¶ … Technology changed Security and Terrorism?
Terrorists have evolved in their warfare and now they exploit modern technologies to facilitate every stage of their operation such as recruitment, training, planning and attack. Counter terrorism efforts therefore require more effort, continued research and high tech solutions to prevent, protect and to safeguard innocent citizens. The key to victory is not just the volume of information at our disposal but more importantly how effectively the information is analyzed and disseminated among anti-terror vigilance networks in different nations. Only a coordinated approach to counter terrorism would yield fruit, and for this, standardization of security measures across the international checkpoints is indispensible. There is no one solution to solve the problem of terrorism but with the development of newer technological solutions such as Biometric identification, Biosensors and terahertz imaging systems and other software solutions we can look forward to achieving the objective of a safer America and a safer world.,
Introduction
The twenty first century began amidst the explosive growth of the internet, the telecommunication technologies and the biotech revolution, creating a huge promise of the benefits that society could derive from these advancements in every walk of life. Sadly though Sep / 2001 also marked a new era in the history of the world, one in which terrorists could easily use a high tech plan of converting a fuel filled passenger flight into a guided ballistic missile that could destroy vital civilian targets at the heart of one of the highly secure and technologically powerful nations in the world. The impact of the attacks was an immediate revamp of security policies and the shift in focus towards the development and use of advanced technology in identifying and preventing such atrocious schemes by the terror outfits that spare no stone unturned to carry out their nefarious plans. However, terrorists also employ the latest in technologies for anything from logistics to planning and training to actual execution of attacks, creating a terror network that is a formidable enemy to engage with. Particularly, when the proliferation of latest weapon systems help them posses new modern military weapons with GPS locators and guided munitions, it becomes even more dangerous and deadly. Let us briefly discuss the use of technology by terrorists and how governments across the world are using advanced technological solutions in their efforts to prevent the terror plots and protect innocent people.
Technology and Terrorists
Technology has impacted terrorism in very significant ways. Terrorists make use of modern communication gadgets and their network capabilities to recruit, plan, train, organize and execute their mission.
Recruiting
Recruiting new candidates is a continuous process for terror networks as new members are needed to fill in the places of those who are arrested or killed during their mission. The internet and other mobile communication devices make the recruitment drive a lot easier. For instance, several terror outfits related to the Al Qaeda routinely recruit candidates from the databases of the Madrasas (religious institutions) in Pakistan. Similarly the Hezbollah outfit is well-known to use violent video games to spread their hatred messages against Israel and to recruit members. By making use of emails, conferences and other networking features terror outfits have made targeted recruiting an easy process than before. [Bruce Et.al, (2007) pg 13]
Training
Technology also aids terrorists in speeding up their training requirements. The internet and the information that is available has made it is easy for terrorists to learn everything about the different type of explosive devices. The internet speeds up technological training and is particularly helpful for members to obtain vital training from field experts elsewhere in the globe who may also be supportive of their cause on the sly. As the 2009 counter terrorism strategy (CONTEST) of the UK government states, "Terrorist organisations will have access to more lethal technology. Scientific training and expertise will have even greater significance for terrorist organisations because technology will be able to compensate for the vulnerabilities they will have. Terrorists will continue to aspire to develop or steal and then use [CBRN] weapons. [Paul Cornish, (2010)]
Technology in Conducting Attacks
Modern day consumer technology helps terrorists in conducting their violent acts. The use of cell phones, GPS and satellite phones enable them to better coordinate their attacks and to have more precision helping them achieve their goal of mass destruction and increased impact. Terrorists are now routinely using the simple communication device like the cell phone as a remote to trigger explosive devices. The 2005 serial blasts in Delhi supermarkets and the Madrid blasts are examples of cases where mobile...
With the threat of terrorism remaining so strong in this country it is vital to find new and better ways to protect people and to keep them safe from harm as much as is humanly and technologically possible. Scope of the Study The scope of this particular study is very broad and far-reaching, because there are so many people who are being affected by it now and will be affected by
Technology, Terrorism, and Crime (APA). Technology, Terrorism, and Crime One of the most heinous terrorist groups currently operating in the U.S. In called the "Aryan Nations." This group openly states on their website that they have been "Fighting Jewish Takeover for over 35 years." (aryan-nation.org) This group of domestic terrorists post articles on their website with grammatically incorrect titles like "The menace of Multiculturalism," and "Jews that control Hollywood: Meet the filthy
S.A. PATRIOT Act Improvement and Reauthorization Act reauthorized all expiring provisions of the U.S.A. PATRIOT Act, added dozens of additional safeguards to protect privacy interests and civil liberties, and strengthened port security. (USDOJ, 2008) SUMMARY & CONCLUSION This report has presented in brief the federal policy changes that been changed or created since the events of September 11, 2001. Changes have included collaboration between federal, state and local agencies in coordination and
That said, Even if those countries do not actually build nuclear bombs, they could still decide to develop latent nuclear weapon capabilities as a type of insurance policy. This is not a new realization. For instance, the Baruch Plan, which was brought before the United Nations in 1946, attempted to place controls on fissile material and dual-use nuclear technologies. While that plan was stillborn, recent years have seen renewed efforts
Some rates had even decreased. Maritime shipping rates grew by 5 to 10% on average in the two weeks after the attack, but that rise was soon reversed. Airfreight rates, however, were about 10% higher in late 2001 than before the attacks. Due to the abrupt slowing of cumulative demand starting in 2000 and the decline in fuel costs after the terrorism, there should have been a steeper falling
Terrorism Scope and Direction The 911 Commission Report focuses on the specificities of the September 11 terrorist attack and the nature of Al Qaeda as a threat to domestic security. Its scope is narrower in focus than either the National Security Strategy or the National Strategy for Counterterrorism. The National Security Strategy (2015) is the most generalized of these three documents. Issues like climate change, poverty, health, and the economy comingle in
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now