ICCT’s Key Publications on Technology and Terrorism

Read ICCT’s key works on technology and terrorism. With technological advances in areas such as drones and AI/facial recognition, the use of these new technologies is putting increased pressure on human rights. Many are asking do they threaten freedom of expression, drive inequality and discrimination, and provide repressive regimes with powerful tools to control their populations? 

1️⃣ Terrorists have always been children of their time. As we increasingly make use of modern technology to ease our own burdens, those with ill intentions can also use the same technologies for their own gains. Read more about the relationship between tech and terrorism in this perspective by Renske van der Veer.

2️⃣ Despite technology being a powerful tool to counter terrorism, the potential trade off is increasing social control by the state. Therefore, accountability in relation to the use of technological CT measures becomes a salient issue. How can these extra powers be effectively counterbalanced? In this paper, Quirine Eijkman reconsiders how to enforce accountability by the state and create effective technological CT measures that can be checked and balanced.

3️⃣ How have advances in technology affected the exchange of intelligence between states? For insight into how global and transnational security risks are tackled by states and why there is an increasing need for building intelligence relations among countries, check out this Research Paper by Bibi van Ginkel.

4️⃣ How has intelligence adapted to the ever-changing threat of terrorism? How crucial of a role does ‘warning’ play in countering and mitigating this threat? To better understand warning’s capabilities and limitations, as well as the nature of intelligence, take a look at this chapter from our Handbook of Terrorism Prevention and Preparedness by Kenneth A. Duncan.

5️⃣ What is the potential threat of extremist/terrorist use of 3D-printed weapons? What factors may impede or promote their adoption of this technology? For answers to these questions and more, dive into this Perspective by Yannick Veilleux-Lepage.

6️⃣ Want to gain a better understanding of the ways in which terrorists use technology? Take a look at our project page, in conjunction with the Global Network on Extremism and Technology (GNET).