Verified Document

Technologies Used By ISIS The Terrorist Organizations Essay

Related Topics:

Terrorist organizations and terrorists are exploiting social media and the internet resources for the purpose of committing terrorist activities and for the facilitation of wide-ranging terrorist activities including radicalization, incitement, training, recruitment, communications, information gathering, planning, financing, and preparation (United Nations, n.d). Technology has quickly become a fundamental component of the modern day society. Technology governs itself therefore making it possible for terrorists to utilize it for the purpose of advancing their terrorism. Modern terrorism has become unpredictable and instantaneous thanks to technology. Technology has made it possible for terrorists to target large audiences and bring terror right into the home (InfoSec, 2018). Cyberspace is a technological environment that has no boundaries hence making it a place where terrorists can locate resources, disseminate propaganda information and launch attacks in any corner of the world.
5 main technological types and/or tools Used by ISIS for Information Sharing and Intelligence Gathering

Social Media: Modern terrorism has chosen social media as a useful resource. The online social platforms make communication within terrorist groups possible. Terrorists use social media for recruitment, propaganda sharing, psychological warfare, mobilization, information gathering, data mining etc. (InfoSec, 2018). Most terrorist attacks are choreographed meticulously for the purpose of attracting electronic media and international press. The objective of terrorism is to target the population watching and using media resources and not just the killing of victims. The strategists of ISIS employ social media as an important resource for mobilization. ISIS has managed to mobilize approx. 40,000 foreigners from around the world with enticing messages encouraging them to join them (Ward, 2018).

Increased access to the internet in the Middle East and Africa has given ISIS a broader pool of support gained through social networks. It is the duty of analysts and policy makers to comprehend the intentions of terrorist organizations in their use of Information communication technologies (Ward, 2018). The internet offers convenience due to its accessibility and affordability. Broader social media reach (platforms such as Twitter, Facebook, Whatsapp, YouTube, and Instagram etc.) in the global space has allowed ISIS to easily share information and gather intelligence.

Encryption: Encryption of communication through messaging applications and electronic devices has become a growing phenomenon today. ISIS and other terrorist organizations have exploited the encryption technology to make it possible for them to communicate securely and thereafter store destructive information (Graham, 2016). Any legislative effort aimed at empowering enforcement agencies with ability to listen to private communication may never bear any fruits. The encryption of information is a new phenomenon commonly referred to as going dark (Graham, 2016). End to end encryption codes have given rise to unbreakable secure communication. Although this...…security forces.

ISIS has been known to use threats, murder, kidnapping, population control, resource control to prevailing over Syria and Iraq. They send threats to targeted populations through social media, through text messages, IED attacks, bombing, anonymous calls etc. This way ISIS succeeds in sending terror to the local communities who oblige by paying taxes to them for their own security.

In order to overcome the threat of terrorism the U.S. security agencies may have to bleach the rights to privacy in order to get into the communication networks of suspect organizations if only to foil potential attacks on the American people. By hacking into the ISIS fusion centers and eavesdropping on their digital, radio, and apps communication it is likely to decode what they might be planning. As it was with the San Bernardino attacker the FBI employed the services of professional hackers to access details of the attacker’s iPhone (Nakashima, 2016). The FBI can also employ drone surveillance, artificial intelligence, and data mining to get into the terrorists networks and minds (InfoSec, 2018). The security agencies can also deploy radio and cellphone jammers to disrupt, interfere, or block illegal, terrorist wireless communications (Phantom Technologies, 2018). Similarly the intelligence units can interfere with internet communication as a way of derailing information conveyance between terrorist organizations.

Cite this Document:
Copy Bibliography Citation

Related Documents

Do Terrorist Organizations Like Cryptocurrency
Words: 2343 Length: 8 Document Type: Term Paper

Bitcoin: Disruptive Technology and TerrorismIntroductionThe advent of technology has brought about significant changes in various sectors of the economy, including finance, communication, and transportation. However, these advancements have also introduced new challenges, particularly in the realm of security. This paper examines the concept of Disruptive Innovation, with a focus on Bitcoin and its implications for terrorist financing. The importance of this topic lies in its relevance to contemporary global security

Human Rights Issues With Pre Emptive Counter Terrorist Measures
Words: 4366 Length: 14 Document Type: Essay

Terrorism has been a hot topic in the news for over a decade. It has impact people on an international level with countries like France, England, and the United States experiencing attacks. Currently Isis, a terrorist organization, has generated chaos in the Middle East. Government have been destabilized and peace and security jeopardized. Atrocious acts of violence have occurred from child beheadings to rapes and torture. Terrorism threatens the social

Exploring Important Issues That Impact the Planet and Its Peoples
Words: 3043 Length: 9 Document Type: Research Paper

Global Environmental & Social Problems The four unit course in Contemporary Global Environmental and Social Problems explores and critiques some of the most pressing global social / environmental issues and problems that are not limited to one nation or region. Thesis: The most serious environmental and social issues on the planet -- issues that threaten the health, safety and productivity of the human race -- should be given serious, critical

Lone Wolf Terrorists and Internet Recruitment
Words: 1667 Length: 6 Document Type: Essay

Recruitment of the Lone WolfIntroductionThe recent terrorist episodes in the US have all been incidents of Lone Wolf terrorism. From the bombing of the Oklahoma City Building in 1995 by Timothy McVeigh and Terry Nichols to the Charlottesville attack in 2017 by neo-Nazi James Fields, Lone Wolf terrorists exist in this country and their presence is the most important current domestic security concern. This paper will explain why Lone Wolf

TSA: Should It Be Removed
Words: 685 Length: 2 Document Type: Essay

deadly disadvantages involved when contemplating dismantling all TSA employees and technologies -- scanners and other personally meddlesome tools -- and going exclusively with air marshals. This paper points to the several obvious disadvantages involved with simply cutting TSA out of the picture entirely and allowing passengers to board planes without carefully screening them -- in the belief that since terrorists will know there are air marshals aboard every plane

The Problem of Lone Wolf Terrorism in the US
Words: 3672 Length: 12 Document Type: Research Paper

Impact of Lone Wolf Terrorists Introduction The recent terrorist episodes in the US have all been incidents of Lone Wolf terrorism. From the bombing of the Oklahoma City Building in 1995 by Timothy McVeigh and Terry Nichols to the Charlottesville attack in 2017 by neo-Nazi James Fields, Lone Wolf terrorists exist in this country and their presence is the most important current domestic security concern. This paper will explain why Lone Wolf

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now