Terrorist Groups Use of Cloud Technology dissertation

Download this dissertation in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from dissertation:

Terrorist Group's Use Of Cloud Technology

After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of science and technology in the context of world affairs, however lopsided development led to religious fundamentalism and also the terrorist ethos.

The world was for a long time in dread of nuclear weapons, but these too have taken a different dimension. Nations, even rogue nations with nuclear power are not the threat but a fanatic group that succeeds in hijacking a nuclear missile, for example, is. Though science and technology have been blamed for environmental disasters, the proliferation of technology is also a provision of a means of violence, and computing and information technology could well be the next weapon. Under such a condition, with the world depending more and more on the IT infrastructure, is cloud computing a possible victim of the terrorist? Secondly can a terrorist outfit carry on their operations unmolested using cloud computing? What would be the possible outcome of such a situation? Can the world cope with the threat? The threat is not idle as will be shown in the analysis.

2. Thesis Statement:

The thesis follows the line of thinking that terrorists will look for any medium of information exchange, communication and financial operations and control of their militia, the criteria being that there should not be a source that can tap into their activities. Especially since the mobile phone used widely for its communications by Bin Laden was his organizations undoing and his death, it is likely that the other terrorists would seek medium that is safe from the intelligence agencies and can remain undetected for long. The cloud computing and grid systems are exactly that.

Therefore the thesis statement - "Terror groups utilize technology to advances to plan, fundraise, recruit, and promote their ideology while offering a degree of anonymity. Cloud computing/technology (the Cloud) is the latest advancement terror groups will seek to employ in future." This is supported by the fact that terror outfits operates exactly on the same model as the military. Take the LTTE for example which even had their planes. Tactics and methods of the terrorists show that this hypothesis will be proved true in the future. The reason is that terrorists think like soldiers and believe in strategy and using resources based on the goals objectives, intentions, and the method of executing. Naturally the strategy and tactics will use the methods that are most practicable. The crude way that the terrorists have used to spread terror has been the use of "arson; bombs in vehicles; remote controlled explosions; 'Molotov cocktails'; biological and chemical materials disseminated offensively; grenades; gun attacks (hand and automatic); mortar attacks; attacks with rocket launchers; knife attacks; machete attacks; hijacking of vehicles and aircraft; and so on."

The use of mobile technology by the Al Qaeda was effective insofar as it resulted in the September attacks, and the organization was also exposed by their mobile use. The internet is being used by many organizations and many countries allow these groups to conduct affairs anonymously. Therefore as the technology improves the masterminds of these organizations also look to use these methods and technology as fast as possible and try to adapt faster than regular business. Especially the technology that is safe, secure and free from leaks. The cloud is just that. It is secure and encrypted and protected. The information revolution caused advances in the technology of communication and organization with the advent of cyberspace. With the modern methods of data processing especially online, there has come about the existence of a "virtual society" also called the global community wherein all the persons of the globe can access the resources of the net with little outlay. Therefore the community now is the force behind the business, government, military and international perceptions. It was observed far back in 1999 that "as cyber space evolves, the terrorists are becoming interested in this new medium"

There is scope for spreading ideology, gaining adherents, control of the cadres and passing of encrypted information. Therefore we cannot brush aside the possibility of cloud becoming their new haven. There is also historical evidence to prove this fact.

3. Historical (terror groups use of technology)

Taking terrorism as an organized crime it can be seen that terrorism is a result of an economic need or as seen in the case of Al-Qaeda as a religious fundamentalism. Such organizations receive shelter and funds domestically and the major source of funds are drug dealing and other criminal activities like kidnapping, extortion, money laundering, smuggling and even counterfeit currencies.

Organizations like OMshinrikyo in Japan or the Al Qaeda use religious grouping and use of religion to create terrorists or criminal outfits. That crimes against the U.S. especially would occur cannot be ruled out. This has been due to the hatred by the impoverished nations against the United States and other capitalist nations which translates to the fact that wealth is held in developed countries while all other places are impoverished. Such a notion of the wide spread misery in the undeveloped countries which is attributed to the actions of the Western nations seem to get wide support for the terrorists and in some places they also enjoy legitimacy.

The terrorist will exist in nations that are in antipathy to the U.S. Or the developed nations. So some community will always find support from governments that fund terrorists. The Department of the Treasury issued a 'Terrorist Assets Report,' in December 2004 and this report showed that the United States succeeded in blocking funds to the tune of ten million dollars.

So far, funding is achieved by smuggling and trafficking in drugs. The drug trafficking is a source that brings funds that then flowed into all the nations monetary system along with generally legitimate funds mostly by buying and dealing with real estate and also vehicles. The recent changes in technology have facilitated growth of a new type of global crime syndicates. The changes in technology and means of global banking have also given the criminal better avenues at operation. This can be exemplified by pointing to the rising cyber crimes, and use of sophisticated computers and machines in white collar crimes and the rising incidents of mobile phone and other gadget misuse. These would intensify and funds can be transferred in anonymity if the cloud is not policed or accountability created. Technology today is digital, and involves computers and other communication devices and involves audio, video and other facilities, and involve at present video conferencing, scanning and generally telemetries and other content delivery features.

Thus cloud computing will enhance these facilities and make the work of the terrorist easier with regard to communication and creating ill will to nations of their choice will thus become easy because of the wider reach and broad cast abilities that the technology can confer. There is a positive chance that the terrorist will succeed in adapting technology in their activities. Examples are that the Om Shinrikyo used Zarin, a gas that was sophisticated in manufacture and Al-Qaeda used planes and internet for coordination must not be forgotten. If cloud computing is to be, then there must be a possibility of policing it properly. This makes it necessary to bring about a global consensus on the use of the cloud and accountability. So why is the cloud computing different from the already existing systems and how does the system offer more anonymity? For that the cloud computing has to be examined in detail.

4. Cloud Computing

Cloud computing is simply the use of the network resources on the internet in such a way that the existing infrastructure is used by many from sites and data and processing is done via the internet without having any infrastructure installed at the premises. This means that not only data but any communication device, any software can be used based on the service provider and the cloud which consists of these borrowed resources spread across the globe can be used not only by businesses but by groups on the go. This makes the movement of people easier from place to place and they can access the data from anywhere. Thus fugitives, secret societies and the terror groups need not have specific place or infrastructure created but can be spread out across the globe and access the same information form anywhere.

This makes pinning them difficult and enlarges their reach. There are two parts in the concept of communication - they are the grid and cloud computing. The grid is the infrastructure or network that brings about the possibility of sharing resources and exchanging information, storing information and processing it, all on the grid. Thus…[continue]

Cite This Dissertation:

"Terrorist Groups Use Of Cloud Technology" (2011, July 05) Retrieved December 4, 2016, from http://www.paperdue.com/essay/terrorist-groups-use-of-cloud-technology-43107

"Terrorist Groups Use Of Cloud Technology" 05 July 2011. Web.4 December. 2016. <http://www.paperdue.com/essay/terrorist-groups-use-of-cloud-technology-43107>

"Terrorist Groups Use Of Cloud Technology", 05 July 2011, Accessed.4 December. 2016, http://www.paperdue.com/essay/terrorist-groups-use-of-cloud-technology-43107

Other Documents Pertaining To This Topic

  • Terrorist Attacks an Assessment of

    Taking the nature of this weapon into account the general assumption is that the target of a bomb of this nature would possible be a large city, congested transport or residential area. However this is common assumption and possibly not the only targets that terrorists might consider. From the point-of-view of the terrorist it may be more appropriate to choose a target which would be less secure and would maximize

  • Cloud Computing to Combat DDOS

    Monitoring the type of DDoS attack, the frequency of the attack, duration of attack, and the aggressiveness of the attack all provide clues as to whom may be instituting the attack. The packet stream can be disrupted by the victim by 'pretending' to go offline to the protocol receiving the bandwidth from that particular attack. The rerouting of using available bandwidth to other protocols via an alternative port can

  • Cloud Computing Will Be Discussed to Show

    cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

  • Cyber Security Cloud Computing

    Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

  • Chemical & Biological Warfare the

    The larger the region covered by the chemical agent, the more likely it will be to cause the widespread destruction for which the person or group is looking (Brophy & Fisher, 1959). Toxicity matters, of course, but the earliest uses were not about the level of toxicity the chemical agent possessed. They were more focused on how the toxic was absorbed. If the chemical agent could be absorbed through

  • Cyber Firewalls Online Activities Have

    This is problematic, as these kinds of issues could lead to wide spread disruptions with no one knowing or understanding where it came from. For example, if a terrorist group was able to master this tool, they could utilize it to attack Western power grids. (Magnuson, 2013) This would create significant amounts of disruptions without having anyone being able to trace what is happening directly. When this occurs, there is

  • Afghanistan the Current Situation in

    In fact 92% of the world's supply of opium comes from Afghanistan. The Taliban have tapped into this rich resource and it provides them with sufficient cash to pay their soldiers more than the Afghanistan government pays its own troops (Schmidt, 2010, p. 63). While he Taliban do not "mastermind" the opium trade, Schmidt explains, they do benefit financially from integrating their radical politics into the marketing of opium. In

Read Full Dissertation
Copyright 2016 . All Rights Reserved