Preview

High-Tech Terrorism

Better Essays
Open Document
Open Document
1220 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
High-Tech Terrorism
“New technologies allow terrorists to communicate efficiently, broaden their message, and wield unconventional weapons in unexpected ways,” (Martin, 2013). With the internet and rapidly advancing sciences and technology terrorists have become even a larger threat than before. The first category of new high-tech methods is information technologies. This consists of computers, the internet, e-mail, and social networking sites. Cyberterrorism has become a central feature in many of the terrorist cells and groups. “Today, almost all active terrorist organizations (which number more than forty) maintain websites, and many organizations maintain more than one website and use several different languages,” (Weimann, 2004). According to a study done by the United States Institute of Peace, there are eight different ways in which terrorists use the internet.
The first is psychological warfare, which is the use of threats and misinformation to believe the person(s) are in danger. Next is publicity and propaganda. “Terrorists now have direct control of their message…[enabling them] to manipulate their own image and the image of their enemies,” (Weimann, 2004). Data mining is the next way terrorists use the internet. They scour the internet searching out information on their enemy, most of it for free. In addition, fundraising is particularly popular on the terrorist websites. They offer pages were a person can make credit card donations or they manipulate users’ sympathy for a certain cause to get them to donate. Terrorists also use the internet for recruitment and mobilization purposes. “Recruiters…roam online chat rooms and cybercafés, looking for receptive members of the public, particularly young people,” (Weimann, 2004).
In continuance, terrorists are networking through the internet. The terrorist groups are moving away from the hierarchy system and are breaking up into smaller cells that are connecting through the internet. The next way terrorists are using the



References: HLS 101- Weapons of Mass Destruction. (2011). Retrieved from Eastern kentucky university: http://hlsonline.eku.edu/hls-101-weapons-mass-destruction-wmd Martin, G. (2013). Understanding terrorism. Thousand Oaks, California: Sage Publications, Inc. Rosenwald, M. (2013, Novem 13). Plastic guns a growing worry for law enforcement. The washington post. Retrieved from http://www.washingtonpost.com/local/printed-plastic-guns-a-growing-worry-for-law-enforcement/2013/11/13/211e9f74-4cad-11e3-be6b-d3d28122e6d4_story.html Vergano, D. (2010, Octob 27). One emp and the world goes dark. USA Today, Retrieved from http://usatoday30.usatoday.com/tech/science/2010-10-26-emp_N.htm Weapons of Mass Destruction. (2013, October 9). Retrieved from Global Focus: Open Source Intelligence: http://www.globalfocus.org/GF-WMDs.htm#radiological Weimann, G. (2004). How modern terrorism uses the internet. United States Institute of Peace: Special Report. Retrieved from http://www.usip.org/sites/default/files/resources/sr116.pdf

You May Also Find These Documents Helpful

  • Good Essays

    White, J. R. (2009). Terrorism and Homeland Security (6th ed.). [Adobe Digital Edition]. doi: 1009-0001-15E7-000015E8…

    • 873 Words
    • 4 Pages
    Good Essays
  • Best Essays

    INTL 440 Syllabus LDD Jan 14

    • 2263 Words
    • 11 Pages

    This course provides an overview of cyber warfare and the potential impact of its use by military, terrorist, and criminal organizations. By studying the operation of computer networks, the student will gain an appreciation of how they have both benefited society and made portions of its infrastructure more vulnerable. An overview of cyber weaponry will be presented, and various offensive and defensive strategies will be examined via case studies.…

    • 2263 Words
    • 11 Pages
    Best Essays
  • Good Essays

    It has been around for many centuries and will continue to be part of our lives. The practice however, has undergone remarkable changes throughout the years. As discussed earlier, the technological aspect alone has afforded terrorist organizations more readily available information and a better communication line to arrange and help with the execution of their plans. This technology provides both, assistance to the terrorists and an opportunity for targeting, as industrialized societies have placed greater reliance on information…

    • 1211 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    When analyzing the world's current situation concerning terrorism, it is difficult to say whether the global war on terrorism has been a successful one. Since the September 11, 2001 attack on the World Trade Centers in New York City, George Bush, former president of the United States, vowed to defeat terrorism. Moreover, to entirely grasp the subject, one must be familiar with the definition of terrorism and it can be defined as an act of violence or threatened violence intended to spread panic in a society, and to bring about political change. Terrorists do not necessarily live in their native states, majority migrate to neighboring countries, and countries and often go undetected. The logistics and man power it takes to combat terrorism is immense, and it seems more evident that the global war on terrorism is not succeeding due to essentially three factors. First, that The United States has created a terrorist haven in the Middle East. Second, international support for the global war on terrorism is decreasing. Third, terrorism has been on the constant increase since 911. Sept 11, 2001 changed the world forever because the attack on the two most powerful economic symbols which was the Twin Towers World Trade Center and the Pentagon.…

    • 1679 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    “We are now faced with a combination of new and traditional actors, a widened set of motivations and tactics, organizational structures and principles, as well as a wider range of threats along the technological spectrum, especially with the increased potential for the terrorists use of weapons of mass destruction. Counter terrorism must deal with a wider range of threats…

    • 2278 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Cited: Arquila, John and Ronfeldt, David. Networks and Netwars: The Future of Terror, Crime, and Militancy. Santa Monica, CA: Rand, 2001.…

    • 2376 Words
    • 10 Pages
    Powerful Essays
  • Better Essays

    Decentralization 310

    • 973 Words
    • 4 Pages

    Wei, L. (August 2010). Terrorism’s New Frontiers. Beijing Review, Vol. 53, Issue 31, pp 13. Retrieved on 9/9/2013 from http://web.ebscohost.com.ezproxy.liberty.edu:2048/ehost/pdfviewer/pdfviewer?sid=0b0e8b95-14ad-45df-928e-599544912e63%40sessionmgr110&vid=2&hid=119…

    • 973 Words
    • 4 Pages
    Better Essays
  • Good Essays

    i. Contemporary terrorist organizations are harmonizing their activities with scientific and technological discoveries, and in particular with the Internet and communication technologies. Collectively, this phenomenon is known as mega-terrorism.…

    • 1993 Words
    • 6 Pages
    Good Essays
  • Better Essays

    Bibliography: Byman, Dan. "Fighting the War on Terrorism: A Better Approach." Www.tobinproject.org. N.p., 2006. Web. 11 Dec. 2013.…

    • 2016 Words
    • 6 Pages
    Better Essays
  • Good Essays

    Lone wolf terrorism has been on the rise due to the accessibility of information on the internet and connection of social media. It is far easier for individuals to find become radicalized through extremist propaganda found through an easy online search. Information on how to build bombs to layouts of city plans are easily accessible on the internet. Terrorists, or aspiring terrorists, are also able to read about failed terrorist attacks, to find areas where they are able to make improvements in their own…

    • 85 Words
    • 1 Page
    Good Essays
  • Powerful Essays

    Torturing Prisons

    • 1727 Words
    • 7 Pages

    • Charles W. Kegley Jr. The New Global Terrorism: Characteristics, Causes, Controls. Upper Saddle River, NJ: Prentice-Hall, 2002.…

    • 1727 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    Interrogations

    • 3230 Words
    • 12 Pages

    United States. Army. Training and Doctrine Command. A Military Guide to Terrorism in the Twenty-first Century: TRADOC G2 Handbook(s). Vol. 1.06. Fort Leavenworth, Kan.: Command, 2008. Print.…

    • 3230 Words
    • 12 Pages
    Best Essays
  • Satisfactory Essays

    One of the prime uses of the internet by terrorists is for the propagation of propaganda. Propaganda usually takes the form of multimedia communications providing ideological or practical instruction, clarifications, justifications or promotion of terrorist activities. These may include computer-generated messages, presentations, magazines, treaties, audio and video files and video games advanced by terrorists’ organizations or sympathizers. Nevertheless, what constitutes terrorist propaganda, as opposed to legitimate advocacy of a viewpoint, is often a subjective valuation. Further, the distribution of propaganda is generally not, in and of itself, a prohibited activity. One of the basic canons of international law is the protection of fundamental…

    • 314 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    References: Bergen, Peter (2005) ‘Al Qaeda Then and Now’, in Al Qaeda Now: Understanding Today’s Terrorists, edited by Greenberg, Karen J.; Chapter 1, Cambridge University Press, New York, NY, USA.…

    • 2669 Words
    • 11 Pages
    Best Essays

Related Topics