-
-
-
19
-
-
27944500710
-
-
Rand Documented Briefing Prepared for the Virginia State Crime Commission
-
John D. Woodward, Jr., Christopher Horn, Julius Gatune, and Aryn Thomas, "Biometrics: A Look at Facial Recognition," Rand Documented Briefing Prepared for the Virginia State Crime Commission, 2003, 1. Available at (http://www.rand.org/publications/DB/DB396/DB396.pdf).
-
(2003)
Biometrics: a Look at Facial Recognition
, pp. 1
-
-
Woodward Jr., J.D.1
Horn, C.2
Gatune, J.3
Thomas, A.4
-
20
-
-
27944481315
-
Gaps Seen in 'Virtual Border' Security System, New York Times, 31 May 2004, and "Prepare to be Scanned
-
See the website of the US-VISIT program at 4 December
-
See the website of the US-VISIT program at (http://www.dhs.gov/us-visit); also John Markoff and Eric Lichtblau, "Gaps Seen in 'Virtual Border' Security System, New York Times, 31 May 2004, and "Prepare to be Scanned," The Economist, 4 December 2003.
-
(2003)
The Economist
-
-
Markoff, J.1
Lichtblau, E.2
-
21
-
-
27944469572
-
US Moving with Switch to 'Biometric' Passports
-
15 May
-
Frank James, "US Moving with Switch to 'Biometric' Passports," Chicago Tribune, 15 May 2004.
-
(2004)
Chicago Tribune
-
-
James, F.1
-
27
-
-
27944470989
-
Technology Strains to Find Menace in the Crowd
-
31 May
-
See Barnaby Feder, "Technology Strains to Find Menace in the Crowd," New York Times, 31 May 2004;
-
(2004)
New York Times
-
-
Feder, B.1
-
28
-
-
0035924712
-
Friend or Foe? Face Recognition Goes to War
-
20 December
-
Warren Webb, "Friend or Foe? Face Recognition Goes to War," EDN, 20 December 2001.
-
(2001)
EDN
-
-
Webb, W.1
-
31
-
-
84868475540
-
Keeping terror out: Immigration policy and asymmetric warfare
-
Spring
-
Cited in Mark Krikorian, "Keeping Terror Out: Immigration Policy and Asymmetric Warfare," The National Interest (Spring 2004), p. 78.
-
(2004)
The National Interest
, pp. 78
-
-
Krikorian, M.1
-
35
-
-
27944496431
-
Is your security system accurate?
-
See 10 May
-
See Robert Dunn, "Is Your Security System Accurate?" Security Magazine, 10 May 2004. Available at (http://www.securitymagazine.com/CDA/ ArticleInformation/features/BNP_ Features_Item/0,5411,123071,00.html).
-
(2004)
Security Magazine
-
-
Dunn, R.1
-
36
-
-
27944473969
-
-
See New York: Random House
-
One such advocate is Larry Ellison of the software company Oracle, who sees his firm as a potential vendor to any such system. See Jeffrey Rosen, The Naked Crowd: Reclaiming Security and Freedom in an Anxious Age (New York: Random House, 2004), pp. 107-129.
-
(2004)
The Naked Crowd: Reclaiming Security and Freedom in An Anxious Age
, pp. 107-129
-
-
Rosen, J.1
-
38
-
-
27944433847
-
Al Qaeda may be stealing your ID
-
26 August
-
For a discussion see Sheila R. Cherry, "Al Qaeda May Be Stealing Your ID," Insight on the News, 26 August 2002.
-
(2002)
Insight on the News
-
-
Cherry, S.R.1
-
41
-
-
27944465333
-
-
see
-
Bruce Schneier is one of these skeptics; see Beyond Fear, p. 237;
-
Beyond Fear
, pp. 237
-
-
-
42
-
-
27944509606
-
-
see also the work of George Smith, found, among other places, at National Security Notes, available at (http://www.soci.niu.edu/ ~crypt/) and (http://vmyths.com/).
-
National Security Notes
-
-
Smith, G.1
-
43
-
-
85015108003
-
Analytic models and policy prescription: Understanding recent innovation in US counterterrorism
-
This is discussed in Richard Falkenrath, "Analytic Models and Policy Prescription: Understanding Recent Innovation in US Counterterrorism," Studies in Conflict and Terrorism 24 (2001), pp. 167-168.
-
(2001)
Studies in Conflict and Terrorism
, vol.24
, pp. 167-168
-
-
Falkenrath, R.1
-
45
-
-
0008783791
-
Cyber attacks during the war on terrorism: A predictive analysis
-
22 September
-
Michael Vatis, "Cyber Attacks During The War on Terrorism: A Predictive Analysis," Institute for Security Technology Studies Report, 22 September 2001, available at (http://www.ists.dartmouth.edu/ISTS/ counterterrorism/ cyber_attacks.htm).
-
(2001)
Institute for Security Technology Studies Report
-
-
Vatis, M.1
-
46
-
-
27944458859
-
-
See note 30
-
See note 30.
-
-
-
-
49
-
-
0040374704
-
-
Falkenrath, "Analytic Models and Policy Prescription," p. 171. Falkenrath argues that the notion of this risk being largely perceptual is in a way misleading, for the long-term effect of dread can undermine the fabric of a society and its democratic institutions.
-
Analytic Models and Policy Prescription
, pp. 171
-
-
Falkenrath1
-
51
-
-
0027769403
-
Perceived risk, trust, and democracy
-
Paul Slovic, "Perceived Risk, Trust, and Democracy," Risk Analysis 13(6) (1993), pp. 675-681.
-
(1993)
Risk Analysis
, vol.13
, Issue.6
, pp. 675-681
-
-
Slovic, P.1
-
57
-
-
0003609864
-
-
Boston: Harvard Business School Press, This entire work is an excellent study of the digital technopositivism and what the authors see as some of the pitfalls of this view.
-
John Seely Brown and Paul Duguid, The Social Life of Information (Boston: Harvard Business School Press, 2000), p. 19. This entire work is an excellent study of the digital technopositivism and what the authors see as some of the pitfalls of this view.
-
(2000)
The Social Life of Information
, pp. 19
-
-
Brown, J.S.1
Duguid, P.2
-
60
-
-
27944482965
-
Biometrics
-
January/February The editors of this issue list biometrics as one of ten technologies that will "change the world."
-
Alexandra Stikeman, "Biometrics," Technology Review (January/February 2001), pp. 106-107. The editors of this issue list biometrics as one of ten technologies that will "change the world."
-
(2001)
Technology Review
, pp. 106-107
-
-
Stikeman, A.1
-
61
-
-
0035851501
-
IATA advocates biometrics security
-
12 November
-
For one example of this conflation, the director of the International Air Transport Association spoke of 11 September 2001 as an intelligence failure, which could be resolved through biometric identification. Pierre Sparaco, "IATA Advocates Biometrics Security," Aviation Week and Space Technology, 12 November 2001, p. 50.
-
(2001)
Aviation Week and Space Technology
, pp. 50
-
-
Sparaco, P.1
-
62
-
-
27944432141
-
Too flaky to trust
-
4 December
-
"Too Flaky to Trust," The Economist, 4 December 2003.
-
(2003)
The Economist
-
-
-
63
-
-
27944473658
-
You'll love those national ID cards
-
14 January
-
Amitai Etzioni, "You'll Love Those National ID Cards," Christian Science Monitor, 14 January 2002, p. 11.
-
(2002)
Christian Science Monitor
, pp. 11
-
-
Etzioni, A.1
-
64
-
-
33751348141
-
A garbage can model of organizational choice
-
March
-
Michael Cohen, James March, and Johan Olsen, "A Garbage Can Model of Organizational Choice," Administration Studies Quarterly 17 (March 1972), p. 2.
-
(1972)
Administration Studies Quarterly
, vol.17
, pp. 2
-
-
Cohen, M.1
March, J.2
Olsen, J.3
-
65
-
-
27944434926
-
Biometrics; The measure of man
-
7 September
-
For these claims see Stikeman, "Biometrics"; "The Measure of Man," The Economist, 7 September 2000;
-
(2000)
The Economist
-
-
Stikeman1
-
66
-
-
26044468491
-
And now, the good side of facial recognition
-
4 February
-
John D. Woodward, "And Now, The Good Side of Facial Recognition," Washington Post, 4 February 2001, reprinted on the Rand website at (http://www.rand.org/commentary/020401WP.html).
-
(2001)
Washington Post
-
-
Woodward, J.D.1
-
69
-
-
27944477777
-
Security blanket message: Firms capitalize on Americans' fears
-
16 September
-
Jim Krande, "Security Blanket Message: Firms Capitalize on Americans' Fears," Marketing News, 16 September 2002.
-
(2002)
Marketing News
-
-
Krande, J.1
-
70
-
-
27944448860
-
Shared risk, shared rewards
-
see 1 September
-
See, for example, the testimony by Joseph Atick, head of the biometric identification company Visionics before the Senate Committee on Terrorism, 14 November 2001. Federal Document dealing House. For a discussion of the financial dynamics of homeland security and counterterrorism technology, see Seth Grimes, "Shared Risk, Shared Rewards," Intelligent Enterprise, 1 September 2003.
-
(2003)
Intelligent Enterprise
-
-
Grimes, S.1
-
72
-
-
27944468699
-
Don't let them hurt our children
-
1 March
-
"Don't Let Them Hurt Our Children," Access Control and Security Systems, 1 March 2003. Similar arguments have been made in the United Kingdom regarding their national ID card; see
-
(2003)
Access Control and Security Systems
-
-
-
73
-
-
27944491249
-
ID cards 'will protect youngsters from paedophiles
-
24 April
-
James Lyons, "ID Cards 'Will Protect Youngsters from Paedophiles," The Scotsman, 24 April 2004.
-
(2004)
The Scotsman
-
-
Lyons, J.1
-
74
-
-
27944507768
-
-
Prepare To Be Scanned
-
"Prepare To Be Scanned."
-
-
-
-
75
-
-
27944463151
-
-
See Note 31
-
See Note 31.
-
-
-
-
80
-
-
27944503418
-
Complexity, trust, and terror
-
see 22 October
-
For example, see Langdon Winner, "Complexity, Trust, and Terror," Netfuture no. 137 (22 October 2002), available at (http://www.netfuture.org/2002/Oct2202_137.html).
-
(2002)
Netfuture
, Issue.137
-
-
Winner, L.1
-
81
-
-
27944490831
-
-
Prepare to be Scanned
-
"Prepare to be Scanned."
-
-
-
-
83
-
-
4544366486
-
The problem of redundancy problem: Why more nuclear security forces may produce less nuclear security
-
Scott Sagan, "The Problem of Redundancy Problem: Why More Nuclear Security Forces May Produce Less Nuclear Security," Risk Analysis 24(4) (2004), pp. 935-946.
-
(2004)
Risk Analysis
, vol.24
, Issue.4
, pp. 935-946
-
-
Sagan, S.1
|