How terrorists use technology to scheme and attack
To exchange information, terrorists have exploited disposable cellular phones. Their technology may now be so sophisticated and secretive, experts say, that many communications avoid detection by National Security Agency programmes that designed to uncover terror plots. Terrorists have shown their ability to take up technological arms to harm the general populace.
For years, the extremists have used online forums to share information and drum up support. They have developed systems that blend encryption programmes with anonymity software to cover their tracks.
Terrorism on the Internet is also very dynamic: websites suddenly emerge, frequently modify their formats, and then swiftly disappear – or, in many cases, seem to disappear by changing their online address but retaining much the same content. They also adapt changing technology easily.
You may recall that a couple of years ago, leaders of terrorist groups used to send tapes to media houses to relay information about their threats. Nowadays, they share videos on the Internet.
To exchange information, terrorists have exploited disposable cellular phones, over the counter long-distance calling cards, Internet cafes, and other means of anonymous communications. Embedding information in digital pictures and graphics is another innovation employed to enable the clandestine global communication that modern terrorists require.
In last week’s Kenya attack, the Al-Shabaab used their Twitter account to communicate nearly on minute by minute basis.... Read the full, comprehensive news article and discuss at The Daily Nation