Counterterrorism and Cybersecurity

Total Information Awareness

  • Newton Lee

Table of contents

  1. Front Matter
    Pages i-xv
  2. Counterterrorism History: Then and Now

    1. Front Matter
      Pages 1-1
    2. Newton Lee
      Pages 3-19
    3. Newton Lee
      Pages 21-42
  3. Counterterrorism Strategies: Causes and Cures, War and Peace

    1. Front Matter
      Pages 43-43
    2. Newton Lee
      Pages 45-71
    3. Newton Lee
      Pages 73-105
    4. Newton Lee
      Pages 107-132
  4. Counterterrorism Technologies: Total Information Awareness

  5. Cybersecurity: History, Strategies, and Technologies

    1. Front Matter
      Pages 199-199
    2. Newton Lee
      Pages 201-248
    3. Newton Lee
      Pages 301-319
  6. Cybersecurity: Applications and Challenges

    1. Front Matter
      Pages 321-321
    2. Newton Lee
      Pages 323-341
    3. Newton Lee, Darren Manners
      Pages 343-347
    4. Newton Lee, Philip Polstra
      Pages 349-427
  7. Back Matter
    Pages 457-489

About this book


From 9/11 to Charlie Hebdo along with Sony-pocalypse and DARPA's $2 million Cyber Grand Challenge, this book examines counterterrorism and cyber security history, strategies and technologies from a thought-provoking approach that encompasses personal experiences, investigative journalism, historical and current events, ideas from thought leaders and the make-believe of Hollywood such as 24, Homeland and The Americans. President Barack Obama also said in his 2015 State of the Union address, "We are making sure our government integrates intelligence to combat cyber threats, just as we have done to combat terrorism.

In this new edition, there are seven completely new chapters, including three new contributed chapters by healthcare chief information security officer Ray Balut and Jean C. Stanford, DEF CON speaker Philip Polstra and security engineer and Black Hat speaker Darren Manners, as well as new commentaries by communications expert Andy Marken and DEF CON speaker Emily Peed.

The book offers practical advice for businesses, governments and individuals to better secure the world and protect cyberspace.


Blackhat DEF CON counterterrorism cyber warfare cybersecurity cyberterrorism data mining healthcare security peace penetration test security vulnerabilities terrorism war

Authors and affiliations

  • Newton Lee
    • 1
  1. 1.Newton Lee Laboratories, LLCTujungaUSA

Bibliographic information

  • DOI
  • Copyright Information Springer International Publishing Switzerland 2015
  • Publisher Name Springer, Cham
  • eBook Packages Computer Science
  • Print ISBN 978-3-319-17243-9
  • Online ISBN 978-3-319-17244-6
  • Buy this book on publisher's site