Counterterrorism / en AI and Counterterrorism: Potential, Pitfalls, and the Path Forward /blog/ai-and-counterterrorism-potential-pitfalls-and-path-forward AI and Counterterrorism: Potential, Pitfalls, and the Path Forward <span><span lang about="/user/68991" typeof="schema:Person" property="schema:name" datatype>bcook</span></span> <span><time datetime="2024-02-01T15:55:10-05:00" title="Thursday, February 1, 2024 - 15:55">February 1, 2024</time><br><br> </span> <img loading="lazy" src="/sites/default/files/BLOG%20IMAGE%20SIZE%20%2850%29_0.png" width="640" alt="woman in front of map screens" typeof="foaf:Image"> <p>As artificial intelligence (AI) transforms nearly every aspect of modern life, it’s ushered in new opportunities, efficiencies, and conveniences. It’s also bolstering efforts to enhance digital and national security.&nbsp;</p> <p>AI is now poised to alter the landscape of counterterrorism, offering an arsenal of analytical tools and predictive capabilities. However, its integration into this sensitive domain raises several ethical and practical concerns that must be examined and legislated to ensure its responsible use. While the potential benefits of AI in counterterrorism are undeniable, overlooking its potential drawbacks could have far-reaching consequences.&nbsp;</p> <p>&nbsp;</p> <h2>Unleashing the Potential of AI in Counterterrorism</h2> <p>AI’s power lies in its ability to process information and gather insights that are near impossible for humans. Here’s a look at some of the ways AI is leading the way for a new world of counterterrorism.&nbsp;</p> <ul role="list"> <li> <p><em><strong>Data-driven insights:</strong></em> AI excels at navigating mountains of data, from financial transactions to social media activity, extracting hidden patterns and connections that human analysts might miss. This ability enables the <a href="https://www.mccormick.northwestern.edu/news/articles/2023/10/advancing-ai-systems-in-cybersecurity-counterterrorism-and-international-security/" target="_blank">prediction of radicalization pathways and potential events</a>, the disruption of terrorist funding networks, and the tracking of suspicious movements. For example, AI models can analyze vast quantities of financial data and piece together seemingly insignificant transactions that reveal a web of illicit transfers funding a terrorist organization.&nbsp;</p> </li> <li> <p><em><strong>Cybersecurity fortification:</strong></em> The digital world has become a battleground for terrorist groups, who use it for propaganda, recruitment, and communication. AI algorithms can serve as front-line defenders, detecting and stopping cyberattacks, identifying malicious online activity, and rooting out malicious accounts. For example, an AI system could monitor online communications to recognize and neutralize bots that are propagating radical rhetoric before they can infiltrate vulnerable communities.&nbsp;</p> </li> <li> <p><em><strong>Enhanced border security: </strong></em>AI-powered systems like facial recognition cameras can revolutionize border control by analyzing biometric data from travel documents and scanning video footage at checkpoints. This allows for the swift identification of individuals on watchlists or exhibiting suspicious behavior, streamlining security processes while significantly improving detection accuracy.&nbsp;</p> </li> <li> <p><em><strong>Resource optimization and risk assessment:</strong></em> By sifting through crime trends, threat reports, and intelligence data, AI can assist authorities in <a href="https://www.science.org/doi/10.1126/sciadv.abg4778" target="_blank">prioritizing resources and directing investigations toward the most pressing threats</a>. For example, an AI model that analyzes past attacks, social media posts, and suspicious financial activity can identify areas with the highest risk of imminent attacks, enabling authorities to allocate resources proactively.&nbsp;</p> </li> </ul> <h2>&nbsp;</h2> <h2>Navigating the Pitfalls of AI in Counterterrorism</h2> <p>Despite AI’s incredible potential and already significant impact, it comes with an incredible responsibility. Misuse of AI or having systems fall into the wrong hands are considerable concerns.&nbsp;</p> <ul role="list"> <li> <p><em><strong>Bias and discrimination:</strong></em> AI’s weakness lies in its dependence on data supplied by humans, which has built in biases and stereotypes. Biased data leads to biased algorithms, <a href="https://www.icct.nl/publication/states-prevention-terrorism-and-rule-law-challenging-magic-artificial-intelligence-ai#:~:text=Moreover%2C%20the%20use%20of%20AI,against%20particular%20individuals%20or%20groups" target="_blank">potentially profiling and targeting individuals or groups</a> based on factors like race, religion, or ethnicity. This discriminatory application of AI could erode trust in law enforcement and exacerbate existing societal inequalities.&nbsp;</p> </li> <li> <p><em><strong>Privacy concerns: </strong></em>Extensive data collection and analysis raise <a href="https://www.un.org/counterterrorism/sites/www.un.org.counterterrorism/files/countering-terrorism-online-with-ai-uncct-unicri-report-web.pdf" target="_blank">justifiable concerns about individual privacy and potential violations of civil liberties</a>. The use of facial recognition technology, social media monitoring, and other intrusive techniques in the name of counterterrorism must be balanced with robust safeguards to protect privacy rights. For example, AI-powered cameras designed to track terrorists could also track individuals across cities, creating detailed profiles of their movements and interactions, and raising unsettling questions about the erosion of personal liberties.&nbsp;</p> </li> </ul> <ul role="list"> <li> <p><em><strong>Transparency and accountability: </strong></em>AI models can be intricate and mysterious, making it challenging to explain their decision-making processes and address instances of bias or errors. For example, if an AI system flags an individual as a potential threat without providing any explanation or evidence, leaving them with no recourse to challenge the system's judgment, negative impacts are likely.&nbsp;</p> </li> <li> <p><em><strong>Misuse and weaponization: </strong></em>The potential for <a href="https://www.securitymagazine.com/articles/99908-ai-included-in-dhs-national-security-risks-for-2024" target="_blank">malicious actors to weaponize AI for evil purposes</a> cannot be ignored. The development of autonomous weapons systems powered by AI poses significant ethical and safety concerns, raising the potential for a dangerous AI arms race. If a terrorist organization gained access to and manipulated AI-powered systems, they could turn them to strengthen rather than protect against their attacks.&nbsp;</p> </li> </ul> <p>&nbsp;</p> <h2>Navigating the Path Forward for AI in Counterterrorism</h2> <p>The integration of AI into counterterrorism requires a delicate balancing act between security needs and <a href="/blog/ethical-considerations-of-artificial-intelligence">ethical considerations</a>. To unlock its potential while mitigating its risks, developers, legislators, and counterterrorism agencies <a href="https://www.bbc.com/news/technology-67872767" target="_blank">must define and evaluate standards to ensure its responsible use</a>.&nbsp;</p> <ul role="list"> <li> <p><strong><em>Ethical development and deployment:</em></strong> Comprehensive ethical frameworks must be established to ensure the responsible development and deployment of AI in counterterrorism, prioritizing fairness, transparency, and accountability. This includes regular audits of algorithms, public reporting on AI's use, and the establishment of independent oversight bodies.&nbsp;</p> </li> <li> <p><em><strong>Bias mitigation and fairness:</strong></em> Agencies must employ rigorous data curation processes to minimize biased training data and implement fairness-enhancing techniques to ensure unbiased decision-making. This requires collaboration between technologists, ethicists, and social scientists to develop robust solutions.&nbsp;</p> </li> <li> <p><em><strong>Privacy protection and civil liberties:</strong></em> Legislators must implement robust legal and regulatory frameworks to safeguard individual privacy rights and prevent the erosion of civil liberties while enabling effective counterterrorism measures. This includes data minimization practices, strong encryption standards, and clear guidelines on data retention and access.&nbsp;</p> </li> </ul> <p>AI, like all technological advancements, should be met with both optimism and the weight of responsibility. While AI’s potential to revolutionize counterterrorism is undeniable, technologists and legislators must prioritize the development and implementation of robust safeguards to mitigate the risks of bias, discrimination, and privacy violations. If these standards can be met and upheld, AI can exist in a counterterrorism context where security is assured and individual freedoms are protected.&nbsp;</p> <p>Capitol Tech’s programs in <a href="/fields-of-study/computer-science-artificial-intelligence-and-data-science" target="_blank">Computer Science, Artificial Intelligence and Data Science</a> can give you the technical and interpersonal skills required to ensure AI’s effective and responsible use in counterterrorism. Additionally, Capitol's cutting-edge <a href="/degrees-and-programs/bachelors-degrees/counterterrorism-bs">degree programs in Counterterrorism</a> can equip you with the knowledge and resources needed to protect our nation from both foreign and domestic threats. For more information on Capitol Technology’s degree programs, contact our Admissions team at <a href="admissions@captechu.edu">admissions@captechu.edu</a>.&nbsp;</p> Categories: <a href="/blog/category/counterterrorism" hreflang="en">Counterterrorism</a>, <a href="/taxonomy/term/38" hreflang="en">Computer Science, Artificial Intelligence and Data Science</a> <section id="section-46696" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 01 Feb 2024 20:55:10 +0000 bcook 11351 at Defining Terrorism and How it Can Help With Counterterrorism Strategies /blog/challenge-of-defining-terrorism-and-how-it-can-help-counterterrorism-strategies Defining Terrorism and How it Can Help With Counterterrorism Strategies <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2021-09-16T09:13:49-04:00" title="Thursday, September 16, 2021 - 09:13">September 16, 2021</time><br><br> </span> <img loading="lazy" src="/sites/default/files/defining-terrorism-to-help-with-counterterrorism-strategies_0.jpeg" width="640" alt="rows of plastic cups with a lit candles symbolize the challenge of defining terrorism and how it can help with counterterrorism strategies" typeof="foaf:Image"> <div class="WordSection1"> <div alt="rows of plastic cups with a lit candles symbolize the challenge of defining terrorism and how it can help with counterterrorism strategies" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;large&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;image_loading&quot;:{&quot;attribute&quot;:&quot;lazy&quot;}}" data-entity-type="media" data-entity-uuid="472a7c3d-93aa-42fa-be1d-05ef32638099" title="defining terrorism small" class="align-right embedded-entity" data-langcode="en"> <img loading="lazy" src="/sites/default/files/styles/large/public/defining-terrorism-to-help-with-counterterrorism-strategies_0.jpeg?itok=9tV9FB2h" alt="rows of plastic cups with a lit candles symbolize the challenge of defining terrorism and how it can help with counterterrorism strategies" title="defining terrorism small" typeof="foaf:Image"> </div> <p><span><span><span><span><span><span><span><span><span>From the outside, it may seem that the definition of terrorism is obvious, but for those working in the world of security and intelligence, the term can often be nebulous. When is it appropriate to call an event an act of terrorism and why is it so important that the definition be standardized? And how does this tie into counter</span><span>terrorism strategies?</span></span></span></span></span></span></span></span></span></p> <p><strong><span><span><span><span><span><span><span><span>What Qualifies as a Terrorist Group</span></span></span></span></span></span></span></span></strong></p> <p><span><span><span><span><span><span><span><span><span>An</span>&nbsp;<span>evolving definition of terrorism from the group to the individual level represents a shift in recent years in perceptions often with a specific set of people in mind, and can result in stereotyping and profiling. It can also make it difficult to define a terrorist group.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>The Department of Homeland Security (DHS) issued their </span><a href="https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategic-framework-countering-terrorism-targeted-violence.pdf"><span>Strategic Framework for Countering Terrorism</span></a> <a href="https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategic-framework-countering-terrorism-targeted-violence.pdf"><span>and Targeted Violence</span></a><a href="https://www.dhs.gov/sites/default/files/publications/19_0920_plcy_strategic-framework-countering-terrorism-targeted-violence.pdf"> </a><span>in 2019. In the report, DHS discusses the evolving nature of terroristic threats.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>“Domestic terrorists, motivated by racially- and ethnically-motivated violent extremism, anti-government and anti-authority violent extremism, and other violent extremist ideologies, represent a growing share of the threat to the Homeland,” states the report.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>The DHS report also addresses the concern of targeted violence, which may not be “defined” as terrorism but share similar hallmarks.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>“They overlap, intersect, and interact,” says the report. “Addressing one threat can require or lend itself to addressing another. Perpetrators and supporters of terrorism and targeted violence use much of the same toolkit to validate their worldviews, engage with like-minded sympathizers, devise plans, and prepare for attacks.”</span></span></span></span></span></span></span></span></span></p> <p><strong><span><span><span><span><span><span><span><span>Criteria-Based Tracking of Terrorist Attacks</span></span></span></span></span></span></span></span></strong></p> <p><span><span><span><span><span><span><span><span><span>As Kamala Kelkar </span><a href="https://www.pbs.org/newshour/nation/defining-terrorism-consensus"><span>reported for PBS</span></a><span>, Erin Miller and her team at the University of Maryland, compiled the </span><a href="https://www.start.umd.edu/gtd/"><span>Global Terrorism Database</span></a><a href="https://www.start.umd.edu/gtd/"> </a><span>(GTD), which tracks instances of terrorism worldwide dating back to 1970.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>Miller and her team have established a set of criteria that they use to classify an event as an act of terrorism.</span></span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span><span>According to the </span><a href="https://www.start.umd.edu/gtd/downloads/Codebook.pdf"><span>GTD Codebook</span></a><span>, for an event to be added to the database, all three of the following items must apply.</span></span></span></span></span></span></span></span></span></p> <ul> <li><span><span><span><span><span><span><span><span><span><span>“The incident must be intentional – the result of a conscious calculation on the part of a perpetrator.</span></span></span></span></span></span></span></span></span></span></li> <li><span><span><span><span><span><span><span><span><span><span>The incident must entail some level of violence or immediate threat of violence -including property violence, as well as violence against people.</span></span></span></span></span></span></span></span></span></span></li> <li><span><span><span><span><span><span><span><span><span><span>The perpetrators of the incidents must be sub-national actors. The database does not include acts of state terrorism.”</span></span></span></span></span></span></span></span></span></span></li> </ul> <p><span><span><span><span><span><span><span><span><span>The Codebook further specifies that the event must meet at least two of three additional criteria: the goal must be for more than just financial gain (must have a goal focused on systemic change), there must be intention to coerce a group of people larger than just the immediate victims, and it must occur outside of legitimate warfare.</span></span></span></span></span></span></span></span></span></p> </div> <p><strong><span><span><span><span><span><span><span>Can We Define Terrorism</span></span></span></span></span></span></span></strong></p> <p><span><span><span><span><span><span><span><span>The Codebook goes on to acknowledge that there is often overlap between terrorism, hate crimes, organized crime, and insurgent actions and note that some events may not be exclusively terrorism-driven.</span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>It’s not as easy as stating a few sentences to capture an accurate definition of terrorism. As Ward, Kelkar, and Miller all showcased, terrorism is – and likely will continue to be – difficult to define.</span></span></span></span></span></span></span></span></p> <p><strong><span><span><span><span><span><span><span>Impacts on Counterterrorism Strategies</span></span></span></span></span></span></span></strong></p> <p><span><span><span><span><span><span><span><span>The shifting definitions of terrorism as well as the variety of types of terrorist actions and how they are conducted means countering terrorism is full of challenges. The internet, particularly social media, have allowed for easier dissemination of information by terrorist groups.</span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>In the report, DHS has offered five guiding principles for counter</span><span>terrorism efforts. These include:</span></span></span></span></span></span></span></span></p> <ul> <li><span><span><span><span>Understand and adapt to the threat environment</span></span></span></span></li> <li><span><span><span><span>Understand positive and potentially malicious uses of technology</span></span></span></span></li> <li><span><span><span><span>Collaborate with domestic and international partners</span></span></span></span></li> <li><span><span><span><span>Emphasize locally-based solutions</span></span></span></span></li> <li><span><span><span><span>Uphold individual rights</span></span></span></span></li> </ul> <p><span><span><span><span><span><span><span><span>Ultimately, counterterrorism efforts involve a high level of understanding of the changing terroristic landscape and being able to adapt and change to current and future threats.</span></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><span>Capitol Tech offers bachelor’s, master’s, and doctoral degrees in </span><a href="/fields-of-study/security-intelligence-and-critical-infrastructure"><span>Security, Intelligence, and Critical</span></a> <a href="/fields-of-study/security-intelligence-and-critical-infrastructure"><span>Infrastructure</span></a><span>. Many courses are offered online. For more information, contact </span><a href="mailto:admissions@captechu.edu"><span>admissions@captechu.edu</span></a><span>.</span></span></span></span></span></span></span></span></p> Categories: <a href="/blog/category/counterterrorism" hreflang="en">Counterterrorism</a> <section id="section-31896" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 16 Sep 2021 13:13:49 +0000 zqureshi 7801 at Growing National Focus on Fighting Domestic Terrorism Has Many Complexities /blog/biden-adminnistration-focus-fighting-domestic-terrorism Growing National Focus on Fighting Domestic Terrorism Has Many Complexities <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2021-03-18T11:27:32-04:00" title="Thursday, March 18, 2021 - 11:27">March 18, 2021</time><br><br> </span> <img loading="lazy" src="/sites/default/files/Biden%20Administration%20focus%20on%20fighting%20domestic%20terrorism.jpg" width="640" alt="a close up of the White House and its flag symbolize the Biden Administration's focus on domestic counterterrorism efforts " typeof="foaf:Image"> <div alt="a close up of the White House and its flag symbolize the Biden Administration's focus on domestic counterterrorism efforts " data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;large&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;image_loading&quot;:{&quot;attribute&quot;:&quot;lazy&quot;}}" data-entity-type="media" data-entity-uuid="73663615-a1eb-41e4-9296-272514f37595" title="capitol hill fighting domestic terrorism" class="align-right embedded-entity" data-langcode="en"> <img loading="lazy" src="/sites/default/files/styles/large/public/Biden%20Administration%20focus%20on%20fighting%20domestic%20terrorism.jpg?itok=h8AYXLjC" alt="a close up of the White House and its flag symbolize the Biden Administration's focus on domestic counterterrorism efforts " title="capitol hill fighting domestic terrorism" typeof="foaf:Image"> </div> <p><span><span><span><span><span><span><span>The January 6 attack on the Capitol continues to resonate throughout the counterterrorism community. In his first few weeks in office, President Biden labeled the attackers “domestic terrorists” and ordered a domestic threat assessment to further identify potential threats from extremist networks.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Press Secretary Jen Psaki shared details of Biden’s plan in a press conference in January. In addition to the threat assessment, Biden’s plan includes directing the National Security Council to expand its capabilities for handling domestic threats and a request that all related federal departments work on enhancing efforts to combat terrorism.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>“The NSA will undertake a policy review,” reported Joey Garrison for <a href="https://www.usatoday.com/story/news/politics/2021/01/22/biden-orders-threat-assessment-domestic-violent-extremism/6676776002/"><span>USA Today</span></a>, summarizing Psaki’s statements, “to determine how the government can share information more effectively to address threats, prevent radicalization and disrupt violent extremist networks.”</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Counterterrorism efforts often focus on attacks “originating” outside of the United States, such as those that occurred on September 11, 2001. However, the recent attack on American soil – in America’s capital, has redirected many efforts inward. The goal is to not reinvent the wheel, but to build on those initiatives that are already in place.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Some express concerns with Biden’s plan, though, in terms of how terrorism is currently defined and how laws surrounding freedom of speech may come into play.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><a href="https://www.usatoday.com/story/opinion/todaysdebate/2021/02/22/joe-biden-domestic-terrorism-law-ask-merrick-garland-editorials-debates/6766577002/"><span>USA Today’s Editorial Board</span></a> responded to word that the Biden administration is considering a new domestic terrorism law. </span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>“The definition of a terrorist under federal law is anyone who commits violence ranging from murder to destruction of property with the intent of intimidating or coercing a civilian population, influencing government policy through intimidation or coercion, or to affect the conduct of the government,” shared the editors, noting that currently the law only applies in terms of international terrorism.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>In a ruling by the Supreme Court, they continue, if the government declares an organization located inside the United States as a terror group that may violate First Amendment protections.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Legislation was proposed in early 2020 that would result in regular, detailed assessments of domestic terrorism and would allocate resources in areas of most need. At this time, however, that bill is still sitting with the Committee on the Judiciary.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Military Involvement in Domestic Terrorism</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Adding complexity is the involvement of current and former military in domestic terrorism. Nearly 48 percentof investigations opened by the FBI in 2020 were related to concerns about domestic extremism, shared Jeff Seldin for <a href="https://www.voanews.com/usa/biden-administration-going-after-violence-crackdown-domestic-terrorism"><span>VOA News</span></a>. Seldin also shared that George Washington University estimated 20 of the 181 Capitol attackers were former military.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>On February 5, Defense Secretary Lloyd Austin ordered a stand-down, or pause in military operations, “to give the leaders of the military services a chance to talk about the spread of extremist ideology and the impact it is having on military members,” reported Seldin.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span><a id="_gjdgxs" name="_gjdgxs"></a></span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>While the legal impacts at the national level are still to be determined, it’s clear that the definition of terrorism is changing, and those in counterterrorism need to be prepared for potential attacks both inside and outside of the United States.</span></span></span></span></span></span></span></p> <p><span><span><span><span><span><span><span>Want to learn about counterterrorism? Capitol Tech offers an <a href="/degrees-and-programs/bachelors-degrees/counterterrorism-bs"><span>Online Bachelor’s in Counterterrorism Degree</span></a>. To learn more about this Online degree C, contact <a href="mailto:admissions@captechu.edu"><span>admissions@captechu.edu</span></a>. </span></span></span></span></span></span></span></p> Categories: <a href="/blog/category/counterterrorism" hreflang="en">Counterterrorism</a> <section id="section-28941" class="section background-white"> <div class="super-contained"> </div> </section> Thu, 18 Mar 2021 15:27:32 +0000 zqureshi 7221 at How To Build A Career In Counterterrorism /blog/how-to-build-a-career-in-counterterrorism How To Build A Career In Counterterrorism <span><span lang about="/user/826" typeof="schema:Person" property="schema:name" datatype>zqureshi</span></span> <span><time datetime="2020-11-16T13:20:05-05:00" title="Monday, November 16, 2020 - 13:20">November 16, 2020</time><br><br> </span> <img loading="lazy" src="/sites/default/files/How%20To%20Build%20A%20Career%20In%20Counterterrorism.jpg" width="640" alt="a person who has built a career in counterterrorism looks at a computer screen with maps and software" typeof="foaf:Image"> <div alt="a person who has built a career in counterterrorism looks at a computer screen with maps and software" data-embed-button="media_browser" data-entity-embed-display="media_image" data-entity-embed-display-settings="{&quot;image_style&quot;:&quot;&quot;,&quot;image_link&quot;:&quot;&quot;,&quot;image_loading&quot;:{&quot;attribute&quot;:&quot;lazy&quot;}}" data-entity-type="media" data-entity-uuid="2137bf82-f4fd-4891-8af6-192fff4cab00" title="build a career in counterterrorism" class="align-right embedded-entity" data-langcode="en"> <img loading="lazy" src="/sites/default/files/How%20To%20Build%20A%20Career%20In%20Counterterrorism.jpg" alt="a person who has built a career in counterterrorism looks at a computer screen with maps and software" title="build a career in counterterrorism" typeof="foaf:Image"> </div> <p><span><span><span><span><span><span>There are many fields in which someone interested in cyber and information security can pursue a career. One area that is always in demand is counterterrorism.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>What is counterterrorism?</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>Counterterrorism involves implementing coordinated strategies in order to prevent or combat terrorist attacks of all kinds – physical and digital. The first counterterrorism unit was established in Britain in the 1880s and since then has become a major part of every country’s defense strategies.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Counterterrorism brings together government, military, law enforcement, intelligence agencies, and business to enforce tactics, techniques, and strategy aimed at overcoming terrorism. While terrorism is often considered a threat from a foreign entity, counterterrorism efforts also tackle concerns from within the United States.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>Why is counterterrorism important in today’s world?</span></span></strong></span></span></span><br> <span><span><span><span><span><span>The U.S. faces consistent terrorist threats, on both the large and small scale. The Country Reports on Terrorism 2019, produced by the Department of State, lists ISIS and al-Qa’ida (AQ) as persistent threats. There has also been an increasing threat from racially or ethnically motivated terrorism (REMT), particularly white supremacist terrorism.&nbsp;</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Successful terrorist attacks have terrible immediate consequences, with loss of life at the top of the list, and physical destruction creating additional problems. Attacks may impact key pieces of critical infrastructure, such as water, electricity, and food services. The impact of attacks linger, leading to emotional turmoil for those who experienced the attack, financial consequences for both affected individuals and countries, and vulnerability to future attacks.</span></span></span></span></span></span></p> <p><span><span><span><strong><span><span>What opportunities are available to those studying counterterrorism?</span></span></strong></span></span></span></p> <p><span><span><span><span><span><span>As reported in the </span></span></span></span></span></span><a href="https://www.prnewswire.com/news-releases/global-outlook-for-the-counter-cyber-terrorism-market-to-2027---firewall-sector-forecast-to-record-a-3-7-cagr-and-reach-us17-3-billion-by-2027--301105745.html"><span><span><span><span><span><span><span>Counter Cyber Terrorism – Global Market Trajectory &amp; Analytics</span></span></span></span></span></span></span></a><span><span><span><span><span><span> report, the global market for counter cyber terrorism is estimated at $30 billion for the year 2020, with $8.8 billion of that attributed to the U.S. The global market is expected to reach $37.9 billion by 2027.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>As such, there is a large market for skilled intelligence and cybersecurity staff to assist in preventing terrorist attacks.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>There are a number of government agencies that are looking to hire for jobs related to counterterrorism. These include:</span></span></span></span></span></span></p> <ul> <li><span><span><span><span><span><span>Department of Homeland Security</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>National Counterterrorism Center</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>Department of Defense</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>Central Intelligence Agency</span></span></span></span></span></span></li> <li><span><span><span><span><span><span>Federal Bureau of Investigation</span></span></span></span></span></span></li> </ul> <p><span><span><span><span><span><span>Government-related businesses, like Lockheed Martin and Booz Allen Hamilton, also hire counterterrorism staff.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Jobs in this field include intelligence analyst, records examiner, counterterrorism analyst, and strategic analyst.</span></span></span></span></span></span></p> <p><span><span><span><span><span><span>Want to learn more? Capitol Tech offers bachelor’s, master’s and doctorate degrees in </span></span></span></span></span></span><a href="/fields-of-study/security-intelligence-and-critical-infrastructure"><span><span><span><span><span><span><span>security, intelligence, and critical infrastructure</span></span></span></span></span></span></span></a><span><span><span><span><span><span> and </span></span></span></span></span></span><a href="/fields-of-study/cyber-and-information-security"><span><span><span><span><span><span><span>cyber and information security</span></span></span></span></span></span></span></a><span><span><span><span><span><span>. Many courses are available both on-campus and online. To learn more about Capitol Tech’s degree programs, contact </span></span></span></span></span></span><a><span><span><span><span><span><span><span>admissions@captechu.edu</span></span></span></span></span></span></span></a><span><span><span><span><span><span>.&nbsp;</span></span></span></span></span></span></p> <p><br> &nbsp;</p> Categories: <a href="/blog/category/counterterrorism" hreflang="en">Counterterrorism</a> <section id="section-27491" class="section background-white"> <div class="super-contained"> </div> </section> Mon, 16 Nov 2020 18:20:05 +0000 zqureshi 6686 at