Our trace these messages and attempt to

Our
world today revolves around social media. Whether it is to look up the local
news, see what your friend is doing, or just wasting time away our society is
dependent on technology. When everyone is so attached and influenced by the
media it becomes exceedingly easy for extremist groups to reach into the common
world. ISIS has become professionals at infiltrating social media to recruit
many people from all over the world. Extremist groups use social media to
recruit, radicalize, and raise funds. Using social media as well as encrypted
online communications beyond the reach of law enforcement surveillance, the
terror organizations are increasingly able to reach new sympathizers and
encouraging attacks. With modern technology we should have a way to be able to
track and trace these messages and attempt to trace back the source. According
to Statista.com as of “2015 the last reported number of internet users was 3.17
billion up from 2.94 billion in the previous year” (statista.com). This amount of users on the internet it’s near to
impossible to track and surveillance each suspicious conversation but if we
were able to somehow find where these extremist groups are most prevalent we
should be able to find a way to monitor and flag any conversation that appears
to be abnormal.

Although,
the internet could be one of our biggest allies to preventing terrorism it is
also one of our greatest challenges. Many extremist groups such as ISIS use
Twitter and Facebook openly. They use technology called encryption to hide away
from the watchful eye of the government. This tactic is called “going dark”.
This is one of the main concerns of police and counter-terrorism officers worldwide
right now. National Counterterrorism Center Director, Nicholas Rasmussen told
CNN’s Jim Sciutto in the CNN Special Report, that “It’s clear that our
terrorist adversaries have figured out and learned what kinds of communication
we’ve been in the past able to intercept. And they now understand that if they
… find other ways to communicate that they can shield their communications
from us.” There apps such as WhatsApp and its competitor Telegram that the
terrorist groups also use in order to communicate. The great thing about these
apps is that in some cases they are bale to block or flag suspicious conversations
for example Telegram has been able to block suspicious terrorist communications
according to Telegram they have stopped 126 communication lines they have
stated “Thanks to your reports, today we were able to block another 164 public
channels used to spread terrorist propaganda.” Although, it seems like a near
impossible task to stop these extremist groups from communicating through
encrypted lines there are ways to look and stop these communications from
happening. It is the government’s job and the apps creators job to try and
prevent these communications from happening.          

We Will Write a Custom Essay Specifically
For You For Only $13.90/page!


order now
x

Hi!
I'm Joan!

Would you like to get a custom essay? How about receiving a customized one?

Check it out