How can technology help in preventing terrorist attacks?
(NISHMA NATHA PATIL)
M. Sc-IT Part-1 Roll Num- 199376 ABSTRACT collecting accurate information in these IOT Internet of Things men the often harsh, rugged and mountainous artificial intelligence has its dynamic nature, countries. To assist these forces, commercial efficiency and accuracy led to the hasty and micro-sensors with wireless interfaces could unrestrained explosion of modern intelligent be utilized to study and monitor a variety of security systems, plying vital role in phenomena and environments from a certain monitoring various organizations well as distance for military purposes. In order to industries. Many developing countries are locate hidden terrorist groups and enable facing terrorism from so many years and more effective use of conventional military thus they are implementing their ideas and resources. By using these mobile sensor efforts to survive in the worst circumstances. devices, improving communication for data In this paper, some of the effective transfer from the source, and developing and efficient technologies of IOTs based better ways to monitor and detect threats, security system is been proposed to handle terrorist ability to carry out attacks can be these situations. Its defensive and attacking severely disrupted. mechanism makes possible to detect terrorist NEED OF STUDY activities using behavior analysis from We know that terrorism has become videos of human activities and helping the the latest threat to the peace of the world and institutions and organizations from such its security. Terrorists are improving their terrorist attacks. Initially the system is abilities and sophistication in all aspects of trained using the self-generated and pre- their support and operation. Weapon defined patterns. Some of the agile securities technology has become more increasingly are also used to control the terrorist attacks. available. The purchasing power of terrorist We can say that terrorism is the organization is on the rise with the ready greatest threat to national security and availability of both trained personnel and cannot be defeated by the conventional technology to operate it. military force alone. In the critical areas The terrorists are not only such as Iraq, Turkey and Afghanistan threatening the freedom and ideals of regular forces cannot reach these hostile or democracy but they are also causing a the terrorist groups, the instigators of development of mankind and progress. terrorism. The groups have a clear So there is need for stringent understanding of the relative ineffectiveness provision for prevention of terrorism. Using of the counter-guerrilla operations and they some technologies we can predict the threat rely on the guerrilla warfare to avoid major and would try to prevent from the further combat as their primary means of continuing cause of it. So that the number of attacks are the conflict with the governmental lower down and the security is maintained structures. In the Internal Security within the nations and there is less harm to Operations, detection of terrorist and hostile the life of people. groups in their hiding places such as the caves, lairs, etc. can only be achieved by professionally trained people such as Special Forces or the intelligence units with the necessary experience and tools suitable for INTRODUCTION used by a fraction of only British forces. A The cities are on the frontline of spokesperson for the force said the software crime and terrorism. Some of them are at uses an algorithm which is originally used to more risk than others where all of them are predict earthquakes to estimate the vulnerable. Now days the cities are likelihood of a crime occurring in a experimenting with innovative approaches particular location during a window of time. to preventing crime and countering It will pin a series of locations on the extremism. map where the highest likelihood of a crime The most successful are improving would be occurring to patrol. intelligence gathering, community outreach, For every 15 min spent in the 500ft strengthening policing and investing in new square zone it equates to two hours of no technologies to improve urban safety. These crime. types of cities are said to deploy ‘agile All the officers sitting in a Kent can security’, problem-oriented and data driven access the system from force computers and approaches that speed up decision-making print the out maps to use on patrol. The and design in environmental changes to limit reports give the location and main crime insecurity. types predicted such as robbery, burglary Agile security measures start with and sexual offences and officers are asked to the premise that many types of crime, patrol the areas which are at most risk. radicalization and terrorism are non-random Gunshot: and even predictable. With some exceptions, There is a technology used to reduce they cluster in time, space and among the the gun violence which is called as specific population groups. There is massive ShotSpotter. Here it is like the microphones increase in the computing power and are placed strategically around the high advances in machine learning have made it crime areas so they pick up the sounds of possible to sift through the huge quantities gunfire and alert police to the location of of data related to the crime and terrorism, to shooting’s via dots on a city map. The identify underlying correlations and causes. ShotSpotter also sends alerts to apps on The processing and harnessing of these data cop’s phones. flows is crucial to enabling the agile security “It goes through the dot and found in cities. the casings 11feet from where the dot was according to the GPS coordinates”. So it’s incredibly helpful and has saved a life of DETECTING CRIME BEFORE IT peoples. HAPPENS USING TECHNOLOGIES Role of CCTV in TTPs: Precondition of the agile security is Mainly it is a conceptual framework, connected to the urban infrastructure. When to critically evaluate the role of the closed city authorities, private firms and the civic television circuit i.e. CCTV in the terrorist groups have the access to the real time data TTPs which is (Tactics, Techniques and whether generated by the crime mapping Procedure), which is focusing on camera platforms, CCTVs, smart lights or gunshot system avoidance and targeting. This will be detection systems they can get better at examined in terms of the interplay of tactics detecting crime before it occurs. and the technology, between the surveillance Crime mapping platforms: (provided by the CCTV) and also its Predictive crimes mapping tools had avoidance, or also the destruction as these existed for more than a decade but are only serve a precondition to successfully committing an act of the terrorism, from an Actual instances of attacks on CCTV precondition to successfully committing an equipment and, a recent example of CCTV act of the terrorism from an operational and avoidance strategy in a case of the terrorism. tactical perspective. Some of the circumstances emphasizes on The main role of TTPs in the how the presence of CCTV can be a factor terrorism analysis is that the concept is used in the terrorist TTPs. In particular, the to identify individual patterns of behavior of choice of a specific location for the arming a particular terrorist activity, or also a of an assailant, where there is an illicit particular terrorist organization. This transaction can take place, looked at from a concept of TTPs helps to examine and tactical and the operational perspective; two categorize more general tactics and weapons fundamental operational objectives are in used by a particular terrorist activity, or a fact achieved: particular terrorist organization. The current The initial avoidance of detection approach to the terrorism analysis involves and intervention by security, which has the an examination of the behavior of an potential to disrupt the terrorist operation individual terrorist, or that of a terrorist from going ahead, to start with. organization, in particular their use the The latent- advantage that without specific weapons, used in specific ways; and CCTV coverage a key element in the which may include different tactics and policing is denied, with the lack of real-time strategies being exhibited. Normally the physical evidence being available post-the- technology aspects of tactics, techniques and terrorism event, during investigations, procedures are also treated as the indiscreet leading to prosecutions – which again, elements within the TTPs. However, a which has the potential to disrupt future specific focus on CCTV as an ‘opponent’, so terrorist operation from going ahead. to speak, raises an interesting focus on the specifics of a technology that encourages a Remote Sensing: counter tactic or the operation to be created. Remote sensing from the space can In such case the specific need to destroy or be as simple as taking photographs of the render useless the capacity of police, earth from space using an optical camera security or defense to surveil of an area, and also the photographic film. The sensors collect the information, and digital images of people’s activities. As first stated, the on board a satellite in the either dominate debate to do with CCTV is its geosynchronous orbit [GEO], or an inclined effectiveness in the crime prevention; or the polar low-earth orbit [LEO], perform however, viewed the alternatively, that a remote sensing from the space. In addition terrorist actor likely sees CCTV systems as a to the numerous civilian applications, this potential operational and tactical threat, an technology is also used for military analogy can also be made with known reconnaissance and the verification of criminal and activist perceptions who do target the CCTV specifically. It is argued compliance with arms control treaties and that a likely outcome based on the need to contributing to world security. The achieve the operational security, is the command and the control system of the ‘downing of CCTV’ as a precondition for a terrorist groups leave Radio Frequency (RF) successful attack. This then later point signatures which are easily targeted by the which will be examined next, in two Military Electronic Units. Even though the sections: terrorist groups are need to give a centralized command and control of their stop and counter acts of terrorism, also as activities, they for the gathering of evidence for the will sometimes operate very slow prosecution of such acts. A significant communications, or maybe hand written amount of data about the functioning, notes carried by human messengers from activities and sometimes the targets of the civilian population and making terrorist organizations springs from activities much more difficult to detect. website, chat room and other Internet One of the most important discoveries in communications. Further, increased the detection of these terrorist groups is Internet use for terrorist purposes provides the use of unmanned aircraft, such as a corresponding increase within Pioneer, Harpy, Ranger, Scout, Searcher, the availability of electronic data which Heron, Hunter, I-See, I-View, which, due can be compiled and analyzed for counter- to special features, make detect of terrorism purposes. Law enforcement, inimical groups much easier, using intelligence and other authorities are evaluated data (images and video) sent developing increasingly sophisticated from 3000 m or higher. These planes tools to proactively prevent, detect and with night-sight are ready to observe the deter terrorist activity involving use of the movements of groups in the dark. web . The use of traditional investigative However, these aforementioned methods means, like dedicated translation are supported images of previously found resources for the timely identification of detection, which suggests that the group potential terrorist threats, is must are already located. This study additionally expanding. proposes a system for locating hidden Online discussions provide a chance to groups in places where previously no present opposing viewpoints or to valid signals are detected. Building on the interact in constructive debate, which previous uses of sensors (in environmental can have the effect of discouraging detection) our proposal constitutes a potential supporters. Counter-narratives practical and important addition to mobile with a robust factual foundation could also sensor usage within the sort of tagging or be conveyed through online discussion attaching sensors to domestic animals: the forums, images and videos. Successful detection and site of terrorist groups messages can also demonstrate empathy hidden in caves and harsh environments. with the underlying issues that contribute While the system to radicalization, like political and social proposed doesn't claim to get every conditions, and highlight alternatives to possible human target, it represents an violent means of achieving the desired easily employed additional reconnaissance outcomes.20 Strategic communications tool for the advantage of Special Forces. that provide counter-narratives to terrorist propaganda can also be disseminated Uses of the Internet for via the web , in multiple languages, to countering terrorist activity: succeed in a broad, geographically diverse audience. While terrorists have developed some ways to use the web in furtherance of illicit purposes, their use of the web also provides opportunities for the gathering of intelligence and other activities to “Digital Me” Sitting on the Device: 4. Andrew Silke, “Contemporary Terrorism Studies: Issues in Research,” in Critical Smartphones are getting to be an Terrorism Studies: A New Research extension of the user, capable of Agenda, edited by Richard Jackson, Marie recognizing them and predicting their next Breen Smyth, and Jeroen Gunning (New move. They will understand who you're , York, Abingdon: Routledge, 2009), 34. what you would like , once you want it, how you would like it done and execute tasks upon your authority. CONCLUSION Your smartphone will track you The use of AI for the predictive purpose in throughout the day to seek out ,plan and the countering terrorism is neither inherently solve problems for you said Angie Wang, good nor inherently bad. Rather this are the principle research analyst at Gartner. It way such capabilities are used is critical. will leverage its sensors, cameras and data The current constructs that regulate the use to accomplish these tasks automatically. of predictive AI countering in the terrorism For example, within the connected home, seems unlikely to either safeguard against it could order a vacuum bot to misuse or to enable the most of the scrub when the house is empty, or turn a beneficial use of these technologies, both in rice cooker on 20 minutes before you terms of operational performance and arrive. adherence to human rights principles. Pursuing more concerted efforts to use LITERATURE REVIEW predictive AI in counter terrorism operations would require commitment in the terms of 1. Bart Schuurman and Quirine Eijkman, research and experimentation, in order to “Moving Terrorism Research Forward: The develop models that are ready to use. If AI Crucial Role of Primary Sources,” The technologies for predicting terrorism reach International Centre for Counter-Terrorism - maturity, greater data access and The Hague 4, no. 2 (2013), 1-13 centralization- under strict safeguards that 2. For instance: John Horgan, “Issues in could offer a way of mediating infringement Terrorism Research,” The Police Journal 70, of privacy to proportionate ends. Currently, no. 3 (1997): 193–202; Ariel Merari, specific regulations of the use of AI for the “Academic Research and Government purpose of predicting involvement or risk of Policy on Terrorism,” Terrorism and terrorism are partial, or entirely absent. Political Violence 3, no. 1 (1991): 88–102; Where restrictions do exist, they often focus Andrew Silke, “The Devil You Know: on access to data and not on how the data Continuing Problems with Research on are used. Paradoxically, restricting access Terrorism,” Terrorism and Political could limit the ability to develop good Violence 13, no. 4 (2001): 1–14. models that could otherwise improve compliance with conditions of 3. Alex P. Schmid, “The Definition of proportionality and non-discrimination. Terrorism,” in The Routledge Handbook of More centralized access with better Terrorism Research, edited by Alex P. regulation could be fairer than incidental Schmid (London, New York: Routledge, access at the discretion of whichever actor 2011), 40–41; Schuurman and Eijkman (see or agency is able to obtain it. Existing note 1), 1–13. assumption- such as the beliefs that broader access to data is always deleterious for human rights, and that centralization of analysis inherently bad- should be reviewed in the light of technical possibilities for controlling powers of access and increased transparency. The development and use of predictive capabilities can be a valid justification for a wider access to, and use of, public data, provided that models are thoroughly validated before use that the initial stages of analysis are automated and that technical measures of control are in place to prevent misuse. Continued access to any data for the purpose of countering terrorism should be contingent on the ability to derive sufficient predictive value from those specific data- meaning that proportionality of access is directly linked to fulfilment of a legitimate aim. Governments will use new technological means at their disposal when pursuing critical objectives such as public safety. The fact that AI makes invasion of privacy at scale much easier means that the use of those technologies remains a public policy concern. This does not mean that use of AI for predicting terrorism by liberal democracies should be off limits. In fact, good predictive capabilities based on the automated analysis of less intrusive data could be part of sensible restrictions on disproportionate use of measures that present greater threats to privacy and other associated freedoms. A decision-making process, with measurable performance, with regard to who should be subject to more intrusive surveillance may be key to limiting the use of technically enabled surveillance where practical limitations are likely to be eroded. How successfully states manage the powers that new technology brings them will continue to reflect how well established their institutions are, and the strength of their commitment to protecting citizens’ rights in general.
Evaluate the extent to which technology enables and supports transnational criminal and terrorist operations. Analyze the potential solutions and challenges associated with combating cyber threats on a global scale.