The Interrelation Between Terrorism and Technology Research Paper

Exclusively available on Available only on IvyPanda® Made by Human No AI

Introduction

The wrath of terrorism imposed on today’s civilizations is indeed of a devastating nature in view of the accuracy of attacks resulting from the technologically advanced means available to terrorists. The recent spates of attacks by terrorists are sensational in their use of advanced techniques used in carrying out their attacks. The terrorists can encode their communications in a way that they cannot be traced by the intelligence agencies of the world. Advancements in technology used by terrorists are of such a high order that their communication with each other can be hidden within photographic images as also by using satellite mobile phones that gives them undetectable opportunities to interact in executing their tasks. The basic fact remains that new technologies cannot be restrained from reaching the masses, especially for those who find ways to misuse them in achieving their terrorist objectives (Mohamed Sid-Ahmed, 2001). It is a big question that knowledge cannot be restrained by blocking it or preventing it from spreading to all those who are searching for it. Terrorists are in the possession of means to finance such technologies at any given price and the issue of banning dangerous technologies cannot be considered except in the case of very extreme uses such as nuclear technology, which too is now in a delicate scenario in view of the recent disclosures in some countries of such technology getting into wrong hands. The Iraq war was fought primarily to prevent Iraq from acquiring weapons of mass destruction and to do away with its vulnerability in protecting the technology from getting into the possession of terrorist elements. Sure if such technologies can get into the hands of terrorists there can be havoc in the world because terrorist have no qualms about jeopardizing the life of any number of people to create the much desired fear of terrorist attacks. However the issue of preventing the availability of latest technology getting into the hands of terrorists is difficult to implement since all technologies are for the betterment and development of the human race, and it is unfortunate that terrorists use these techniques to achieve their horrific goals by harming humanity. Prevention and checks are the best means of curbing such acts (Stephen Handelman, 2006).

Different kinds of terrorist activities

While defining terrorism there is need to outline the different kinds of terrorist activities that are present in today’s world. The initial pangs of terrorism were experienced by the world when terrorists used techniques such as hijackings, bombings, diplomatic kidnappings and assassinations in attempts to assert their demand and ultimately such threats made a concrete impact on the world in terms of the permanent existence of these threats on mankind. In this context, politicians and lawmakers began to differentiate the types of terrorism existing in the world and began to find ways to combat such threats.

State terrorism

When governments sponsor terrorist acts it is referred to as state terrorism. There are many countries accused of carrying out state terrorism, like Germany did under Nazi rule. The US has also been accused of state terrorism when it sponsored the Nicaraguan Contras in the 1980s. Another terrorist form is bioterrorism whereby toxic biological agents are released to terrorize and harm citizens of a particular place for terrorist causes. Cyber terrorism refers to the use of information technology to attack civil populations in effort to draw attention to the terrorists cause, and recently this threat has taken alarming proportions. Eco-terrorism is a new term that relates to violence carried out in the interest of environmentalism whereby sabotage is done to inflict economic damages on industries which are seen as damaging the natural environment. Nuclear terrorism is the deadliest form of terrorism that is a potent threat on the world since nuclear materials can be exploited to inflict tremendous loss to life in terrorist attacks. Nuclear facilities can be attacked, nuclear weapons can be purchased, or nuclear weapons can be built as also ways found to disperse radioactive materials (Amy Zalman).

Attempts to prevent attacks

In the face of this new war, the governments of the world face a resourceful and ruthless enemy. Hence all the available knowledge, law and enforcement means are being used to prevail on this threat. In attempts to prevent further 9/11 style of attacks, the US government has set the entire science establishments in motion on a large scale (Pashos Mandravelis, 2005). Biologists, epidemiologists and software engineers have been made to team up to produce techniques that prevent food and air against bioterrorism. Bio forensics specialists and nuclear physicists have teamed up to reduce the possibility of smuggling nuclear techniques and to prevent suicide bombers. A major task in hand is to prevent food, water and air from being targeted in this hi-tech environment, and the agencies are making hectic efforts to combat the challenge. Sensors have been developed that can identify attacks on crops and air conditioning in public places. Miniature toxin detectors have been developed and deployed in several American cities that collect air-borne toxic substances that are sent to labs for testing and ascertaining for their harmful effects. Another measure is the requirement since 2004 for all visitors to the US to have their fingerprints recorded by optical scanners that check such information against a watch list of wanted people and this has yielded good results by way of nabbing anti-social elements with potential terror threats (Anti-Terrorism Technology Key to Homeland Security 2002). Added to this is the development of micron size sensors that can be placed in pipelines to monitor releases of biological chemicals or radio actives to alert authorities of any eventuality. In view of the vulnerability of planes, trains, buses and subways to threats from terrorists, they have been equipped with wireless sensors and fiber optics that are linked to a command post offering security personnel timely warning of such threats. Certainly, detection systems have improved and more advanced versions are in the pipeline to further boost security measures. Advanced video surveillance has been deployed in most public service areas and buildings have now begun to be designed against terrorist attacks by using hi-tech equipment. Additionally, in view of the possibility of cyber attacks being made on the financial networks and telecommunication grids, other means of protecting these facilities have been mooted (Siddharth Srivastava, 2004).

Conclusion

An international terrorist attack is defined in the US as one that is carried out by groups or individuals that are foreign based or sent at the instance of countries from outside the United States and whose actions spread through different boundaries. A typical example of international terrorism was the World Trade Center attack on 11/9. Domestic terrorism is defined as the unlawful use of violence against people or facilities in efforts to force the government and authorities to submit to political or social objectives (Recent Trends in Domestic and International Terrorism 1995). There are several instances of domestic terrorism worldwide and are more in the nature of local inhabitants of that country using such illegal means to further their cause by using coercive tactics into harming the interest of the public by way of damages to facilities as also to human life. However more important in the present scenario is the threat of international terrorism which has now taken a heavy toll and threatens to destabilize countries and cultures.

References

  1. Amy Zalman, . Web.
  2. , 2002. Web.
  3. Mohamed Sid-Ahmed, Terrorism and technology, 2001, Al Ahram Weekly
  4. Pashos Mandravelis, 2005, . Web.
  5. Recent Trends in Domestic and International Terrorism, 1995, Center for National Security Studies
  6. Siddharth Srivastava, Of Technology and Terrorism, 2004, The Kashmir Telegraph
  7. , 2006. Web.
More related papers Related Essay Examples
Cite This paper
You're welcome to use this sample in your assignment. Be sure to cite it correctly

Reference

IvyPanda. (2021, October 9). The Interrelation Between Terrorism and Technology. https://ivypanda.com/essays/the-interrelation-between-terrorism-and-technology/

Work Cited

"The Interrelation Between Terrorism and Technology." IvyPanda, 9 Oct. 2021, ivypanda.com/essays/the-interrelation-between-terrorism-and-technology/.

References

IvyPanda. (2021) 'The Interrelation Between Terrorism and Technology'. 9 October.

References

IvyPanda. 2021. "The Interrelation Between Terrorism and Technology." October 9, 2021. https://ivypanda.com/essays/the-interrelation-between-terrorism-and-technology/.

1. IvyPanda. "The Interrelation Between Terrorism and Technology." October 9, 2021. https://ivypanda.com/essays/the-interrelation-between-terrorism-and-technology/.


Bibliography


IvyPanda. "The Interrelation Between Terrorism and Technology." October 9, 2021. https://ivypanda.com/essays/the-interrelation-between-terrorism-and-technology/.

If, for any reason, you believe that this content should not be published on our website, please request its removal.
Updated:
This academic paper example has been carefully picked, checked and refined by our editorial team.
No AI was involved: only quilified experts contributed.
You are free to use it for the following purposes:
  • To find inspiration for your paper and overcome writer’s block
  • As a source of information (ensure proper referencing)
  • As a template for you assignment
1 / 1