Verified Document

Technologies Used By ISIS The Terrorist Organizations Essay

Related Topics:

Terrorist organizations and terrorists are exploiting social media and the internet resources for the purpose of committing terrorist activities and for the facilitation of wide-ranging terrorist activities including radicalization, incitement, training, recruitment, communications, information gathering, planning, financing, and preparation (United Nations, n.d). Technology has quickly become a fundamental component of the modern day society. Technology governs itself therefore making it possible for terrorists to utilize it for the purpose of advancing their terrorism. Modern terrorism has become unpredictable and instantaneous thanks to technology. Technology has made it possible for terrorists to target large audiences and bring terror right into the home (InfoSec, 2018). Cyberspace is a technological environment that has no boundaries hence making it a place where terrorists can locate resources, disseminate propaganda information and launch attacks in any corner of the world. 5 main technological types and/or tools Used by ISIS for Information Sharing and Intelligence Gathering

Social Media: Modern terrorism has chosen social media as a useful resource. The online social platforms make communication within terrorist groups possible. Terrorists use social media for recruitment, propaganda sharing, psychological warfare, mobilization, information gathering, data mining etc. (InfoSec, 2018). Most terrorist attacks are choreographed meticulously for the purpose of attracting electronic media and international press. The objective of terrorism is to target the population watching and using media resources and not just the killing of victims. The strategists of ISIS employ social media as an important resource for mobilization. ISIS has managed to mobilize approx. 40,000 foreigners from around the world with enticing messages encouraging them to join them (Ward, 2018).

Increased access to the internet in the Middle East and Africa has given ISIS a broader pool of support gained through social networks. It is the duty of analysts and policy makers to comprehend the intentions of terrorist organizations in their use of Information communication technologies (Ward, 2018). The internet offers convenience due to its accessibility and affordability. Broader social media...

ISIS and other terrorist organizations have exploited the encryption technology to make it possible for them to communicate securely and thereafter store destructive information (Graham, 2016). Any legislative effort aimed at empowering enforcement agencies with ability to listen to private communication may never bear any fruits. The encryption of information is a new phenomenon commonly referred to as going dark (Graham, 2016). End to end encryption codes have given rise to unbreakable secure communication. Although this...…security forces.
ISIS has been known to use threats, murder, kidnapping, population control, resource control to prevailing over Syria and Iraq. They send threats to targeted populations through social media, through text messages, IED attacks, bombing, anonymous calls etc. This way ISIS succeeds in sending terror to the local communities who oblige by paying taxes to them for their own security.

In order to overcome the threat of terrorism the U.S. security agencies may have to bleach the rights to privacy in order to get into the communication networks of suspect organizations if only to foil potential attacks on the American people. By hacking into the ISIS fusion centers and eavesdropping on their digital, radio, and apps communication it is likely to decode what they might be planning. As it was with the San Bernardino attacker the FBI employed the services of professional hackers to access details of the attacker’s iPhone (Nakashima, 2016). The FBI can also employ drone surveillance, artificial intelligence, and data mining to get into the terrorists networks and minds (InfoSec, 2018). The security agencies can also deploy radio and cellphone jammers to disrupt, interfere, or block illegal, terrorist wireless communications (Phantom Technologies, 2018). Similarly the intelligence units can interfere with internet communication as a way of derailing information conveyance between terrorist organizations.

Cite this Document:
Copy Bibliography Citation

Related Documents

Do Terrorist Organizations Like Cryptocurrency
Words: 2343 Length: 8 Document Type: Term Paper

Bitcoin: Disruptive Technology and TerrorismIntroductionThe advent of technology has brought about significant changes in various sectors of the economy, including finance, communication, and transportation. However, these advancements have also introduced new challenges, particularly in the realm of security. This paper examines the concept of Disruptive Innovation, with a focus on Bitcoin and its implications for terrorist financing. The importance of this topic lies in its relevance to contemporary global security

Exploring Important Issues That Impact the Planet and Its Peoples
Words: 3043 Length: 9 Document Type: Research Paper

Global Environmental & Social Problems The four unit course in Contemporary Global Environmental and Social Problems explores and critiques some of the most pressing global social / environmental issues and problems that are not limited to one nation or region. Thesis: The most serious environmental and social issues on the planet -- issues that threaten the health, safety and productivity of the human race -- should be given serious, critical

Is the "New Terrorism" That Much Different From the "Old Terrorism" ...
Words: 3803 Length: 11 Document Type: Essay

New Terrorism -- Risk Management In the aftermath of the carnage created by terrorists on September 11, 2001, in which 2,977 people were killed (in the World Trade Center, the Pentagon, and in hijacked commercial jetliners), the United States government initiated a "war on terror." That war has yet to be won, and may never be won because terrorists have found new ways of launching attacks and where there once was

Terrorism Can Be Traced to History
Words: 2026 Length: 6 Document Type: Essay

nomadic tribes wreaking havoc on each other to Zealots of Judea and the original Assassins, terrorism has been a part of human political strategy since the origin of the species. Whether it reflects the innate bellicosity of human beings or simply reveals the effects of class or religious conflict, terrorism is an unfortunate part of life -- even daily life for some people. Advanced weaponry and communications technology has

An Analysis of the Effectiveness of U S Cbrn Strategy
Words: 2334 Length: 8 Document Type: Essay

United States' Strategy for Dealing with a Chemical, Biological, Radiological or Nuclear Non-State Actor Threat One of the major potential threats that has emerged in recent years is a chemical, biological, radiological or nuclear (CBRN) threat from a non-state actor. In the "good old days" of the Cold War, nation-states with these capabilities were well-known to the international community and contingency plans were developed by the United States and its

TSA: Should It Be Removed
Words: 685 Length: 2 Document Type: Essay

deadly disadvantages involved when contemplating dismantling all TSA employees and technologies -- scanners and other personally meddlesome tools -- and going exclusively with air marshals. This paper points to the several obvious disadvantages involved with simply cutting TSA out of the picture entirely and allowing passengers to board planes without carefully screening them -- in the belief that since terrorists will know there are air marshals aboard every plane

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now