Telephone Terrorism


Book Description

Nearly thirty years ago, an angry senator cursed the wave of automated telemarketing that was invading homes from coast to coast. "Computerized calls are the scourge of modern civilization," he declared. "It is telephone terrorism, and it has got to stop." Congress responded by passing the Telephone Consumer Protection Act. Americans were now able to sue the annoying robocallers, and they rejoiced. Soon, however, junk debt collectors and questionable charities found loopholes in the new law. Next came an onslaught of unstoppable scams that clogged the phone lines beyond belief. Meanwhile, some people were profiteering from confusion over the rules, sometimes at the expense of legitimate businesses. With stinging humor, this book tells how the fight against robocalls went awry. Crazy court cases, devious schemes, and outrageous behavior combine to make an epic story of greed and governmental incompetence. "Telephone Terrorism" is recommended for anyone who has been harassed over the phone by a clueless collection agency or persistent telemarketer, or who simply wants to know more about an unusual law that impacts their life.




Crimes Committed by Terrorist Groups


Book Description

This is a print on demand edition of a hard to find publication. Examines terrorists¿ involvement in a variety of crimes ranging from motor vehicle violations, immigration fraud, and mfg. illegal firearms to counterfeiting, armed bank robbery, and smuggling weapons of mass destruction. There are 3 parts: (1) Compares the criminality of internat. jihad groups with domestic right-wing groups. (2) Six case studies of crimes includes trial transcripts, official reports, previous scholarship, and interviews with law enforce. officials and former terrorists are used to explore skills that made crimes possible; or events and lack of skill that the prevented crimes. Includes brief bio. of the terrorists along with descriptions of their org., strategies, and plots. (3) Analysis of the themes in closing arguments of the transcripts in Part 2. Illus.




Preparing for the Psychological Consequences of Terrorism


Book Description

The Oklahoma City bombing, intentional crashing of airliners on September 11, 2001, and anthrax attacks in the fall of 2001 have made Americans acutely aware of the impacts of terrorism. These events and continued threats of terrorism have raised questions about the impact on the psychological health of the nation and how well the public health infrastructure is able to meet the psychological needs that will likely result. Preparing for the Psychological Consequences of Terrorism highlights some of the critical issues in responding to the psychological needs that result from terrorism and provides possible options for intervention. The committee offers an example for a public health strategy that may serve as a base from which plans to prevent and respond to the psychological consequences of a variety of terrorism events can be formulated. The report includes recommendations for the training and education of service providers, ensuring appropriate guidelines for the protection of service providers, and developing public health surveillance for preevent, event, and postevent factors related to psychological consequences.




Women and Terrorism


Book Description

Extremist groups rely upon women to gain strategic advantage, recruiting them as facilitators and martyrs while also benefiting from their subjugation. Yet U.S. policymakers overlook the roles that women play in violent extremism--including as perpetrators, mitigators, and victims--and rarely enlist their participation in efforts to combat radicalization. This omission puts the United States at a disadvantage in its efforts to prevent terrorism globally and within its borders. Women fuel extremists' continued influence by advancing their ideology online and by indoctrinating their families. New technology allows for more sophisticated outreach, directly targeting messages to radicalize and recruit women. It also provides a platform on which female extremists thrive by expanding their recruitment reach and taking on greater operational roles in the virtual sphere. The failure of counterterrorist efforts to understand the ways in which women radicalize, support, and perpetrate violence cedes the benefit of their involvement to extremist groups. Omitting women from terrorism prevention efforts also forfeits their potential contributions as mitigators of extremism. Women are well positioned to detect early signs of radicalization, because fundamentalists often target women's rights first. As security officials, women provide insights and information that can be mission critical in keeping the peace. And because of their distinctive access and influence, women are crucial antiterrorism messengers in schools, religious institutions, social environments, and local government. Overlooking the contributions women can make to prevent extremism renders the United States less secure. Many extremist groups promote an ideology that classifies women as second-class citizens and offers strategic and financial benefits through women's subjugation. Boko Haram, the Islamic State, al-Qaeda, al-Shabab, and other groups use sexual violence to terrorize populations into compliance, displace civilians from strategic areas, enforce unit cohesion among fighters, and even generate revenue through trafficking. Suppressing women's rights also allows extremists to control reproduction and harness female labor. U.S. government policy and programs continue to underestimate the important roles women can play as perpetrators, mitigators, or targets of violent extremism. The Donald J. Trump administration should take steps to help the United States and its allies respond effectively to the security threat posed by violent extremism and advance U.S. peace and stability.




Protecting Individual Privacy in the Struggle Against Terrorists


Book Description

All U.S. agencies with counterterrorism programs that collect or "mine" personal data-such as phone records or Web sites visited-should be required to evaluate the programs' effectiveness, lawfulness, and impacts on privacy. A framework is offered that agencies can use to evaluate such information-based programs, both classified and unclassified. The book urges Congress to re-examine existing privacy law to assess how privacy can be protected in current and future programs and recommends that any individuals harmed by violations of privacy be given a meaningful form of redress. Two specific technologies are examined: data mining and behavioral surveillance. Regarding data mining, the book concludes that although these methods have been useful in the private sector for spotting consumer fraud, they are less helpful for counterterrorism because so little is known about what patterns indicate terrorist activity. Regarding behavioral surveillance in a counterterrorist context, the book concludes that although research and development on certain aspects of this topic are warranted, there is no scientific consensus on whether these techniques are ready for operational use at all in counterterrorism.




Digital Privacy, Terrorism and Law Enforcement


Book Description

This book examines the UK’s response to terrorist communication. Its principle question asks, has individual privacy and collective security been successfully managed and balanced? The author begins by assessing several technologically-based problems facing British law enforcement agencies, including use of the Internet; the existence of ‘darknet’; untraceable Internet telephone calls and messages; smart encrypted device direct messaging applications; and commercially available encryption software. These problems are then related to the traceability and typecasting of potential terrorists, showing that law enforcement agencies are searching for needles in the ever-expanding haystacks. To this end, the book examines the bulk powers of digital surveillance introduced by the Investigatory Powers Act 2016. The book then moves on to assess whether these new powers and the new legislative safeguards introduced are compatible with international human rights standards. The author creates a ‘digital rights criterion’ from which to challenge the bulk surveillance powers against human rights norms. Lord Carlile of Berriew CBE QC in recommending this book notes this particular legal advancement, commenting that rightly so the author concludes the UK has fairly balanced individual privacy with collective security. The book further analyses the potential impact on intelligence exchange between the EU and the UK, following Brexit. Using the US as a case study, the book shows that UK laws must remain within the ambit of EU law and the Court of Justice of the European Union's (CJEU's) jurisprudence, to maintain the effectiveness of the exchange. It addresses the topics with regard to terrorism and counterterrorism methods and will be of interest to researchers, academics, professionals, and students researching counterterrorism and digital electronic communications, international human rights, data protection, and international intelligence exchange.




The Telephone Book


Book Description

The telephone marks the place of an absence. Affiliated with discontinuity, alarm, and silence, it raises fundamental questions about the constitution of self and other, the stability of location, systems of transfer, and the destination of speech. Profoundly changing our concept of long-distance, it is constantly transmitting effects of real and evocative power. To the extent that it always relates us to the absent other, the telephone, and the massive switchboard attending it, plugs into a hermeneutics of mourning. The Telephone Book, itself organized by a "telephonic logic," fields calls from philosophy, history, literature, and psychoanalysis. It installs a switchboard that hooks up diverse types of knowledge while rerouting and jamming the codes of the disciplines in daring ways. Avital Ronell has done nothing less than consider the impact of the telephone on modern thought. Her highly original, multifaceted inquiry into the nature of communication in a technological age will excite everyone who listens in. The book begins by calling close attention to the importance of the telephone in Nazi organization and propaganda, with special regard to the philosophy of Martin Heidegger. In the Third Reich the telephone became a weapon, a means of state surveillance, "an open accomplice to lies." Heidegger, in Being and Time and elsewhere, elaborates on the significance of "the call." In a tour de force response, Ronell mobilizes the history and terminology of the telephone to explicate his difficult philosophy. Ronell also speaks of the appearance of the telephone in the literary works of Duras, Joyce, Kafka, Rilke, and Strindberg. She examines its role in psychoanalysis—Freud said that the unconscious is structured like a telephone, and Jung and R. D. Laing saw it as a powerful new body part. She traces its historical development from Bell's famous first call: "Watson, come here!" Thomas A. Watson, his assistant, who used to communicate with spirits, was eager to get the telephone to talk, and thus to link technology with phantoms and phantasms. In many ways a meditation on the technologically constituted state, The Telephone Book opens a new field, becoming the first political deconstruction of technology, state terrorism, and schizophrenia. And it offers a fresh reading of the American and European addiction to technology in which the telephone emerges as the crucial figure of this age.




Terrorism and the Electric Power Delivery System


Book Description

The electric power delivery system that carries electricity from large central generators to customers could be severely damaged by a small number of well-informed attackers. The system is inherently vulnerable because transmission lines may span hundreds of miles, and many key facilities are unguarded. This vulnerability is exacerbated by the fact that the power grid, most of which was originally designed to meet the needs of individual vertically integrated utilities, is being used to move power between regions to support the needs of competitive markets for power generation. Primarily because of ambiguities introduced as a result of recent restricting the of the industry and cost pressures from consumers and regulators, investment to strengthen and upgrade the grid has lagged, with the result that many parts of the bulk high-voltage system are heavily stressed. Electric systems are not designed to withstand or quickly recover from damage inflicted simultaneously on multiple components. Such an attack could be carried out by knowledgeable attackers with little risk of detection or interdiction. Further well-planned and coordinated attacks by terrorists could leave the electric power system in a large region of the country at least partially disabled for a very long time. Although there are many examples of terrorist and military attacks on power systems elsewhere in the world, at the time of this study international terrorists have shown limited interest in attacking the U.S. power grid. However, that should not be a basis for complacency. Because all parts of the economy, as well as human health and welfare, depend on electricity, the results could be devastating. Terrorism and the Electric Power Delivery System focuses on measures that could make the power delivery system less vulnerable to attacks, restore power faster after an attack, and make critical services less vulnerable while the delivery of conventional electric power has been disrupted.




The Terror Factory


Book Description

A groundbreaking work of investigative journalism, The Terror Factory shows how the FBI has - under the guise of engaging in counterterrorism since 9/11 - built a network of informants whose primary purpose is to infiltrate Muslim communities to create phony terrorist plots so the bureau can claim victory in the War on Terror. Now Aaronson reveals in detail how the FBI transformed from a reactive law enforcement agency into a proactive counterterrorism unit, and how so-called terror consultants have made fortunes by exaggerating the threat of Islamic terror in the US.




Why Terrorism Works


Book Description

One of America's most distinguished defenders of civil liberties presents measures that will prevent terrorism and still uphold our democratic values The greatest danger facing the world today, says Alan M. Dershowitz, comes from religiously inspired, state sponsored terrorist groups that seek to develop weapons of mass destruction for use against civilian targets. In his newest book, Dershowitz argues passionately and persuasively that global terrorism is a phenomenon largely of our own making and that we must and can take steps to reduce the frequency and severity of terrorist acts. Analyzing recent acts of terrorism and our reaction to them, Dershowitz explains that terrorism is successful when the international community gives in to the demands of terrorists--or even tries to understand and eliminate the "root causes" of terrorism. He discusses extreme approaches to wiping out international terrorism that would work if we were not constrained by legal, moral, and humanitarian considerations. And then, given that we do operate under such constraints, he offers a series of proposals that would effectively reduce the frequency and severity of international terrorism by striking a balance between security and liberty.