Verified Document

Technologies In Disaster Management The Essay

) and read digitized letters of suicide bombers. Google earth is a software which uses satellite images to enhance maps to a whole new level. However its capabilities can backfire with regards to safety as terrorists might use it to plan attacks on crucial infrastructures (Wright, 2008). Most forms of terrorism originate from jihad (religious struggle). The traditional forms of physical jihad are now being accompanied by electronic warfare. Islamic hacker organizations such as Munazamat Fursan Al-Jihad Al-Electronic and Inhiyar Al Dolar have set up websites to engage hackers in their missions. Technical experts aim at disrupting websites which are controlled by the American government, those which might be contradictory to the mujahideen belief system and Christian websites in general. They coordinate intrusions by Denial of Service attacks which can overload web servers with data packets, causing a major decline in performance. Ping attacks exploit the mechanism of checking system activity by making the incoming pings reach their peak, blocking the buffer space and crashing the network. These organizations target the youth who are accustomed to using the latest technology and are willing to use their expertise for jihadist needs. Mujahideen Secrets 1 was an application published on an Al-Qaeda-based website which lets users conceal their email-based communications using multiple cryptographic algorithms. Updates on the software have added a simpler user interface and the ability to encrypt real time chats as well. Instances of publicly broadcasting inhuman activities such as the beheading of Nicholas Berg, the "heroes of Fallujah" video where a bomb destroys a U.S. carrier and the murder of...

The first step would be to identify an effective interface to reach out to the Muslim community. Their views being promoted online should be replied with a sensible message which counters their extremist path. Efforts such as those taken by the Digital Outreach team of the American government have to be applied in order to establish a strong counter terrorist presence on the web. Informational operations can have far-reaching effects. The United States still has a lot of ground to cover with regards to safeguarding its citizens from extremists and their activities on the web (Wright, 2008).
References

United Nations. (n.d.).The role of Science and Technology in Disaster Reduction. International Strategy for Disaster Reduction. Retrieved December 4, 2010 from www.unisdr.org/eng/public_aware/world_camp/2001/pdf/Kit_2_The_Role_of_Science_and_Technology_in_Disaster_Reduction.pdf

Selvavinayagam, K ( n.d.). Disaster management practices using ArcGIS, ArcIMS,

ArcSDE and Oracle. Retrieved December 5, 2010 from www.stesalit-inc.com/Disaster.pdf

GDIN (Global Disaster Information Network ) (2005) GDIN Homopage.

htpp://www.gdin-international.org

Virtual University for Small States of the Commonwealth (VUSSC) (n.d.).Introduction to Disaster Management.Unit 8: The Role of Technology in Disaster Management. (pp 97-119)

Wright, M. (2008). TECHNOLOGY & TERRORISM Forensic Examiner 17(4)

Sources used in this document:
References

United Nations. (n.d.).The role of Science and Technology in Disaster Reduction. International Strategy for Disaster Reduction. Retrieved December 4, 2010 from www.unisdr.org/eng/public_aware/world_camp/2001/pdf/Kit_2_The_Role_of_Science_and_Technology_in_Disaster_Reduction.pdf

Selvavinayagam, K ( n.d.). Disaster management practices using ArcGIS, ArcIMS,

ArcSDE and Oracle. Retrieved December 5, 2010 from www.stesalit-inc.com/Disaster.pdf

GDIN (Global Disaster Information Network ) (2005) GDIN Homopage.
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now