Technology Betrayal Continued

By Halima Khan

The tools of the information age which were once welcomed as a great step forward for mankind are now progressively more so being turned into weapons in the “war on terror.” For instance, the G8 countries in recent times approved to integrate biometric passports based on microchips or databases that predetermine physical characteristics such as facial dimensions, fingerprints, iris patterns and voice patterns. More than a few governments are operational in attaining, developing, and linking databases of personal information. Subsequently they will build up on data mining software to verify “signatures” of terrorist movement. It is argued that these intricate information systems engage artificial constructions of the “terrorist” which are too complex for any single human being to comprehend, yet too reducing to serve as a dependable basis for suspicion. Additionally, sanctioning high technology to categorize suspects complicates the matter of liability and responsibility for what is already being practiced in a relatively low-tech approach: the detention, deportation, and even torture of suspects presumed guilty of terrorist association.


The role of information technology in countering terrorism in an era of globalization can itself come under question. Modern terrorism has been typified as a negative comeback to globalization, but at the same time, terrorism has become so effectual by exploiting the very engines of globalization itself. The role of information technology in fighting terrorism, especially intelligence analysis comes fully loaded with the legal challenges that lie as consequence. It takes a network to fight a network, an analyst puts very rightly. But then it takes a network to create a counterfeit network as well.

Information technology is at the heart of both modern terrorism and globalization. Globalization has distorted the distinction between international and domestic terrorism. Terrorism became strictly global in the late 1960s, with the arrival of cheap commercial intercontinental airline travel and international communications. Not accidentally, cheap intercontinental travel and international communications are two of the engines driving globalization and aiding terrorism. Terrorists veil their planning and preparation in a sea of global noise, but a well-resourced terrorist faction has a global scope, span, and presence, withholding no borders and jurisdictions. Terrorists have revealed an ability to exploit information technology. Many have hypothesized that terrorists may soon begin targeting information technology itself, as well as using it as a weapon, for instance with attacks against decisive infrastructures and cyber terrorism. To tackle these issues sufficiently, technology and law must be urbanized in parallel, with mutual respect for each other. This is unprecedented, but indispensable, if a balance is to be maintained in civil security, civil and economic liberty, and technological progress.


1 Comment

Filed under Pakistan

One response to “Technology Betrayal Continued

  1. rex minor

    Let us look at it from a different point of view.
    The so called international terrorism is a diversion, let us call it simply the individual acts of resistance which the secret service and/or the media connect the dots at will and call it globalised acts. Are they really inter- related and of similar nature?

    The Nigerian citizen hiding some sort of explosives in his underwear in a passenger plane is not a great terrorist act or a great technology to warrant the use of scanners. The simple and cheaper way would be to ask the passengers to completely undress and then board the plane. I wonder if the scanners can detect the inner orgens of the human body?
    The use of ‘Echelon’ to collect and listen into the private telephone conversation of people all over the world is a misuse of resources. Let us forget for the time being the rights of individuals to their privacy. How is it humanly possible for analysts to electronically sift through the data obtained on a daily basis to identify if some nut is planning to harm some one. Any idea how many languages are spoken world wide?
    If they were to extend this to ‘E’ mails. It is estimated that on average 21 million entries are recorded daily in the “E Bay” and
    16 million log on to Amazon!

    More important for the justice departments around the world are to watch and control the misuse of illegal acts committed by several States including the US and many other countries. For example the Islraeli Govt. is alleged to have issued false passports of the UK, Ireland and Australia citizenship to their intelligence operators to commit a criminal act in Dubai.