Terrorism Close Calls Security

Terrorism & Cloud Computing Technology Alliance

According to Jason Burke, “Technology is Terrorism most effective of all as it delivers a global audience.” From the time immemorial, we’ve seen the rise and fall of worlds notorious big terrorists. Such as Mohammed Atef, Osama bin Laden, Ahmed Mohammed Hamed Ali, Abdul Rahman Yasin just but to mention a few.

Whereby, according to the FBI’s Most Wanted Terrorists List, some of the above mentioned are still at large while others are already dead. Notably, the FBI Most Wanted Terrorists was a list created and first released on October 10, 2001, with the authority of United States President Bush, following the September 11 attacks on the United States.

Unpacking Terrorism Activities

Terrorism is, in the broadest sense, the use of intentionally indiscriminate violence as a means to create terror among masses of people; or fear to achieve a religious or political aim. Equally, it is used in this regard primarily to refer to violence during peacetime or in a war against non-combatants (mostly civilians and neutral military personnel).

In that case, the terms “terrorist” and “terrorism” originated during the French Revolution of the late 18th century. On the contrary, the acts gained mainstream popularity in the 1970s in news reports and books covering the conflicts in Northern Ireland, the Basque Country, and Palestine. The increased use of suicide attacks from the 1980s onwards was typified by the September 11 attacks in New York City and Washington, D.C. in 2001.

Confirmed cases of Terrorism Activities in Kenya

Generally speaking, Kenya has been the scene of various attacks attributed to terrorist elements. Whereas, in 1980, the Jewish-owned Norfolk hotel was attacked by the Palestine Liberation Organization (PLO). In 1998, the US embassy in Nairobi was bombed, as was the Israeli-owned Paradise hotel in 2002.

Additionally, in 2013, the militant group Al-Shabaab killed 67 people at Nairobi‘s Westgate Shopping Mall. There have been numerous other lesser attacks. Other related cases of Terrorism in Kenya include;

The Worlds’ Acts of Terrorism General Preview

For your information, acts of terrorism based on cloud computing alliance have been felt recently across the globe. In that case, with various government bodies coming into terms and finding ways of eliminating international cases of terror.

Initially, the list contained 22 of the top suspected terrorists chosen by the FBI, all of whom had earlier been indicted for acts of terrorism between 1985 and 1998. None of the 22 had been captured by the US or other authorities by that date. Of the 22, only Osama bin Laden was by then already listed on the FBI Ten Most Wanted Fugitives list.

No particular legal consequences flowed from the creation of inclusion on the list. On January 17, 2002, the FBI released a third major FBI wanted list, which has now become known as the FBI Seeking Information – War on Terrorism list. Especially, to enlist the public’s help in reporting information which may prevent future terrorist attacks.

Breaking down Terrorism & Cloud Computing Alliance

On the fugitive group wanted the poster, the FBI did not list the persons in any particular stated order. Except perhaps for the consistent placing of bin Laden in the number one position of the top row. However, the 22 can easily fit into distinct categories of over the two decades, based on the terrorist attacks in which they were, according to US authorities, involved.

As can be seen, in this era of technology and globalization, security is increasingly becoming one of the most pertinent issues.

Stop Terrorism
In general, governments across the globe are grappling with Terrorism Alerts.

Huduma Namba Kenya & the National Security Strategy

In other words, as criminals continue to evolve their tactics, the global security landscape is concurrently changing and we are now facing new and complex threats to both internal and external national security. Including,

  • Bioterrorism,
  • Narcoterrorism,
  • Cyberterrorism,
  • Agroterrorism.

As can be seen from the above mentioned among others, they are all emerging security challenges. Above all, that necessitate a radical and progressive reorientation of counter-strategies. Let’s simplify the above-mentioned acts of Terrorism Cloud Computing Allies.

1. Bioterrorism 

The word “bioterrorism” refers to biological agents (microbes or toxins) used as weapons to further personal or political agendas. Acts of bioterrorism range from a single exposure directed at an individual by another individual to government-sponsored biological warfare resulting in mass casualties.

For one thing, Bioterrorism differs from other methods of terrorism in that the materials needed to make an effective biological agent are readily available, require little specialized knowledge and are inexpensive to produce. Whereby, it could be as a result of pathogenic microorganisms.

One of the greatest humanity concern linked to bioterrorism results from an outbreak of diseases such as;

  1. anthrax (a bacterium)
  2. and smallpox (a virus).

Whereas, both can be lethal. For instance, Anthrax ain’t communicable while smallpox is readily transmitted. Particularly from person to person. In humans, the three forms of anthrax are inhalational, cutaneous and intestinal. Initially, symptoms of inhalational anthrax may resemble the flu. If untreated, symptoms will progress to breathing difficulties and eventual shock.

2. Narcoterrorism 

Narcoterrorism is a term coined by former President Fernando Belaúnde Terry of Peru in 1983 when describing terrorist-type attacks against his nation’s anti-narcotics police. In its original context, narcoterrorism the general attempts of narcotics trafficking.

Especially influencing the policies of a government or a society through violence and intimidation. Hindering the enforcement of anti-drug laws by the systematic threat or use of such violence. For example, Pablo Escobar‘s violence in his dealings with the Colombian government is probably one of the best known. Exclusively, with one of the best selling movie series with best-documented examples of narcoterrorism.

The term has become a subject of controversy, largely due to its use in discussing violent opposition to the US government’s War on Drugs. In particular, to those that especially engage in drug trafficking activity. In reality, to fund their operations and gain recruits and expertise. Such organizations include;

  2. AUC in Colombia,
  3. PCP-SL in Peru,
  4. Hamas and the Taliban.

Learn more about Narcoterrorism.

3. Agroterrorism

Agroterrorism is defined as the malicious use of plant or animal pathogens to cause devastating disease in the agricultural sector. Currently, this topic has received increased attention and discussion within academic, media, and government circles.

In some developing countries, the potential exists for agroterrorism to cause widespread disruption through the loss of sustenance, income, and production. Defense of agriculture may also be problematic because of the lack of stability and basic biosecurity infrastructure for the detection and prevention of diseases or invasive species. Further, the methodologies for risk-based allocation of resources include,

  • Threat,
  • Vulnerability,
  • and Consequence (TVC) Analysis.

A qualitative application of the TVC framework analysis suggests that evidence exists to demonstrate general terrorist threats. In addition to the vulnerability of agriculture and, depending on the country, potentially serious consequences arising from agroterrorism. Learn more about Security analysis for agroterrorism.

4. Cyberterrorism

Cyberterrorism is the use of the Internet to conduct violent acts that result in or threaten, loss of life or significant bodily harm. For example, in order to achieve political or ideological gains through threat or intimidation. In that case, the Information Sharing Environment (ISE) terrorism database sharing.

Nonetheless, the use of cyber might become clear early on in that investigation. But a tie to terrorism may not reveal itself for days, weeks, or months, if ever. On the other hand, from that perspective, the term “cyber terrorism” isn’t always immediately clear.

Terrorism Alert
The issue comes down to two things: people and infrastructure.

In order to effectively prevent or respond to a terrorist attack, people (whether they be investigators, analysts, or subject matter experts) with the skills to make sense out of the information are needed. The appropriate infrastructure must be in place beforehand to allow those involved to share information and talk with one another. See more illustrations about Cyberterrorism.

For your Takeaway,

There are different definitions of terrorism. Terrorism is a charged term. As a matter of fact, Governments and non-state groups use the term to abuse or denounce opposing groups. Varied political organizations have been accused of using terrorism to achieve their objectives. These organizations include right-wing and left-wing political organizations, nationalist groupsreligious groupsrevolutionaries and ruling governments.

Finally, legislation declaring terrorism a crime has been adopted in many states. However, there is no consensus as to whether or not terrorism should be regarded as a war crime. Whereas, the Global Terrorism Database, maintained by the University of Maryland, College Park, has recorded more than 61,000 incidents of non-state terrorism. Above all, resulting in at least 140,000 deaths between 2000 and 2014.

Resourceful References;

  1. The jmexclusives: Cloud Computing & Technology News Update
  2. Centers for Disease Control and Prevention: bioterrorism
  3. Office of the Director of National Intelligence: Unpacking Cyber Terrorism
  4. International Food Policy Research: Security analysis for agroterrorism
  5. Wikipedia: Narcoterrorism
  6. FBI: Most Wanted List 2019
Scroll to Top