1,496
Views
5
CrossRef citations to date
0
Altmetric
Original Articles

Intelligence for Counter‐Terrorism: Technology and Methods

Pages 48-61 | Published online: 03 Aug 2011
 

ABSTRACT

In recent years, access to new information, communications and weapons technologies has enabled criminal and terrorist operations on a scale previously unobtainable. While the number of terrorists and terrorist organizations has increased, the nature of their operations has changed dramatically as well. Understanding and countering modern terrorist operations poses a significant challenge for law enforcement and security services. In many cases technologies open to terrorist abuse have evolved far more rapidly than the technologies and methods needed to counter them effectively, even in the most advanced nations, which are at least a generation behind the terrorists in some areas. In countering terrorism, police and intelligence services need timely and effective access to terrorist communications, as well as the ability to interdict weapons shipments and other logistics. Given the nature of the new technologies, these have become very difficult tasks. As terrorists have become increasingly sophisticated in their operations, demands on counter‐terrorist operations and technologies have escalated as well. In meeting these challenges it is important to note that in some cases the solution will involve both new laws as well as new technologies. In other cases, it may be necessary to face the facts that some operations are currently beyond the reach of the law or the technology base, and alternative approaches will need to be found. This article reviews the current technology base used by terrorists; explores the challenges posed for counter‐terrorist operations; and suggests areas where new technologies may be of use in meeting these challenges.

This article is part of the following collections:
New Frontiers in Intelligence Studies

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.