Excerpt by Essay:
The lack of onsite training and motivation is not a problem any more as terrorists get to view videos of dangerous activities (destroying choppers, beheading soldiers etc . ) and browse digitized letters of committing suicide bombers. Yahoo earth is actually a software which in turn uses satellite images to improve maps into a whole new level. However its capabilities can backfire in terms of safety because terrorists might use it to plan attacks on crucial infrastructures (Wright, 2008).
The majority of forms of terrorism originate from jihad (religious struggle). The traditional types of physical jihad are now being combined with electronic combat. Islamic hacker organizations just like Munazamat Fursan Al-Jihad Al-Electronic and Inhiyar Al Dolar have set up websites to interact hackers inside their missions. Specialized experts aim disrupting websites which are controlled by the American government, those which may be contradictory towards the mujahideen belief system and Christian websites in general. They will coordinate intrusions by Refusal of Support attacks which could overload world wide web servers with data bouts, causing a serious decline in performance. Ping attacks take advantage of the device of looking at system activity by making the incoming pings reach their very own peak, stopping the barrier space and crashing the network. These kinds of organizations focus on the children who happen to be accustomed to making use of the latest technology and therefore are willing to employ their knowledge for jihadist needs. Mujahideen Secrets you was a credit card applicatoin published on an Al-Qaeda-based website which let us users cover up their email-based communications employing multiple cryptographic algorithms. Updates on the software program have added a simpler user interface and the capability to encrypt real time chats as well. Instances of publicly broadcasting inhuman activities including the beheading of Nicholas Berg, the “heroes of Fallujah” video where a bomb damages a U. S. carrier and the homicide of Daniel Pearl make it clear how technology has made that easy to pass on terror (Wright, 2008).
The extent of violence getting spread by these groupings has made it necessary to prepare an approach that may yield a lot of results. The first thing would be to determine an effective program to reach out to the Muslim community. Their opinions being offered online ought to be replied which has a sensible communication which counters their extremist path. Work such as individuals taken by the Digital Outreach team from the American authorities have to be applied in order to establish a strong table terrorist existence on the web. Informational operations may have far-reaching effects. The us still has a whole lot of earth to cover with regards to safeguarding the citizens from extremists and their activities online (Wright, 2008).
References
United Nations. (n. m. ). The role of Science and Technology in Disaster Lowering. International Strategy for Disaster Lowering. Retrieved Dec 4, 2010 from www.unisdr.org/eng/public_aware/world_camp/2001/pdf/Kit_2_The_Role_of_Science_and_Technology_in_Disaster_Reduction.pdf
Selvavinayagam, E ( and. d. ). Disaster managing practices employing ArcGIS, ArcIMS
ArcSDE and Oracle. Gathered December five, 2010 via www.stesalit-inc.com/Disaster.pdf
GDIN (Global Tragedy Information Network ) (2005) GDIN Homopage.
htpp: //www.gdin-international.org
Virtual University for Small States from the Commonwealth (VUSSC) (n. d. ). Summary of Disaster Supervision. Unit almost 8: The Role of Technology in Catastrophe Management. (pp 97-119)
Wright, M. (2008). TECHNOLOGY TERRORISM Forensic Examiner 17(4)