{"id":420,"date":"2013-04-29T10:57:08","date_gmt":"2013-04-29T14:57:08","guid":{"rendered":"https:\/\/www.mysecuritysign.com/blog\/?p=420"},"modified":"2023-05-09T02:06:26","modified_gmt":"2023-05-09T06:06:26","slug":"boston-bombing-technology","status":"publish","type":"post","link":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/","title":{"rendered":"Boston bombing: surprising technologies that stop and track terror"},"content":{"rendered":"<p>In less than a week, the Boston bombers have been identified, tracked down, and arrested. Surveillance camera footage was key in doing so. The surviving suspect was apprehended in a collaborative effort; law authorities asked the public for photos of the marathon and released photos of suspects to them. Social media helped people quickly share images and information, making it difficult for the two young men to hide.<\/p>\n<div style=\"width: 522px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"   \" title=\"Boston-Bombing-Memorial\" src=\"https:\/\/i2.cdn.turner.com\/cnn\/dam\/assets\/130423184916-kessler-boston-photos-story-top.jpg\" alt=\"memorial for boston bombing victims\" width=\"512\" height=\"288\" \/><p class=\"wp-caption-text\">People clicking photos at a memorial for Boston marathon victims. (Image via <a href=\"https:\/\/edition.cnn.com\/2013\/04\/24\/opinion\/kessler-digital-forensics\/index.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CNN<\/a>)<\/p><\/div>\n<p>CNN <a href=\"https:\/\/edition.cnn.com\/2013\/04\/24\/opinion\/kessler-digital-forensics\/index.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">reports<\/a>, \u201cThe Boston Marathon bombing investigation made use of crowdsourcing to collect photos and video from cell phones and <a href=\"https:\/\/www.mysecuritysign.com\/video-surveillance-signs\" target=\"_blank\" rel=\"noopener noreferrer\">surveillance<\/a> cameras at an unprecedented level. These pictures were made public a little more than 72 hours after the explosions and the second suspect was arrested 29 hours later.\u201d<\/p>\n<p>Retracing the footsteps of the Boston bombing suspects digitally was another key tool in apprehending the suspects. NBC <a href=\"https:\/\/usnews.nbcnews.com\/_news\/2013\/04\/21\/17852502-terrorists-may-leave-digital-breadcrumbs-for-investigators?lite\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">reports<\/a>, \u201cThe same Internet that makes it easy for terrorists and killers to research targets and stock up on ammunition also makes it easier for them to get caught quickly, thanks to &#8216;digital breadcrumbs&#8217; that are hard to erase.\u201d<\/p>\n<p>Mark Rasch, former head of the Justice Department&#8217;s computer crime unit and now an independent consultant at MarkDRasch.com, said, &#8220;The first place you find digital breadcrumbs is in deleted or cached files.&#8221;<\/p>\n<p>It wasn&#8217;t just digital forensics that helped locate the suspects fast. Fox News <a href=\"https:\/\/www.foxnews.com\/tech\/2012\/12\/18\/criminal-minds-episodes-could-help-nab-terrorists\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">reports,<\/a> \u201cToday in the U.S., there are several software programs regularly used by police agencies for geographic profiling, including Rigel, CrimeStat and Dragnet. They identify the most likely \u201canchor points\u201d of a criminal &#8212; such as their home or girlfriend\u2019s apartment &#8212; a technique that could also be applied to locate those points for a terrorist organization with numerous cells or the release of a biological weapon.\u201d<\/p>\n<p>New techniques for foiling terrorists continue to emerge. Besides sniffer dogs, honeybees can and have been trained in minutes to detect a wide range of explosive compounds. (Source: <a href=\"https:\/\/www.homelandsecuritynewswire.com\/new-device-uses-sniffer-bees-detect-explosives\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Homeland Security News Wire<\/a>)<\/p>\n<p>More sophisticated techniques include fluorescence quenching. When a nitrated molecule settles down next to a detector compound, \u201celectromagnetic resonances bleed energy out of the detector, reducing (or quenching) the fluorescence.\u201d (Source: <a href=\"https:\/\/spectrum.ieee.org\/tech-talk\/at-work\/test-and-measurement\/sniffing-out-explosives?utm_source=feedburner&amp;utm_medium=feed&amp;utm_campaign=Feed%3A+IeeeSpectrumAerospace+%28IEEE+Spectrum%3A+Aerospace%29\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">IEEE Spectrum<\/a>)<\/p>\n<p>Advanced optical technologies like laser infrared spectroscopy, search for \u201ccharacteristic absorption patterns\u201d of explosives. Photodissociation\/laser-induced fluorescence emits a distinctive fluorescent signature to signal the presence of bombs. It helps to look for solid traces of explosive, especially those transferred to the bomb-makers hands, clothing, and then left on backpack straps, vehicle panels, door-handles, windows, railings, or walls.<\/p>\n<p>These tools enable intelligence officials to react more and more quickly to possible terrorist threats. As Columbia University School of International and Public Affairs adjunct professor Abraham Wagner says: &#8220;police and intelligence work have uncovered about 45 plots since September 2001, and may have discouraged a number of others.\u201d<\/p>\n<div class=\"related-products\">\n<h3>Like this topic? Check out our related products:<\/h3>\n<ul>\n<li>\n<div class=\"wraptocenter\"><a href=\"\/video-surveillance-signs\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/www.mysecuritysign.com\/\/img\/sm\/S\/Video-Surveillance-Notice-Sign-S-5229.gif\" alt=\"\" \/><\/a><\/div>\n<p>Video Surveillance Signs<\/li>\n<li>\n<div class=\"wraptocenter\"><a href=\"\/mss\/security-signs\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/www.mysecuritysign.com\/\/img\/sm\/K\/Video-Recorded-Surveillance-Sign-K-4174.gif\" alt=\"\" \/><\/a><\/div>\n<p>Security Camera Signs<\/li>\n<li>\n<div class=\"wraptocenter\"><a href=\"\/mss\/cctv-signs\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"https:\/\/www.mysecuritysign.com\/\/img\/sm\/K\/CCTV-Video-Surveillance-Sign-K-4710.gif\" alt=\"\" \/><\/a><\/div>\n<p>CCTV Signs<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In less than a week, the Boston bombers have been identified, tracked down, and arrested. Surveillance camera footage was key in doing so. The surviving suspect was apprehended in a collaborative effort; law authorities asked the public for photos of the marathon and released photos of suspects to them. Social media helped people quickly share [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":3018,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[18,15,20,19],"class_list":["post-420","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trespassing","tag-boston-bombing","tag-surveillance-2","tag-technology","tag-terror-attacks"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Boston bombing: surprising technologies that stop and track terror -<\/title>\n<meta name=\"description\" content=\"Find out how simple to more advanced technology helped in nabbing Boston bombing suspects, and deterred many terror plots.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Boston bombing: surprising technologies that stop and track terror -\" \/>\n<meta property=\"og:description\" content=\"Find out how simple to more advanced technology helped in nabbing Boston bombing suspects, and deterred many terror plots.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/trespassingsignscctvsigns\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-29T14:57:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-09T06:06:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/211288.p3cdn1.secureserver.net\/wp-content\/uploads\/2013\/04\/130423184916-kessler-boston-photos-story-top.jpg?time=1722559791\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aurora\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mysecuritysign\" \/>\n<meta name=\"twitter:site\" content=\"@mysecuritysign\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aurora\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/\"},\"author\":{\"name\":\"Aurora\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/6d51df47d53b37640cc277c19a5407b1\"},\"headline\":\"Boston bombing: surprising technologies that stop and track terror\",\"datePublished\":\"2013-04-29T14:57:08+00:00\",\"dateModified\":\"2023-05-09T06:06:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/\"},\"wordCount\":501,\"image\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/130423184916-kessler-boston-photos-story-top.jpg\",\"keywords\":[\"Boston bombing\",\"surveillance\",\"technology\",\"terror attacks\"],\"articleSection\":[\"Trespassing\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/\",\"name\":\"Boston bombing: surprising technologies that stop and track terror -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/130423184916-kessler-boston-photos-story-top.jpg\",\"datePublished\":\"2013-04-29T14:57:08+00:00\",\"dateModified\":\"2023-05-09T06:06:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/6d51df47d53b37640cc277c19a5407b1\"},\"description\":\"Find out how simple to more advanced technology helped in nabbing Boston bombing suspects, and deterred many terror plots.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/boston-bombing-technology\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/130423184916-kessler-boston-photos-story-top.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/130423184916-kessler-boston-photos-story-top.jpg\",\"width\":640,\"height\":360},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/\",\"name\":\"\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mysecuritysign.com/blog\\\/#\\\/schema\\\/person\\\/6d51df47d53b37640cc277c19a5407b1\",\"name\":\"Aurora\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Boston bombing: surprising technologies that stop and track terror -","description":"Find out how simple to more advanced technology helped in nabbing Boston bombing suspects, and deterred many terror plots.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/","og_locale":"en_US","og_type":"article","og_title":"Boston bombing: surprising technologies that stop and track terror -","og_description":"Find out how simple to more advanced technology helped in nabbing Boston bombing suspects, and deterred many terror plots.","og_url":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/","article_publisher":"https:\/\/www.facebook.com\/trespassingsignscctvsigns","article_published_time":"2013-04-29T14:57:08+00:00","article_modified_time":"2023-05-09T06:06:26+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/211288.p3cdn1.secureserver.net\/wp-content\/uploads\/2013\/04\/130423184916-kessler-boston-photos-story-top.jpg?time=1722559791","type":"image\/jpeg"}],"author":"Aurora","twitter_card":"summary_large_image","twitter_creator":"@mysecuritysign","twitter_site":"@mysecuritysign","twitter_misc":{"Written by":"Aurora","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/#article","isPartOf":{"@id":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/"},"author":{"name":"Aurora","@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/6d51df47d53b37640cc277c19a5407b1"},"headline":"Boston bombing: surprising technologies that stop and track terror","datePublished":"2013-04-29T14:57:08+00:00","dateModified":"2023-05-09T06:06:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/"},"wordCount":501,"image":{"@id":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/130423184916-kessler-boston-photos-story-top.jpg","keywords":["Boston bombing","surveillance","technology","terror attacks"],"articleSection":["Trespassing"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/","url":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/","name":"Boston bombing: surprising technologies that stop and track terror -","isPartOf":{"@id":"https:\/\/www.mysecuritysign.com/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/#primaryimage"},"image":{"@id":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/130423184916-kessler-boston-photos-story-top.jpg","datePublished":"2013-04-29T14:57:08+00:00","dateModified":"2023-05-09T06:06:26+00:00","author":{"@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/6d51df47d53b37640cc277c19a5407b1"},"description":"Find out how simple to more advanced technology helped in nabbing Boston bombing suspects, and deterred many terror plots.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mysecuritysign.com/blog\/boston-bombing-technology\/#primaryimage","url":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/130423184916-kessler-boston-photos-story-top.jpg","contentUrl":"https:\/\/www.mysecuritysign.com/blog\/wp-content\/uploads\/2013\/04\/130423184916-kessler-boston-photos-story-top.jpg","width":640,"height":360},{"@type":"WebSite","@id":"https:\/\/www.mysecuritysign.com/blog\/#website","url":"https:\/\/www.mysecuritysign.com/blog\/","name":"","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mysecuritysign.com/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mysecuritysign.com/blog\/#\/schema\/person\/6d51df47d53b37640cc277c19a5407b1","name":"Aurora"}]}},"_links":{"self":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/420","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/comments?post=420"}],"version-history":[{"count":4,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/420\/revisions"}],"predecessor-version":[{"id":4438,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/posts\/420\/revisions\/4438"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/media\/3018"}],"wp:attachment":[{"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/media?parent=420"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/categories?post=420"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mysecuritysign.com/blog\/wp-json\/wp\/v2\/tags?post=420"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}