Breaking News

ASUS Announces T1 GeForce RTX 5070 and RTX 5060 Ti Graphics Cards COLORFUL Launches iGame B850M ULTRA Series Micro-ATX Motherboards Sony Unveils 1000X THE COLLEXION Samsung Launches Next-Gen Odyssey, ViewFinity and The Movingstyle Essential Monitors LG Electronics Introduces World’s First Native 1000Hz Full HD Gaming Monitor

logo

  • Share Us
    • Facebook
    • Twitter
  • Home
  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map

Search form

Technology and Terrorism

Jan 28,2005 0

TV reports throughout the world about the technology tools probably used by the terrorists in their effort to execute their hideous attack against the USA are sensational. Firstly, their communications must have been encoded to a point that intelligence services all over the world did not have the slightest idea that a criminal act of so grand a scale was on the way to be executed. We have heard from extravagant tools that can hide messages within the photographic images’ dots (stenography), satellite mobiles that encode communication and so on.

All these technologies are existent as well as widespread-even the mobiles we, simple citizens use nowadays encode our conversation, still in a relatively simple way, so that absolute security is not offered. The issue immediately raised is how and why such technologies have been released in the market, since the fact that they are to be used by bloodthirsty terrorists to assassinate thousands of people, is certain. The question of dangerous technology is a fair, yet a simplistic one.

The first issue one has to think about is that once a technology is born, there is no way for it to be restricted on a long-term basis. It is knowledge, and knowledge cannot be stopped with wire fences. Even in the event of technology diffusion being restricted by law, its possession by criminals cannot be prevented, and that constitutes another problem. They are in possession of the means and of the financial support to acquire it: “ if cryptography becomes a felony, only those able to commit it will be capable of having it”, said someone.

The second question that has to be raised is, “to what extent should we accept “dangerous” technology ban? Should that be Cryptography? Should that be Flight Simulation Programs? (let us not forget that it is quite possible that the terrorists had been trained as to how to approach their targets using the Microsoft Flight Simulator program, one amongst the most common programs in the world.) On the other side, if one comes to think about it, the technological instrument utilized to drag thousands of people to the realms of Armageddon was the complicated yet common jet plane. Do we also have to ban flight technology?

William Gibson had written, “Gutter is able to track down its own ways to utilize any kind of technology”. Issuing bans of any kind has not been a solution to any problem. It just creates delusions of safety…

 

By Pashos Mandravelis.

email to P. Mandravelis

Tags:
Previous Post
Asus Extreme N6600GT
Next Post
Spelling piracy - errors are money

Related Posts

Latest Reviews

The Technology Stack Behind Modern Digital Gaming Platforms
Consumer Electronics

The Technology Stack Behind Modern Digital Gaming Platforms

be quiet! Dark Rock Pro 6
Cooling Systems

be quiet! Dark Rock Pro 6

How Online Casinos Use Encryption, Verification, and Risk Controls to Build User Trust
Enterprise & IT

How Online Casinos Use Encryption, Verification, and Risk Controls to Build User Trust

Why Low-Latency Infrastructure Matters More Than Raw Specs
Enterprise & IT

Why Low-Latency Infrastructure Matters More Than Raw Specs

In the Age of AI Phishing, the Best User Experience Might Be the One That Feels Safest
Enterprise & IT

In the Age of AI Phishing, the Best User Experience Might Be the One That Feels Safest

Popular News

TEAMGROUP Launches EXPERT P34F Find My External SSD

TEAMGROUP Launches EXPERT P34F Find My External SSD

CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards

CORSAIR announces Vanguard Pro 96 and Vanguard 96 Gaming Keyboards

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series

Samsung announces Galaxy Tab S11 and Galaxy S25 FE series

Viltrox Showcases Upcoming Lens Lineup and New TTL Flash at IBC 2025

Viltrox Showcases Upcoming Lens Lineup and New TTL Flash at IBC 2025

MSI Launches FORGE GK600 TKL WIRELESS Special Edition Compact Mechanical Keyboard

MSI Launches FORGE GK600 TKL WIRELESS Special Edition Compact Mechanical Keyboard

Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series

Panasonic Introduces the First Ultra-Telephoto Zoom Lens in the LUMIX S Series

MSI Launches DATAMAG 40Gbps Magnetic Portable SSD

MSI Launches DATAMAG 40Gbps Magnetic Portable SSD

Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities

Viltrox Joins the L-Mount Alliance, Expanding Creative Possibilities

Main menu

  • Home
  • News
  • Reviews
  • Essays
  • Forum
  • Legacy
  • About
    • Submit News

    • Contact Us
    • Privacy

    • Promotion
    • Advertise

    • RSS Feed
    • Site Map
  • About
  • Privacy
  • Contact Us
  • Promotional Opportunities @ CdrInfo.com
  • Advertise on out site
  • Submit your News to our site
  • RSS Feed