|In recent years The Characteristicsand modus of operandi of terrorism and criminal acts progress tremendously which makes the combat against the adversary more difficult for us the security forces. Our working methods, strategies and tactics must adapt and cope with the “new reality” and constant changing environment which creates new threats and weapons that the adversary is using against us, this is why new and innovative approaches are necessary to protect and defend against the daily threats.As we use and apply new methods and technology applications into our security protective measures it obvious that the same application (mostly offered in the civilian market) can be used by the adversary against us, the most known example are the 26/11 attack in Mumbai India which demonstrate the terrorist utilization of technology before the execution of attacks and most important during the attacks. (They carried handheld GPS navigators, satellite phones, BlackBerrys and data CDs containing detailed maps and Google Earth images of where they were going.)We have also need to consider the corrective and effective usage and deployment of the technology that will be as an integrated part of our security plan, the adversary constantly trying to identify our “weak points” which he might use in time and place in accordance to his preference, in this context we can relate the recent attempt to blow the Northwest Flight No 253 on 25th of December by Nigerian terrorist which managed to pass the security checks and board the plane with explosives.
In order to accomplish and execute security – In every aspect of life, and in everywhere, there is a need to utilize technology. Every item, tool, or possibility is linked in one way or another to the technological aspect.Technology grants the defending side or the public early knowledge – intelligence, sight and visual electronic tracking possibilities, and a means to counter terrorism – and all of these relate to technology and make use of available technology we have today in the market.
The seminar is composed of analyzing several cases of terrorism and attempted terrorism of different kinds – and how tools – “Of the trade”, different technologies and technological modes of operation helped the defending side to prevent terror and the next attacks