The sounds of gunfire taking place at a computer game. Just as businesses and militaries are turning to e-learning and internet simulations, there’s concern that terrorists could use the same resources. This special police officer on the topic from the UK explains the possibilities for terrorist networks in using such technologies. It’s emerged that US intelligence agencies are also taking this threat seriously. The tactic for these agencies is to figure out what’s �normal� in virtual behavior and try to spot abnormalities that may or may not be linked to terrorist organizations. The problem of �normal� in virtual words can be very similar to what tactics terrorists would train on. This blogger and analyst talks about some of the finer differences, and says he’s not sure the differences could be picked up.
The story you just read is not locked behind a paywall because listeners and readers like you generously support our nonprofit newsroom. Now more than ever, we need your help to support our global reporting work and power the future of The World. Can we count on you?