10 Nov The impact of technological advances on security
Technological advances have a major impact on security, and criminal organizations also keep pace with advancing technologies to conduct well-structured attacks. With access to new technologies, they can have access to tools that allow them to develop high-impact weapons, and detecting the creation of this type of weapon is an increasingly urgent task to anticipate any type of attack. Reliable partners need to be involved in the ubiquitous surveillance process, and society needs to actively participate, being alert and well-informed to know how to reduce vulnerability.
Terrorists are using increasingly efficient tools and varying their strategies to carry out their attacks. Researchers, industry, security, and intelligence professionals recognize the need to escalate and prioritize terrorist attack issues using new technologies.
New technologies can offer security measures for the early identification of potential attacks. The methods of pre-detection of intent to build massive weapons are improving, but it is necessary to know how to identify potential terrorists and anticipate any attack, to prepare society not to fall into traps. A number of potential pre-detection technologies and methods were evaluated to help shape potential policies to address emerging threats. Some of these involved multispectral sensors that collect biometric data to identify individuals, software systems for automatic social media monitoring, robots acting as security guards for high-value infrastructure, and crowd scanning, among others. All these methods were formulated in common agreement between researchers, scientists, and security and intelligence professionals.
Author: Francine Martin
Gordon, T., Florescu, E., Glenn, J., & Sharan, Y. (2016, July). Identification of Potential Terrorists and Adversary Planning: Emerging Technologies and New Counter-Terror Strategies. Retrieved from IOS Press BV: https://books.google.at/books?id=bUbiDgAAQBAJ&lpg=PR1&ots=7mvM-rYJyq&dq=Potential%20exploitation%20of%20emerging%20technologies%20by%20terrorist&lr&pg=PR3#v=onepage&q=cordis&f=false