Terrorists and Technology
Levi West, Director of Terrorism Studies at Charles Sturt University in Canberra, returns to look at how terrorists leverage (or don’t) emerging apps and platforms ranging from social media, to encryption, to cryptocurrencies. We do our best to cut through the hype and look at the very real limits and challenges terrorists face when they become early adopters or even sophisticated users of networks where states have a very real advantage.
This episode also includes another short recollection from Fred Burton. Fred is the former deputy chief of counterterrorism at the Diplomatic Security Service and the author of the best-selling memoir GHOST: Confessions of a Counterterrorism Agent. His other works include Chasing Shadows: A Special Agent's Lifelong Hunt to Bring a Cold War Assassin to Justice and Under Fire: The Untold Story of the Attack in Benghazi.
Previous Post: U.S. Objections to the Afghan Taliban: Ends, Ways, or Means?
Next Post: Bullets of Palestine