Terrorist Group's Use Of Cloud Technology
After the 1980s there have been changes on a global scale that included post cold war developments. The changes in Eastern Europe and the Soviet Union coupled with the technological change on the nations of the East caused structural and perceptional changes that were needed to make them competitive in high technology; which included everything from military to the service sector. There was advance of science and technology in the context of world affairs, however lopsided development led to religious fundamentalism and also the terrorist ethos.
The world was for a long time in dread of nuclear weapons, but these too have taken a different dimension. Nations, even rogue nations with nuclear power are not the threat but a fanatic group that succeeds in hijacking a nuclear missile, for example, is. Though science and technology have been blamed for environmental disasters, the proliferation of technology is also a provision of a means of violence, and computing and information technology could well be the next weapon. Under such a condition, with the world depending more and more on the IT infrastructure, is cloud computing a possible victim of the terrorist? Secondly can a terrorist outfit carry on their operations unmolested using cloud computing? What would be the possible outcome of such a situation? Can the world cope with the threat? The threat is not idle as will be shown in the analysis.
2. Thesis Statement:
The thesis follows the line of thinking that terrorists will look for any medium of information exchange, communication and financial operations and control of their militia, the criteria being that there should not be a source that can tap into their activities. Especially since the mobile phone used widely for its communications by Bin Laden was his organizations undoing and his death, it is likely that the other terrorists would seek medium that is safe from the intelligence agencies and can remain undetected for long. The cloud computing and grid systems are exactly that.
Therefore the thesis statement - "Terror groups utilize technology to advances to plan, fundraise, recruit, and promote their ideology while offering a degree of anonymity. Cloud computing/technology (the Cloud) is the latest advancement terror groups will seek to employ in future." This is supported by the fact that terror outfits operates exactly on the same model as the military. Take the LTTE for example which even had their planes. Tactics and methods of the terrorists show that this hypothesis will be proved true in the future. The reason is that terrorists think like soldiers and believe in strategy and using resources based on the goals objectives, intentions, and the method of executing. Naturally the strategy and tactics will use the methods that are most practicable. The crude way that the terrorists have used to spread terror has been the use of "arson; bombs in vehicles; remote controlled explosions; 'Molotov cocktails'; biological and chemical materials disseminated offensively; grenades; gun attacks (hand and automatic); mortar attacks; attacks with rocket launchers; knife attacks; machete attacks; hijacking of vehicles and aircraft; and so on."
The use of mobile technology by the Al Qaeda was effective insofar as it resulted in the September attacks, and the organization was also exposed by their mobile use. The internet is being used by many organizations and many countries allow these groups to conduct affairs anonymously. Therefore as the technology improves the masterminds of these organizations also look to use these methods and technology as fast as possible and try to adapt faster than regular business. Especially the technology that is safe, secure and free from leaks. The cloud is just that. It is secure and encrypted and protected. The information revolution caused advances in the technology of communication and organization with the advent of cyberspace. With the modern methods of data processing especially online, there has come about the existence of a "virtual society" also called the global community wherein all the persons of the globe can access the resources of the net with little outlay. Therefore the community now is the force behind the business, government, military and international perceptions. It was observed far back in 1999 that "as cyber space evolves, the terrorists are becoming interested in this new medium"
There is scope for spreading ideology, gaining adherents, control of the cadres and passing of encrypted information. Therefore we cannot brush aside the possibility of cloud becoming their new haven. There is also historical evidence to prove this fact.
3....
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now