SlideShare a Scribd company logo
1 of 2
PAST, PRESENT AND FUTURE DIMENSIONS OF TERRORISM
                                    Dr. Prashant Mehta
                   Assistant Professor, National Law University, Jodhpur
                          Email: prashantmehta1@rediffmail.com


Terrorism over the years has changed in ways and methods that makes it more
dangerous, lethal, and even more difficult to combat. If we analyse present scenario
of terrorism activity we will find that terrorist have not only adapted technology and
its latest developments but have also outsmart the intelligence set-up in both
planning, tactics, and technology.

In past the method of operation for most terrorists groups were guns and
conventional weapons which causing limited destruction and created threat
perception in mind of people. However today, evidence suggests that some of the
“new” terrorist groups may be willing to inflict mass casualties by using sophisticated
technologies. This use of advanced technology was quite evident from series of serial
bomb blasts had identical footprints of well planned, well managed, and well
executed operations that rocked major Indian cities.

Each operation was either followed or preceded by emails to several newspapers, TV
channels using hacked email accounts or sent from public WiFi zones. The high-tech
bombs, which were Improvised Explosive Devices (IEDs), contained the latest
generation of explosives (ammonium nitrate) that are difficult to detect and has
today become a object of terror.

Ammonium nitrate (NH4NO3) is not a high-quality explosive like RDX (it is difficult to
procure and use RDX as it is banned substance) but intelligent use in combination with
engine oil, gelatin sticks, concrete shrapnel, pebbles, nuts, bolts, packing, and proper
fuel mix like diesel converts it into a low cost high impact explosive. The explosion
becomes more lethal when the bomb composition is packed in tight containers,
concrete blocks, tiffin boxes, and pipes etc. Packing bombs in tight containers
increases the impact.

In this reaction ammonium nitrate acts as an accelerant (producing oxygen gas at a
very fast rate) which in turn speeds up the rate at which the fuel burns, producing a
huge explosion. The basic difference between the RDX and ammonium nitrate is that
the former can be used alone for causing blasts whereas the latter has to be laced
with some fuel or oil for causing the explosion.

This chemical mixture was then connected to an embedded chip which acted as an
electronic timer device planted at busy locations and detonated remotely by cell
phones using hacked or untraceable SIM cards, at peak hours to cause maximum harm
to innocent people. Each time security forces and intelligence agencies thought they
had some clues, they ended up finding they had been outfoxed by tech savvy well
trained, well planned and educated terrorist.

Today threat comes from Terrorist’s familiarity and their in-depth knowledge of using
electronic communication technology. Terrorist had knowledge to hack into servers,
clone the IP addresses to erase their trails of origin by resorting to cyber attacks on
information systems. Not only this, the terrorists use cell phones freely to
communicate between themselves but such calls are rarely traced since the terrorists
use a combination of foreign SIM cards and computer hacking to trespass into Indian
communication networks making detection of the origin of the calls almost
impossible. Besides encrypted emails and SMS services, the encryption keys of which
are not available to the government, were also used extensively. All blasts used high-
technology where conventional timers were replaced by integrated circuits (ICs) to
trigger the blasts at equal intervals and to even leave some of the bombs unexploded
to convey the message that they can strike anywhere and at will.

The third and future dimensions will come from new fast emerging technologies, how
the world might change in the years ahead and how it will counter challenge the
possible future developments of the terrorist threat. The emergence of a new breed
of terrorists less constrained by traditional or present methods of destruction,
coupled with the diffusion of know-how about nuclear, biological, and chemical
weapons, may increase the probability of terrorist incident with Weapons of Mass
Destruction (WMD).

The unregulated growth and diffusion of the new biotechnologies and genetic
engineering could open up a wide array of new potential threats like enhancement of
bacterial and viral virulence, heterologous gene expression and protein engineering of
toxins, agro-terrorism (create biological pathogens to destroy agricultural livestock),
nanotech bombs and genetic weapons (targeted towards special genomic race) etc
may become a reality in future. At the moment, the production of such weapons and
their use by terrorists is only a theoretical possibility but recent developments
indicate that in a not-too-distant future and the gap between possibility and reality
may close. Thus changing nature and means of operations is making it dangerous and
difficult to combat terrorism. Countering this threat requires deterring laws,
preventing as much as preparing public and private capabilities to respond to actual
attacks.

More Related Content

Similar to Past, Present And Future Dimensions Of Terrorism

GCSP Policy Paper 9
GCSP Policy Paper 9GCSP Policy Paper 9
GCSP Policy Paper 9Dale Till
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docxrtodd599
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research PaperRachel Phillips
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYijcsit
 
Berlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 PaperBerlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 Papermartindudziak
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandEnrique J Cordero
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weaponFernando Alcoforado
 
Electronic surveillance has become a controversial practice in the U.docx
Electronic surveillance has become a controversial practice in the U.docxElectronic surveillance has become a controversial practice in the U.docx
Electronic surveillance has become a controversial practice in the U.docxshandicollingwood
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation OllieShoresna
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxjiyalouis
 

Similar to Past, Present And Future Dimensions Of Terrorism (20)

1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main1 s2.0-s0267364913000666-main
1 s2.0-s0267364913000666-main
 
Cyber-Terrorism Essay
Cyber-Terrorism EssayCyber-Terrorism Essay
Cyber-Terrorism Essay
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
GCSP Policy Paper 9
GCSP Policy Paper 9GCSP Policy Paper 9
GCSP Policy Paper 9
 
Running headEMERGING THREATS AND COUNTERMEASURES .docx
Running headEMERGING THREATS AND COUNTERMEASURES             .docxRunning headEMERGING THREATS AND COUNTERMEASURES             .docx
Running headEMERGING THREATS AND COUNTERMEASURES .docx
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
 
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRYTHE PROFESSIONALIZATION OF THE HACKER INDUSTRY
THE PROFESSIONALIZATION OF THE HACKER INDUSTRY
 
The Professionalization of the Hacker Industry
The Professionalization of the Hacker IndustryThe Professionalization of the Hacker Industry
The Professionalization of the Hacker Industry
 
Terrorist Cyber Attacks
Terrorist Cyber AttacksTerrorist Cyber Attacks
Terrorist Cyber Attacks
 
Berlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 PaperBerlin Intl Sec Conf2 Paper
Berlin Intl Sec Conf2 Paper
 
CyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderlandCyberTerrorismACaseOfAliceInWonderland
CyberTerrorismACaseOfAliceInWonderland
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weapon
 
Electronic surveillance has become a controversial practice in the U.docx
Electronic surveillance has become a controversial practice in the U.docxElectronic surveillance has become a controversial practice in the U.docx
Electronic surveillance has become a controversial practice in the U.docx
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
CYBER AWARENESS
CYBER AWARENESSCYBER AWARENESS
CYBER AWARENESS
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptxThe Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
The Unseen Threats_ Exploring the Darknet's Latest Cyber Crime Trends.pptx
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 

More from Prashant Mehta

Gases physical properties
Gases physical propertiesGases physical properties
Gases physical propertiesPrashant Mehta
 
New education policy 2020
New education policy 2020New education policy 2020
New education policy 2020Prashant Mehta
 
India's New Education Policy 2020
India's New Education Policy 2020 India's New Education Policy 2020
India's New Education Policy 2020 Prashant Mehta
 
Human induced climate change
Human induced climate changeHuman induced climate change
Human induced climate changePrashant Mehta
 
Opportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare SectorOpportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare SectorPrashant Mehta
 
Healthcare Waste Trail in India
Healthcare Waste Trail in IndiaHealthcare Waste Trail in India
Healthcare Waste Trail in IndiaPrashant Mehta
 
Healthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian CourtsHealthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian CourtsPrashant Mehta
 
Challenges in Indian Healthcare Sector
Challenges in Indian Healthcare SectorChallenges in Indian Healthcare Sector
Challenges in Indian Healthcare SectorPrashant Mehta
 
Internal security and forensic science
Internal security and forensic scienceInternal security and forensic science
Internal security and forensic sciencePrashant Mehta
 

More from Prashant Mehta (20)

Elements facts
Elements factsElements facts
Elements facts
 
Gases physical properties
Gases physical propertiesGases physical properties
Gases physical properties
 
Communicable Diseases
Communicable DiseasesCommunicable Diseases
Communicable Diseases
 
Industrial processes
Industrial processesIndustrial processes
Industrial processes
 
Alloys
AlloysAlloys
Alloys
 
New education policy 2020
New education policy 2020New education policy 2020
New education policy 2020
 
India's New Education Policy 2020
India's New Education Policy 2020 India's New Education Policy 2020
India's New Education Policy 2020
 
Green house effect
Green house effectGreen house effect
Green house effect
 
Human induced climate change
Human induced climate changeHuman induced climate change
Human induced climate change
 
Smog
SmogSmog
Smog
 
Acid rain
Acid rainAcid rain
Acid rain
 
Healthcare Wastes
Healthcare WastesHealthcare Wastes
Healthcare Wastes
 
Opportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare SectorOpportunities in Indian Healthcare Sector
Opportunities in Indian Healthcare Sector
 
Healthcare Waste Trail in India
Healthcare Waste Trail in IndiaHealthcare Waste Trail in India
Healthcare Waste Trail in India
 
Healthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian CourtsHealthcare Waste and Judicial Intervention by Indian Courts
Healthcare Waste and Judicial Intervention by Indian Courts
 
Challenges in Indian Healthcare Sector
Challenges in Indian Healthcare SectorChallenges in Indian Healthcare Sector
Challenges in Indian Healthcare Sector
 
Internal security and forensic science
Internal security and forensic scienceInternal security and forensic science
Internal security and forensic science
 
Atmospheric Oxidants
Atmospheric OxidantsAtmospheric Oxidants
Atmospheric Oxidants
 
Atmosphere
AtmosphereAtmosphere
Atmosphere
 
Global Warming
Global WarmingGlobal Warming
Global Warming
 

Recently uploaded

16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendFabwelt
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 

Recently uploaded (8)

16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf16042024_First India Newspaper Jaipur.pdf
16042024_First India Newspaper Jaipur.pdf
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf15042024_First India Newspaper Jaipur.pdf
15042024_First India Newspaper Jaipur.pdf
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Experience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming TrendExperience the Future of the Web3 Gaming Trend
Experience the Future of the Web3 Gaming Trend
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 

Past, Present And Future Dimensions Of Terrorism

  • 1. PAST, PRESENT AND FUTURE DIMENSIONS OF TERRORISM Dr. Prashant Mehta Assistant Professor, National Law University, Jodhpur Email: prashantmehta1@rediffmail.com Terrorism over the years has changed in ways and methods that makes it more dangerous, lethal, and even more difficult to combat. If we analyse present scenario of terrorism activity we will find that terrorist have not only adapted technology and its latest developments but have also outsmart the intelligence set-up in both planning, tactics, and technology. In past the method of operation for most terrorists groups were guns and conventional weapons which causing limited destruction and created threat perception in mind of people. However today, evidence suggests that some of the “new” terrorist groups may be willing to inflict mass casualties by using sophisticated technologies. This use of advanced technology was quite evident from series of serial bomb blasts had identical footprints of well planned, well managed, and well executed operations that rocked major Indian cities. Each operation was either followed or preceded by emails to several newspapers, TV channels using hacked email accounts or sent from public WiFi zones. The high-tech bombs, which were Improvised Explosive Devices (IEDs), contained the latest generation of explosives (ammonium nitrate) that are difficult to detect and has today become a object of terror. Ammonium nitrate (NH4NO3) is not a high-quality explosive like RDX (it is difficult to procure and use RDX as it is banned substance) but intelligent use in combination with engine oil, gelatin sticks, concrete shrapnel, pebbles, nuts, bolts, packing, and proper fuel mix like diesel converts it into a low cost high impact explosive. The explosion becomes more lethal when the bomb composition is packed in tight containers, concrete blocks, tiffin boxes, and pipes etc. Packing bombs in tight containers increases the impact. In this reaction ammonium nitrate acts as an accelerant (producing oxygen gas at a very fast rate) which in turn speeds up the rate at which the fuel burns, producing a huge explosion. The basic difference between the RDX and ammonium nitrate is that the former can be used alone for causing blasts whereas the latter has to be laced with some fuel or oil for causing the explosion. This chemical mixture was then connected to an embedded chip which acted as an electronic timer device planted at busy locations and detonated remotely by cell
  • 2. phones using hacked or untraceable SIM cards, at peak hours to cause maximum harm to innocent people. Each time security forces and intelligence agencies thought they had some clues, they ended up finding they had been outfoxed by tech savvy well trained, well planned and educated terrorist. Today threat comes from Terrorist’s familiarity and their in-depth knowledge of using electronic communication technology. Terrorist had knowledge to hack into servers, clone the IP addresses to erase their trails of origin by resorting to cyber attacks on information systems. Not only this, the terrorists use cell phones freely to communicate between themselves but such calls are rarely traced since the terrorists use a combination of foreign SIM cards and computer hacking to trespass into Indian communication networks making detection of the origin of the calls almost impossible. Besides encrypted emails and SMS services, the encryption keys of which are not available to the government, were also used extensively. All blasts used high- technology where conventional timers were replaced by integrated circuits (ICs) to trigger the blasts at equal intervals and to even leave some of the bombs unexploded to convey the message that they can strike anywhere and at will. The third and future dimensions will come from new fast emerging technologies, how the world might change in the years ahead and how it will counter challenge the possible future developments of the terrorist threat. The emergence of a new breed of terrorists less constrained by traditional or present methods of destruction, coupled with the diffusion of know-how about nuclear, biological, and chemical weapons, may increase the probability of terrorist incident with Weapons of Mass Destruction (WMD). The unregulated growth and diffusion of the new biotechnologies and genetic engineering could open up a wide array of new potential threats like enhancement of bacterial and viral virulence, heterologous gene expression and protein engineering of toxins, agro-terrorism (create biological pathogens to destroy agricultural livestock), nanotech bombs and genetic weapons (targeted towards special genomic race) etc may become a reality in future. At the moment, the production of such weapons and their use by terrorists is only a theoretical possibility but recent developments indicate that in a not-too-distant future and the gap between possibility and reality may close. Thus changing nature and means of operations is making it dangerous and difficult to combat terrorism. Countering this threat requires deterring laws, preventing as much as preparing public and private capabilities to respond to actual attacks.