Saturday, April 21, 2018
Most Popular
Tech Views
General Computing
WEB Reviews
Seagate Enterprise Capacity 3.5 V.3 4TB SAS 6Gb/s HDD Review
OCZ Vector 256GB SSD Review @ Custom PC Review
Gigabyte F2A85XM-D3H
NZXT Phantom 630
Auvio Bluetooth Portable Speaker Review
Corsair H90 CPU Cooler Review
BIOSTAR Hi-Fi Z77X (Intel Z77) Motherboard Review
Noctua NH-L9i Cooler Review on Technic3D
Breaking News
Apple to Replace Some MacBook Pro Laptop Batteries
ZTE's Nubia Red Gaming Phone Released
LG Display's OLED Smartphone Screens Still Not Ready For Apple
Nintendo Labo Kits Now Available
June's VLSI Symposium Focuses on Next Generation Transistor Technology and MRAM
Samsung Not Interested in Nokia's Health Unit
ZTE Says Company's Survival at Risk
2nd Generation AMD Ryzen Desktop Processors Arrive to Offer Great Value
Home > Tech Views > General Computing

Friday, January 28, 2005
Technology and Terrorism

1. Page 1

TV reports throughout the world about the technology tools probably used by the terrorists in their effort to execute their hideous attack against the USA are sensational. Firstly, their communications must have been encoded to a point that intelligence services all over the world did not have the slightest idea that a criminal act of so grand a scale was on the way to be executed. We have heard from extravagant tools that can hide messages within the photographic images’ dots (stenography), satellite mobiles that encode communication and so on.

All these technologies are existent as well as widespread-even the mobiles we, simple citizens use nowadays encode our conversation, still in a relatively simple way, so that absolute security is not offered. The issue immediately raised is how and why such technologies have been released in the market, since the fact that they are to be used by bloodthirsty terrorists to assassinate thousands of people, is certain. The question of dangerous technology is a fair, yet a simplistic one.

The first issue one has to think about is that once a technology is born, there is no way for it to be restricted on a long-term basis. It is knowledge, and knowledge cannot be stopped with wire fences. Even in the event of technology diffusion being restricted by law, its possession by criminals cannot be prevented, and that constitutes another problem. They are in possession of the means and of the financial support to acquire it: “ if cryptography becomes a felony, only those able to commit it will be capable of having it”, said someone.

The second question that has to be raised is, “to what extent should we accept “dangerous” technology ban? Should that be Cryptography? Should that be Flight Simulation Programs? (let us not forget that it is quite possible that the terrorists had been trained as to how to approach their targets using the Microsoft Flight Simulator program, one amongst the most common programs in the world.) On the other side, if one comes to think about it, the technological instrument utilized to drag thousands of people to the realms of Armageddon was the complicated yet common jet plane. Do we also have to ban flight technology?

William Gibson had written, “Gutter is able to track down its own ways to utilize any kind of technology”. Issuing bans of any kind has not been a solution to any problem. It just creates delusions of safety…


By Pashos Mandravelis.

email to P. Mandravelis

Get RSS feed Easy Print E-Mail this Message

Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .