When most people consider technology in relation to terrorism they think about drones and surveillance. In reality, there are much more sophisticated methods for fighting terrorism that have evolved out of 9/11. One of the major advancements has been SOMA, which is an artificial intelligence software that uses data about past behavior of terror groups in order to learn rules about the probability of an organization, community, or person taking certain actions in different situations (Cooney, 2008). In a unique collaboration between computer scientists and political scientists, SOMA has generated tens of thousands of rules about the likely behavior of each of about 30 groups (including major terrorist organizations such as Hezbollah, Hamas, and Hezb-I-Islami) (Cooney, 2008).
The National Consortium for the Study of Terrorism and Responses to Terrorism (START) is a U.S. Department of Homeland Security Center of Excellence, tasked by the Department of Homeland Security’s Science and Technology Directorate with using state-of-the-art theories, methods, and data from the social and behavioral sciences to improve understanding of the origins, dynamics, and social and psychological impacts of terrorism (START, 2009). START, based at the University of Maryland, College Park, aims to provide timely guidance on how to disrupt terrorist networks, reduce the incidence of terrorism, and enhance the resilience of U.S. society in the face of the terrorist threat.
START. (2009). National consortium for the study of terrorism and responses to terrorism.
Cooney, M. (2008). Software, portal target, predict terrorist behavior. Retrieved from
One of the major issues I see with technology and its use in this manner is that it is a problem of interconnectivity. The internet connect everything and in order for it to work, there must be access to systems. The problem is really a human issue that is caused by poor policies and allowing systems to be unsafe. When considering a company as a whole with both electronic data and physical assets as the backbone of the company’s success; it is imperative that these assets be protected. The security policy must include several facets of protection such as daily security, threat mitigation, and disaster planning. Daily network security measures must be included for information handling, and other work process related network functions (Microsoft, 2015). Threat mitigation is a facet of the security policy in which managers and employees are aware of potential threats and have system in place for reporting these threats. Policies may include, but are not limited to: permission levels, disabling accounts for departing employees, employees changing positions, and monitoring potential security issues. Policies will also include the enforcement of strong passwords, expiration of passwords when not being used, and monitoring logins from terminals to see if individuals are sharing passwords (Microsoft, 2015). This type of policy making is often overlooked in companies because it is costly to implement.
Microsoft. (2015). Developing Network Security.