Top Special Offer! Check discount
Get 13% off your first order - useTopStart13discount code now!
Terrorism has been transformed by the use of technology into modern systems. Old terrorist organizations such as Al Qaeda are fast receding from the spotlight, making way for ISIS-like organizations. ISIS-like organizations use cutting-edge technology to facilitate their operations around the world. Terrorist organisations relied heavily on audio and video records to deliver their message to their intended target between the 1940s and the 1980s (Patrick, 2017). These approaches, however, have become obsolete since susceptible countries have established counterterrorism mechanisms to protect themselves from such attacks. These safeguards included tracking the video with the message and even where it was shot. Suspects can be captured and imprisoned using this information (Taylor, 2014). However, ISIS-like organizations use social media to advance their cause. The paper will analyze how the ISIS-like organizations utilize technology to advance their missions.
Technology in the communication field has been utilized widely. Current military communication systems of any modernized army boost of internal communication systems. Soldiers can communicate with each other in the battle field. In any war, communication is everything. It is this communication that brings about the coordination of the whole army. With a well-coordinated strike-force, the enemy would surely fall down. ISIS-like organizations also boast of these advanced communication systems (Patrick, 2017). The funding for such purchase requires huge sums which are also collected online. Piracy and donations from wealthy families are known methods pf funding such purchases for the jihadist enthusiast.
Another possible use of technology is the integration of social media in the advertisements and marketing aspects by these groups. Recruitment drives can be seen all over the internet for these groups. A popular style is the use of Facebook. The ISIS-like organizations post convincing articles on joining the executives for the first meeting. Vulnerable youth or the unemployed persons can easily be lured by these organizations such amounts (Moule, 2017). Vulnerable youth or the unemployed persons can easily be lured by funds in exchange for a job at the organization. It is quite easy to say no to your former self as you acquire the new fighting combat.
Also, the ISIS-like organizations have their own pages on social media where they communicate with their recruits all over. Usually, they would post a video, which clearly articulates why investing even in the main company is a plus for humanity. Everyone might not be a Muslim, but some would contact them about the funding scenario (Kinyanjui, 2014). Also, even with the global war against terrorism, there exist psychopaths who desire employment slots in the group. The high pressure accorded to the security agencies to infiltrate in such content, has become obsolete. The ISIS-like groups have developed confidence, and would even call their victims to say whether they would come for more (in case there is a meeting for the first time.
By boasting of the wide spectrum ensnared by the key terrorist groups, it is possible to have trained ICT personnel who manage the cyber activities of these organizations. It takes months to train a qualified ICT programmer, one who is competent in the hacking systems. By sing this knowledge and manpower in the ICT field, the ISIS-like organization can intercept communication channels of their enemies, especially the US (Johnston, 2016). With such gain in intelligence, the ISIS-like organization can reorder their strategies to win the battles. The hackers can even tap into online banking platforms to divert funds to their accounts.
With regards to finance, the ISIS-like groups even have online payment systems to collect their donations. Popular online banking methods like PayPal, and wire transfer have been a success for such organizations. In the past few years, it is estimated that the ISIS group received close to $1 billion in funds from donations and sponsorships (Kinyanjui, 2014). These financial platforms have brought convenience to the customer, for example, an ISIS enthusiast in Mexico or South America can send in their donations instantly.
Another use of social media is in the recruitment process. The ISIS-like organizations advertise the need for certain combat people to add onto its ever-growing army. People would then inbox the administrator of such accounts on the way ford regarding the application to the ISIS group. The administrator would then tell them the exact location they are to meet for the recruitment process (Von Behr, 2013). Unless such communications channels are intercepted by the CIA or the FBI, the ISIS-like organizations will continue celebrating the marvels of technology in the current times. This aspect has to be monitored and even regulated to curb recurrence of such incidents.
In the modern world, everybody craves attention. Attention, for the ISIS-like organization, draws confidence to the group. With attention, the ISIS group gets to remove the old-fashioned Al Qaeda group from the limelight. They achieve this by use of the news agencies. Whenever there is a fight at any part of the world, the publishing house usually develops a story for the general public. Similarly, when the US soldiers are bombed in Iraq and Syria, the general population (including the military) would fear going to such a place (Jnekins, 2014). Therefore, news platforms like Aljazeera and CNN only focus on the ISIS thereby starving the Al Qaeda the needed attention (Von Behr, 2013). Without attention, it would be difficult for old-fashioned organizations like Al Qaeda to be recognized even by their former enthusiasts. By taking the ego fight to the digital realm, old supporters of Al Qaeda and other old organizations would shift to the new ISIS-like organizations to advance their jihadist tendencies.
In recent times, ISIS has been losing ground in Syria and Iraq. Both of these countries have the favorable environment to advance the construction of the terrorism system. Iraq and Syria are in political turmoil. There is no clear leader in either countries. Without a solid leader, the organizations can choose to work openly without fearing apprehension as required by most laws. Such confusion makes it quite easy to acquire high-grade military equipment without fear of arrest. High sophisticated equipment likely to be bought by the groups include the night vision kit, intercom systems, and even more efficient guns. The night vision kit helps them see clearly at night. They kits are able to make the soldier see through darkness and identify the target before firing. The intercom systems only serve to enhance the communication between the soldiers. The technology shift since the 1940-1980s year range has revolutionized terrorism on the global front. The ISIS-like organizations use social media to advance their cause (for recruitment, collecting funds and communication).
Jnekins, B. (2014). Dynamics of Syrian’s Civil War.
Johnston, P. &. (2016). Impact of US air Drones Strikes in Pakistan. International Studies Quarterly, 203-219.
Kinyanjui, S. (2014). Impact of Terrorism on Foreign Direct Investment. Internationa Journal of Business Asssociation, 148.
Moule, R. &. (2017). Technology and Conflict: Group Processes and Collective Violence in Internet Era. Crime Law and Social Change, 47-75.
Patrick, J. (2017). Introduction to Security. Pearson.
Sandler, T. J. (2015). The Toll of Terrorism. Finance and Development, 27.
Taylor, R. F. (2014). Digital Crime and Digital Terrorism. Prentice Hall Press.
Von Behr, I. &. (2013). Radicalisation in Digital Era.
Hire one of our experts to create a completely original paper even in 3 hours!