|
Counter-Terrorism, Ethics and Technology : Emerging Challenges at the Frontiers of Counter-Terrorism
“... of machine learning to detect suspicious behavior and hacking computers to gain access to encrypted data...”