Resilience, Peace and Security

How technology could help predict terrorist attacks

People use computers at an Internet cafe in Changzhi, north China's Shanxi province June 20, 2007. The blocking of Flickr is the latest casualty of China's ongoing battle to control its sprawling Internet. Wikipedia, and a raft of other popular Web sites, discussion boards and blogs have already fallen victim to the country's censors. China employs a complex system of filters and an army of tens of thousands of human monitors to survey the country's 140 million Internet users' surfing habits and surgically clip sensitive content from in front of their eyes.

People use computers at an Internet cafe. Image: REUTERS/Stringer

Sheryl Prentice
Post-doctoral researcher in linguistics, Lancaster University
Share:
Our Impact
What's the World Economic Forum doing to accelerate action on Resilience, Peace and Security?
The Big Picture
Explore and monitor how Internet Governance is affecting economies, industries and global issues
A hand holding a looking glass by a lake
Crowdsource Innovation
Get involved with our crowdsourced digital platform to deliver impact at scale
Stay up to date:

Internet Governance

The internet has become a weapon for terrorists, who use social media and other technologies to organise, recruit and spread propaganda. So is it possible to turn technology around and use it to not only catch terrorists but predict and potentially stop terror attacks before they happen?

One thing we can do is use technology to search for patterns in the activity and language of terrorists and their supporters online. If we can spot trends that typically occur in the run up to an attack, it may be possible to automatically identify when future acts of violence are being planned. In a new study, researchers from Harvard University attempted to do just this. They used computer simulations to show how unofficial groups of online Islamic State (IS) supporters spread and grow through social networking sites and how this relates to the timing of violent attacks.

Global terrorism index 2015
Image: Institute for Economics and Peace

This follows research into how messages on Twitter can be classified to predict whether someone will support or oppose IS. Other researchers have used data-mining techniques on social media data to try to work out when supporters “begin to adopt pro-IS behaviour”.

And others have used text analysis software to show that language patterns used by certain extremist groups differ in the months leading up to a violent attack. For example, the language may show less cognitive complexity – a more simplistic way of viewing the word – if it uses less complex structures, with more short words or sentences.

My own research with Paul J Taylor and Paul Rayson at Lancaster University has used linguistic software to detect patterns in the language used by various Islamic extremist groups and narrow down potential clues in a message. Using the method of collocation, which measures the strength of association between words or between a word and a concept, we showed you could automatically establish whether extremists' messages were portraying people or places positively or negatively. For example, some personal names were significantly associated with the negative term “agentry” (referring to people acting as enemy agents), while others were significantly associated with the positive term “heroic”.

This method could indicate potential terrorist targets by highlighting people or places to which violence or contempt is felt. For example, we might find that the terms “target”, “targeting”, “attack” or “kill” were strongly associated with the name of a particular place, person, or organisation. We could then look at the context of where and how these words were used in the text to work out if they suggested that person, place, or organisation may be in danger.

Other technologies

However, the limitation of this sort of approach is that it excludes attacks that may have happened without this kind of online build up. Each of these studies focuses only on a small aspect of the wider ecosystem of terrorism. So unless we can show that these patterns occur in all types of terror-related situations, we have to be careful not to exaggerate their importance and remember that other factors including political and personal situations can drive acts of violence.

Terrorists’ online communications are only part of the picture. We also have ways of studying terrorists’ offline communicative behaviours by measuring levels of stress or anxiety, or detecting patterns associated with deceit. For example, we can use sensors, infrared scanners and brain imaging technologies such as fMRI to monitor changes in the body or track people’s face, body or eye movements. Some argue that if we deployed this kind of technology in airport security, it might alert us to those intending to carry out an attack.

In 2002, researchers at Honeywell Laboratories in the US showed how thermal imaging technology could identify a heat pattern that occurs around the eyes when people try to deceive someone. They suggested this technique could be used to rapidly screen air travellers during pre-flight interviews “without the need for skilled staff”.

Human factor

But such a system wouldn’t be foolproof. There are a number of reasonswhy an individual may be anxious at an airport, which may have nothing to do with attempts to deceive airline staff. Perhaps they have a fear of flying. These technologies are not 100% accurate. They tend to be tested in lab-based environments and trained on fake attempts to deceive rather than in real-life situations.

Some argue that technology does not have three vital qualities that humans possess: experience, values and judgement. This means that machines may miss something that only a human could detect.

So while technology offers exciting possibilities for tracking terrorist communications and predicting attacks, it isn’t a replacement for human judgement and should be used with caution.

Loading...
Don't miss any update on this topic

Create a free account and access your personalized content collection with our latest publications and analyses.

Sign up for free

License and Republishing

World Economic Forum articles may be republished in accordance with the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License, and in accordance with our Terms of Use.

The views expressed in this article are those of the author alone and not the World Economic Forum.

Related topics:
Resilience, Peace and SecurityFourth Industrial Revolution
Share:
World Economic Forum logo
Global Agenda

The Agenda Weekly

A weekly update of the most important issues driving the global agenda

Subscribe today

You can unsubscribe at any time using the link in our emails. For more details, review our privacy policy.

Global trade can support humanitarian relief. Here's how

Macarena Torres Rossel and Mariam Soumaré

July 15, 2024

About Us

Events

Media

Partners & Members

  • Sign in
  • Join Us

Language Editions

Privacy Policy & Terms of Service

© 2024 World Economic Forum