chapter  7
22 Pages

Fixated individuals and the state’s response: networked security

WithJELLE VAN BUUREN

This chapter discusses how computerized decision support systems and various computational techniques can be used to analyze and understands weak signals of an upcoming terrorist attack by a lone actor. It argues that it is common for terrorist organizations to use social media in order to spread information and propaganda. The Internet and social media have an enormous effect on modern society. The use of encryption techniques and password-secured sites may be used for exchanging sensitive information. Fixation behavior is described by Meloy et al. as behavior indicating an increasingly pathological preoccupation with a person or a cause. The surveillance issue usually divides people into two groups: those in favor and those against. Even though it is likely that natural language processing capabilities will increase further in the future, it is not necessarily the case that social media monitoring is the way to go to fight lone actor terrorism.