加强安全的技术解决方案

VIP文档

ID:53923

大小:0.42 MB

页数:11页

时间:2023-04-08

金币:10

上传者:战必胜
TECHNOLOGY SOLUTIONS TO REINFORCING SECURITY
By Maj Gen P K Mallick, VSM(Retd)
Introduction
21
st
century is characterized by phenomenal growth of technology specially
Information Technology (IT) and Internet. The technology is becoming cheaper, easy
to operate and provide facilities which could not be even imagined decade earlier.
Technology is also a great leveler. Today the same facilities provided by latest
technology advancements are available to violent elements as well as law enforcing
agencies and armed forces. Today’s enemies are dynamic, unpredictable, diverse,
fluid, networked and constantly evolving leading to complex problem sets. Small
networked organizations like insurgents are very good at adopting technology
whereas large, hierarchical, bureaucratic Government organizations take its own
time to exploit its benefits.
1
Technology is central to both terrorism and
counterterrorism, yet each side sees technology in a different way.
Social media has helped like minded people around the world to connect. It has also
aided the causes of violent extremists by networking them to similarly inclined
individuals and organisations. Terrorists excel at exploiting opportunities, But
terrorists did not create Twitter, YouTube, or Facebook although they have used
these platforms extensively. The introduction of artificial intelligence, machine
learning and natural language processing technology to identify and remove terrorist
content online is a positive move to make the Internet safer. Responsible leadership
and decision making are required from governments and technology firms to deliver
the products and services needed to reap the benefits of innovation and make
technology work for everyone.
Use of Technology by Law Enforcing Agencies
There are a number of challenges that policymakers face today in the ever
increasing reliance on technology for countering terrorism today. These include:
The level of engagement with the communities affected by the technology
implementation.
The effectiveness of counterterrorism measures.
The resources dedicated to counterterrorism.
Achieving an appropriate balance between privacy and security.
Data sharing challenges.
Respect for criteria of legitimacy, necessity and proportionality.
1
Brig P K Mallick, Leveraging Technology in CI Ops, Pinnacle, Jun 2008 available at :
https://drive.google.com/file/d/0B7lCgXHBh1PaTlQ3VVZYbFRWbXM/edit
资源描述:

当前文档最多预览五页,下载文档查看全文

此文档下载收益归作者所有

当前文档最多预览五页,下载文档查看全文
温馨提示:
1. 部分包含数学公式或PPT动画的文件,查看预览时可能会显示错乱或异常,文件下载后无此问题,请放心下载。
2. 本文档由用户上传,版权归属用户,天天文库负责整理代发布。如果您对本文档版权有争议请及时联系客服。
3. 下载前请仔细阅读文档内容,确认文档内容符合您的需求后进行下载,若出现内容与标题不符可向本站投诉处理。
4. 下载文档时可能由于网络波动等原因无法下载或下载错误,付费完成后未能成功下载的用户请联系客服处理。
关闭