4 research outputs found

    Terrorism, counter-terrorism and the information revolution : the Islamic State (IS) versus the United States

    Get PDF
    Abstract: Contemporary and future advancements in innovative technologies have revolutionized the way humans are able to consume and release information on an everyday basis. However, these advancements could be depicted as a double-edged sword, as these technologies could be used for the purpose of terrorist activity. Terrorist groups such as IS (Islamic State), have used the internet through sophisticated technologies as a tool to radicalize, recruit and plan terrorist attacks on a consistent basis signalling an evolution in tactics and strategy adopted by modern terrorist groups. Guided by David Rapoport’s theory on the evolution of modern terrorism through four waves, this dissertation attempts to provide evidence for the rise of a fifth wave of terrorism - a fifth wave that is catalysed and spurred on by the power of the internet and the Information Revolution. This dissertation has employed an exploratory and qualitative approach to uncover the evolution that terrorism has undertaken as a result of new and emerging technologies. This dissertation also provides evidence of strategies that have been employed to counter terrorist activity using innovative and emerging technologies. In summary, this dissertation assesses the following: Chapter 1 provides the purpose of the study as well as the research objectives that the study attempts to achieve. Chapter 2 provides the context for the study by discussing the origins, definitions and characteristics of modern terrorism, as well as introducing David Rapoport’s theory on the four waves of terrorism. Chapter 3 discusses the emergence of a fifth wave of terrorism through examining key characteristics, traits, and catalysts of terrorism, as tools in understanding previous waves. Chapter 3 also assesses other popular fifth wave theories that currently exist to draw on their relevancy. In Chapter 4, IS is used as a case study to assess their potential of being a fifth wave terrorist group by discussing how they have used the internet for propaganda, financing; training; planning and executing attacks. Chapter 5 examines the need for counterterrorism in the digital age and the change in approach by the US government in counter terrorism as a result of new technologies. This chapter also provides insight into what new emerging technologies are being used to assist in the fight against terrorism by other counterterrorism agencies. Chapter 6 serves as the conclusion for this study and provides a brief summary of the key findings in this study. This dissertation attempts to draw on the possible emergence of a fifth of terrorism and uses IS as a case study to substantiate why they can be considered as a fifth wave terrorist group coupled with key counterterrorist strategies being employed as further evidence of this. The consequences of the Information Revolution on terrorism are also explored.M.A. (Politics

    Performance analysis for wireless G (IEEE 802.11G) and wireless N (IEEE 802.11N) in outdoor environment

    Get PDF
    This paper described an analysis the different capabilities and limitation of both IEEE technologies that has been utilized for data transmission directed to mobile device. In this work, we have compared an IEEE 802.11/g/n outdoor environment to know what technology is better. The comparison consider on coverage area (mobility), throughput and measuring the interferences. The work presented here is to help the researchers to select the best technology depending of their deploying case, and investigate the best variant for outdoor. The tool used is Iperf software which is to measure the data transmission performance of IEEE 802.11n and IEEE 802.11g

    Performance Analysis For Wireless G (IEEE 802.11 G) And Wireless N (IEEE 802.11 N) In Outdoor Environment

    Get PDF
    This paper described an analysis the different capabilities and limitation of both IEEE technologies that has been utilized for data transmission directed to mobile device. In this work, we have compared an IEEE 802.11/g/n outdoor environment to know what technology is better. the comparison consider on coverage area (mobility), through put and measuring the interferences. The work presented here is to help the researchers to select the best technology depending of their deploying case, and investigate the best variant for outdoor. The tool used is Iperf software which is to measure the data transmission performance of IEEE 802.11n and IEEE 802.11g

    Muslim identity, ‘Neo-Islam’ and the 1992-95 War in Bosnia and Herzegovina

    Get PDF
    Following the fall of the Berlin Wall, Yugoslavia was entangled in a fratricidal break-up. In none of the other former Yugoslav republics did the conflict turn as violent as in Bosnia and Herzegovina, which suffered genocide, the greatest number of victims and the highest percentage of infrastructural destruction. Although its three ethnic communities – Muslims, Serbs and Croats – were previously well integrated, the break-up of Yugoslavia exposed Bosnia’s unique Islamic component, which both Serbs and Croats perceived to be the major impediment to the continuation of a pluralistic society. Islam, however, only turned into a divisive and decisive factor in the conflict when combined with ethnic nationalism. Previous research into the causes of the 1992-95 war in Bosnia and Herzegovina and the break-up of Yugoslavia has identified Bosnia’s long Islamic heritage and large Muslim population on the doorstep of Europe as specific features influencing both its rationale and resolution. Yet there has been no analysis of the role and impact of ‘neo-Islam’ (a term I explained below) in the conflict – an omission this thesis seeks to redress. The thesis uses historical analysis to demonstrate that Bosnia and Herzegovina was frequently subject to international intervention during the nineteenth and twentieth centuries, it explores whether the unique Islamic component was the reason behind this phenomenon, and seeks to comprehend why Bosnia and Herzegovina has always appeared to pose a problem for the international community, from the papal persecutions of the medieval Bogumils through to the present day
    corecore