This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Power

Harnessing the power of big data to counter international terrorism

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Harnessing the power of big data to counter international terrorism

Benefits of Big Data

With the data floating around in various spheres, the security forces realize a new force that they have in their hands in countering the vice. Especially home-grown terrorists through radicalization can be traced through making sense of the vast volumes of data at their disposal and collaboration. It is important to note that intelligence in gathering the information needed to counter terrorism is necessary[1]. Knowing what information can be publicly gathered and what needs to be subpoenaed to be collected is crucial[2].

Counterterrorism as conceptualized by governments across the globe has continued to change and is no longer a shrouded in secrecy as the public is faced with even domestic terrorism[3]. The essence countering terrorism is being able to prevent it rather than mitigating its effects. The unprecedented changes in the nature of terrorism have are occurring at a time when there are technological advancements in information sharing and gathering that add a dynamic dimension to the countering of terrorism[4].

There are cases where national security interests have to supersede the need for respect for privacy of individuals in gathering the data and information needed to infiltrate terror cells and deter attacks.

A point in case is Operation STEPFORD and CREVICE that were landmark cases that gathered data and used it to deter terror attacks to the UK public by putting people in jail through intelligence gathering and following due process[5]. The new face of terrorism is sophisticated and countries and their relevant authorities need all the help they can muster through collaborations in inter-agencies, intelligence sharing across countries and help from the communities where they serve[6]. Authorities need to embed in the public a culture of understanding that their security, in as much it is the responsibility of the state, it begins by them being vigilant and collaborating in sharing information they think might be helpful.

Don't use plagiarised sources.Get your custom essay just from $11/page

Challenges

Considerable steps have been taken in the fight against terrorism with the realization of the vast resource of information available and the potential it holds. However, exploitation of this open-source information and knowing what intelligence is to be prioritized continue to challenge the fight on terror. The nature of the data collected makes it difficult to have monitoring that is constantly proactive and a fat reactive response time[7]. The volumes of data collected while in the process of carrying out counterterrorism operations and just for the sake of keeping tabs on all individuals thought to be potential threats can be overwhelming. The old data that is no longer considered useful intelligence-wise can also be deleted from storage spaces or changed in storage format and kept in archives somewhere.

Another challenge is that the access to big data is not a reserve of the authorities trying to combat terrorism alone. The terrorists themselves have the access privilege through the open-source availability of sophisticated technology. Increasing the level of protection on the data collected, especially the classified information is to be prioritized as the terrorists also have the capabilities of accessing the ‘harnessed data’[8].

Authorities are also faced with the challenge of the possibility of deviating from the actual task. This is a challenge that can be countered through the prioritization of threats in terms of the risks posed together with the seriousness of the source. This way those threats that seem realistic and serious to the public can be identified in an easier manner from the tons of data collected.

Sensitivity

The data can be collected in inter-state/regional areas of jurisdiction and shared though development of technical abilities. However, international diplomacy and interest of nations determine the type of sensitive information that can be shared with certain states. Though countries have their own allies and interests, the fight of terrorism is considered a global effort. The intervention of the United Nations and other regional affiliations also add force to the requirement of information sharing to combat terrorism[9]. The utilization of the Big Data advantages it brings to the addressing of terrorism has to be considered while cognizant of the sensitive nature of the type of information being shared. There are levels of security clearance on requested information/data that will be required on either regional or international levels.

The collection of all the sums of data required for analytics and determination of potential threats means that at times privacy of individuals is overstepped. The institutions that are tasked with protecting the rights of individuals to things such as privacy can impede the effectiveness of combating terrorism. There are also far-right protectionists of the Muslim religion which is often targeted by biased information gathering and interpretation to mean that they are directly related or are sympathizers of acts of terrorists.

Summary / Conclusion

Countering terrorism is no longer the secretive dimension of statecraft that would cost billions of dollars. There is a realization that the proper utilization of the ‘Big Data’ and development of technologically advanced equipment with superior analytics capabilities will be giving governments the ability to adequately address threats from terrorism. Data collected through the various avenues in the wake of technological advancements provides a very effective and efficient way of tackling terrorism. However, it does come with its fair share of challenges. The challenges can be overcome through various interventions and a safer world free of terror could be realized.

Recommendations

The challenge of proactive and reactive response times could be overcome if responsibilities are shared across agencies and vital information spread across the spectrum to have all those involved in the fight against terrorism on the same page. Technological advancements can be funded by governments to go into research on how data can be shrunk and stored in the cloud to reduce the burden of storage[10].

Increasing the level of protection on the data collected, especially the classified information is to be prioritized as the terrorists also have the capabilities of accessing the ‘harnessed data’[11]. The various groups and institutions that might offer resistance to the proper utilization of Big Data through public outcries should also be involved but at certain levels of classification where the threat to national or regional security is not put under compromise.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

References

Abelson, H., Ledeen, K., & Lewis, H. R. Blown to bits: your life, liberty, and happiness after        the digital explosion. Upper Saddle River, NJ, Addison-Wesley. 2008.

Akhgar, B. Application of big data for national security: a practitioner’s guide to     emerging            technologies.http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nleb       &db=nlabk&            N=956791. 2015.

Akhgar, B., Bayerl, P. S., & Sampson, F. Open source intelligence  investigation. Cham,            Springer.http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&db    nlabk&            N=1446648. 2016.

Bush, George W. National Strategy for Combating Terrorism. Morgan James Pub. 2009.

Maan, A. K. Counter-terrorism: narrative strategies.            http://public.eblib.com/choice/publicfullrecord.aspx?p=1901098 2015.

Masferrer, A., & Walker, C. Counter-terrorism, human rights and the rule of          law: crossing   legal boundaries in defence of the state. 2013.

Murphy, C. EU counter-terrorism law: pre-emption and the rule of law. Oxford, Hart Pub.            2012.

 

 

[1] Abelson, H., Ledeen, K., & Lewis, H. R. Blown to bits: your life, liberty, and happiness after the digital explosion. Upper Saddle River, NJ, Addison-Wesley. 2008 p.43

[2]Maan, A. K. Counter-terrorism: narrative strategies.http://public.eblib.com/choice/publicfullrecord.aspx?p=1901098. 2015 p.82

[3] Abelson, H., Ledeen, K., & Lewis, H. R. Blown to bits: your life, liberty, and happiness after the digital explosion. Upper Saddle River, NJ, Addison-Wesley. 2008 p.45

[4] Bush, George W. National Strategy for Combating Terrorism. Morgan James Pub. 2009 p.102

 

[5] Akhgar, B. Application of big data for national security: a practitioner’s guide to emerging technologies.http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nleb &db=nlabk&        N=956791. 2015 p.101

[6] Masferrer, A., & Walker, C. Counter-terrorism, human rights and the rule of         law: crossing legal boundaries in defence of the state. 2013 p.163

[7] Akhgar, B. Application of big data for national security: a practitioner’s guide to emerging technologies.http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nleb &db=nlabk&        N=956791. 2015 p.98

[8] Murphy, C. EU counter-terrorism law: pre-emption and the rule of law. Oxford, Hart Pub. 2012 p.95

[9] Akhgar, B. Application of big data for national security: a practitioner’s guide to emerging technologies.http://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nleb &db=nlabk&        N=956791. 2015 p.53

[10] Maan, A. K. Counter-terrorism: narrative strategies.http://public.eblib.com/choice/publicfullrecord.aspx?p=1901098. 2015 p.73

[11] Murphy, C. EU counter-terrorism law: pre-emption and the rule of law. Oxford, Hart Pub. 2012 p.107.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask