2 Oct 2022

52

Technology and Terrorism: How They Intersect and What We Can Do

Format: APA

Academic level: University

Paper type: Coursework

Words: 285

Pages: 1

Downloads: 0

Terrorist groups use modern technology, such as the Internet, to spread propaganda. The Internet, mainly social media platforms, is flooded with videos and audio that present misleading information to people. Indeed, before all the websites and social media platforms came to life, terrorism was majorly dependent on the native communication channel such as radio or television. However, with advancements in technology, there are various ways for the groups to disseminate data that reaches millions. Extremists use violent videos on YouTube, Facebook, or Twitter, which assist in highlighting extremist beliefs and, at the same time, use victims to incite people. In all these, they understand that psychological manipulation is effective in forming perceptions of truth. 

They use technology for recruitment in a bid to promote homegrown terrorism. Groups such as the Islamic State of Iraq and Syria (ISIS) create chat groups and websites that are password protected for linking young people with recruiters. For example, applications such as WhatsApp and Telegram provide end-to-end- encrypted messages which ensure privacy and ease of communication. Harrison (2020) outlines that online recruitment for ISIS rely on Internet access, where up to 90% of young people socialize. In clandestine recruitment, they gather intelligence and use citizens to spy on their government and engage in terrorism on behalf of the group. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Terrorists rely on cyberterrorism to further their distractive agenda. According to the United Nations (2013), they target computer systems of security agencies intending to instil feat politically and socially. Unlike the early days when terrorism majored in taking hostages, modern technology has proven to be an impactful alternative through computer viruses and flooding. For example, the Tel Aviv Exchange in 2012 saw thousands of credit card details disclosed. With thousands of websites functioning in the tech world for businesses' conduct, these attacks are fatal and disruptive to the proper functioning of a country. 

References 

Harrison, S. (2020). Evolving Tech, Evolving Terror. Center for Strategic & International Studies. https://www.csis.org/npfp/evolving-tech-evolving-terror 

United Nations (2013). United Nations Counter-Terrorism Implementation Task Force. The use of the Internet for terrorist purposes. https://www.unodc.org/documents/frontpage/Use_of_Internet_for_Terrorist_Purposes.pdf 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 15). Technology and Terrorism: How They Intersect and What We Can Do.
https://studybounty.com/technology-and-terrorism-how-they-intersect-and-what-we-can-do-coursework

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

The 1931 Central China Flood

The country of China was a vibrant agricultural hub in the early 18th century. The agriculturists cultivated on every available fertile piece of land. Their activities disrupted wetlands and Nanyang trees were felled...

Words: 625

Pages: 2

Views: 143

2009 Washington DC Metro Train Collision

The 22 nd of June 2009 saw the collision of two southbound Red Line Washington Metro trains. The total number of casualties was nine with tens of others being injured. According to DC Metro, the cause of the accident...

Words: 554

Pages: 2

Views: 80

Comparing and Contrasting the Rural, Urban, and Insurgent Models of Terrorism

In the purest sense, the term terrorism refers to the application of intentional brutality and violence, in general against unarmed civilians, mainly for political reasons. The term was coined during the French...

Words: 325

Pages: 1

Views: 518

Understanding Response and Recovery

The emergency management system will have to change the response and recovery protocols for better response to an emergency. The changes in the system will entail new official organizations and primed plans for...

Words: 374

Pages: 1

Views: 209

Why Radicalization Fails: Barriers to Mass Casualty Terrorism

Radicalization is a concept that refers to the gradual social processes used to explain changes in behaviours or ideas. There is a clear distinction between behavioural and cognitive dimensions of...

Words: 1951

Pages: 7

Views: 134

Information Sharing and Collaboration: Department of Homeland Security

The Department of Homeland Security (DHS) has many intelligence agencies used for protecting American citizens. The various agencies should collaborate by sharing information to combat threats to Americans....

Words: 307

Pages: 1

Views: 63

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration