Social media is an important part of our lives

Assignment Help Other Subject
Reference no: EM132363990

One terrorist tactic, and its not limited to terrorists, but something that all factions utilize. That is knowing your enemy. Just like we use counter-intelligence to thwart the adversary before they can act, they too are utilizing intelligence operations to understand our, or whomever their target is, vulnerabilities (Hoffman, 2006). You could say this is step one of any terrorist plot, but it's just as important as the end result. If we look at early war on terror tactics involving road side IEDs (improvised explosive devices), they were crude but effective until we learned and adapted. We learned about the types of threats we expected to encounter but even though we gained ground on terrorist forces they did not take it as a complete loss. The longer we are in a position of superiority the easier it is for us to be observed and tactics adapted. They adapted by making IEDs take the shape of discarded ammunition magazines or "forgotten equipment". We are trained to not reveal privileged information lightly because we don't know who may be observing and terrorist elements will observe when the opportunity presents itself. Information gathering does not require high tech equipment, simply the use of their five senses and enough patience to use our rules of engagement against us. They document our movement, prompting us to change routes; they learn our standard operating procedures to anticipate our reactions. We have to shred documents because dumpster diving is a reliable source of information for the dedicated.

Social media is an important part of our lives, and it is a valuable source of information from the adversary (Makhutov & Baecher, 2012). They don't need to hack our computers when they can use rapport building and social engineering to illicit out information. We have seen the effects of home-grown terrorists and we know they can come from anywhere, they may already be on your friends list. When we upload pictures of our workplaces, we unintentionally give floor plans, population information, and sometimes even security. I think this is going to grow and become a significant source for terrorists to study us, they already do, but I don't see the usefulness of the information slowing down or becoming less helpful to their cause in the future.

REFERENCES

Hoffman, B. (2006). Inside terrorism. Retrieved from https://ebookcentral.proquest.com

Makhutov, N. A., & Baecher, G. B. (Eds.). (2012). Comparative analysis of technological and intelligent terrorism impacts on complex technical systems. Amsterdam: IOS Press.

Reference no: EM132363990

Questions Cloud

Analyze key historical events in field of health informatics : Analyze key historical events in the field of health informatics for how technology has been used that could inform the management of health information.
Does an ehr follow the patient to other health facilities : What is an EHR? What types of information are found in an EHR? How is it used? Does an EHR follow the patient to other health facilities? Explain.
Flour-is-us v. clarence-breach of contract : In Week 1, on behalf of your client Clarence Holden, you drafted an offer letter to Flour-Is-Us, with the terms of the contract for sale.
Negotiable instruments have properties : Negotiable instruments have properties that are like contracts. What is a negotiable instrument and how do these contracts differ from regular contracts.
Social media is an important part of our lives : Social media is important part of our lives and it is a valuable source of information from adversary. One terrorist tactic, and its not limited to terrorists,
Introduced in the first life skills assignment : You will continue to work with the case of The Church of Narnia v. The ABCD Company, introduced in the first life skills assignment.
Force training and the courts : Based on Training Liability in Use of Deadly Force, analyze the findings of Zuchel v. Denver and Popow v. City of Margate.
Personal jurisdiction and subject matter jurisdiction mean : Define and explain what personal jurisdiction and subject matter jurisdiction mean and how these terms are relevant to one who does business in different states
What type of contract was at issue in this case : Explain the difference between an implied-in-law (quasi contract) and an implied-in-fact contract. What type of contract was at issue in this case?

Reviews

Write a Review

Other Subject Questions & Answers

  Explain the critical importance of poverty in affecting

F/600/9777-CACHE Level 2 Certificate for the Children and Young People’s Workforce-Understand the needs of children and young people who are vulnerable.

  Provide at least one advantage and one disadvantage of each.

Name two other methods for assessing body fat or weight status. Provide at least one advantage and one disadvantage of each method.

  Why a strategic plan should determine various choices

Explain how and why a strategic plan should determine various choices regarding performance management system design.

  Describe the effects of these diplomatic efforts

Summarize a situation that required U.S. diplomatic efforts during the president’s time in office. Explicate the diplomatic doctrine the president followed, with reference to specific actions or events that occurred. Describe the effects of these dip..

  Discuss the problem of love in wuthering heights

Discuss Wordsworth's depiction of naturalism in one of the assigned poems from Lyrical Ballads

  Is there difference in time for two sets instructions

Is there a significant difference in time for the two sets of instructions? Use a two tailed test at .05 level of significance. Calculate the estimated Cohen’s d and r 2 to measure effect size for this stud.

  What peeked your interest the most

What did you find most complex or perplexing about vulnerability assessment? What peeked your interest the most? What can you do comfortably?

  Explain what criteria must be met for collaborative activity

Explain what criteria must be met for collaborative activities to be effective, according to the textbook

  Discuss people to develop software to automate hacking

The US government (and particularly DARPA) should encourage people to develop software to automate hacking

  Define professional boundaries

What are at least two legal issues associated with clinical psychology? Provide an example of a situation that could be legal but unethical.

  What factors contributed to large numbers of families

what factors contributed to large numbers of African American families moving out of the south and into areas such as Los Angeles?

  Should the physician allow mike to continue making decisions

Should the physician allow Mike to continue making decisions that seem to him to be irrational and harmful to James?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd