Total Pageviews

Thursday 15 June 2023

Use of Technology For Terrorists Activities-TERRORIST THREAT THAT INDIA FACES

TERRORIST THREAT THAT INDIA FACES

Major terror threats that India faces  in different parts of the country are discussed in this article. Technological  threats are also discussed alongside:-

(a) Maoism/Naxalism/Left Wing Terrorism in Central India.

(b) Insurgency , Terrorism ,Illegal Bangladeshi Migration.In North East . 

(c) Radicalization Of Society/Communal Riots. & Terrorism In  Hinterland

(d) Terrorism In Kashmir.

(e) Khalistani Extremism in Punjab and abroad

(f) Guarding India’s Land And Sea Borders from terror attacks.

(g) Terror Threat in Island territories.

(h) Innovative Technologies that may be Used in Future.

Other Forms Of Terrorism in India  by China and Pakistan are:

Cyber-Terrorism.

Radiological Dispersal Devices& Threats To India’s Nuclear Installations.

Threats To India’s Maritime Assets (Offshore Oil Platforms, Attractive Commercial Targets Like VlCCs).

Bio-Terrorism (Corona virus).Nuclear Terrorism?? 

On line radicalization.

We will consider technologies used by various terror groups in India as above

 Use of Technology For Terrorists Activities

Cross-border terror organizations have  been utilizing various technologies to facilitate and execute terrorist activities. Some of the technologies used by these organizations are given in succeeding paras.

Terror groups employ encrypted messaging applications and other secure communication tools to plan and coordinate their operations while avoiding detection by intelligence agencies. They employ cyber warfare tactics, including hacking, phishing, and malware attacks, to gather intelligence, disrupt critical infrastructure, or launch propaganda campaigns. Terrorists leverage social media platforms to recruit members, disseminate propaganda, and radicalize vulnerable individuals. They exploit the reach and anonymity provided by these platforms. Terror organizations have increasingly utilized drones for surveillance, weapon delivery, and reconnaissance purposes. Drones provide them with enhanced operational capabilities and flexibility.Terrorists exploit digital payment systems, crypto currencies, and other financial technologies to facilitate money laundering, to fund their activities.

Cross-border terror organizations employ various technologies to carry out their activities. Specific technological capabilities employed by cross-border terror organizations vary from time to time. Therefore, continuous assessment, adaptation, and cooperation between military, intelligence agencies, and other relevant stakeholders are crucial to effectively counter the threats posed by terror organizations

From a military perspective, the deployment of technology by cross-border terror organizations against India presents a serious challenge. These groups are increasingly using advanced technologies .

The deployment of technology by cross-border terror organizations is a constantly evolving threat that requires a combination of military and non-military responses. The Indian military has been working to stay ahead of these challenges through the development and deployment of advanced technologies, as well as through close coordination with other government agencies and international partners.

Some key areas where technology deployment by Cross-border terror organizations is observed are as under:-

Cross-border terror groups utilize advanced communication technologies to maintain operational security and coordinate their activities. They employ encrypted messaging applications, secure radio communication systems, satellite phones, and other digital platforms, internet-based platforms to exchange information and issue commands. They utilize advanced communication technologies to establish secure and covert communication networks.

The use of drones by terror organizations has become more prevalent in Punjab. These groups deploy small, inexpensive drones for surveillance, intelligence gathering, carrying narcotics. Drones provide real-time information about troop movements, military installations, or civilian targets, enabling the terrorists to plan their actions accordingly.

IEDs are commonly used by terrorist organizations. They employ remote-controlled or radio-controlled IEDs to target military convoys, checkpoints, or other high-value targets. They have employed IEDs as a primary means of attack. These devices can be concealed in everyday objects or vehicles .Improvements in remote detonation mechanisms and trigger systems have made IEDs more lethal and difficult to detect. Grenade throwing is common tactics.

Terror organizations have increasingly used social media platforms and online forums to spread propaganda, recruit new members, and radicalize individuals. These platforms provide a means to disseminate their ideologies, showcase their activities, and recruit sympathizers or supporters.

Cross-border terror organizations  employ surveillance and reconnaissance technologies to gather intelligence on potential targets or monitor the movement of security forces. This can include the use of drones, satellite imagery, or advanced night vision equipment.

Technology plays a significant role in weapon acquisition and smuggling for terror groups. They  exploit advancements in communication and transportation to procure and transport firearms, explosives, or other illicit materials across borders.

Terror organizations leverage social media platforms and the internet to disseminate propaganda, recruit new members, and radicalize vulnerable individuals. Online platforms provide a wide reach and is used to incite violence or promote extremist ideologies. They employ cyber warfare tactics to conduct espionage, launch propaganda campaigns. They try to cause chaos, gain intelligence, generate fear among the population.


No comments:

Post a Comment