Terrorists’ Use of Technology
Terror is spreading its wings globally & has found ideologies propaganda within new people. Even at remote places, terrorism has risen which affects zillions of harmless & defenseless people.
Integrating with technology terrorism is dynamic & has a strong force to create. Because of cyberspace terrorist can operate from anywhere globally without any restrictions & checkpoints.
Social media is a new face to support terrorist activities by which they create sympathies among the global masses. They represent each devastating terrorist activity dramatically & in larger scale to create a widespread fear.
Active terrorist groups utilizing & communicating via technology such as Hamas (the Islamic Resistance Movement), the Lebanese Hezbollah (Party of God), the Egyptian Al-Gama’a at Islamiyah, the Popular Democratic Liberation Front Party in Turkey (DHKP / C), the Kurdish Workers’ Party (PKK), the Zapatista National Liberation Army (ELNZ), the Islamic Movement of Uzbekistan (IMU) the Mujahedin, and the Chechens (Koyno, 2011).
For example in order to spread terrorism globally Osama Bin laden has extensively used internet to communicate its ideologies among the Muslim & other radicals. The group Osama Bin laden founded is named as Al-Qaeda & its current active militant is Sunni Islamist. It has used technology extensively in the form of cyberspace, using satellite enabled communication services & remotely launching missiles through controlled panels. Through this they were able to create havoc, devastation effects, organize terror activities, train new people & fund its terror activities. Later on in mass hunt conducted by US Navy SEALs they were able to identify Osama’s location & killed him on the spot.
Due to the high tech evidences, cybercrimes were easy to detect & identify terrorist exact locations. Through electronically controlled planes, tracing through electronic fingerprints , footprints, imaging & satellites during 9/11 war, US army were able to identify the terrorist group names, remotely controlled IP devices giving directions & were able to decode encrypted messages exchanged within the groups.
Another example: Saddam Hussain, an Iraqi head was found hiding deep inside a tunnel under a camouflaged terrace and false walls. His location was traced through satellites by US military & all the messages were decoded in the easy language through intelligent technology.
Last example, Osama Bin Laden was killed by US army in Pakistan by identifying his location through multiplatform surveillance & through remotely sensing secret devices.
Online Identity Theft
One of the examples is stealing iPhone personal identification through which impersonators gain access, steal identities, upgrade it to latest software & sell it off at high prices. This results in the losses to the carriers & not to owners. Another way through which attackers affect is through stealing victim’s personal information by decoding personal messages, passwords, and harassing victim by blackmailing, using their financial. The victim suffers peace of mind, suffer financial losses & mental harassments. In the long term they have to deal with court cases due to the cyberspace victimization resulting in time & energy loss.
Another example when we see phishing, scam mails which targets private information on mails be it debit/credit card details, stealing personal identity & sending pestering scam mails to other mail account holders & stealing information from them. Through tracking personal information or decoding encrypted messages, hackers are able to access in the personal mailbox information. The victim suffers financial losses, mental harassments & attacker can steal track personal to professional details blackmailing the victim. One can track attacker through unique IP address which initially generated such spam mails or by keeping a tab on the last suspicious activity mail accounts.
Three ways victim could have avoided is through-:
Keeping strong password information & regularly changing it. Regularly updating & staying in touch with the bank accounts, phone messages or with mails.
Not opening unwarranted messages on phones or phishing/scam mails. Only dealing with secured encrypted messages. Not disclosing it to anyone & keeping a tab of all the outgoing, incoming & other minute details.
Keeping a track of any suspicious activities. Using secured payment gateways intelligently & meticulously generating OTP’s, passwords through private SMS or mail alerts.
Eisenstein, J., & Jacob, H. (2011). Felony justice: An organizational analysis of criminal courts (p. 21). Boston: Little, Brown.
Feeley, M. M. (2010). Actuarial justice: The emerging new criminal law.
Hagan, F. E. (2013). Research methods in criminal justice and criminology(pp. 347-48). C. Romano, & A. Nollkaemper (Eds.). Boston: Allyn and Bacon.
Silberman, C. E. (2015). Criminal violence, criminal justice (p. 305). New York: Random house.
Walker, S., & Walker, S. (2011). Popular justice: A history of American criminal justice (p. 131). New York: Oxford University Press.