{"id":57736,"date":"2015-11-24T00:00:00","date_gmt":"2015-11-23T22:00:00","guid":{"rendered":"https:\/\/richardvanhooijdonk.com\/blog\/digital-warfare-terrorism-of-the-future-part-1\/"},"modified":"2024-12-19T22:13:46","modified_gmt":"2024-12-19T20:13:46","slug":"digital-warfare-terrorism-of-the-future-part-1","status":"publish","type":"post","link":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/","title":{"rendered":"Digital warfare &#8211; terrorism of the future &#8211; part 1"},"content":{"rendered":"<p>&#8220;Government services are slow and bureaucratic and there is no communication or collaboration, whether nationally or internationally. They are unable to keep up with the exponential speed of technological developments which enable terrorists to commit attacks.&#8221;<\/p>\n<p>Last week\u2019s terrorist attack in Paris was awful. And, of course, everyone suddenly has an opinion or a solution. Rotterdam\u2019s mayor Aboutaleb suggested we eliminate all 50,000 IS fighters in one go. France immediately sent ten F-16 planes to bomb IS capital Raqqa. We will see a winter of bombings. Even England, Australia and Russia are following suit with stern language. Out of 50,000 fighters, more than 10,000 are located in terrorist cells scattered throughout the world. As the attacks draw nearer to Europe, we will see an increase in the number of cells to be eliminnated. These are groups of Jihadis who, via the Internet or mobile communication, receive encrypted messages with orders to attack. For months or even years, they can live among us as ordinary citizens, a pleasant neighbour or good friend. As wolves in sheep\u2019s clothing, almost impossible to find. Will Europe or the Netherlands still be able to provide safe havens for us in the future? Are our security services able to protect us?<\/p>\n<p>As a trendwatcher and futurist, my days are filled with exploring technology trends and their impact on people, businesses, governments and therefore also terrorism. After the Paris attacks last weekend we\u2019re all talking about extremism and terrorism again; on radio and TV as well as in blogs, newspapers and magazines. We talk about border security, bombing IS, the victims and the fear of it happening again. What hardly seems to be a topic of discussion, however, is the terrorists\u2019 biggest friend and ally: digital &#8211; the backbone of IS and the foundation for terrorist operations. But digital is also the basis for fighting terrorism. Intelligence and investigation services; it is an almost incomprehensible cat-and-mouse game. This article provides an overview of the digital technology deployed to combat terrorism and, indeed, to protect us.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-31433 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/anonymous-digitaal-terrorisme-1.jpg\" alt=\"Computer screen with white Anonymous mask\" width=\"801\" height=\"400\"><br \/>\nSource: <a href=\"http:\/\/www.shutterstock.com\/g\/Neydt\">NeydtStock \/ Shutterstock.com<\/a><\/p>\n<p>We\u2019re all aware of the rapid development of new technology; robots, drones, sensors, big data, Internet of Things, bio and nanotech and 3D printing. The speed at which technology is developing today is unprecedented. Meanwhile, Moore&#8217;s Law has been defeated and computer chips are now 3,500 times smaller, 60,000 times faster and contain 19,000 times more energy. In the next five years we\u2019ll see even faster acceleration in these developments than we\u2019ve experienced in the past 50 years, allowing for more opportunities to combat terrorism, but it will also enable prolific growth of terrorism itself.<\/p>\n<p>Related lecture: <a href=\"https:\/\/richardvanhooijdonk.com\/keynote\/trends-2040-ben-jij-er-klaar-voor\/\">Trends! On to 2030<\/a><\/p>\n<h2>Technology to fight terrorists<\/h2>\n<p>We have many interesting techniques at our disposal to fight terrorism; some techniques are still being developed while others are already used on a small scale. Below is an overview of the technologies investigative organisations should deploy in order to protect the world from terrorism.<\/p>\n<ul class=\"bold-list\">\n<li>Biometric identification<\/li>\n<li>Big data can predict terrorist attacks<\/li>\n<li>Robots<\/li>\n<li>Cameras that detect explosives<\/li>\n<li>Electromagnetic weapons<\/li>\n<li>Nanotechnology<\/li>\n<li>Virtual reality<\/li>\n<\/ul>\n<h2>Biometric identification<\/h2>\n<p>When it comes to identifying people, passports no longer suffice. Identification documents which are indistinguishable from the real thing can be created in an instant. Terrorists own factories which provide these on demand. We are, therefore, looking for new ways to identify people. At many airports, passengers can now identify themselves with an iris scan. I no longer have to show my passport. The gate opens as soon as there\u2019s a 100% match between the original iris scan and the recorded version. Unfortunately, this is only possible at my home airport. Due to the lack of appropriate systems and arrangements my iris scan can\u2019t be sent to other airports. This also illustrates the problems we face when we look at the bigger picture. The techniques are there but they are not used and there is no co-operation; a thorn in the side of the security forces.<\/p>\n<p>Besides iris recognition we currently have identification technologies that use fingerprints, breath, voice and face. <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/selfies-and-electronic-tattoos-the-future-of-biometric-data-collection-and-authentication\/\">New types of biometric identification<\/a> include the veins in our bodies and DNA matching but also \u2013 believe it or not &#8211; odour, heart rate, skin texture and shape of the ear. New systems such as Future Attribute Screening Technology (FAST) will soon make an entrance at schools, shopping malls and other areas where there\u2019s large gatherings of people.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-31436 size-full\" src=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/sites\/4\/2019\/05\/digitaal-terrorisme-biometric-1.jpg\" alt=\" Blue digital screen with iris scanner\" width=\"801\" height=\"400\"><\/p>\n<p>Every day, large crowds of people walk through our streets and our railway stations. In 2015, one of the largest railway stations in the southern part of China started using a facial recognition system. The recordings of travellers are compared with a database of wanted criminals and escapees. The system, which has been in development since 2002, can check 5 people per second. The intelligent recognition system is now also used at various large APEC (Asia-Pacific Economic Cooperation) gatherings.&nbsp;A solid and clear policy for biometric identification is crucial. In 2025, lack of biometric identification may result in people being deported to their countries of origin.<\/p>\n<h2>Big data can predict terrorist attacks<\/h2>\n<p>Big data and algorithms can help predict terrorism. The University of Maryland has developed a program which, based on 770 variables such as news, geo-political situation, location and political events, can predict when and where an attack is likely to take place. All this information has been gathered over a period of 20 years and mainstream news and publications on terrorism are still added daily. It\u2019s basically a type of <a href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/the-many-talents-of-ibms-supercomputer-watson\/\">IBM\u2019s Watson<\/a>, which specifically focuses on terrorism. The calculation methods are similar to the methods Amazon uses to predict customer behaviour. The software is designed to get a grip on the many attacks that are taking place in India and Pakistan.<\/p>\n<p>PredictifyMe was initially used to map customer and patient behaviour for hospitals, insurers and retailers. The available datasets can map out groups and individuals on the basis of 100,000 variables and combine this information with flight details, key events, behaviour on social media and data from cameras. Another provider, Soothsayer, claims to be able to predict a terrorist attack with 72% accuracy by using 200 different indicators. Both parties are active in Pakistan and want to contribute to the fight against the large number of terrorist attacks in Pakistani schools.<\/p>\n<p><iframe title=\"Could this company predict the next terror attack?\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/BR1nV5gg8w4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe><br \/>\nVideo credits: <a href=\"https:\/\/www.youtube.com\/channel\/UCe-4xQosMQGkIA8mT4sR98Q\" target=\"_blank\" rel=\"noopener noreferrer\">CNN Money<\/a><\/p>\n<p>Researchers at the Ram\u00f3n Llull University in Spain have developed a system through which pictures and videos can be matched with all public image and video databases all over the world. The system can be connected to social media and sends out alerts when a social media profile suddenly becomes inactive for a time and then is reactivated in a suspicious part of a different country. A terrorist found in this way can then immediately be eliminated by a drone. This may paint a rather macabre picture but it\u2019s a very realistic and highly likely future scenario.<\/p>\n<p>The use of smart data in wars is proving increasingly successful. Israeli intelligence services use data from satellites, videos, speeches and news to detect and eliminate Hamas terrorists. Obviously, in close cooperation with the American NSA. Terrorists leave behind large amounts of data via smartphones and other devices, social media, computers and countless cameras and sensors on cars and machines. Almost everything we do can be digitally monitored, stored and analysed. This allows us to get close to the actual perpetrators but also to those who fund the attacks. Algorithms can scan millions of sources and draw conclusions on the basis of artificial intelligence. Individuals in countries where digital (Internet, mobile) is well-represented generate more than one terabyte of data per year. Within ten years, this will be more than 20 terabyte. So we have more and more data available which can be processed by supercomputers to nearly 100% accurate predictions.<\/p>\n<p>The technology is currently available to law enforcement agencies in various parts of the world but Europe seems to struggle to find its way to these smart systems. There are, however, some first steps now towards the field of &#8216;risk assessment&#8217;. Supercomputers can link travel patterns to people, places and events, making the search for potential terrorists more targeted. On the flipside, because of the algorithms still \u2018learning\u2019, this also increases the chance of innocent people ending up on the &#8216;terrorist-list\u2019.<\/p>\n<p>See also:&nbsp;<a href=\"\/digital-warfare-terrorism-future-part-2\/\">Digital warfare &#8211; terrorism of the future &#8211; part 2<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Government services are slow and bureaucratic and there is no communication or collaboration, whether nationally or internationally. They are unable to keep up with the exponential speed of technological developments which enable terrorists to commit attacks.&#8221; Last week\u2019s terrorist attack in Paris was awful. And, of course, everyone suddenly has an opinion or a solution. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":48014,"parent":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[2885],"tags":[4230,4237],"article-type":[],"trends":[],"class_list":["post-57736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","tag-government","tag-terrorism"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Digital warfare - terrorism of the future - part 1 - Richard van Hooijdonk Blog<\/title>\n<meta name=\"description\" content=\"Digital - The Backbone &amp; Foundation For Terrorist Operations. &amp;#x2705 Check Out How We Can Use Digital Tech To Fight Back. (Part I - Big Data &amp; Biometrics)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital warfare - terrorism of the future - part 1 - Richard van Hooijdonk Blog\" \/>\n<meta property=\"og:description\" content=\"Digital - The Backbone &amp; Foundation For Terrorist Operations. &amp;#x2705 Check Out How We Can Use Digital Tech To Fight Back. (Part I - Big Data &amp; Biometrics)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/\" \/>\n<meta property=\"og:site_name\" content=\"Richard van Hooijdonk Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-23T22:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-19T20:13:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/Toekomst-van-terror-management.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"526\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Hein\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Hein\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/\"},\"author\":{\"name\":\"Hein\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\"},\"headline\":\"Digital warfare &#8211; terrorism of the future &#8211; part 1\",\"datePublished\":\"2015-11-23T22:00:00+00:00\",\"dateModified\":\"2024-12-19T20:13:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/\"},\"wordCount\":1401,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Toekomst-van-terror-management.jpg\",\"keywords\":[\"Government\",\"Terrorism\"],\"articleSection\":[\"Cybercrime\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/\",\"name\":\"Digital warfare - terrorism of the future - part 1 - Richard van Hooijdonk Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Toekomst-van-terror-management.jpg\",\"datePublished\":\"2015-11-23T22:00:00+00:00\",\"dateModified\":\"2024-12-19T20:13:46+00:00\",\"description\":\"Digital - The Backbone & Foundation For Terrorist Operations. &#x2705 Check Out How We Can Use Digital Tech To Fight Back. (Part I - Big Data & Biometrics)\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Toekomst-van-terror-management.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/05\\\/Toekomst-van-terror-management.jpg\",\"width\":800,\"height\":526,\"caption\":\"Dark world map with explosions and man with balaclava\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/digital-warfare-terrorism-of-the-future-part-1\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/en\\\/keynotespreker-trendwatcher-en-futurist\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Digital warfare &#8211; terrorism of the future &#8211; part 1\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"name\":\"Richard van Hooijdonk Blog\",\"description\":\"Keynote speaker, trendwatcher and futurist\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#organization\",\"name\":\"Richard van Hooijdonk BV\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"contentUrl\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/logo-footer-1.png\",\"width\":100,\"height\":72,\"caption\":\"Richard van Hooijdonk BV\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.richardvanhooijdonk.com\\\/#\\\/schema\\\/person\\\/cd9351ef31c33ebb6dd4efd845fe2b37\",\"name\":\"Hein\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g\",\"caption\":\"Hein\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Digital warfare - terrorism of the future - part 1 - Richard van Hooijdonk Blog","description":"Digital - The Backbone & Foundation For Terrorist Operations. &#x2705 Check Out How We Can Use Digital Tech To Fight Back. (Part I - Big Data & Biometrics)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/","og_locale":"en_US","og_type":"article","og_title":"Digital warfare - terrorism of the future - part 1 - Richard van Hooijdonk Blog","og_description":"Digital - The Backbone & Foundation For Terrorist Operations. &#x2705 Check Out How We Can Use Digital Tech To Fight Back. (Part I - Big Data & Biometrics)","og_url":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/","og_site_name":"Richard van Hooijdonk Blog","article_published_time":"2015-11-23T22:00:00+00:00","article_modified_time":"2024-12-19T20:13:46+00:00","og_image":[{"width":800,"height":526,"url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/Toekomst-van-terror-management.jpg","type":"image\/jpeg"}],"author":"Hein","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Hein","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/#article","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/"},"author":{"name":"Hein","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37"},"headline":"Digital warfare &#8211; terrorism of the future &#8211; part 1","datePublished":"2015-11-23T22:00:00+00:00","dateModified":"2024-12-19T20:13:46+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/"},"wordCount":1401,"publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/Toekomst-van-terror-management.jpg","keywords":["Government","Terrorism"],"articleSection":["Cybercrime"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/","url":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/","name":"Digital warfare - terrorism of the future - part 1 - Richard van Hooijdonk Blog","isPartOf":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/#primaryimage"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/Toekomst-van-terror-management.jpg","datePublished":"2015-11-23T22:00:00+00:00","dateModified":"2024-12-19T20:13:46+00:00","description":"Digital - The Backbone & Foundation For Terrorist Operations. &#x2705 Check Out How We Can Use Digital Tech To Fight Back. (Part I - Big Data & Biometrics)","breadcrumb":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/#primaryimage","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/Toekomst-van-terror-management.jpg","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/05\/Toekomst-van-terror-management.jpg","width":800,"height":526,"caption":"Dark world map with explosions and man with balaclava"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.richardvanhooijdonk.com\/en\/digital-warfare-terrorism-of-the-future-part-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.richardvanhooijdonk.com\/en\/keynotespreker-trendwatcher-en-futurist\/"},{"@type":"ListItem","position":2,"name":"Digital warfare &#8211; terrorism of the future &#8211; part 1"}]},{"@type":"WebSite","@id":"https:\/\/blog.richardvanhooijdonk.com\/#website","url":"https:\/\/blog.richardvanhooijdonk.com\/","name":"Richard van Hooijdonk Blog","description":"Keynote speaker, trendwatcher and futurist","publisher":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.richardvanhooijdonk.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.richardvanhooijdonk.com\/#organization","name":"Richard van Hooijdonk BV","url":"https:\/\/blog.richardvanhooijdonk.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","contentUrl":"https:\/\/blog.richardvanhooijdonk.com\/wp-content\/uploads\/2019\/04\/logo-footer-1.png","width":100,"height":72,"caption":"Richard van Hooijdonk BV"},"image":{"@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/blog.richardvanhooijdonk.com\/#\/schema\/person\/cd9351ef31c33ebb6dd4efd845fe2b37","name":"Hein","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/17c0b4046546bb0e1add38c8f8f5e3d0b4a016ca1bf1f7d002bb95611e4bbda4?s=96&d=mm&r=g","caption":"Hein"}}]}},"_links":{"self":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/comments?post=57736"}],"version-history":[{"count":0,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/posts\/57736\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media\/48014"}],"wp:attachment":[{"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/media?parent=57736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/categories?post=57736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/tags?post=57736"},{"taxonomy":"article-type","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/article-type?post=57736"},{"taxonomy":"trends","embeddable":true,"href":"https:\/\/blog.richardvanhooijdonk.com\/en\/wp-json\/wp\/v2\/trends?post=57736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}