Terrorist Group's Use Of Cloud Technology
After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of science and technology in the context of world affairs, however lopsided development led to religious fundamentalism and also the terrorist ethos.
The world was for a long time in dread of nuclear weapons, but these too have taken a different dimension. Nations, even rogue nations with nuclear power are not the threat but a fanatic group that succeeds in hijacking a nuclear missile, for example, is. Though science and technology have been blamed for environmental disasters, the proliferation of technology is also a provision of a means of violence, and computing and information technology could well be the next weapon. Under such a condition, with the world depending more and more on the IT infrastructure, is cloud computing a possible victim of the terrorist? Secondly can a terrorist outfit carry on their operations unmolested using cloud computing? What would be the possible outcome of such a situation? Can the world cope with the threat? The threat is not idle as will be shown in the analysis.
2. Thesis Statement:
The thesis follows the line of thinking that terrorists will look for any medium of information exchange, communication and financial operations and control of their militia, the criteria being that there should not be a source that can tap into their activities. Especially since the mobile phone used widely for its communications by Bin Laden was his organizations undoing and his death, it is likely that the other terrorists would seek medium that is safe from the intelligence agencies and can remain undetected for long. The cloud computing and grid systems are exactly that.
Therefore the thesis statement - "Terror groups utilize technology to advances to plan, fundraise, recruit, and promote their ideology while offering a degree of anonymity. Cloud computing/technology (the Cloud) is the latest advancement terror groups will seek to employ in future." This is supported by the fact that terror outfits operates exactly on the same model as the military. Take the LTTE for example which even had their planes. Tactics and methods of the terrorists show that this hypothesis will be proved true in the future. The reason is that terrorists think like soldiers and believe in strategy and using resources based on the goals objectives, intentions, and the method of executing. Naturally the strategy and tactics will use the methods that are most practicable. The crude way that the terrorists have used to spread terror has been the use of "arson; bombs in vehicles; remote controlled explosions; 'Molotov cocktails'; biological and chemical materials disseminated offensively; grenades; gun attacks (hand and automatic); mortar attacks; attacks with rocket launchers; knife attacks; machete attacks; hijacking of vehicles and aircraft; and so on."
The use of mobile technology by the Al Qaeda was effective insofar as it resulted in the September attacks, and the organization was also exposed by their mobile use. The internet is being used by many organizations and many countries allow these groups to conduct affairs anonymously. Therefore as the technology improves the masterminds of these organizations also look to use these methods and technology as fast as possible and try to adapt faster than regular business. Especially the technology that is safe, secure and free from leaks. The cloud is just that. It is secure and encrypted and protected. The information revolution caused advances in the technology of communication and organization with the advent of cyberspace. With the modern methods of data processing especially online, there has come about the existence of a "virtual society" also called the global community wherein all the persons of the globe can access the resources of the net with little outlay. Therefore the community now is the force behind the business, government, military and international perceptions. It was observed far back in 1999 that "as cyber space evolves, the terrorists are becoming interested in this new medium"
There is scope for spreading ideology, gaining adherents, control of the cadres and passing of encrypted information. Therefore we cannot brush aside the possibility of cloud becoming their new haven. There is also historical evidence to prove this fact.
3....
Taking the nature of this weapon into account the general assumption is that the target of a bomb of this nature would possible be a large city, congested transport or residential area. However this is common assumption and possibly not the only targets that terrorists might consider. From the point-of-view of the terrorist it may be more appropriate to choose a target which would be less secure and would maximize
cloud computing will be discussed to show that the good outweighs the bad. Furthermore, it will be further discussed that the government is looking into using cloud computing because it will cut IT cost down and increase capabilities despite the fact people are concerned with security issues that this may bring to the public. In completing a dissertation, it is very hard to go through the challenges that it requires.
Cyber Security/Cloud Computing Consider a recent cyber security breach (specific event) and address the following questions: Describe the circumstances involved Monster Com: Confidential information of 1.3 million job seekers was stolen and used in a phishing fraud Monster.Com, a United States online recruitment site reported in 2008 that hackers broke into the site using password-protected resume library. They used credentials that Monster Worldwide Inc. claims were stolen from some of its clients. Reuters reported
information technology skills I acquired through the military are transferable to civilian situations. The 20 years I gave to the military have placed me in a wide variety of situations quite different from what others might encounter in civilian life. My experience in the U.S. Navy has allowed me to learn new skills in the information technology field and I have been able to apply them in new situations. The
Business Categories of risk associated with sourcing of IT/IS services Performance Risk Delays at third parties may lead to a decline in end customer performance levels and timely delivery. As a product/service is outsourced, this risk gets heightened severely. Several factors can cause delays such as factors that are not within the outsourcing company's control. For instance, delays at the port/custom, weather, labor disputes, and political crisis. More severe examples are delays
The larger the region covered by the chemical agent, the more likely it will be to cause the widespread destruction for which the person or group is looking (Brophy & Fisher, 1959). Toxicity matters, of course, but the earliest uses were not about the level of toxicity the chemical agent possessed. They were more focused on how the toxic was absorbed. If the chemical agent could be absorbed through
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now