Terrorist organizations and terrorists are exploiting social media and the internet resources for the purpose of committing terrorist activities and for the facilitation of wide-ranging terrorist activities including radicalization, incitement, training, recruitment, communications, information gathering, planning, financing, and preparation (United Nations, n.d). Technology has quickly become a fundamental component of the modern day society. Technology governs itself therefore making it possible for terrorists to utilize it for the purpose of advancing their terrorism. Modern terrorism has become unpredictable and instantaneous thanks to technology. Technology has made it possible for terrorists to target large audiences and bring terror right into the home (InfoSec, 2018). Cyberspace is a technological environment that has no boundaries hence making it a place where terrorists can locate resources, disseminate propaganda information and launch attacks in any corner of the world.
5 main technological types and/or tools Used by ISIS for Information Sharing and Intelligence Gathering
Social Media: Modern terrorism has chosen social media as a useful resource. The online social platforms make communication within terrorist groups possible. Terrorists use social media for recruitment, propaganda sharing, psychological warfare, mobilization, information gathering, data mining etc. (InfoSec, 2018). Most terrorist attacks are choreographed meticulously for the purpose of attracting electronic media and international press. The objective of terrorism is to target the population watching and using media resources and not just the killing of victims. The strategists of ISIS employ social media as an important resource for mobilization. ISIS has managed to mobilize approx. 40,000 foreigners from around the world with enticing messages encouraging them to join them (Ward, 2018).
Increased access to the internet in the Middle East and Africa has given ISIS a broader pool of support gained through social networks. It is the duty of analysts and policy makers to comprehend the intentions of terrorist organizations in their use of Information communication technologies (Ward, 2018). The internet offers convenience due to its accessibility and affordability. Broader social media...
Bitcoin: Disruptive Technology and TerrorismIntroductionThe advent of technology has brought about significant changes in various sectors of the economy, including finance, communication, and transportation. However, these advancements have also introduced new challenges, particularly in the realm of security. This paper examines the concept of Disruptive Innovation, with a focus on Bitcoin and its implications for terrorist financing. The importance of this topic lies in its relevance to contemporary global security
Global Environmental & Social Problems The four unit course in Contemporary Global Environmental and Social Problems explores and critiques some of the most pressing global social / environmental issues and problems that are not limited to one nation or region. Thesis: The most serious environmental and social issues on the planet -- issues that threaten the health, safety and productivity of the human race -- should be given serious, critical
New Terrorism -- Risk Management In the aftermath of the carnage created by terrorists on September 11, 2001, in which 2,977 people were killed (in the World Trade Center, the Pentagon, and in hijacked commercial jetliners), the United States government initiated a "war on terror." That war has yet to be won, and may never be won because terrorists have found new ways of launching attacks and where there once was
nomadic tribes wreaking havoc on each other to Zealots of Judea and the original Assassins, terrorism has been a part of human political strategy since the origin of the species. Whether it reflects the innate bellicosity of human beings or simply reveals the effects of class or religious conflict, terrorism is an unfortunate part of life -- even daily life for some people. Advanced weaponry and communications technology has
United States' Strategy for Dealing with a Chemical, Biological, Radiological or Nuclear Non-State Actor Threat One of the major potential threats that has emerged in recent years is a chemical, biological, radiological or nuclear (CBRN) threat from a non-state actor. In the "good old days" of the Cold War, nation-states with these capabilities were well-known to the international community and contingency plans were developed by the United States and its
deadly disadvantages involved when contemplating dismantling all TSA employees and technologies -- scanners and other personally meddlesome tools -- and going exclusively with air marshals. This paper points to the several obvious disadvantages involved with simply cutting TSA out of the picture entirely and allowing passengers to board planes without carefully screening them -- in the belief that since terrorists will know there are air marshals aboard every plane
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now