The sounds of gunfire taking place at a computer game. Just as businesses and militaries are turning to e-learning and internet simulations, there’s concern that terrorists could use the same resources. This special police officer on the topic from the UK explains the possibilities for terrorist networks in using such technologies. It’s emerged that US intelligence agencies are also taking this threat seriously. The tactic for these agencies is to figure out what’s �normal� in virtual behavior and try to spot abnormalities that may or may not be linked to terrorist organizations. The problem of �normal� in virtual words can be very similar to what tactics terrorists would train on. This blogger and analyst talks about some of the finer differences, and says he’s not sure the differences could be picked up.
The World is an independent newsroom. We’re not funded by billionaires; instead, we rely on readers and listeners like you. As a listener, you’re a crucial part of our team and our global community. Your support is vital to running our nonprofit newsroom, and we can’t do this work without you. Will you support The World with a gift today? Donations made between now and Dec. 31 will be matched 1:1. Thanks for investing in our work!