Verified Document

How Has Technology Changed Security And Terrorism Term Paper

¶ … Technology changed Security and Terrorism? Terrorists have evolved in their warfare and now they exploit modern technologies to facilitate every stage of their operation such as recruitment, training, planning and attack. Counter terrorism efforts therefore require more effort, continued research and high tech solutions to prevent, protect and to safeguard innocent citizens. The key to victory is not just the volume of information at our disposal but more importantly how effectively the information is analyzed and disseminated among anti-terror vigilance networks in different nations. Only a coordinated approach to counter terrorism would yield fruit, and for this, standardization of security measures across the international checkpoints is indispensible. There is no one solution to solve the problem of terrorism but with the development of newer technological solutions such as Biometric identification, Biosensors and terahertz imaging systems and other software solutions we can look forward to achieving the objective of a safer America and a safer world.,

Introduction

The twenty first century began amidst the explosive growth of the internet, the telecommunication technologies and the biotech revolution, creating a huge promise of the benefits that society could derive from these advancements in every walk of life. Sadly though Sep / 2001 also marked a new era in the history of the world, one in which terrorists could easily use a high tech plan of converting a fuel filled passenger flight into a guided ballistic missile that could destroy vital civilian targets at the heart of one of the highly secure and technologically powerful nations in the world. The impact of the attacks was an immediate revamp of security policies and the shift in focus towards the development and use of advanced technology in identifying and preventing such atrocious schemes by the terror outfits that spare no stone unturned to carry out their nefarious plans. However, terrorists also employ the latest in technologies for anything from logistics to planning and training to actual execution of attacks, creating a terror network that is a formidable enemy to engage with. Particularly, when the proliferation of latest weapon systems help them posses new modern military weapons with GPS locators and guided munitions, it becomes even more dangerous and deadly. Let us briefly discuss the use of technology by terrorists and how governments across the world are using advanced technological solutions in their efforts to prevent the terror plots and protect innocent people.

Technology and Terrorists

Technology has impacted terrorism in very significant ways. Terrorists make use of modern communication gadgets and their network capabilities to recruit, plan, train, organize and execute their mission.

Recruiting

Recruiting new candidates is a continuous process for terror networks as new members are needed to fill in the places of those who are arrested or killed during their mission. The internet and other mobile communication devices make the recruitment drive a lot easier. For instance, several terror outfits related to the Al Qaeda routinely recruit candidates from the databases of the Madrasas (religious institutions) in Pakistan. Similarly the Hezbollah outfit is well-known to use violent video games to spread their hatred messages against Israel and to recruit members. By making use of emails, conferences and other networking features terror outfits have made targeted recruiting an easy process than before. [Bruce Et.al, (2007) pg 13]

Training

Technology also aids terrorists in speeding up their training requirements. The internet and the information that is available has made it is easy for terrorists to learn everything about the different type of explosive devices. The internet speeds up technological training and is particularly helpful for members to obtain vital training from field experts elsewhere in the globe who may also be supportive of their cause on the sly. As the 2009 counter terrorism strategy (CONTEST) of the UK government states, "Terrorist organisations will have access to more lethal technology. Scientific training and expertise will have even greater significance for terrorist organisations because technology will be able to compensate for the vulnerabilities they will have. Terrorists will continue to aspire to develop or steal and then use [CBRN] weapons. [Paul Cornish, (2010)]

Technology in Conducting Attacks

Modern day consumer technology helps terrorists in conducting their violent acts. The use of cell phones, GPS and satellite phones enable them to better coordinate their attacks and to have more precision helping them achieve their goal of mass destruction and increased impact. Terrorists are now routinely using the simple communication device like the cell phone as a remote to trigger explosive devices. The 2005 serial blasts in Delhi supermarkets and the Madrid blasts are examples of cases where mobile...

It is very simple to convert a mobile phone into a trigger for a bomb. "Cell phones have been connected to terrorist bombings in Madrid, Bali and Israel. Many roadside bombs in Iraq are believed to be triggered by cell phones." [Emily Turrettini, (2005)] More recently, the planning and the operations of the 2008 Mumbai attacks, where terrorists entered and held under siege a five star hotel for more than 3 days, was effected using high tech gadgets. As G. Parthasarathy, one of the national security experts said, "Both sides used technology. The terrorists would not have been able to carry out these attacks had it not been for technology. They were not sailors, but they were able to use sophisticated GPS navigation tools and detailed maps to sail from Karachi [in Pakistan] to Mumbai," The terrorists used high resolution satellite images of Mumbai city and the target hotel. They also used satellite phones and VOIP internet services to call phone numbers of their command in Pakistan who provided them with instructions on how to conduct the attack. [Emily Wax]
Technological Terrorism (Cyber warfare)

Cyber warfare is a reality now and the connectivity of the internet provides terrorist with the possibility to hack and intrude important computer installations and wreck devastation. For instance, a recent study by the International Commission on Nuclear Non-proliferation and Disarmament (ICNND) has reported that the possibility of terrorists attacking a nuclear power plant for destructive purposes is very real as they could actually accomplish this by breaking and entering into computer systems that control these plants. As John Fritz the author of the study report states, "Despite claims that nuclear launch orders can only come from the highest authorities, numerous examples point towards an ability to sidestep the chain of command and insert orders at lower levels. Cyber-terrorists could also provoke a nuclear launch by spoofing early warning and identification systems or by degrading communications networks." [Bobbie Johnson] Cyberterrorism is therefore a permanent threat that cannot be lightly ignored. Instead of creating a weapon of mass destruction which would be a very difficult thing for a terrorist outfit to accomplish they can easily pursue the alternative of cyber warfare against target nuclear plants.

Technology against Terrorism

While there is no fool proof solution against terrorism there is no doubt that modern technology has greatly improved the security situation and more and more research is devoted to finding new technological solutions that help us prevent, protect and safeguard people from the terrorists.

Improved Baggage Screening

Post 9/11, there has been some drastic changes in border security. Particularly, airport security has been beefed up considerably over the last several years. Baggage checking and passenger screening have vastly improved in airports across the world. In the U.S., the dept of Homeland security spends a whooping $500 million every year for research and improvisation of baggage screening process. [Eleni Linos] There are more than 7200 Explosion Trace Detection systems (ETD) and 1100 Explosion Detection Systems (EDS) in the airports across U.S.. [Garrick et.al] Any baggage that gives an alarm is immediately manually checked up for any explosive material. Though there have been instances of a very high rate of false alarms reported by these scanning machines, they are helpful in conducting a thorough check of all baggage.

Passenger Screening

Technology also helps to improve passenger screening process. Airport security is now making use of passenger profiling, 'Group Listing' and software such as CAPPS (computer assisted passenger pre-screening systems) that help them to easily identify passengers. [EFF] Also, U.S. airports now use 'Screening passengers by observation techniques' (SPOT), a behavioral technique to identify suspicious people just based on observation. This system uses 'micro expressions' to detect criminal intent. As TSA spokesman Chris White said, "We have caught a number of individuals, from drug dealers to money launderers, and a double murderer in one case," [Paul Marks]

Recent and future developments

Biometrics

Biometrics, a field which has developed significantly over the last several years promises to be the future of personal identification. Biometrics is nothing but the use of physical characteristics of a person such as a fingerprint, face, signature, iris, voice, etc. that can be cross checked with a digitized biometric database. This offers an almost foolproof system of personal identification. Biometrics technology would enable security officers to control access to 'sensitive facilities' at the airport and other high security workplaces. It would also help in preventing identity theft which is possible under the current system of personal identification using traditional passports…

Sources used in this document:
Bibliography

1) Bruce W. Don, David R. Frelinger & Scott Gerwehr et.al, 'Network technologies for Networked Terrorists: Assessing the Value of Information and Communication technologies to Modern Terrorists Organizations', Dept of Homeland Security, 2007, Accessed Mar 14th 2011, available online at, http://www.rand.org/pubs/technical_reports/2007/RAND_TR454.pdf

2) Paul Cornish, 'Technology, Strategy and Counter Terrorism', International Affairs, Vol 86, Issue 4, Accessed March 14th 2011, available at, http://onlinelibrary.wiley.com/doi/10.1111/j.1468-2346.2010.00917.x/pdf

3) Emily Turrettini, 'Handsets' Deadly Use: Detonators', (Aug 27, 2005), accessed Mar 14th 2011, available online at, http://www.textually.org/textually/archives/cat_cell_phones_used_by_terrorists.htm?p=2

4) Emily Wax, 'Gunmen Used Technology as a Tactical Tool', The Washington Post, Dec 3, 2008, Accessed Mar 15th 2011, Available at, http://www.washingtonpost.com/wp-dyn/content/article/2008/12/02/AR2008120203519.html
5) Bobbie Johnson, 'Terrorists could use Internet to launch Nuclear Attack: Report', accessed mar 15th 2011, available at, http://www.guardian.co.uk/technology/2009/jul/24/internet-cyber-attack-terrorists
6) Eleni Linos & Graham Colditz,, ' Screening Program Evaluation Applied to Airport Security', BMJ, (Dec 2007) 335:1290-1292, available at, http://www.bmj.com/cgi/content/full/335/7633/1290
7) Garrick Blalock, Vrinda Kadiyali & Daniel H. Simon, 'The Impact of Post 9/11 Airport Security Measures on the Demand for Air Travel', Journal of Law and Economics, Feb 2005, Available at, http://aem.cornell.edu/faculty_sites/gb78/wp/airport_security_022305.pdf
8) EFF, 'CAPPS ii: Government Surveillance via Passenger Profiling', Accessed Mar 15th 2011, available at, http://w2.eff.org/Privacy/cappsii/
9) Paul Marks, 'Can a Government remotely detect a Terrorists thoughts?', accessed Mar 16th 2011, available at, http://www.newscientist.com/article/dn12458-can-a-government-remotely-detect-a-terrorists-thoughts.html
10) John D. Woodward, 'Biometrics: Facing Up to Terrorism', RAND, Accessed Mar 16th 2011, available at, http://www.rand.org/pubs/issue_papers/IP218/IP218.pdf
11) New Jersey Institute of Technology. "Physicist Sees Terahertz Imaging As Ultimate Defense Against Terrorism." ScienceDaily 1 November 2005. 17 March 2011 http://www.sciencedaily.com/releases/2005/11/051101080318.htm
12) Brenton Marshall, Coral G. Warr & Marien D. Bruyne, 'Detection of Volatile Indicators of Illicit Substances by the Olfactory Receptors of Drosophila melanogaster', Chem Senses, June 7, 2010, Available Online at, http://chemse.oxfordjournals.org/content/early/2010/06/07/chemse.bjq050.full.pdf+html
Cite this Document:
Copy Bibliography Citation

Related Documents

Terrorism Tech Technological Innovation As
Words: 4295 Length: 15 Document Type: Thesis

The foolishness of this reversal of priorities would be clearly demonstrated in the contrast between the results of intelligence efforts on 9/11 and those just two years prior. After the resignation of Tenet, who submitted as his official reason for departure the desire to spend more time with his family, his spokesman noted that "no one in the U.S. government was more aggressive in calling attention to and dealing with

Terrorism Response and Local Police
Words: 3075 Length: 9 Document Type: Research Paper

Local Police Response to Terrorism The Council of State Governments The council of State Governments is a body of representatives of all states, Territories within the ambit of the U.S. And Commonwealth of Puerto Rico. It is an organization that provides vital data and statistics towards excellence in running the matters of the state. It seeks to enable the three apex institutions, viz., legislature, judiciary and the executive with intellectual inputs with

Changes Terrorism Has Brought to the United States
Words: 3084 Length: 10 Document Type: Research Paper

Terrorism Has Changed the United States The United States has experienced considerable threats of terrorism in the past decade similar to other parts of the world. This threat has largely emerged from the fact that groups like Al-Qaeda and other terror organizations have continued to pose a significant threat to the United States homeland. Despite the success that the country has achieved in eliminating terror groups and organizations like al-Qaeda,

Security Plan
Words: 1558 Length: 5 Document Type: SWOT

Terrorist attacks are an ever-growing concern within the United States. Some states have taken a more developed approach to handling potential terrorist threats. Ever since the 9/11 attacks, Florida was the first draft the United States' first comprehensive counterterrorism policies to assist in the protection of Florida's citizens and visitors. Florida's policy was drafted early within the new model of Homeland Security. The policy has various modifications performed over the

Security Leader in a Military Organization
Words: 3068 Length: 10 Document Type: Essay

The ability to lead is an important trait in the organizational world today. With organizations encountering increasingly complex situations, leaders have a role to successfully steer their organizations through those situations. They must properly influence and guide their followers in the achievement of organizational goals and objectives (Bateman, Snell & Konopaske, 2016). Leadership ability is particularly important in military organizations. The security environment has become ever more challenging, warranting even

Terrorism Influences
Words: 1759 Length: 5 Document Type: Research Paper

Terrorism Influences Terrorism has no specific definition and its definition largely depends upon the viewpoint of an individual for example Samuel Adams (a well-known revolutionary fireband) or Thomas Gefferson would have been terrorist from British perspective but they have been Great heroes from American perspective. Take the case of George Washington who was previously fighting with British army against French and was loyalist of British crown but later on he sought

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now