Evolving anti-terrorist technology

Author

Scroll Down

How the dark web has been used both for legal and illegal messaging/transactions.

The big picture—updated

Intense analysis continues as developments in France continue to unfold. Among the facts that are most important for all of us to understand—

  • First, youth attracted to violent extremism are often alienated, socially marginal and, in many cases, have criminal records preceding their recruitment. In fact, they typically are not devout, but religiously illiterate and drawn to ISIS and similar groups because they seductively offer social acceptance and a means for venting their wrath.
  • Second, the vast majority of Muslims are completely repelled by ISIS—though, understandably, those living within reach of that and other terrorist organizations keep a low profile, just as people living in gang-dominated urban neighborhoods in the U.S. keep a low profile.
  • Third, such groups are inspired by an apocalyptic vision of ‘End Days’ and fervently believe they are God’s agents in helping catalyze ‘a war to end all wars.’ This explains why the number one objective of ISIS is to incite the U.S. to engage them in a ground war in Iraq and Syria.
  • Fifth, unfortunately, apocalyptic beliefs also inspire some fundamentalist Christian groups in the U.S. who are among those most eager to engage ISIS on the ground in the Middle East. Together, these two antagonists increase the potential for an unthinkable self-fulfilling prophecy.

A growing security debate over encryption messaging platforms

The big break in quelling the planned-for second wave of terrorist attacks in Paris on Tuesday resulted from authorities accessing the content of the cell phones of dead perpetrators. Their messages to one another had been encrypted, but once received, were accessible to anyone with their devices in hand.

Should Apple, Google, Firefox and major Internet players create ‘back doors,’ making it easier for law enforcement to read encrypted messages in transmission? I’ve posted Insights articles before about how the Dark Web has been used both for legal and illegal messaging/transactions. Recent legislation in the U.S. requires additional oversight from courts in monitoring Internet /phone communications. —Some now argue for reversing those restrictions and also making the Dark Web transparent to security agencies via ‘back door’ access.

 

To date, most encryption services are protected against government surveillance

Authorities already can unencrypt messages sent on some ‘dark’ platforms. Understandably, they prefer to keep terrorist organizations guessing as to which among them remain ‘safe’ for their nefarious purposes. Among the favorites of terrorist and other criminal organizations are WhatsApp, Signal, iMessage, Wickr and Telegram. Telegram, by the way, is among those that are foreign-based (German) and as such is likely to remain outside the reach of the US DHS in the future—especially given the German government’s aversion to N.S.A. surveillance.

Apple’s encryption iMessage service is the most prominent among those that are U.S. based. The President is on record as being opposed to challenging Apple or other U.S.-based encryption services.

Why has he taken this position?

  • If that data couldn’t be encrypted, it would render critical infrastructure and other data vulnerable to criminals and enemy governments. And, it would simply result in terrorists switching to foreign-based encryption services like Telegram.
  • Most importantly, WHEN likely perpetrators are known, then a record of their phone calls, their length and to whom they are made can be monitored, if not their content. This remains the most viable strategy for preventing future attacks. However, European governments need to invest much more in monitoring technology to leverage this opportunity.

In the second in this Insights series, I’ll describe other anti-terrorist technologies that will come into play in the not-too-distant future.

The pros and cons of encryption and the fiery debate about reducing or stopping the flow of immigrants from the war

High tech antiterrorist strategies

It’s likely that Europe, (now Africa), North America and other parts of the world will be hit by ISIS in the months ahead. This seems to be their new strategy. In all the discussions about increasing surveillance budgets, the pros and cons of encryption, and the fiery debate about reducing or stopping the flow of immigrants from the war-torn Middle East, there has been limited coverage of anti-terrorism technology.

New and emerging technologies–

  • Cockpit sensors and autopilot systems–Commercial aircraft cockpit sensors could be installed to send an alarm to operatives on the ground. After an autopilot system kicks in, the plane would quickly lands to a secure location where Navy SEALS or other military personnel storm the plane to engage the terrorist(s). –This is assuming, of course, that the plane isn’t blown out of the sky by a suicide bomber–or, more likely, a carefully concealed/hard-to-detect bomb placed in luggage, as was the case with the Russian plane in Sinai last month –Old style hijackings are less likely now because terrorists are well aware that since 9-11 passengers fight back.

  • Anti missile tech for commercial aircraft–What can we do protect airlines from shoulder-fired missiles, aka Man Portable Air Defense Systems (MANPADS)–that have already successful in bring down planes in Asia, Africa and Central America? Anti missile infra red disrupter systems have been researched and developed, but not implemented, by the Israelis and the U.S. Why? These systems cost $1-2 M per plane. In addition, military experts have expressed doubt about its effectiveness, especially against an advanced MANPADS missile like the one that shot down the Malaysian plane over Ukraine last year. Unfortunately, they are now easier to obtain on the black market in politically unstable countries like Ukraine and Libya. Nonetheless, IF such missiles are used effectively to bring down passenger flights on a regular basis, it could shut down commercial aviation for a very long time.

  • Bio-monitors– U.S. airports are now equipped with Explosives trace detection devices, to scan passengers’ hands and personal items for traces of explosives residue. Getting more publicity, Imaging scanners allow security personnel to see under passengers’ clothing for weapons or explosives have been in place at major airports for several years.

  • On the horizon– Integrating high-resolution video surveillance at airports and onboard with software to analyze facial expressions and body movements for suspicious behavior, including subliminal indicators of high stress and lying.

  • Light guns — Nonlethal laser ‘dazzlers’ that put out a pulsating beam of blinding light could be used by air marshals to temporarily blind an attacker in order to disable him or her without harming other passengers.

  • Super thin, flexible body armor–Ultra thin body armor that is as light as an undershirt has been developed by scientists in the U.S., Europe and China. It’s not yet effective against bullets, but in future iterations may be.