You are previewing Developing Next-Generation Countermeasures for Homeland Security Threat Prevention.
O'Reilly logo
Developing Next-Generation Countermeasures for Homeland Security Threat Prevention

Book Description

In the modern world, natural disasters are becoming more commonplace, unmanned systems are becoming the norm, and terrorism and espionage are increasingly taking place online. All of these threats have made it necessary for governments and organizations to steel themselves against these threats in innovative ways. Developing Next-Generation Countermeasures for Homeland Security Threat Prevention provides relevant theoretical frameworks and empirical research outlining potential threats while exploring their appropriate countermeasures. This relevant publication takes a broad perspective, from network security, surveillance, reconnaissance, and physical security, all topics are considered with equal weight. Ideal for policy makers, IT professionals, engineers, NGO operators, and graduate students, this book provides an in-depth look into the threats facing modern society and the methods to avoid them.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Book Series
    1. Mission
    2. Coverage
  5. Editorial Advisory Board
  6. Foreword
  7. Preface
  8. Acknowledgment
  9. Chapter 1: Types of Terrorism
    1. ABSTRACT
    2. INTRODUCTION
    3. THE NEW TERRORISM
    4. THE MORALITY OF ASYMMETRICAL WARFARE
    5. STATE TERRORISM
    6. DISSIDENT TERRORISM
    7. RELIGIOUS TERRORISM
    8. IDEOLOGICAL TERRORISM
    9. INTERNATIONAL TERRORISM
    10. CRIMINAL DISSIDENT TERRORISM
    11. GENDER-SELECTIVE TERRORISM
    12. CONCLUSION
    13. REFERENCES
  10. Chapter 2: Protection of Critical Homeland Assets
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. RISK MANAGEMENT: IN CONTEXT
    5. HOW TO ASSESS VULNERABILITIES
    6. PHYSICAL AND OPERATIONAL CHARACTERISTICS
    7. SECURITY DATA DEVELOPMENT
    8. RISK MATRIX
    9. CRITICALITY OF THE ASSETS
    10. HOW CAN WE PROTECT THE INFRASTRUCTURE USING PROACTIVE MEASURES?
    11. FUTURE RESEARCH DIRECTIONS
    12. CONCLUSION
    13. REFERENCES
  11. Chapter 3: Assessing the Interactions between Native American Tribes and the U.S. Government in Homeland Security and Emergency Management Policy
    1. ABSTRACT
    2. BACKGROUND
    3. SETTING THE STAGE
    4. CASE DESCRIPTION
    5. CONCEPTUAL FRAMEWORK
    6. METHODS
    7. RESULTS
    8. DISCUSSION
    9. SOLUTIONS AND RECOMMENDATIONS
    10. CURRENT CHALLENGES
    11. CONCLUSION
    12. REFERENCES
    13. KEY TERMS AND DEFINITIONS
  12. Chapter 4: Transnational Crime and the American Policing System
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. EXAMINING TRANSNATIONAL CRIME
    5. POLICE EFFECTIVENESS AND POLICING STRATEGIES
    6. POLICING STRATEGIES WITH RESPECT TO TRANSNATIONAL CRIME: WHAT WOULD WORK?
    7. SOLUTIONS AND RECOMMENDATIONS
    8. FUTURE RESEARCH
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  13. Chapter 5: Islamic Extremists in Africa
    1. ABSTRACT
    2. INTRODUCTION
    3. ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT
    4. AFRICAN UNION
    5. PARTICIPATING AND NONPARTICIPATING COUNTRIES
    6. MILITARY
    7. REPUBLIC OF KENYA AND THE EAST AFRICAN COMMUNITY OF STATES
    8. RELATIONSHIP WITH SOMALIA
    9. AL-SHABAAB
    10. NIGERIA
    11. OIL
    12. NIGERIAN MILITARY
    13. BOKO HARAM
    14. FULANI MILITANTS
    15. GLOBAL TERRORISM DATABASE
    16. CONCLUSION
    17. REFERENCES
    18. KEY TERMS AND DEFINITIONS
  14. Chapter 6: Border Security and Cooperative Initiatives to Counter Illicit Drug Trafficking
    1. ABSTRACT
    2. INTRODUCTION
    3. JAMAICA’S DRUG TRAFFICKING TO THE USA
    4. FUNCTIONS OF BORDER SECURITY IN DRUG TRAFFICKING
    5. SELECTED BORDER SECURITY MEASURES TO CURB DRUG TRAFFICKING
    6. CONCLUSION AND WAYS FORWARD
    7. REFERENCES
    8. ENDNOTES
  15. Chapter 7: Biometric Spoofing and Anti-Spoofing
    1. ABSTRACT
    2. INTRODUCTION
    3. FINGERPRINT RECOGNITION
    4. FACE RECOGNITION
    5. IRIS RECOGNITION
    6. MULTIMODAL BIOMETRIC RECOGNITION
    7. SUMMARY, CHALLENGES, AND OPEN ISSUES
    8. REFERENCES
    9. KEY TERMS AND DEFINITIONS
  16. Chapter 8: On Using Gait Biometrics for Re-Identification in Automated Visual Surveillance
    1. ABSTRACT
    2. INTRODUCTION
    3. HISTORY OF BIOMETRICS
    4. GAIT BIOMETRICS
    5. PEOPLE RE-IDENTIFICATION
    6. CONCLUSION
    7. REFERENCES
    8. KEY TERMS AND DEFINITIONS
  17. Chapter 9: Multi-Factor Authentication and Dynamic Biometric Signatures
    1. ABSTRACT
    2. INTRODUCTION
    3. TRENDS IN ELECTRONIC AUTHENTICATION
    4. DYNAMIC BIOMETRIC SIGNATURES
    5. RELIABILITY OF AUTHENTICATION THROUGH DBS
    6. EXPERIMENTS WITH THE DYNAMIC BIOMETRIC SIGNATURE
    7. CONCLUSION
    8. REFERENCES
  18. Chapter 10: Battlefield Cyberspace
    1. ABSTRACT
    2. BACKGROUND ON RESEARCH
    3. LAWS AND POLICIES TO COMBAT TERRORISM
    4. TOOLS AND METHODS FOR NETWORK ATTACKS
    5. WHO IS CONNECTED AND WHY?
    6. WHERE DO PEOPLE CONNECT?
    7. EMERGING TECHNOLOGIES AND THE INTERNET
    8. EMERGING AREAS IN HUMAN COMPUTER INTERACTION FOR COUNTERING CYBER ATTACKS
    9. CONCLUSION
    10. REFERENCES
    11. KEY TERMS AND DEFINITIONS
  19. Chapter 11: Search Space Reduction in Biometric Databases
    1. ABSTRACT
    2. INTRODUCTION
    3. BIOMETRIC RECOGNITION
    4. SEARCH SPACE REDUCTION IN FINGERPRINT DATABASES
    5. INDEXING
    6. SEARCH SPACE REDUCTION IN PALMPRINT DATABASES
    7. SEARCH SPACE REDUCTION IN FACE DATABASES
    8. SEARCH SPACE REDUCTION IN IRIS DATABASES
    9. ANALASYS AND COMPARISION
    10. CONCLUSION AND FUTURE DIRECTIONS
    11. REFERENCES
    12. KEY TERMS AND DEFINITIONS
  20. Chapter 12: Physical Layer Security in Multiuser Wireless Networks
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. PHY SECURITY OVERVIEW
    4. 3. RELATED WORKS
    5. 4. MULTIUSER WIRELESS NETWORKS
    6. 5. CONCLUSION AND FUTURE WORKS
    7. REFERENCES
  21. Chapter 13: Importance of a Versatile Logging Tool for Behavioural Biometrics and Continuous Authentication Research
    1. ABSTRACT
    2. INTRODUCTION
    3. ARCHITECTURE OF THIS TOOL
    4. UNDERLYING TECHNOLOGIES
    5. ANALYSIS ON CONTINUOUS AUTHENTICATION
    6. RESULT ANALYSIS
    7. CONCLUSION
    8. REFERENCES
    9. ENDNOTES
  22. Chapter 14: Evaluation of Keystroke Dynamics Authentication Systems
    1. ABSTRACT
    2. INTRODUCTION
    3. KEYSTROKE DYNAMICS TECHNOLOGY
    4. EVALUATION OF KEYSTROKE DYNAMICS AUTHENTICATION SYSTEMS
    5. ANALYSIS OF PHYSICAL AND TOUCH SCREEN KEYBOARDS
    6. FUTURE TRENDS
    7. CONCLUSION
    8. REFERENCES
  23. Chapter 15: A Wrapper-Based Classification Approach for Personal Identification through Keystroke Dynamics Using Soft Computing Techniques
    1. ABSTRACT
    2. INTRODUCTION
    3. BACKGROUND
    4. METHODOLOGY
    5. EXPERIMENTAL RESULTS
    6. CONCLUSION AND FUTURE DIRECTIONS
    7. REFERENCES
  24. Chapter 16: Defending Information Networks in Cyberspace
    1. ABSTRACT
    2. 1 FACING CYBERSPACE SECURITY
    3. 2 REMEMBERING INTERNET ISSUES
    4. 3 DEFENSIVE CYBERSECURITY
    5. 4 IN THE SEARCH OF BETTER SOLUTIONS
    6. 5 CONCLUSION
    7. KEY TERMS AND DEFINITIONS
    8. REFERENCES
    9. ADDITIONAL READING
  25. Compilation of References
  26. About the Contributors