In response to the terrorist attacks of September 11, 2001, the U.S. Government initiated efforts to combat terrorism and irregular adversaries. While terrorism has long been identified as a national security threat, it was no longer viewed as a law enforcement problem, but as a military problem. The Clinton Administration had used the military in retaliation for attacks by international terrorists, but the majority of counterterrorism funding was allocated to the Department of Justice for law enforcement and investigative efforts. After 9/11 the economic emphasis on addressing terrorism shifted to the Department of Defense. (Bradley)
Through public-private partnerships and multilateral cooperation, …show more content…
“Big Data” refers to the extreme volume of data, the various sources of data, and the speed at which the data streams that can be mined for information (Sharma and Gulia). In many cases social media users are identified or can be identified when data collected is combined with data from other sources. When monitoring publicly available information, including social media and online visual media, in combination with digital messages, emails, call activity or search history, law enforcement agencies have access to a rich source of information (Staniforth). To avoid detection, jihadist groups move from public to private communication channels in a process called “going dark.” Chat apps like WhatsApp and Telegram allow the exchange of encrypted messages and files that are unintelligible to law enforcement or that self-destruct after they are read (Graham). Misdirection can also counter Big Data analysis. Before Abdelhamid Abaaoud led the November 13 terror attacks in Paris that killed more than 100 people, his Islamic State accomplices used his phone and other apps to create a digital footprint for him in Syria, masking his return to Europe. (Meichtry and …show more content…
While terrorists have had success avoiding detection using privacy apps with strong encryption, Big Data still is used to uncover attack planning activities and recognize early indicators of radicalization and recruitment, allowing intelligence agencies to stay one step ahead of terrorist events. Based on the earlier successes with the zero-day virus, I believe that software implants will quickly move beyond simply using remote signal detection to find a target to actually subverting the device to monitor itself, which may prove to be the next cyber weapon in the war against