A3 Refereed book chapter or chapter in a compilation book
Identifying Terrorists in Cyber Space: Evaluating the Potential Role of Emerging Radical Technologies and Technology Disruption in Terrorism Foresight
Authors: Jari Kaivo-oja
Editors: Theodore J. Gordon, Elizabeth Florescu, Jerome C. Glenn, Yair Sharan
Publication year: 2017
Book title : Identification of Potential Terrorists and Adversary Planning. Emerging Technologies and New Counter-Terror Strategies
Series title: NATO Science for Peace and Security Series - E: Human and Societal Dynamics
Volume: 132
First page : 137
Last page: 153
Number of pages: 17
ISBN: 978-1-61499-747-4
eISBN: 978-1-61499-748-1
ISSN: 1874-6276
DOI: https://doi.org/10.3233/978-1-61499-748-1-137
Web address : http://ebooks.iospress.nl/volume/identification-of-potential-terrorists-and-adversary-planning-emerging-technologies-and-new-counter-terror-strategies
Self-archived copy’s web address: http://ebooks.iospress.nl/volume/identification-of-potential-terrorists-and-adversary-planning-emerging-technologies-and-new-counter-terror-strategies
The presentation focuses on the future challenges of identifying terrorists in cyber space. In the presentation special attention is paid to new available technologies, which help in the identification process. Author notes that disruptive technologies can be double-edged sword, as cyber terrorists can use the new disruptive technologies. Author first presents background theories of terrorist profiling and identification with special attention to geographical, behavioral, and sociological aspects. In the second phase, author evaluates the potential role of emerging radical and disruptive technologies in the identification process of individual terrorists and terrorist groups. Author also presents key systemic aspects of terrorism foresight paying special attention to advanced weak signal analysis and Wild Card methodology. WE-WI-analysis (weak signal-wild card analysis) can be helpful in operational risk identification, risk assessment, and risk mitigation. Author presents various models which are relevant for terrorism foresight.