Show Summary Details
Contemporary Terrorism Studies

Contemporary Terrorism Studies (1st edn)

Diego Muro and Tim Wilson
Page of

Printed from Oxford Politics Trove. Under the terms of the licence agreement, an individual user may print out a single article for personal use (for details see Privacy Policy and Legal Notice).

date: 01 April 2023

p. 49725. Terrorism, Counter-Terrorism, and Technologylocked

p. 49725. Terrorism, Counter-Terrorism, and Technologylocked

  • Peter Lehr


This chapter looks at the role of technology in the battle against terrorism. Technology was quickly identified as such a potential ‘silver bullet’ following the 9/11 event. This showed that border controls alone are insufficient to prevent terrorist incidents. Technology was able to help with biometrics, data mining, and acquisition to identify terrorists posing as regular citizens. While technology is undeniably useful, it is not fool proof. The chapter uses facial recognition software to illustrate issues with technology. This type of software often comes up with false positives and biases against minority groups. The chapter also raises issues of privacy and civil liberties while referencing the Pegasus spyware scandal as an example.

You do not currently have access to this chapter

Sign in

Please sign in to access the full content.


Access to the full content requires a subscription