Verified Document

Technologies In Disaster Management The Essay

) and read digitized letters of suicide bombers. Google earth is a software which uses satellite images to enhance maps to a whole new level. However its capabilities can backfire with regards to safety as terrorists might use it to plan attacks on crucial infrastructures (Wright, 2008). Most forms of terrorism originate from jihad (religious struggle). The traditional forms of physical jihad are now being accompanied by electronic warfare. Islamic hacker organizations such as Munazamat Fursan Al-Jihad Al-Electronic and Inhiyar Al Dolar have set up websites to engage hackers in their missions. Technical experts aim at disrupting websites which are controlled by the American government, those which might be contradictory to the mujahideen belief system and Christian websites in general. They coordinate intrusions by Denial of Service attacks which can overload web servers with data packets, causing a major decline in performance. Ping attacks exploit the mechanism of checking system activity by making the incoming pings reach their peak, blocking the buffer space and crashing the network. These organizations target the youth who are accustomed to using the latest technology and are willing to use their expertise for jihadist needs. Mujahideen Secrets 1 was an application published on an Al-Qaeda-based website which lets users conceal their email-based communications using multiple cryptographic algorithms. Updates on the software have added a simpler user interface and the ability to encrypt real time chats as well. Instances of publicly broadcasting inhuman activities such as the beheading of Nicholas Berg, the "heroes of Fallujah" video where a bomb destroys a U.S. carrier and the murder of...

The first step would be to identify an effective interface to reach out to the Muslim community. Their views being promoted online should be replied with a sensible message which counters their extremist path. Efforts such as those taken by the Digital Outreach team of the American government have to be applied in order to establish a strong counter terrorist presence on the web. Informational operations can have far-reaching effects. The United States still has a lot of ground to cover with regards to safeguarding its citizens from extremists and their activities on the web (Wright, 2008).
References

United Nations. (n.d.).The role of Science and Technology in Disaster Reduction. International Strategy for Disaster Reduction. Retrieved December 4, 2010 from www.unisdr.org/eng/public_aware/world_camp/2001/pdf/Kit_2_The_Role_of_Science_and_Technology_in_Disaster_Reduction.pdf

Selvavinayagam, K ( n.d.). Disaster management practices using ArcGIS, ArcIMS,

ArcSDE and Oracle. Retrieved December 5, 2010 from www.stesalit-inc.com/Disaster.pdf

GDIN (Global Disaster Information Network ) (2005) GDIN Homopage.

htpp://www.gdin-international.org

Virtual University for Small States of the Commonwealth (VUSSC) (n.d.).Introduction to Disaster Management.Unit 8: The Role of Technology in Disaster Management. (pp 97-119)

Wright, M. (2008). TECHNOLOGY & TERRORISM Forensic Examiner 17(4)

Sources used in this document:
References

United Nations. (n.d.).The role of Science and Technology in Disaster Reduction. International Strategy for Disaster Reduction. Retrieved December 4, 2010 from www.unisdr.org/eng/public_aware/world_camp/2001/pdf/Kit_2_The_Role_of_Science_and_Technology_in_Disaster_Reduction.pdf

Selvavinayagam, K ( n.d.). Disaster management practices using ArcGIS, ArcIMS,

ArcSDE and Oracle. Retrieved December 5, 2010 from www.stesalit-inc.com/Disaster.pdf

GDIN (Global Disaster Information Network ) (2005) GDIN Homopage.
Cite this Document:
Copy Bibliography Citation

Related Documents

Disaster Management Options for Volcano
Words: 1039 Length: 4 Document Type: Term Paper

Magma and gasses building up just below the surface before an eruption can cause a bulge many miles in diameter. Since they are so large, these swells cannot be seen by the naked eye (Kerr, 2003). Satellite-borne radars alert volcanologists when such bulges appear. The satellites monitor global positioning (GPS) devices on the ground, using triangulation to mark whether the ground is bulging. Yet, again, the lack of a

Disaster Management Theory
Words: 658 Length: 2 Document Type: Research Paper

Safety Those concerned with disaster and development represent diverse interests like; they represent political, practitioner- oriented, academic-theoretical, and policy related issues. This leads to a range of different interests, thus conflicting expectations and hostility in those dealing with development and disaster. Development, economic and societal factors influence a country's vulnerability to disasters. Development is a forward-focused, positive term, while disaster has negative connotations. Development studies and practice, share with disaster management and

Technology in Disaster Management
Words: 671 Length: 2 Document Type: Research Paper

Disaster and Technology Technology In Disaster Management Information technology is the basis of effective decision making. Access to reliable and accurate information is important after a disaster since it opens, share and coordinate system. Access to reliable, accurate and timely information at all levels of society is crucial immediately before, during, and after a disaster. In preparedness for disaster communication needs to anticipate a situation which involves ICT element including; broadcasting radio, television,

Risk Crisis Disaster Management
Words: 3665 Length: 11 Document Type: Essay

Risk Crisis Disaster Management Managing the problems related to global warming is quite different than responding to a damaging earthquake albeit both strategies require careful planning and coordination. This paper points to the contrasts between the two ways of management and response, and offers suggestions from the literature on pre-planning for both eventualities. Managing Strategies for Serious Earthquakes To say that a major earthquake that hits in an urban area is an acute

GIScience in Disaster Management Policy
Words: 1205 Length: 4 Document Type: Essay

FOR TRAINING USE ONLY GIScience Policy AnalysisIntroductionGeographic Information Science and Technology (GIScience) has emerged as an important tool in emergency management with the potential to revolutionize how responses are coordinated in crises. This analysis assesses the proposal to integrate GIScience as a core component of the US Emergency Management System. With its capacity for real-time data analysis, spatial mapping, and predictive modeling, GIScience offers unparalleled advantages in planning, executing, and

Using Information Technology in Disaster Management
Words: 2250 Length: 6 Document Type: Essay

Leveraging Information Systems for Disaster Management In today's digital age, natural as well as man-made disaster management has become an easier task. Several IT features are at our disposal, which can help in both prevention and recovery from disaster. Information technology advances such as satellite communication, the Internet, remote sensing, geographic information system (GIS), etc. have proven extremely valuable in hazard reduction planning and execution processes (Vyas & Desai, 2007). IT

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now