Terrorist Groups Use Of Cloud Technology Dissertation Or Thesis Complete

Length: 15 pages Sources: 15 Subject: Terrorism Type: Dissertation or Thesis complete Paper: #34264283 Related Topics: Cyber Crimes, Money Laundering, Cloud Computing, Web Conferencing
Excerpt from Dissertation or Thesis complete :

Terrorist Group's Use Of Cloud Technology

After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of science and technology in the context of world affairs, however lopsided development led to religious fundamentalism and also the terrorist ethos.

The world was for a long time in dread of nuclear weapons, but these too have taken a different dimension. Nations, even rogue nations with nuclear power are not the threat but a fanatic group that succeeds in hijacking a nuclear missile, for example, is. Though science and technology have been blamed for environmental disasters, the proliferation of technology is also a provision of a means of violence, and computing and information technology could well be the next weapon. Under such a condition, with the world depending more and more on the IT infrastructure, is cloud computing a possible victim of the terrorist? Secondly can a terrorist outfit carry on their operations unmolested using cloud computing? What would be the possible outcome of such a situation? Can the world cope with the threat? The threat is not idle as will be shown in the analysis.

2. Thesis Statement:

The thesis follows the line of thinking that terrorists will look for any medium of information exchange, communication and financial operations and control of their militia, the criteria being that there should not be a source that can tap into their activities. Especially since the mobile phone used widely for its communications by Bin Laden was his organizations undoing and his death, it is likely that the other terrorists would seek medium that is safe from the intelligence agencies and can remain undetected for long. The cloud computing and grid systems are exactly that.

Therefore the thesis statement - "Terror groups utilize technology to advances to plan, fundraise, recruit, and promote their ideology while offering a degree of anonymity. Cloud computing/technology (the Cloud) is the latest advancement terror groups will seek to employ in future." This is supported by the fact that terror outfits operates exactly on the same model as the military. Take the LTTE for example which even had their planes. Tactics and methods of the terrorists show that this hypothesis will be proved true in the future. The reason is that terrorists think like soldiers and believe in strategy and using resources based on the goals objectives, intentions, and the method of executing. Naturally the strategy and tactics will use the methods that are most practicable. The crude way that the terrorists have used to spread terror has been the use of "arson; bombs in vehicles; remote controlled explosions; 'Molotov cocktails'; biological and chemical materials disseminated offensively; grenades; gun attacks (hand and automatic); mortar attacks; attacks with rocket launchers; knife attacks; machete attacks; hijacking of vehicles and aircraft; and so on."

The use of mobile technology by the Al Qaeda was effective insofar as it resulted in the September attacks, and the organization was also exposed by their mobile use. The internet is being used by many organizations and many countries allow these groups to conduct affairs anonymously. Therefore as the technology improves the masterminds of these organizations also look to use these methods and technology as fast as possible and try to adapt faster than regular business. Especially the technology that is safe, secure and free from leaks. The cloud is just that. It is secure and encrypted and protected. The information revolution caused advances in the technology of communication and organization with the advent of cyberspace. With the modern methods of data processing especially government, military and international perceptions. It was observed far back in 1999 that "as cyber space evolves, the terrorists are becoming interested in this new medium"

There is scope for spreading ideology, gaining adherents, control of the cadres and passing of encrypted information. Therefore we cannot brush aside the possibility of cloud becoming their new haven. There is also historical evidence to prove this fact.

3. Historical (terror groups use of technology)

Taking terrorism as an organized crime it can be seen that terrorism is a result of an economic need or as seen in the case of Al-Qaeda as a religious fundamentalism. Such organizations receive shelter and funds domestically and the major source of funds are drug dealing and other criminal activities like kidnapping, extortion, money laundering, smuggling and even counterfeit currencies.

Organizations like OMshinrikyo in Japan or the Al Qaeda use religious grouping and use of religion to create terrorists or criminal outfits. That crimes against the U.S. especially would occur cannot be ruled out. This has been due to the hatred by the impoverished nations against the United States and other capitalist nations which translates to the fact that wealth is held in developed countries while all other places are impoverished. Such a notion of the wide spread misery in the undeveloped countries which is attributed to the actions of the Western nations seem to get wide support for the terrorists and in some places they also enjoy legitimacy.

The terrorist will exist in nations that are in antipathy to the U.S. Or the developed nations. So some community will always find support from governments that fund terrorists. The Department of the Treasury issued a 'Terrorist Assets Report,' in December 2004 and this report showed that the United States succeeded in blocking funds to the tune of ten million dollars.

So far, funding is achieved by smuggling and trafficking in drugs. The drug trafficking is a source that brings funds that then flowed into all the nations monetary system along with generally legitimate funds mostly by buying and dealing with real estate and also vehicles. The recent changes in technology have facilitated growth of a new type of global crime syndicates. The changes in technology and means of global banking have also given the criminal better avenues at operation. This can be exemplified by pointing to the rising cyber crimes, and use of sophisticated computers and machines in white collar crimes and the rising incidents of mobile phone and other gadget misuse. These would intensify and funds can be transferred in anonymity if the cloud is not policed or accountability created. Technology today is digital, and involves computers and other communication devices and involves audio, video and other facilities, and involve at present video conferencing, scanning and generally telemetries and other content delivery features.

Thus cloud computing will enhance these facilities and make the work of the terrorist easier with regard to communication and creating ill will to nations of their choice will thus become easy because of the wider reach and broad cast abilities that the technology can confer. There is a positive chance that the terrorist will succeed in adapting technology in their activities. Examples are that the Om Shinrikyo used Zarin, a gas that was sophisticated in manufacture and Al-Qaeda used planes and internet for coordination must not be forgotten. If cloud computing is to be, then there must be a possibility of policing it properly. This makes it necessary to bring about a global consensus on the use of the cloud and accountability. So why is the cloud computing different from the already existing systems and how does the system offer more anonymity? For that the cloud computing has to be examined in detail.

4. Cloud Computing

Cloud computing is simply the use of the network resources on the internet in such a way that the existing infrastructure is used by many from sites and data and processing is done via the internet without having any infrastructure installed at the premises. This means that not only data but any communication device, any software can be used based on the service provider and the cloud which consists of these borrowed resources spread across the globe can be used not only by businesses but by groups on the go. This makes the movement of people easier from place to place and they can access the data from anywhere. Thus fugitives, secret societies and the terror groups need not have specific place or infrastructure created but can be spread out across the globe and access the same information form anywhere.

This makes pinning them difficult and enlarges their reach. There are two parts in the concept of communication - they are the grid and cloud computing. The grid is the infrastructure or network that brings about the possibility of sharing resources and exchanging information, storing information and processing it, all on the grid. Thus…

Sources Used in Documents:

Bibliography

Baker, John C, et al. Mapping the Risks: Assessing Homeland Security Implications of Publicly Available Geospatial Information. Rand: Santa Monica, CA, 2004.

Costigan, Sean S; Gold, David. Terrornomics.

Ashgate Publishing, Ltd., 2007.

Furht, Borko; Escalante, Armando. Handbook of Cloud Computing.


Cite this Document:

"Terrorist Groups Use Of Cloud Technology" (2011, July 05) Retrieved December 5, 2021, from
https://www.paperdue.com/essay/terrorist-groups-use-of-cloud-technology-43107

"Terrorist Groups Use Of Cloud Technology" 05 July 2011. Web.5 December. 2021. <
https://www.paperdue.com/essay/terrorist-groups-use-of-cloud-technology-43107>

"Terrorist Groups Use Of Cloud Technology", 05 July 2011, Accessed.5 December. 2021,
https://www.paperdue.com/essay/terrorist-groups-use-of-cloud-technology-43107

Related Documents
Terrorist Attacks an Assessment of
Words: 3907 Length: 10 Pages Topic: Terrorism Paper #: 74627576

Taking the nature of this weapon into account the general assumption is that the target of a bomb of this nature would possible be a large city, congested transport or residential area. However this is common assumption and possibly not the only targets that terrorists might consider. From the point-of-view of the terrorist it may be more appropriate to choose a target which would be less secure and would maximize

Cloud Computing Will Be Discussed to Show
Words: 9986 Length: 26 Pages Topic: Education - Computers Paper #: 12816018

cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.

Cyber Security Cloud Computing
Words: 1389 Length: 4 Pages Topic: Education - Computers Paper #: 41883574

Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported

My Personal Interest in a Career in Information Technology IT
Words: 805 Length: 3 Pages Topic: Education - Computers Paper #: 88301875

information technology skills I acquired through the military are transferable to civilian situations. The 20 years I gave to the military have placed me in a wide variety of situations quite different from what others might encounter in civilian life. My experience in the U.S. Navy has allowed me to learn new skills in the information technology field and I have been able to apply them in new situations. The

Analyzing Information Technology and Business
Words: 4079 Length: 9 Pages Topic: Sports - College Paper #: 16726453

Business Categories of risk associated with sourcing of IT/IS services Performance Risk Delays at third parties may lead to a decline in end customer performance levels and timely delivery. As a product/service is outsourced, this risk gets heightened severely. Several factors can cause delays such as factors that are not within the outsourcing company's control. For instance, delays at the port/custom, weather, labor disputes, and political crisis. More severe examples are delays

Chemical & Biological Warfare the
Words: 3953 Length: 12 Pages Topic: Military Paper #: 65855836

The larger the region covered by the chemical agent, the more likely it will be to cause the widespread destruction for which the person or group is looking (Brophy & Fisher, 1959). Toxicity matters, of course, but the earliest uses were not about the level of toxicity the chemical agent possessed. They were more focused on how the toxic was absorbed. If the chemical agent could be absorbed through