top of page

Tech, Terrorism & Counter-Terrorism:

The Learning Competition?

Tech, Terrorism & Counter-Terrorism: The Learning Competition?

With the advent of the computer and the internet, we entered the information age. The internet has allowed terrorist organizations, as well as lone terrorists, to quickly and effectively reach a global pool of potential supporters and to spread their ideology and propaganda to the public with relative ease. Terrorists use technology when trying to connect with one another, plan an operation, teach operational tactics, finance, radicalize and recruit, thus forcing technological advancements in the field of counter-terrorism.

 

Artificial intelligence and other tools are being simultaneously developed and deployed to counter terrorists' use of these technologies. This plenary session will examine different technologies that terrorists are exploiting, how they are exploiting it and why. The session will also explore how certain tech is being developed and deployed to counter terrorists' use of the internet and to aid practitioners, analysts, and politicians in safeguarding the global population. A wide range of tech-related topics will be discussed, including cyber-terrorism, hacking and crypto currency.

IMG_4582.jpg
ICT Connect

Subscribe to get news, events and publications from ICT 

©2023 by NWS. Proudly created with wix.com

bottom of page