Excerpt via Term Paper:
Technology changed Protection and Terrorism?
Terrorists include evolved inside their warfare now they make use of modern technology to help every level of their procedure such as recruitment, training, planning and assault. Counter terrorism efforts consequently require even more effort, ongoing research and high tech solutions to prevent, safeguard and to guard innocent individuals. The key to victory is not only the volume details at each of our disposal although more importantly how effectively the data is reviewed and displayed among anti-terror vigilance networks in different nations around the world. Only a comprehensive approach to countertop terrorism would yield fresh fruit, and for this, standardization of security measures across the worldwide checkpoints is indispensible. There is not any one answer to solve the problem of terrorism but with the introduction of newer technical solutions just like Biometric identity, Biosensors and terahertz imaging systems and other software solutions we can look forward to achieving the objective of a safer America and a safer universe.
The twenty first century started amidst the explosive regarding the internet, the telecommunication technology and the biotech revolution, making a huge guarantee of the benefits that world could get from these advancements in every single walk of life. Regrettably though Sep / 2001 also noticeable a new time in the good the world, one out of which terrorists could conveniently use a hi-tech plan of converting a fuel packed passenger air travel into a well guided ballistic razzo that could ruin vital civilian targets at the heart of one from the highly secure and technologically powerful nations around the world in the world. The effect of the episodes was an instantaneous revamp of security guidelines and the shift in emphasis towards the development and utilization of advanced technology in identifying and preventing these kinds of atrocious plans by the terror outfits that spare simply no stone unturned to carry out their particular nefarious plans. However , terrorists also employ the most recent in technologies for anything from logistics to organizing and training to genuine execution of attacks, creating a terror network that is a formidable enemy to interact with. Particularly, when the expansion of latest system systems help them posses new modern armed forces weapons with GPS locators and well guided munitions, it might be even more dangerous and dangerous. Let us in brief discuss the application of technology simply by terrorists and how governments across the world are using advanced technological solutions in their efforts to prevent the terror and building plots and guard innocent people.
Technology and Terrorists
Technology has affected terrorism in very significant ways. Terrorists make use of contemporary communication gadgets and their network capabilities to recruit, prepare, train, coordinate and execute their quest.
Recruiting new candidates is a constant process for terror networks as newbies are needed to fill in the places of those who are arrested or perhaps killed throughout their mission. The internet and other portable communication equipment make the recruitment drive much easier. For instance, many terror outfits related to the Al Qaeda routinely sponsor candidates through the databases in the Madrasas (religious institutions) in Pakistan. In the same way the Hezbollah outfit can be well-known to work with violent video gaming to distributed their hatred messages against Israel and also to recruit users. By making use of emails, conferences and also other networking features terror outfits have made targeted recruiting a simple process than before. [Bruce Et. al, (2007) pg 13]
Technology also helps terrorists in speeding up their particular training requirements. The internet plus the information that is available has made it truly is easy for terrorists to learn anything about the several type of explosive devices. The web speeds up scientific training and is particularly helpful for people to obtain essential training via field specialists elsewhere in the globe whom may also be encouraging of their cause on the sly. As the 2009 counter terrorism strategy (CONTEST) of the UK government declares, “Terrorist organisations will have use of more lethal technology. Medical training and expertise will have even greater significance for terrorist organisations since technology will be able to compensate for the vulnerabilities they are going to have. Terrorists will always aspire to develop or grab and then employ [CBRN] guns. [Paul Cornish, (2010)]
Technology in Executing Attacks
Current day consumer technology helps terrorists in performing their violent acts. The use of cell phones, GPS NAVIGATION and satellite tv phones enable them to better coordinate all their attacks also to have more accurate helping these people achieve their goal of mass break down and elevated impact. Terrorists are now regularly using the basic communication device like the cell phone as a remote to result in explosive gadgets. The june 2006 serial blasts in Delhi supermarkets and the Madrid blasts are samples of cases exactly where mobile phones were used while detonators intended for triggering explosives. It is very easy to convert a mobile phone into a trigger for a bomb. “Cell phones have been connected to terrorist bombings in Madrid, Bali and His home country of israel. Many roadside bombs in Iraq are thought to be triggered by cell phones. ” [Emily Turrettini, (2005)] More recently, the planning and the operations of the 08 Mumbai attacks, where terrorists entered and held under siege a five star lodge for more than a few days, was effected applying high tech gizmos. As G. Parthasarathy, one of the national secureness experts said, “Both sides used technology. The terrorists would not had been able to execute these attacks had it not been pertaining to technology. They were not sailors, but they could use sophisticated GPS navigation equipment and in depth maps to sail from Karachi [in Pakistan] to Mumbai, ” The terrorists used high resolution satellite images of Mumbai city and the target motel. They also employed satellite mobile phones and VOIP internet services to call phone numbers of their command in Pakistan whom provided associated with instructions in order to conduct the attack. [Emily Wax]
Scientific Terrorism (Cyber warfare)
Internet warfare is known as a reality right now and the connectivity of the internet provides terrorist with the possibility to hack and intrude important laptop installations and wreck damage. For instance, a recent study by International Commission payment on Nuclear Non-proliferation and Disarmament (ICNND) has reported that the chance of terrorists targeting a indivisible power plant pertaining to destructive functions is very actual as they could actually make this happen by breaking and entering into computer systems that control these plants. Because John Fritz the author with the study record states, “Despite claims that nuclear launch orders can only come from the greatest authorities, several examples stage towards a great ability to sidestep the chain of command word and put orders by lower amounts. Cyber-terrorists can also provoke a nuclear release by spoofing early alert and id systems or perhaps by awkward communications sites. ” [Bobbie Johnson] Cyberterrorism is consequently a permanent threat that may not be lightly ignored. Instead of building a weapon of mass break down which might be a very difficult factor for a terrorist outfit to complete they can quickly pursue the choice of internet warfare against target nuclear plants.
Technology against Terrorism
While there is no fool resistant solution against terrorism undoubtedly that modern technology has tremendously improved the safety situation and even more and more research is devoted to obtaining new technical solutions that help us prevent, safeguard and secure people in the terrorists.
Better Baggage Screening process
Post 9/11, there has been several drastic within border protection. Particularly, airport terminal security has been beefed up considerably during the last several years. Suitcases checking and passenger verification have significantly improved in airports across the world. In the U. S., the dept of Homeland protection spends a whooping $500 million every year for analysis and improvisation of baggage testing process. [Eleni Linos] There are more than 7200 Explosion Search for Detection devices (ETD) and 1100 Huge increase Detection Systems (EDS) in the airports across U. S.. [Garrick et. al] Virtually any baggage that provides an security alarm is right away manually examined up for any kind of explosive materials. Though there have been instances of an excellent00 rate of false alerts reported by these types of scanning devices, they are attractive conducting a thorough check of baggage.
Technology also helps to boost passenger screening process. International airport security is now making use of traveler profiling, ‘Group Listing’ and software including CAPPS (computer assisted traveler pre-screening systems) that make them to easily determine passengers. [EFF] Also, U. S. airports now use ‘Screening passengers by simply observation techniques’ (SPOT), a behavioral strategy to identify shady people only based on declaration. This system uses ‘micro expressions’ to find criminal purpose. As TSA spokesman Chris White stated, “We have caught many individuals, via drug traders to cash launderers, and a twice murderer in a single case, ” [Paul Marks]
Recent and future innovations
Biometrics, a field containing developed drastically over the last a long period promises to be the future of personal identification. Biometrics is nothing but the use of physical characteristics of any person such as a fingerprint, deal with, signature, eye, voice, and so forth that can be get across checked using a digitized biometric database. This kind of offers an nearly foolproof approach to personal id. Biometrics technology would allow security officers to control entry to ‘sensitive facilities’ at the air-port and other excessive securityGet your custom Essay