Top 5 Technical Innovations In The War Against Terrorism

Technology in the War against Terrorism

More than conventional war and deadly battles among nations our time is more concerned with terrorist attacks and the wide ranging casualties and mass panic caused by them. Naturally for most part of the world fighting terrorism is an immediacy and priority that no longer can be taken lightly. In the past 2 decades or so the world has seen a variety of most sophisticated and lethal terrorist attacks taking thousands of lives and dismantling normal livelihood for many people. With the rise of terrorism as a bigger force, technical sophistication in weaponry and maneuvers for counter w terrorism efforts is in great demand. Here, we have picked top 5 technical innovations in the war against terrorism.
Real time surveillance through aerial drones
Unmanned aerial vehicles (UAV) or drones are widely being used by security agencies worldwide and in the recent years they became more important for surveillance in areas prone to terrorist activities. Security drones offer real time surveillance images of a vast area with scrupulous details. With real time sharing of surveillance images traffic and police it becomes much easier for the traffic petrol and counter terrorism forces to track and nab any potential threat.
Backscatter X-Ray

Backscatter X-Ray scans are more like normal X-Ray scans but they just scan penetrating slightly past the skin surface. In detecting all types of dangerous organic and inorganic materials hidden by the carrier can be easily detected by this technology. Normally metal detectors fail to scan dangerous elements that are organic in nature and this scanning technology helps to prevent such situation with additional scan in security intensive zones. In the post September 11 scenario every major US airports embraced this security scanning technology to protect itself from any potential security threats for its crew and passengers on board. It’s a handy tool to fight the war against Terrorism.

Corner shot gun:

war against terrorism

This gun was first developed by Israeli security forces as part of their regular research on counter terrorism measures. We all know Israeli forces have to involve in anti insurgent activities on a regular basis across the whole troubled zone of Palestine. This typically maneuverable gun was developed for fighters in Special Forces who have to undergo difficult situation in nabbing terrorists and rescuing hostages. The gun is more like a semi automatic pistol with a camera but the only difference that makes it special is its ability to bend round the corner. This facilitates shooting without making the shooter exposed to the enemy. Many police forces and counter terrorist agencies are increasingly showing interest in this ammunition to fight an effective war against terrorism.
Biometric technology


The most important thing in combating any terrorist offensive begins with the identification of the threatening individuals that stealthily can work out an offensive plan. In the wake of the new counter terrorism measures and technologies getting information and scanning for potential threats in any individual became extremely important. Bio-metric information provides a detailed set of data concerning the behavioral and physical characteristics of the person. Bio-metric information of a person has little chance of being falsified or illegally maneuvered as this information are part of the person himself and security agencies in no time can verify the identity of an individual in question.

StingRay – stealthy device to catch cell phone signals


StingRay is a new surveillance device that makes capturing cell phone signals a lot easier than before. This highly sophisticated stealthy spy device just can do magic when security agencies want to identify the location of a person based on his cell phone signal. It can track cell phone signals in a variety of environments including homes, vehicles, insulated buildings or anywhere. The device works as fake cell towers and through phone data and activities such as messages, calls or emails tracks down the device location.
Stay tuned for more updates: Visit


Popular posts from this blog