Sunteți pe pagina 1din 6

How can technology help in preventing terrorist attacks?

(NISHMA NATHA PATIL)


M. Sc-IT Part-1 Roll Num- 199376
ABSTRACT collecting accurate information in these
IOT Internet of Things men the often harsh, rugged and mountainous
artificial intelligence has its dynamic nature, countries. To assist these forces, commercial
efficiency and accuracy led to the hasty and micro-sensors with wireless interfaces could
unrestrained explosion of modern intelligent be utilized to study and monitor a variety of
security systems, plying vital role in phenomena and environments from a certain
monitoring various organizations well as distance for military purposes. In order to
industries. Many developing countries are locate hidden terrorist groups and enable
facing terrorism from so many years and more effective use of conventional military
thus they are implementing their ideas and resources. By using these mobile sensor
efforts to survive in the worst circumstances. devices, improving communication for data
In this paper, some of the effective transfer from the source, and developing
and efficient technologies of IOTs based better ways to monitor and detect threats,
security system is been proposed to handle terrorist ability to carry out attacks can be
these situations. Its defensive and attacking severely disrupted.
mechanism makes possible to detect terrorist NEED OF STUDY
activities using behavior analysis from We know that terrorism has become
videos of human activities and helping the the latest threat to the peace of the world and
institutions and organizations from such its security. Terrorists are improving their
terrorist attacks. Initially the system is abilities and sophistication in all aspects of
trained using the self-generated and pre- their support and operation. Weapon
defined patterns. Some of the agile securities technology has become more increasingly
are also used to control the terrorist attacks. available. The purchasing power of terrorist
We can say that terrorism is the organization is on the rise with the ready
greatest threat to national security and availability of both trained personnel and
cannot be defeated by the conventional technology to operate it.
military force alone. In the critical areas The terrorists are not only
such as Iraq, Turkey and Afghanistan threatening the freedom and ideals of
regular forces cannot reach these hostile or democracy but they are also causing a
the terrorist groups, the instigators of development of mankind and progress.
terrorism. The groups have a clear So there is need for stringent
understanding of the relative ineffectiveness provision for prevention of terrorism. Using
of the counter-guerrilla operations and they some technologies we can predict the threat
rely on the guerrilla warfare to avoid major and would try to prevent from the further
combat as their primary means of continuing cause of it. So that the number of attacks are
the conflict with the governmental lower down and the security is maintained
structures. In the Internal Security within the nations and there is less harm to
Operations, detection of terrorist and hostile the life of people.
groups in their hiding places such as the
caves, lairs, etc. can only be achieved by
professionally trained people such as Special
Forces or the intelligence units with the
necessary experience and tools suitable for
INTRODUCTION used by a fraction of only British forces. A
The cities are on the frontline of spokesperson for the force said the software
crime and terrorism. Some of them are at uses an algorithm which is originally used to
more risk than others where all of them are predict earthquakes to estimate the
vulnerable. Now days the cities are likelihood of a crime occurring in a
experimenting with innovative approaches particular location during a window of time.
to preventing crime and countering It will pin a series of locations on the
extremism. map where the highest likelihood of a crime
The most successful are improving would be occurring to patrol.
intelligence gathering, community outreach, For every 15 min spent in the 500ft
strengthening policing and investing in new square zone it equates to two hours of no
technologies to improve urban safety. These crime.
types of cities are said to deploy ‘agile All the officers sitting in a Kent can
security’, problem-oriented and data driven access the system from force computers and
approaches that speed up decision-making print the out maps to use on patrol. The
and design in environmental changes to limit reports give the location and main crime
insecurity. types predicted such as robbery, burglary
Agile security measures start with and sexual offences and officers are asked to
the premise that many types of crime, patrol the areas which are at most risk.
radicalization and terrorism are non-random Gunshot:
and even predictable. With some exceptions, There is a technology used to reduce
they cluster in time, space and among the the gun violence which is called as
specific population groups. There is massive ShotSpotter. Here it is like the microphones
increase in the computing power and are placed strategically around the high
advances in machine learning have made it crime areas so they pick up the sounds of
possible to sift through the huge quantities gunfire and alert police to the location of
of data related to the crime and terrorism, to shooting’s via dots on a city map. The
identify underlying correlations and causes. ShotSpotter also sends alerts to apps on
The processing and harnessing of these data cop’s phones.
flows is crucial to enabling the agile security “It goes through the dot and found
in cities. the casings 11feet from where the dot was
according to the GPS coordinates”. So it’s
incredibly helpful and has saved a life of
DETECTING CRIME BEFORE IT peoples.
HAPPENS USING TECHNOLOGIES Role of CCTV in TTPs:
Precondition of the agile security is Mainly it is a conceptual framework,
connected to the urban infrastructure. When to critically evaluate the role of the closed
city authorities, private firms and the civic television circuit i.e. CCTV in the terrorist
groups have the access to the real time data TTPs which is (Tactics, Techniques and
whether generated by the crime mapping Procedure), which is focusing on camera
platforms, CCTVs, smart lights or gunshot system avoidance and targeting. This will be
detection systems they can get better at examined in terms of the interplay of tactics
detecting crime before it occurs. and the technology, between the surveillance
Crime mapping platforms: (provided by the CCTV) and also its
Predictive crimes mapping tools had avoidance, or also the destruction as these
existed for more than a decade but are only serve a precondition to successfully
committing an act of the terrorism, from an Actual instances of attacks on CCTV
precondition to successfully committing an equipment and, a recent example of CCTV
act of the terrorism from an operational and avoidance strategy in a case of the terrorism.
tactical perspective. Some of the circumstances emphasizes on
The main role of TTPs in the how the presence of CCTV can be a factor
terrorism analysis is that the concept is used in the terrorist TTPs. In particular, the
to identify individual patterns of behavior of choice of a specific location for the arming
a particular terrorist activity, or also a of an assailant, where there is an illicit
particular terrorist organization. This transaction can take place, looked at from a
concept of TTPs helps to examine and tactical and the operational perspective; two
categorize more general tactics and weapons fundamental operational objectives are in
used by a particular terrorist activity, or a fact achieved:
particular terrorist organization. The current The initial avoidance of detection
approach to the terrorism analysis involves and intervention by security, which has the
an examination of the behavior of an potential to disrupt the terrorist operation
individual terrorist, or that of a terrorist from going ahead, to start with.
organization, in particular their use the The latent- advantage that without
specific weapons, used in specific ways; and CCTV coverage a key element in the
which may include different tactics and policing is denied, with the lack of real-time
strategies being exhibited. Normally the physical evidence being available post-the-
technology aspects of tactics, techniques and terrorism event, during investigations,
procedures are also treated as the indiscreet leading to prosecutions – which again,
elements within the TTPs. However, a which has the potential to disrupt future
specific focus on CCTV as an ‘opponent’, so terrorist operation from going ahead.
to speak, raises an interesting focus on the
specifics of a technology that encourages a Remote Sensing:
counter tactic or the operation to be created. Remote sensing from the space can
In such case the specific need to destroy or be as simple as taking photographs of the
render useless the capacity of police, earth from space using an optical camera
security or defense to surveil of an area,
and also the photographic film. The sensors
collect the information, and digital images
of people’s activities. As first stated, the on board a satellite in the either
dominate debate to do with CCTV is its geosynchronous orbit [GEO], or an inclined
effectiveness in the crime prevention; or the polar low-earth orbit [LEO], perform
however, viewed the alternatively, that a remote sensing from the space. In addition
terrorist actor likely sees CCTV systems as a to the numerous civilian applications, this
potential operational and tactical threat, an technology is also used for military
analogy can also be made with known
reconnaissance and the verification of
criminal and activist perceptions who do
target the CCTV specifically. It is argued compliance with arms control treaties and
that a likely outcome based on the need to contributing to world security. The
achieve the operational security, is the command and the control system of the
‘downing of CCTV’ as a precondition for a terrorist groups leave Radio Frequency (RF)
successful attack. This then later point signatures which are easily targeted by the
which will be examined next, in two Military Electronic Units. Even though the
sections:
terrorist groups are need to give a
centralized command and control of their stop and counter acts of terrorism, also as
activities, they for the gathering of evidence for the
will sometimes operate very slow prosecution of such acts. A significant
communications, or maybe hand written amount of data about the functioning,
notes carried by human messengers from activities and sometimes the targets of
the civilian population and making terrorist organizations springs from
activities much more difficult to detect. website, chat room and other Internet
One of the most important discoveries in communications. Further, increased
the detection of these terrorist groups is Internet use for terrorist purposes provides
the use of unmanned aircraft, such as a corresponding increase within
Pioneer, Harpy, Ranger, Scout, Searcher, the availability of electronic data which
Heron, Hunter, I-See, I-View, which, due can be compiled and analyzed for counter-
to special features, make detect of terrorism purposes. Law enforcement,
inimical groups much easier, using intelligence and other authorities are
evaluated data (images and video) sent developing increasingly sophisticated
from 3000 m or higher. These planes tools to proactively prevent, detect and
with night-sight are ready to observe the deter terrorist activity involving use of the
movements of groups in the dark. web . The use of traditional investigative
However, these aforementioned methods means, like dedicated translation
are supported images of previously found resources for the timely identification of
detection, which suggests that the group potential terrorist threats, is
must are already located. This study additionally expanding.
proposes a system for locating hidden Online discussions provide a chance to
groups in places where previously no present opposing viewpoints or to
valid signals are detected. Building on the interact in constructive debate, which
previous uses of sensors (in environmental can have the effect of discouraging
detection) our proposal constitutes a potential supporters. Counter-narratives
practical and important addition to mobile with a robust factual foundation could also
sensor usage within the sort of tagging or be conveyed through online discussion
attaching sensors to domestic animals: the forums, images and videos. Successful
detection and site of terrorist groups messages can also demonstrate empathy
hidden in caves and harsh environments. with the underlying issues that contribute
While the system to radicalization, like political and social
proposed doesn't claim to get every conditions, and highlight alternatives to
possible human target, it represents an violent means of achieving the desired
easily employed additional reconnaissance outcomes.20 Strategic communications
tool for the advantage of Special Forces. that provide counter-narratives to terrorist
propaganda can also be disseminated
Uses of the Internet for via the web , in multiple languages, to
countering terrorist activity: succeed in a broad, geographically diverse
audience.
While terrorists have developed some
ways to use the web in furtherance of
illicit purposes, their use of the web also
provides opportunities for the gathering of
intelligence and other activities to
“Digital Me” Sitting on the Device: 4. Andrew Silke, “Contemporary Terrorism
Studies: Issues in Research,” in Critical
Smartphones are getting to be an Terrorism Studies: A New Research
extension of the user, capable of Agenda, edited by Richard Jackson, Marie
recognizing them and predicting their next Breen Smyth, and Jeroen Gunning (New
move. They will understand who you're , York, Abingdon: Routledge, 2009), 34.
what you would like , once you want it,
how you would like it done and execute
tasks upon your authority.
CONCLUSION
Your smartphone will track you
The use of AI for the predictive purpose in
throughout the day to seek out ,plan and
the countering terrorism is neither inherently
solve problems for you said Angie Wang,
good nor inherently bad. Rather this are the
principle research analyst at Gartner. It
way such capabilities are used is critical.
will leverage its sensors, cameras and data
The current constructs that regulate the use
to accomplish these tasks automatically.
of predictive AI countering in the terrorism
For example, within the connected home,
seems unlikely to either safeguard against
it could order a vacuum bot to
misuse or to enable the most of the
scrub when the house is empty, or turn a
beneficial use of these technologies, both in
rice cooker on 20 minutes before you
terms of operational performance and
arrive.
adherence to human rights principles.
Pursuing more concerted efforts to use
LITERATURE REVIEW predictive AI in counter terrorism operations
would require commitment in the terms of
1. Bart Schuurman and Quirine Eijkman,
research and experimentation, in order to
“Moving Terrorism Research Forward: The
develop models that are ready to use. If AI
Crucial Role of Primary Sources,” The
technologies for predicting terrorism reach
International Centre for Counter-Terrorism -
maturity, greater data access and
The Hague 4, no. 2 (2013), 1-13
centralization- under strict safeguards that
2. For instance: John Horgan, “Issues in could offer a way of mediating infringement
Terrorism Research,” The Police Journal 70, of privacy to proportionate ends. Currently,
no. 3 (1997): 193–202; Ariel Merari, specific regulations of the use of AI for the
“Academic Research and Government purpose of predicting involvement or risk of
Policy on Terrorism,” Terrorism and terrorism are partial, or entirely absent.
Political Violence 3, no. 1 (1991): 88–102; Where restrictions do exist, they often focus
Andrew Silke, “The Devil You Know: on access to data and not on how the data
Continuing Problems with Research on are used. Paradoxically, restricting access
Terrorism,” Terrorism and Political could limit the ability to develop good
Violence 13, no. 4 (2001): 1–14. models that could otherwise improve
compliance with conditions of
3. Alex P. Schmid, “The Definition of proportionality and non-discrimination.
Terrorism,” in The Routledge Handbook of More centralized access with better
Terrorism Research, edited by Alex P. regulation could be fairer than incidental
Schmid (London, New York: Routledge, access at the discretion of whichever actor
2011), 40–41; Schuurman and Eijkman (see or agency is able to obtain it. Existing
note 1), 1–13. assumption- such as the beliefs that broader
access to data is always deleterious for
human rights, and that centralization of
analysis inherently bad- should be reviewed
in the light of technical possibilities for
controlling powers of access and increased
transparency. The development and use of
predictive capabilities can be a valid
justification for a wider access to, and use
of, public data, provided that models are
thoroughly validated before use that the
initial stages of analysis are automated and
that technical measures of control are in
place to prevent misuse. Continued access to
any data for the purpose of countering
terrorism should be contingent on the ability
to derive sufficient predictive value from
those specific data- meaning that
proportionality of access is directly linked to
fulfilment of a legitimate aim. Governments
will use new technological means at their
disposal when pursuing critical
objectives such as public safety. The fact
that AI makes invasion of privacy at scale
much easier means that the use of those
technologies remains a public policy
concern. This does not mean that use of AI
for predicting terrorism by liberal
democracies should be off limits. In fact,
good predictive capabilities based on the
automated analysis of less intrusive data
could be part of sensible restrictions
on disproportionate use of measures that
present greater threats to privacy and other
associated freedoms. A decision-making
process, with measurable performance, with
regard to who should be subject to more
intrusive surveillance may be key to limiting
the use of technically enabled surveillance
where practical limitations are likely to be
eroded. How successfully states manage
the powers that new technology brings them
will continue to reflect how well established
their institutions are, and the strength of
their commitment to protecting citizens’
rights in general.

S-ar putea să vă placă și