The presentation focuses on the future challenges of identifying terrorists in cyber space. In the presentation special attention is paid to new available technologies, which help in the identification process. Author notes that disruptive technologies can be double-edged sword, as cyber terrorists can use the new disruptive technologies. Author first presents background theories of terrorist profiling and identification with special attention to geographical, behavioral, and sociological aspects. In the second phase, author evaluates the potential role of emerging radical and disruptive technologies in the identification process of individual terrorists and terrorist groups. Author also presents key systemic aspects of terrorism foresight paying special attention to advanced weak signal analysis and Wild Card methodology. WE-WI-analysis (weak signal-wild card analysis) can be helpful in operational risk identification, risk assessment, and risk mitigation. Author presents various models which are relevant for terrorism foresight.
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
Tel.: +1 703 830 6300
Fax: +1 703 830 2300 email@example.com
(Corporate matters and books only) IOS Press c/o Accucoms US, Inc.
For North America Sales and Customer Service
West Point Commons
Lansdale PA 19446
Tel.: +1 866 855 8967
Fax: +1 215 660 5042 firstname.lastname@example.org