Conclusion
Terrorists have harnessed technology very effectively, especially in the area of communications and intelligence gathering. This has been established by examining how terror groups the use Internet, mobile devices armed with GPS, Bluetooth technology and cellular hacking to advance their aims. Governments have responded accordingly, using technology to monitor the Internet and our physical surroundings (via surveillance cameras), and developing sophisticated explosive detection devices. But technology is not and never will be foolproof. Time and again, terrorists have found creative ways to slip through the security barriers we have painstakingly erected. While governments must maintain a technological edge over terrorists, technology alone is not the solution. It is but one part of a broader counterterrorism strategy.