You don’t bring a knife to a shootout. That timeless cinematic proverb on how to win a war has just expanded its meaning with the intensity of a nuclear bomb. With the internet and other kinds of cyber technology evolving and adapting to warfare use, government forces and security agencies can no longer rely on traditional offense-and-defensive measures if they want to win the war against international terrorism.
The Islamic State (IS) and other jihadist forces mean serious business. Their ultimate goal is nothing less than the establishment of a global caliphate, and advancing their frontier starts with cyberspace. Anti-terrorists have to innovate and leverage on cutting-edge technology. Neglect or ignorance of emerging tech that can counter organized, militant violence is not an option.
First, let’s look at cybertech. The internet has become the platform by which even the most underfunded groups can spread their message and turn neutral voices to their cause. Recruitment is done through carefully crafted messages in social media. As the Infosec Institute points out, platforms like Twitter have been used to gain new followers among teenagers in Europe and professionals in Europe.
Meetups, collaborations, and planning sessions are also spread discreetly through coded online messages to escape detection by authorities. Worse, hackers in their groups can steal confidential documents and other valid information from online users to create fake identities, passports, and medical reports, in a bid to move their “soldiers” across various countries.
Android phones are the preferred means of communication by terrorists, says Recorded Future. Aside from hard-to-break encrypted messages on how to make a homemade bomb, for example, they can also be used to launch malware and other viruses against governments and private institutions. The damage of a successful attack would be massive and long-lasting, like millions of stolen data, the destruction of critical hardware that keeps operations running, and perhaps even the lowering of shields of defense systems.
Then there is the development of advanced technologies that go beyond cybersecurity and which are launched in the real world. Infiltrators have become more sophisticated and often escape detection, says The National Academies Press. Suicide bombers have learned how to tuck in their explosive devices in very small containers in a bag or within a jacket. Other carriers bring in through seemingly harmless drinking bottles radiological materials that they can seed in a target city’s water facilities system; over time, the citizens of that place can acquire debilitating illnesses, even a high risk for cancer.
Given the escalating risks, some parties in the public and private sectors have stepped up to use technology to counter terrorism.
CNBC points out that a few leading social media companies are the first to take down terrorist-related posts in their cyberspace. Twitter deletes the posts as soon as they appear. Telegram closed several ISIS-related programs that were posting messages in 12 languages. Hacker groups like Anonymous have vowed retaliation against ISIS; some of the avenues they can take would be neutralizing the group’s online recruitment platforms, as well as exposing the hypocrisies of their leaders in order to sow de-motivation and discontent.
Meanwhile, in a more proactive approach, IT specialists and educators based at the University of Miami and Harvard University are creating methods on how online artificial intelligence (AI) can ‘read’ even the most obscure terrorist messages online. As reported by The Conversation, once verified, this information can advise the authorities of the next possible attack.
This same group also recommends installing advanced detection software in transport hubs like airports and bus terminals. Sensors can pick up an increase in body heat, shifts in eye movements, faster heart beats, and even brain pulses to determine if certain individuals are dangerous or about to inflict harm.
Technology can be our ultimate ally in the fight against terrorism or our worst nightmare if we relinquish innovation in this area to them. It can turn out to be the game-changer in global governments’ campaign to permanently eradicate ISIS and other similar threats.
More shareholders could sue Alphabet over alleged Andy Rubin cover-up
One shareholder sued Alphabet for the economic loss incurred from how the company mishandled Andy Rubin’s sexual harassment case in...
SEKO Logistics makes first ever full acquisition
SEKO Logistics is kicking off what it calls a "Transformative Year" with its first ever full acquisition of another company...
Investment-wise, does it make sense to sell your life insurance policy?
While a lump sum payment after the death of the policyholder works well for the beneficiaries, sometimes selling the policy...
Fixed income investing analysts consider in 2019
2018's volatile year is likely to be followed by another volatile year. This volatility is currently cutting across access classes...
4 ways to help you boost your retirement savings
Try making some adjustments to your efforts in saving and you will soon have the cash that you’ll need so...
- Sponsored3 days ago
The fight against cybercrime makes cybersecurity the top investment choice for 2019
- Business4 days ago
How blockchain can solve the broken link of supply chain logistics
- Business5 days ago
A guide to investing in your first commercial property
- Business4 days ago
More Chinese middle class buying lower-priced US houses
- Crypto4 days ago
Bitcoin welcomes 2019 with an unexpected price surge
- Business3 days ago
Mark Zuckerberg to hold public debates on future of technology
- Business4 days ago
Brand building is key to success in the cannabis marketplace
- Featured2 days ago
Dividend calendar – what is it good for?