Abstract

Almost every new technology developed has brought great benefits attached with some risks. To each ‘technology’, there is an ‘anti‐technology’, making it a double edged weapon. But whatever be the risks, the progress just carries on, and new methods are found to tackle the risks. The phenomenal growth of computer and communication technologies, or ICT, is no exception and the main risk it has brought along with its benefits is that it has provided terrorist organisations great advantage in their nefarious activities. The ICT has also greatly facilitated cultural invasions, resulting in real or imagined resentments and revulsions, which are one of the causes of international terrorism. ICT is exploited by the terrorist organisations in two ways—as a tool and as a target of attack. Used as a tool, communications are used in support of their operations providing for control of all their activities. Terrorists can also operate in cyber space to destroy or manipulate information for their own purpose. There are numerous known cases of exploitation of ICT by the terrorist organizations, both, globally as well as in India. This paper aims to study the past patterns of exploitation of ICT by domestic and international terrorists to predict the future eventualities so that they can adopt preventive measures in a pro‐active manner. Subsequent studies under the same project will focus on the counter‐measures in a more detailed manner.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.