Technologies in Disaster Management the Essay

Total Length: 2028 words ( 7 double-spaced pages)

Total Sources: 4

Page 1 of 7

The lack of onsite training and motivation is not a problem anymore as terrorists get to watch videos of dangerous activities (destroying helicopters, beheading soldiers etc.) and read digitized letters of suicide bombers. Google earth is a software which uses satellite images to enhance maps to a whole new level. However its capabilities can backfire with regards to safety as terrorists might use it to plan attacks on crucial infrastructures (Wright, 2008).

Most forms of terrorism originate from jihad (religious struggle). The traditional forms of physical jihad are now being accompanied by electronic warfare. Islamic hacker organizations such as Munazamat Fursan Al-Jihad Al-Electronic and Inhiyar Al Dolar have set up websites to engage hackers in their missions. Technical experts aim at disrupting websites which are controlled by the American government, those which might be contradictory to the mujahideen belief system and Christian websites in general. They coordinate intrusions by Denial of Service attacks which can overload web servers with data packets, causing a major decline in performance. Ping attacks exploit the mechanism of checking system activity by making the incoming pings reach their peak, blocking the buffer space and crashing the network. These organizations target the youth who are accustomed to using the latest technology and are willing to use their expertise for jihadist needs.

Stuck Writing Your "Technologies in Disaster Management The" Essay?

Mujahideen Secrets 1 was an application published on an Al-Qaeda-based website which lets users conceal their email-based communications using multiple cryptographic algorithms. Updates on the software have added a simpler user interface and the ability to encrypt real time chats as well. Instances of publicly broadcasting inhuman activities such as the beheading of Nicholas Berg, the "heroes of Fallujah" video where a bomb destroys a U.S. carrier and the murder of Daniel Pearl make it clear how technology has made it easy to spread terror (Wright, 2008).

The extent of violence being spread by these groups has made it necessary to plan an approach which can yield some results. The first step would be to identify an effective interface to reach out to the Muslim community. Their views being promoted online should be replied with a sensible message which counters their extremist path. Efforts such as those taken by the Digital Outreach team of the American government have to be applied in order to establish a strong counter terrorist presence on the web. Informational operations can have far-reaching effects. The United States still has a lot of ground to cover with regards to safeguarding its citizens from extremists and their activities on the web (Wright, 2008)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Technologies In Disaster Management The" (2010, December 17) Retrieved April 27, 2024, from
https://www.aceyourpaper.com/essays/technologies-disaster-management-5740

Latest MLA Format (8th edition)

Copy Reference
"Technologies In Disaster Management The" 17 December 2010. Web.27 April. 2024. <
https://www.aceyourpaper.com/essays/technologies-disaster-management-5740>

Latest Chicago Format (16th edition)

Copy Reference
"Technologies In Disaster Management The", 17 December 2010, Accessed.27 April. 2024,
https://www.aceyourpaper.com/essays/technologies-disaster-management-5740