Welcome is sleep, more welcome the sleep of stone Whilst crime and shame continue in the land; My happy fortune, not to see or hear; Waken me not - in mercy, whisper low. Michelangelo
Providence loves life and neural networks are designed to help life prosper and grow, not annihilate. Now that we have clear photographs of the assassins and lot of questions are being raised on how she was killed and issue regarding who was behind her killing, I would suggest that the technology can help resolve this modern age crime in no time. It is easy to establish the identity of the killers and the case will be resolved!
It is said the entire mankind is connected at a distance of 'sixth connection,' in a similar devious manner entire terror network of Alqaeda is connected within a very close core.
To establish the authenticity of tape recorded conversations of Baitullah Masood and the field operators congratulating each other on a very successful operation. Certain names have been mentioned these names of the the killers with the match of their photographs shall establish irrefutably their connection with Alqaeda. 1
Look at the facts and then make your minds. On one hand, technology helps terrorists in planning very elaborate attacks, but on the other, it also helps to smash their cells/networks at Godspeed. The trail left behind by the terrorists helped security forces to trace them and bring them to justice, which in itself is a foremost deterrent for any future attack. It can be argued that a suicide bomber primed to kill is not deterred by anything. However, to make the ability to attack through remote control as hard as possible and finely tune the abilities of security forces to track the origins of such sleeper cells help a lot.
The pictures of the sharply guillotined head of the bomber/and killer were released within 24 hours. The identity can be easily established and shall be soon. If he was Bilal- Badr-Ikramullah/ as we have seen in the taped message most probably picked by F16 planes NAVIGATION systems FLYING OVER Bannu area.1
The identity of the network is now what needs to be established. National ID's will be one easiest route. Once identity is established we will know the network the assassin belongs too. The fascinating graphic of the life of one of the 7/7 bombers, Mohammad Sidique Khan, whose network of contacts was vast, reveals the tentacles of connectivity; it is through this connectivity track that leads become available to help discovery and control of sleeper cells. Similar networks are developed in case of mobile telephones. The hard blue core of the cells becomes quite obvious and can be ring fenced.
People with ill intentions do appear on the radar relatively quickly. Two things help the security forces: one is the close circuit cameras on nearly an entire network; big brother watches all good and evil on the streets of Great Britain. Many call it Orwellian security but who knew that collateral benefits to deter early 90's IRA bombing campaign would provide so much benefit to Londoners in 2000. And the other, the very instruments of peaceful voice and picture transfer now, i.e., mobile telephones with huge databases of servers are able to connect rich information on a criminal/ terrorist's sim card to his entire life and identity. The sim card provides the exact location of the terrorists as they move, and the movements of their cars can be traced once the number plate reading cameras servers are fed with the car registration details; the entire journeys of vehicles on various roads is reconstructed by super computers in no time. Many terrorists and killers have been sentenced to prisons by tracing their mobile coordinates to scenes of crime proving their alibis wrong.
This fascinating graphic of the life of one of the 7/7 bombers, Mohammad Sidique Khan, whose network of contacts was vast, reveals the tentacles of connectivity; it is through this connectivity track that leads become available to help discovery and control of sleeper cells. The connection of these ruthless killers to Baitullah core group will be soon established and once that happens lot of faces will be embarrassed and mortified.
When Dr. Asha, one of the main characters of the recent London bombing was boxed in on the UK motorway by security agents, many of us were baffled as to how his 'mobile' whereabouts were exactly located. GPRS positioning, even when one is not using the telephone, emits signals that help establish coordinates of any mobile user. The telephone that was used to blow the cars around Tiger Tiger left a rich electronic trail that helped the security to arrest the criminals. We are living in an era where involuntarily a collective layer of guard is in evolution. Technology of stone tools from our basic existence to a relatively modern one of microchips has provided us the tools of progress and creation. In purely scientific terms, neural connections within various VOIP tools and internet have resulted into a living technological GIAA sphere.
Technology, if utilised for maiming and destructive purposes, can be helpful but it works the other way exponentially and absolves itself completely; technology rarely allows itself to be abused. It develops counter measures and in effect leaves construction as its trial not destruction. Security agencies now have an incredible fingerprint database that it uses to recognize potential terrorists coming into the country. Set up on the policy of Birds of the Flock Fly Together, any person who crosses paths with a 'cell of terrorist' is not only nailed by the mobile networking that sets up the trail, but finger printing database and cross references are other sources through which the world of terror will shrink. The fingerprints are apparently not just of known terrorists, but also appear to be of people that terrorists might have met in various locations. The US requires all ten fingerprints to be supplied by visitors to the US, because it appears to match latents found through its forensic examination of terrorist meeting spots.