SlideShare uma empresa Scribd logo
1 de 7
Baixar para ler offline
International Affairs and Global Strategy                                                           www.iiste.org
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol 4, 2012

                               Terrorism and Role of Media
                                Jagdeep Singh1, Shilpi Goyal2 and Vishal Gupta3

              1. G.M.N. (P.G.) College, Ambala Cantt, Haryana, India

              2. Karnataka State Open University (KSOU), Mysore, India.

                  3. Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India

                        * Email of the corresponding author: shilpigoyal03@gmail.com

Abstract

“Terrorism is the systematic use of terror, violent or destructive acts committed by groups in order to
intimidate a population or government into granting their demands.” All the developed, developing nations
have confronted the horrors of Terrorism. It is one of him devastating threats for the whole world. Due to the
advent of Terrorism in humane life, we have been confined to in destruction. To live the life of a common
man becomes unendurable. Further the role of media and science is very much evident in Terrorism. “Terror”
means disastrous fear. It becomes highly destructive and leading us towards the “Holocaust”.

This paper proposes to examine the role of media in Terrorism. Really, it is the need of the hour that we
should have to awaken our society. Technology has enabled Terrorism and Terrorism to create havoc in the
world. But at the same time there are so many solutions which can be found & implemented by the
technologies. Therefore, here in such circumstances, we have to take an oath to fight against Terrorism and
establish ourselves well equipped and enforced. It will also not come to happen without the optimum
utilization of technology.

The paper illustrates definition, types, history of Terrorism and history of Terrorists group too in brief. It also
gives an outline of Terrorism by ideology, involvement of state etc. A successful attempt has also been made
to rule out the basic cause of terrorism and role of media in terrorism. As Terrorism appears to be one of the
burning issues in present state of world However, this paper is going evaluate the role of media in the
“Terrorism”.

Introduction

Now a day’s human being is trying to take over the nature from every possible angle and he achieved a
success in many of the attempts he claimed. Because of globalization a cut throat competition has set up in
every sector and every nation is trying hard to remain in pace at slightly stage than other. It leads to
revolutionary changes in the field of technology. It mainly includes Electronics and telecommunication, I.T.
Biotechnology. Ammunition engineering, Space Technology and core branches of engineering too. Due to
tremendous enhancement in transport facilities, the life speed of mankind has increased remarkably. The
Internet has transformed the whole world in to –A global village. As well as man to man communication
speed has drastically elevated because of availability of various communication resources. Which are well
within a reach of a common man there are many more other aspects of engineering and technology including
all above which are assessing the technology as a real boon for human being? If at all it is being used for the
welfare of society and nation thereof. But certain anti-social elements are trying to misuse the technological
power for their selfish evil will, status, blind religious faith , search for identity, unsaid ego etc. which mainly
leads to destruction , threats, insecurity , alienation, loneliness etc. all these factors sharply pointing towards a
term –Terrorism.

TERRORISM- A Brief Overview.



                                                         23
International Affairs and Global Strategy                                                         www.iiste.org
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol 4, 2012

The man has been placed on the highest pedestal among all other living beings and is considered to be the best
of creation; it is because of his higher power of judgment and of certain values which distinguish from other
species.

Man can understand what is right and what is wrong and can determine his goal, plan his actions and judge
his doing from moral angle. He has certain attributes or is expected to have certain attributes which entitle
him to be called the noblest of creation, whereas these qualities are missing in the beasts, the brutes ….. or the
terrorist. According to Merriam Webster, Terrorism is systematic use of a Terror, violent or destructive acts
committed by group in order to intimidate a population or Government into granting their demands.

The word – Terror comes from a Latin word meaning –to frighten. The terror cambric’s was a panic and state
of emergency in Rome in response to the approach of warriors of the Cambric Tribe in 105 B.C. The Jacobins
cited this precedent when imposing a Reign of Terror during the French Revolution. After the Jacobins lost
power, the word – Terrorist became a term of abuse.

Although the Reign of Terror was imposed by a Government, in modern times –terrorism use ally refers to
the killing of innocent people by private group in such a way as to create a media spectacle this meaning can
be trace back to Sergey Nechayev , who described himself as a –terrorist Nechayev founded the Russian
terrorist Felicia Orsini threw three bombs in an attempt to assassinate French Emperor Napoleon III . Eight
bystanders were killed and 142 injured. The incident played a crucial role as an inspiration for the
development of the early Russian terrorist group. Russian Sergey Nechayev, who founded People’s
Retribution in 1869, described himself as a –terrorist, an early example of the term being employed in its
modern meaning. Nechayev’s story is told in fictionalized from by Fyodor Dostoevsky in the novel The
Possessed. German anarchist writer Johann Most dispensed –advice for terrorists in the 1880s. Quasi
Terrorism

Types:

    The Terrorism can broadly be classified as below:

                Political Terrorism

                Limited Political Terrorism

                Civil Disorders

                Non Political Terrorism

                Official or State Terrorism

Civil Disorders:

A from of collective violence interfering with the peace, security and normal functioning of the community.

Political Terrorism:

Violent criminal behavior designed primarily to generate fear in the community, or substantial segment of it,
for political purpose.




Non-Political Terrorism:


                                                       24
International Affairs and Global Strategy                                                         www.iiste.org
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol 4, 2012

Terrorism is that not aimed at political purpose but which exhibits – conscious design to create and maintain
high degree of fear for coercive purpose, but the end is individual or collective gain rather than the
achievement of a political objective.

Quasi-Terrorism:

The activities incidental to the commission of crimes of violence that are similar in form and method to
genuine terrorism but which nevertheless lack its essential ingredient It is not the main purpose of the quasi
terrorist to induce terror in immediate victim as in the case of genuine 1 terrorism, but the quasi terrorism uses
the modalities and techniques of the genuine terrorist and produces similar consequences and reaction.

Limited Political Terrorism:

Genuine political Terrorism is characterized by a revolutionary approach; limited political Terrorism refers to
– act of Terrorism which are committed for ideology or political motives but which are not a part of a
concerned campaign to capture control of state.

Office or State Terrorism:

Referring to nations whose rule is basted upon fear and oppression that reach similar to terrorism or such
Proportions defined broadly as terrorist act carried out by government in pursuit of political objectives, often
as apart of their foreign policy.

Media and Terrorism: A brief Scenario

Media is double bladed sword and is to be handled with due care. It can be utilized for the welfare of the
society as discussed earlier. Misuse of the same will definitely damage and destruct the society like anything.
The scientists and researchers of the whole world are trying their best to explore newer technology for the
benefit of the society. But their dreams have been shattered and certain anti social elements have misused the
modern technology in terrorism Modern technology has added. Great tarred and horrors to terrorism. Modern
media has also been characterized as a negative response to globalization.

The terrorists are using trying to use every possible technological resource to fulfill their evil targets. They
are utilizing the knowledge of various engineering disciplines which mainly includes Computer & I.T.,
Electronics and Telecommunications, Ammunition Engineering , Bio technology, space engineering,
Chemical science and other core branches of engineering too.

Media : A tool misused by terrorists.

Terrorists are employing various communication devices for easy, faster and optimized communications. It is
observed that they are mainly taking the help of cell phones, radio audio signals, micro chips (a data handling
device) and other advanced electronics and telecommunication devices. It is proved that they are widely
using Laptops and Internet services and software to plan, develop and execute their terrorist’s attacks.
Various kinds of ammunitions are used by them for terrorism and to create threats. The science of handling,
using and developing the dangerous ammoniates is being thought to them by their masterminds. They are
utilizing the latest means of technology to carry out their evil activities. And is may be the sorry state of
affairs to agree that we are lagging behind in the speed of acquiring the latest means and at the same time to
develop counterattack modules of the same to avoid terrorists acts. It is beyond the scope of this discussion to
enlist and describe all the technological aspects over here hence one of the major components relating to
aviation security is discussed in brief.

(1) Aviation Security :




                                                       25
International Affairs and Global Strategy                                                           www.iiste.org
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol 4, 2012

Over the last 10 years, high-capacity international aircraft have become favorite targets of terrorists.
Consequently, much research and development in counterterrorist technology has been focused on means of
safeguarding this mode of transportation, in part by developing better means of detecting the small quantities
of explosives believed to have caused the most recent fatal tragedies. That effort has included some attention
to controlling access to the aircraft and other critical areas at airports, and to the human aspects of the security
system. However, to date, the question of how best to combine technologies and people to provide maximum
security. A systems approach to overall airport security is under development in a major program sponsored
by the FAA Technical Center, using the Baltimore/Washington International Airport (BWI) as a model is
very much open. The explosives detection problem is one of surveying all means of bringing explosives
aboard aircraft. First, this means screening passengers as well as hand-carried baggage and checked baggage
that go on board. Mail and cargo must also be considered as possible pathways for introducing explosives
aboard aircraft. Screening all flight crew and service and airport contractor personnel is yet another issue,
covered by the BWI programmed but not considered here.

(a)      Statistics of Detection :

The performance of a detection system can be characterized by two primary parameters. Pd, and the false
alarm or false positive rate, Far. A good detector has a very high detection probability (as close to 100 percent
as possible), while still maintaining a very low rate of false positives or false alarms. These two parameters
are coupled, primarily through the detection threshold: the more sensitive the detection threshold, the higher
the false alarm rate. Unfortunately, to detect small quantities of explosives with high probability requires that
the threshold for detection (the lower limit on the amount of explosives that may be reliably detected) be
set as low as possible; consequently, the false alarm rate is high. This effect is shown graphically in figure.
The curve on the left represents the distribution of measured nitrogen content (or other detection parameter)
for bags with no explosives. The curve on the right represents the distribution of measured nitrogen content
for bags with a given amount of explosives that should be detected. The shaded area of overlap represents the
probability of a signal being caused by either a clean piece mistakenly identified or by piece of contraband
material.

(b) Generic Frequency Distributions of Detections and-False Alarms figure.

(c) Recent Development in Detection Technology :

X-ray Systems for Bomb Detection in Baggage. X-ray technologies for airport security are developing
rapidly as advanced systems used for medical and industrial imaging are adapted for screening luggage. The
FAA tested some advanced commercial. X-ray systems in late 1990 for specific purposes in baggage
screening The results of these tests have not yet been released. The standard x-ray machine for airport
security produces an image of the distribution of x rays that have passed though the observed object. These
pictures have excellent spatial resolution-thin wires are readily seen- but the operator cannot find a
lightweight object behind a denser one, nor tell whether a dark image is due to a thin sheet or a heavy
material, such as steel, or a thick sheet of plastic, which can produce the same x-ray absorption. During the
past few years, a number of companies, using a variety of approaches, have been trying to overcome these
shortcoming.

(d) Electromagnetic Techniques for Explosives Detection

A detailed discussion of nuclear magnetic resonance (NMR) and nuclear quadruple resonance (NQR)
techniques for detecting explosive compounds is given in CLASSIFIED appendix F. Both methods involve
applying Radio frequency radiation to an examined object while observing the electromagnetic response of
molecules contained therein. Another method, dielectrometry, measures the dielectric constant (a physical
property of matter) of an object, to determine whether anomalous items are present. The latter technique does
not detect explosives, just anomalies in dielectric constant. All these methods can, in principal, be defeated by
wrapping the explosive in metal foil. However, it is easy to test for the presence of metal foil, for example,

                                                        26
International Affairs and Global Strategy                                                       www.iiste.org
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol 4, 2012

with standard metal detectors (see app. C). For carry-on baggage, these would be a high false alarm rate.
However, for screening individual items targeted by other techniques, these methods might be useful. For
screening people, NQR might become a candidate detector.

(2) Biological and Chemical Defenses :

The confined space and recalculated airflow within airlines could increase the effectiveness of chemical or
biological agents. Many (although not all) biological agents take many hours to produce symptoms. However
chemical attacks as well as attacks with very fast working biological agents could well be terrorist option.
Few possibilities exist for dealing with this problem beyond attempting to detect the agents when being
brought on board-and this would be difficult to do. For aerosols, a separate air system for the flight deck to
insulate the flying crew from the effects of the gas would be on tactic.

     Controlled, but rapid, depressurization in the cabin, to be followed by depressurization, might mitigate
effects on the passengers.

Media: A useful means for prevention of Terrorism

All the advanced medial devices are within the reach of a common man. In order to control the misuse of
media it is hereby advised to identify the sensitive technological means( devices, hardware, software etc.) and
should given proper code of identification so that they can be easily be identified if being misused. They must
be issued to the needy person by judging his requirement, status, personal identity and various other related
modes of identifications. There must be a recommendation of an authentic statuary authority with the person
who wish to procure the same. An undertaking in the form of an affidavit must be obtained from a person who
want to use these means. It should be clearly mentioned in the affidavit that the person who is using the said
means , is essential for his progress and prosperity. A very purpose of said means should be clearly mentioned
in over there. It has also been undertaken that he will be using the same foe benefit and welfare of the
mankind. Any misuse of the same may put him into the court of law for further necessary action.

Media aspects: A brief note:

As and where possible all the public places should be well equipped with advanced equipments so as to
minimize the terrorist’s attack. It is hereby suggested to install CCTV s ,high sensitive metal detectors,
explosive detection , hand detectors , Plasma monitors, Binoculars , certain audio-video sensors, etc. which
will sense ,record and detect any kind unfair source , means, weapons ,explosives etc which may lead to
terrorist attack . All types of national /international communications should be scanned though the filters
consists of expert systems which will act as a interpreter. It will have certain knowledge base of possible
terrorist’s communication modules in every possible language, other suspicious behavioral graphics
database, etc. The said system must be well equipped with recent hardware and software facilities so that it
can easily trace, detect and to nearest police stations and police head quarters inform the details of unfair
means if any. Media will make it possible to detect the illegitimate sources in the society. It requires proper
planning, optimized utilization all kinds of resources (Man, Machine, Material) proper control and
monitoring systems, effective and real feel feed back and above all the honesty, the loyalty, the morality and
last but not the least is the patriotism, It is beyond the scope of this seminar to detail out the design and
development of above cited system.



Conclusion :

In the years past, different involved in operations against terrorist did not even have a communication , full
proof internet security , safety public places, enough intelligence services etc. It is need of an hour to
strengthen all security services related related to every hardware and software aspects from all possible
corners. The media is to be used in the real way to protect the society by coordinating all disciplines of media

                                                      27
International Affairs and Global Strategy                                                       www.iiste.org
ISSN 2224-574X (Paper) ISSN 2224-8951 (Online)
Vol 4, 2012

and building a concrete and well secured so that even an evil will can not clear though. Secondly, it is equally
important and essential to awaken a common man in preventing terrorism threats by use of technology. It is
possible by launching certain awareness campaign designed and developed by the experts.

The direction of non violence as far as their knowledge, capacity and strength in their own working arena is
concerned. It comes to happen that the day will not be far away, where we will take – a sigh of relief, peace
and happiness.

Undoubtedly, the above discussed aspects are very difficult to act upon but not impossible. It reminds Hon.
DR. A. P. J. Abdul Kalama’s saying – Indomitable spirit and unconquerable in the world.

References:

(1) Technology against Terrorism: Structuring Security January 1992 OTA-ISC-511 NTIS order
       #PB92-152529

(2)      Terrorism: concepts, causes, and conflict resolution George Mason University Institute for Conflict
         Analysis and Resolution, Printed by the Defense Threat Reduction Agency, Fort Beloit, Virginia,
         January 2003

(3)      Hudson, Rex A. Who Becomes a Terrorist, and Why: The 1999 Government Report on Profiling
         Terrorists, Federal Research Division,The Lyons Press,2002

(4)      “Unemployment, Inequality and Terrorism: Another Look at the Relationship between Economics
         and Terrorism”

(5)      Library of Congress – Federal Research Division The Sociology and Psychology of Terrorism The
         Media and Terrorism: A Reassessment Paul Wilkinson. Terrorism and Political Violence, Vol.9,
         No.2 (Summer 1997), pp.51-64 Published by Frank Cass, London.




                                                      28
International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org

Business, Economics, Finance and Management               PAPER SUBMISSION EMAIL
European Journal of Business and Management               EJBM@iiste.org
Research Journal of Finance and Accounting                RJFA@iiste.org
Journal of Economics and Sustainable Development          JESD@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Developing Country Studies                                DCS@iiste.org
Industrial Engineering Letters                            IEL@iiste.org


Physical Sciences, Mathematics and Chemistry              PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Chemistry and Materials Research                          CMR@iiste.org
Mathematical Theory and Modeling                          MTM@iiste.org
Advances in Physics Theories and Applications             APTA@iiste.org
Chemical and Process Engineering Research                 CPER@iiste.org


Engineering, Technology and Systems                       PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems              CEIS@iiste.org
Innovative Systems Design and Engineering                 ISDE@iiste.org
Journal of Energy Technologies and Policy                 JETP@iiste.org
Information and Knowledge Management                      IKM@iiste.org
Control Theory and Informatics                            CTI@iiste.org
Journal of Information Engineering and Applications       JIEA@iiste.org
Industrial Engineering Letters                            IEL@iiste.org
Network and Complex Systems                               NCS@iiste.org


Environment, Civil, Materials Sciences                    PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science                  JEES@iiste.org
Civil and Environmental Research                          CER@iiste.org
Journal of Natural Sciences Research                      JNSR@iiste.org
Civil and Environmental Research                          CER@iiste.org


Life Science, Food and Medical Sciences                   PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research                      JNSR@iiste.org
Journal of Biology, Agriculture and Healthcare            JBAH@iiste.org
Food Science and Quality Management                       FSQM@iiste.org
Chemistry and Materials Research                          CMR@iiste.org


Education, and other Social Sciences                      PAPER SUBMISSION EMAIL
Journal of Education and Practice                         JEP@iiste.org
Journal of Law, Policy and Globalization                  JLPG@iiste.org                       Global knowledge sharing:
New Media and Mass Communication                          NMMC@iiste.org                       EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy                 JETP@iiste.org                       Periodicals Directory, JournalTOCS, PKP
Historical Research Letter                                HRL@iiste.org                        Open Archives Harvester, Bielefeld
                                                                                               Academic Search Engine, Elektronische
Public Policy and Administration Research                 PPAR@iiste.org                       Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy                 IAGS@iiste.org                       OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences                RHSS@iiste.org                       NewJour, Google Scholar.

Developing Country Studies                                DCS@iiste.org                        IISTE is member of CrossRef. All journals
Arts and Design Studies                                   ADS@iiste.org                        have high IC Impact Factor Values (ICV).

Mais conteúdo relacionado

Mais procurados

Basic Principles and Organizations of the United Nations
Basic Principles and Organizations of the United NationsBasic Principles and Organizations of the United Nations
Basic Principles and Organizations of the United NationsAnıl Sural
 
Disarmament & Arms Control
Disarmament & Arms ControlDisarmament & Arms Control
Disarmament & Arms Controlgueste59d722
 
C04.8 terrorism and the media
C04.8 terrorism and the mediaC04.8 terrorism and the media
C04.8 terrorism and the mediaMatthew Boutross
 
Cooperation under the security dilemma
Cooperation under the security dilemmaCooperation under the security dilemma
Cooperation under the security dilemmaSamin Mohebbi
 
Notable International Human Rights Organizations
Notable International Human Rights OrganizationsNotable International Human Rights Organizations
Notable International Human Rights OrganizationsJohn Slifko, Ph.D
 
Media & Terrorism
Media & TerrorismMedia & Terrorism
Media & TerrorismFizza Rizvi
 
Bush and the Global war on Terror
Bush and the Global war on Terror Bush and the Global war on Terror
Bush and the Global war on Terror Boutkhil Guemide
 
Media in conflict prevention and peace building
Media in conflict prevention and peace buildingMedia in conflict prevention and peace building
Media in conflict prevention and peace buildingIsurangi pathirana
 
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLInternational Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLNilendra Kumar
 
Lesson #8 post cold war era
Lesson #8 post cold war eraLesson #8 post cold war era
Lesson #8 post cold war eraJason Hauck
 

Mais procurados (20)

Terrorism
TerrorismTerrorism
Terrorism
 
Human Rights protection mechanism
Human Rights protection mechanismHuman Rights protection mechanism
Human Rights protection mechanism
 
Human security
Human securityHuman security
Human security
 
Causes of war
Causes of warCauses of war
Causes of war
 
Media and Conflict Resolution
Media and Conflict ResolutionMedia and Conflict Resolution
Media and Conflict Resolution
 
PPT - The League of Nations - IIA2
PPT - The League of Nations - IIA2PPT - The League of Nations - IIA2
PPT - The League of Nations - IIA2
 
Basic Principles and Organizations of the United Nations
Basic Principles and Organizations of the United NationsBasic Principles and Organizations of the United Nations
Basic Principles and Organizations of the United Nations
 
Disarmament & Arms Control
Disarmament & Arms ControlDisarmament & Arms Control
Disarmament & Arms Control
 
C04.8 terrorism and the media
C04.8 terrorism and the mediaC04.8 terrorism and the media
C04.8 terrorism and the media
 
Cooperation under the security dilemma
Cooperation under the security dilemmaCooperation under the security dilemma
Cooperation under the security dilemma
 
Notable International Human Rights Organizations
Notable International Human Rights OrganizationsNotable International Human Rights Organizations
Notable International Human Rights Organizations
 
Media & Terrorism
Media & TerrorismMedia & Terrorism
Media & Terrorism
 
Human rights
Human rightsHuman rights
Human rights
 
Fascism
FascismFascism
Fascism
 
Bush and the Global war on Terror
Bush and the Global war on Terror Bush and the Global war on Terror
Bush and the Global war on Terror
 
Media in conflict prevention and peace building
Media in conflict prevention and peace buildingMedia in conflict prevention and peace building
Media in conflict prevention and peace building
 
Liberalism
LiberalismLiberalism
Liberalism
 
What is International Law?
What is International Law?What is International Law?
What is International Law?
 
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHLInternational Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
International Humanitarian Law Lecture 13 - Some Contemporary Challenges in IHL
 
Lesson #8 post cold war era
Lesson #8 post cold war eraLesson #8 post cold war era
Lesson #8 post cold war era
 

Destaque

Terrorism Major problem of Pakistan
Terrorism  Major problem of PakistanTerrorism  Major problem of Pakistan
Terrorism Major problem of PakistanHassan Mansoor
 
Pakistani Military Sacrifice
Pakistani Military SacrificePakistani Military Sacrifice
Pakistani Military SacrificeCharles Schliebs
 
Effect of war against terrorism on pakistan
Effect of war against terrorism on pakistanEffect of war against terrorism on pakistan
Effect of war against terrorism on pakistanMuhammad-Usman-Sabir
 
Effects Of Terrorism On Pakistan Economy
Effects Of Terrorism On Pakistan EconomyEffects Of Terrorism On Pakistan Economy
Effects Of Terrorism On Pakistan EconomyFJeconomist
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistanXee Shani
 
Terrorism In Pakistan
Terrorism In PakistanTerrorism In Pakistan
Terrorism In PakistanUsama Malik
 
Impact Of Terrorism
Impact Of TerrorismImpact Of Terrorism
Impact Of Terrorismspclife
 
Impact Of Terrorism On Economy of Pakistan.
Impact Of Terrorism On Economy of Pakistan.Impact Of Terrorism On Economy of Pakistan.
Impact Of Terrorism On Economy of Pakistan.Akhlaq Altaf
 
Operation Zarb-e-Azb
Operation Zarb-e-AzbOperation Zarb-e-Azb
Operation Zarb-e-Azbosama122
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedSlideShare
 

Destaque (15)

War and Terrorism
War and TerrorismWar and Terrorism
War and Terrorism
 
Terrorism Major problem of Pakistan
Terrorism  Major problem of PakistanTerrorism  Major problem of Pakistan
Terrorism Major problem of Pakistan
 
Pakistani Military Sacrifice
Pakistani Military SacrificePakistani Military Sacrifice
Pakistani Military Sacrifice
 
OPERATION ZARB-E-AZB
OPERATION ZARB-E-AZBOPERATION ZARB-E-AZB
OPERATION ZARB-E-AZB
 
Effect of war against terrorism on pakistan
Effect of war against terrorism on pakistanEffect of war against terrorism on pakistan
Effect of war against terrorism on pakistan
 
Effects Of Terrorism On Pakistan Economy
Effects Of Terrorism On Pakistan EconomyEffects Of Terrorism On Pakistan Economy
Effects Of Terrorism On Pakistan Economy
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistan
 
Terrorism In Pakistan
Terrorism In PakistanTerrorism In Pakistan
Terrorism In Pakistan
 
Zarb-e-Azb
Zarb-e-AzbZarb-e-Azb
Zarb-e-Azb
 
Impact Of Terrorism
Impact Of TerrorismImpact Of Terrorism
Impact Of Terrorism
 
Impact Of Terrorism On Economy of Pakistan.
Impact Of Terrorism On Economy of Pakistan.Impact Of Terrorism On Economy of Pakistan.
Impact Of Terrorism On Economy of Pakistan.
 
Operation Zarb-e-Azb
Operation Zarb-e-AzbOperation Zarb-e-Azb
Operation Zarb-e-Azb
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 
Ppt terrorism
Ppt terrorismPpt terrorism
Ppt terrorism
 
LinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-PresentedLinkedIn SlideShare: Knowledge, Well-Presented
LinkedIn SlideShare: Knowledge, Well-Presented
 

Semelhante a 11.terrorism and role of media

Suicide Report 1
Suicide Report 1Suicide Report 1
Suicide Report 1adnanshaikh
 
The_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfThe_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfMohammed Saaida
 
Terrorism
TerrorismTerrorism
Terrorismu439
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...paperpublications3
 
Arathiiiiiiiiiiiiiiiiiii
ArathiiiiiiiiiiiiiiiiiiiArathiiiiiiiiiiiiiiiiiii
Arathiiiiiiiiiiiiiiiiiiirencyrobert
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...paperpublications3
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...paperpublications3
 
Online assigment sarachandran niar hl
Online assigment sarachandran niar hlOnline assigment sarachandran niar hl
Online assigment sarachandran niar hlcijiciji
 
Online assigment sarachandran niar hl
Online assigment sarachandran niar hlOnline assigment sarachandran niar hl
Online assigment sarachandran niar hlH L Sarachandran Nair
 
Terrorism Type, Nature, and Prevention
Terrorism Type, Nature, and PreventionTerrorism Type, Nature, and Prevention
Terrorism Type, Nature, and PreventionJoedhelLloydObordo
 
Terrorism and victimization
Terrorism and victimizationTerrorism and victimization
Terrorism and victimizationIJASRD Journal
 

Semelhante a 11.terrorism and role of media (20)

Terrorism
TerrorismTerrorism
Terrorism
 
Suicide Report 1
Suicide Report 1Suicide Report 1
Suicide Report 1
 
The_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfThe_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdf
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
Arathiiiiiiiiiiiiiiiiiii
ArathiiiiiiiiiiiiiiiiiiiArathiiiiiiiiiiiiiiiiiii
Arathiiiiiiiiiiiiiiiiiii
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
DG11 Global Terrorism
DG11 Global TerrorismDG11 Global Terrorism
DG11 Global Terrorism
 
Online assigment sarachandran niar hl
Online assigment sarachandran niar hlOnline assigment sarachandran niar hl
Online assigment sarachandran niar hl
 
Online assigment sarachandran niar hl
Online assigment sarachandran niar hlOnline assigment sarachandran niar hl
Online assigment sarachandran niar hl
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism Type, Nature, and Prevention
Terrorism Type, Nature, and PreventionTerrorism Type, Nature, and Prevention
Terrorism Type, Nature, and Prevention
 
Terrorism
TerrorismTerrorism
Terrorism
 
TERRORISM.pptx
TERRORISM.pptxTERRORISM.pptx
TERRORISM.pptx
 
Terrorism and victimization
Terrorism and victimizationTerrorism and victimization
Terrorism and victimization
 
Terrorism In India.
Terrorism In India.Terrorism In India.
Terrorism In India.
 
Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2Crj3400 Terrorism Understandingthe Threat1&2
Crj3400 Terrorism Understandingthe Threat1&2
 
How Does Terrorism Affect Global Politics
How Does Terrorism Affect Global PoliticsHow Does Terrorism Affect Global Politics
How Does Terrorism Affect Global Politics
 

Mais de Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

Mais de Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

11.terrorism and role of media

  • 1. International Affairs and Global Strategy www.iiste.org ISSN 2224-574X (Paper) ISSN 2224-8951 (Online) Vol 4, 2012 Terrorism and Role of Media Jagdeep Singh1, Shilpi Goyal2 and Vishal Gupta3 1. G.M.N. (P.G.) College, Ambala Cantt, Haryana, India 2. Karnataka State Open University (KSOU), Mysore, India. 3. Maharishi Markandeshwar University, Mullana, Ambala, Haryana, India * Email of the corresponding author: shilpigoyal03@gmail.com Abstract “Terrorism is the systematic use of terror, violent or destructive acts committed by groups in order to intimidate a population or government into granting their demands.” All the developed, developing nations have confronted the horrors of Terrorism. It is one of him devastating threats for the whole world. Due to the advent of Terrorism in humane life, we have been confined to in destruction. To live the life of a common man becomes unendurable. Further the role of media and science is very much evident in Terrorism. “Terror” means disastrous fear. It becomes highly destructive and leading us towards the “Holocaust”. This paper proposes to examine the role of media in Terrorism. Really, it is the need of the hour that we should have to awaken our society. Technology has enabled Terrorism and Terrorism to create havoc in the world. But at the same time there are so many solutions which can be found & implemented by the technologies. Therefore, here in such circumstances, we have to take an oath to fight against Terrorism and establish ourselves well equipped and enforced. It will also not come to happen without the optimum utilization of technology. The paper illustrates definition, types, history of Terrorism and history of Terrorists group too in brief. It also gives an outline of Terrorism by ideology, involvement of state etc. A successful attempt has also been made to rule out the basic cause of terrorism and role of media in terrorism. As Terrorism appears to be one of the burning issues in present state of world However, this paper is going evaluate the role of media in the “Terrorism”. Introduction Now a day’s human being is trying to take over the nature from every possible angle and he achieved a success in many of the attempts he claimed. Because of globalization a cut throat competition has set up in every sector and every nation is trying hard to remain in pace at slightly stage than other. It leads to revolutionary changes in the field of technology. It mainly includes Electronics and telecommunication, I.T. Biotechnology. Ammunition engineering, Space Technology and core branches of engineering too. Due to tremendous enhancement in transport facilities, the life speed of mankind has increased remarkably. The Internet has transformed the whole world in to –A global village. As well as man to man communication speed has drastically elevated because of availability of various communication resources. Which are well within a reach of a common man there are many more other aspects of engineering and technology including all above which are assessing the technology as a real boon for human being? If at all it is being used for the welfare of society and nation thereof. But certain anti-social elements are trying to misuse the technological power for their selfish evil will, status, blind religious faith , search for identity, unsaid ego etc. which mainly leads to destruction , threats, insecurity , alienation, loneliness etc. all these factors sharply pointing towards a term –Terrorism. TERRORISM- A Brief Overview. 23
  • 2. International Affairs and Global Strategy www.iiste.org ISSN 2224-574X (Paper) ISSN 2224-8951 (Online) Vol 4, 2012 The man has been placed on the highest pedestal among all other living beings and is considered to be the best of creation; it is because of his higher power of judgment and of certain values which distinguish from other species. Man can understand what is right and what is wrong and can determine his goal, plan his actions and judge his doing from moral angle. He has certain attributes or is expected to have certain attributes which entitle him to be called the noblest of creation, whereas these qualities are missing in the beasts, the brutes ….. or the terrorist. According to Merriam Webster, Terrorism is systematic use of a Terror, violent or destructive acts committed by group in order to intimidate a population or Government into granting their demands. The word – Terror comes from a Latin word meaning –to frighten. The terror cambric’s was a panic and state of emergency in Rome in response to the approach of warriors of the Cambric Tribe in 105 B.C. The Jacobins cited this precedent when imposing a Reign of Terror during the French Revolution. After the Jacobins lost power, the word – Terrorist became a term of abuse. Although the Reign of Terror was imposed by a Government, in modern times –terrorism use ally refers to the killing of innocent people by private group in such a way as to create a media spectacle this meaning can be trace back to Sergey Nechayev , who described himself as a –terrorist Nechayev founded the Russian terrorist Felicia Orsini threw three bombs in an attempt to assassinate French Emperor Napoleon III . Eight bystanders were killed and 142 injured. The incident played a crucial role as an inspiration for the development of the early Russian terrorist group. Russian Sergey Nechayev, who founded People’s Retribution in 1869, described himself as a –terrorist, an early example of the term being employed in its modern meaning. Nechayev’s story is told in fictionalized from by Fyodor Dostoevsky in the novel The Possessed. German anarchist writer Johann Most dispensed –advice for terrorists in the 1880s. Quasi Terrorism Types: The Terrorism can broadly be classified as below: Political Terrorism Limited Political Terrorism Civil Disorders Non Political Terrorism Official or State Terrorism Civil Disorders: A from of collective violence interfering with the peace, security and normal functioning of the community. Political Terrorism: Violent criminal behavior designed primarily to generate fear in the community, or substantial segment of it, for political purpose. Non-Political Terrorism: 24
  • 3. International Affairs and Global Strategy www.iiste.org ISSN 2224-574X (Paper) ISSN 2224-8951 (Online) Vol 4, 2012 Terrorism is that not aimed at political purpose but which exhibits – conscious design to create and maintain high degree of fear for coercive purpose, but the end is individual or collective gain rather than the achievement of a political objective. Quasi-Terrorism: The activities incidental to the commission of crimes of violence that are similar in form and method to genuine terrorism but which nevertheless lack its essential ingredient It is not the main purpose of the quasi terrorist to induce terror in immediate victim as in the case of genuine 1 terrorism, but the quasi terrorism uses the modalities and techniques of the genuine terrorist and produces similar consequences and reaction. Limited Political Terrorism: Genuine political Terrorism is characterized by a revolutionary approach; limited political Terrorism refers to – act of Terrorism which are committed for ideology or political motives but which are not a part of a concerned campaign to capture control of state. Office or State Terrorism: Referring to nations whose rule is basted upon fear and oppression that reach similar to terrorism or such Proportions defined broadly as terrorist act carried out by government in pursuit of political objectives, often as apart of their foreign policy. Media and Terrorism: A brief Scenario Media is double bladed sword and is to be handled with due care. It can be utilized for the welfare of the society as discussed earlier. Misuse of the same will definitely damage and destruct the society like anything. The scientists and researchers of the whole world are trying their best to explore newer technology for the benefit of the society. But their dreams have been shattered and certain anti social elements have misused the modern technology in terrorism Modern technology has added. Great tarred and horrors to terrorism. Modern media has also been characterized as a negative response to globalization. The terrorists are using trying to use every possible technological resource to fulfill their evil targets. They are utilizing the knowledge of various engineering disciplines which mainly includes Computer & I.T., Electronics and Telecommunications, Ammunition Engineering , Bio technology, space engineering, Chemical science and other core branches of engineering too. Media : A tool misused by terrorists. Terrorists are employing various communication devices for easy, faster and optimized communications. It is observed that they are mainly taking the help of cell phones, radio audio signals, micro chips (a data handling device) and other advanced electronics and telecommunication devices. It is proved that they are widely using Laptops and Internet services and software to plan, develop and execute their terrorist’s attacks. Various kinds of ammunitions are used by them for terrorism and to create threats. The science of handling, using and developing the dangerous ammoniates is being thought to them by their masterminds. They are utilizing the latest means of technology to carry out their evil activities. And is may be the sorry state of affairs to agree that we are lagging behind in the speed of acquiring the latest means and at the same time to develop counterattack modules of the same to avoid terrorists acts. It is beyond the scope of this discussion to enlist and describe all the technological aspects over here hence one of the major components relating to aviation security is discussed in brief. (1) Aviation Security : 25
  • 4. International Affairs and Global Strategy www.iiste.org ISSN 2224-574X (Paper) ISSN 2224-8951 (Online) Vol 4, 2012 Over the last 10 years, high-capacity international aircraft have become favorite targets of terrorists. Consequently, much research and development in counterterrorist technology has been focused on means of safeguarding this mode of transportation, in part by developing better means of detecting the small quantities of explosives believed to have caused the most recent fatal tragedies. That effort has included some attention to controlling access to the aircraft and other critical areas at airports, and to the human aspects of the security system. However, to date, the question of how best to combine technologies and people to provide maximum security. A systems approach to overall airport security is under development in a major program sponsored by the FAA Technical Center, using the Baltimore/Washington International Airport (BWI) as a model is very much open. The explosives detection problem is one of surveying all means of bringing explosives aboard aircraft. First, this means screening passengers as well as hand-carried baggage and checked baggage that go on board. Mail and cargo must also be considered as possible pathways for introducing explosives aboard aircraft. Screening all flight crew and service and airport contractor personnel is yet another issue, covered by the BWI programmed but not considered here. (a) Statistics of Detection : The performance of a detection system can be characterized by two primary parameters. Pd, and the false alarm or false positive rate, Far. A good detector has a very high detection probability (as close to 100 percent as possible), while still maintaining a very low rate of false positives or false alarms. These two parameters are coupled, primarily through the detection threshold: the more sensitive the detection threshold, the higher the false alarm rate. Unfortunately, to detect small quantities of explosives with high probability requires that the threshold for detection (the lower limit on the amount of explosives that may be reliably detected) be set as low as possible; consequently, the false alarm rate is high. This effect is shown graphically in figure. The curve on the left represents the distribution of measured nitrogen content (or other detection parameter) for bags with no explosives. The curve on the right represents the distribution of measured nitrogen content for bags with a given amount of explosives that should be detected. The shaded area of overlap represents the probability of a signal being caused by either a clean piece mistakenly identified or by piece of contraband material. (b) Generic Frequency Distributions of Detections and-False Alarms figure. (c) Recent Development in Detection Technology : X-ray Systems for Bomb Detection in Baggage. X-ray technologies for airport security are developing rapidly as advanced systems used for medical and industrial imaging are adapted for screening luggage. The FAA tested some advanced commercial. X-ray systems in late 1990 for specific purposes in baggage screening The results of these tests have not yet been released. The standard x-ray machine for airport security produces an image of the distribution of x rays that have passed though the observed object. These pictures have excellent spatial resolution-thin wires are readily seen- but the operator cannot find a lightweight object behind a denser one, nor tell whether a dark image is due to a thin sheet or a heavy material, such as steel, or a thick sheet of plastic, which can produce the same x-ray absorption. During the past few years, a number of companies, using a variety of approaches, have been trying to overcome these shortcoming. (d) Electromagnetic Techniques for Explosives Detection A detailed discussion of nuclear magnetic resonance (NMR) and nuclear quadruple resonance (NQR) techniques for detecting explosive compounds is given in CLASSIFIED appendix F. Both methods involve applying Radio frequency radiation to an examined object while observing the electromagnetic response of molecules contained therein. Another method, dielectrometry, measures the dielectric constant (a physical property of matter) of an object, to determine whether anomalous items are present. The latter technique does not detect explosives, just anomalies in dielectric constant. All these methods can, in principal, be defeated by wrapping the explosive in metal foil. However, it is easy to test for the presence of metal foil, for example, 26
  • 5. International Affairs and Global Strategy www.iiste.org ISSN 2224-574X (Paper) ISSN 2224-8951 (Online) Vol 4, 2012 with standard metal detectors (see app. C). For carry-on baggage, these would be a high false alarm rate. However, for screening individual items targeted by other techniques, these methods might be useful. For screening people, NQR might become a candidate detector. (2) Biological and Chemical Defenses : The confined space and recalculated airflow within airlines could increase the effectiveness of chemical or biological agents. Many (although not all) biological agents take many hours to produce symptoms. However chemical attacks as well as attacks with very fast working biological agents could well be terrorist option. Few possibilities exist for dealing with this problem beyond attempting to detect the agents when being brought on board-and this would be difficult to do. For aerosols, a separate air system for the flight deck to insulate the flying crew from the effects of the gas would be on tactic. Controlled, but rapid, depressurization in the cabin, to be followed by depressurization, might mitigate effects on the passengers. Media: A useful means for prevention of Terrorism All the advanced medial devices are within the reach of a common man. In order to control the misuse of media it is hereby advised to identify the sensitive technological means( devices, hardware, software etc.) and should given proper code of identification so that they can be easily be identified if being misused. They must be issued to the needy person by judging his requirement, status, personal identity and various other related modes of identifications. There must be a recommendation of an authentic statuary authority with the person who wish to procure the same. An undertaking in the form of an affidavit must be obtained from a person who want to use these means. It should be clearly mentioned in the affidavit that the person who is using the said means , is essential for his progress and prosperity. A very purpose of said means should be clearly mentioned in over there. It has also been undertaken that he will be using the same foe benefit and welfare of the mankind. Any misuse of the same may put him into the court of law for further necessary action. Media aspects: A brief note: As and where possible all the public places should be well equipped with advanced equipments so as to minimize the terrorist’s attack. It is hereby suggested to install CCTV s ,high sensitive metal detectors, explosive detection , hand detectors , Plasma monitors, Binoculars , certain audio-video sensors, etc. which will sense ,record and detect any kind unfair source , means, weapons ,explosives etc which may lead to terrorist attack . All types of national /international communications should be scanned though the filters consists of expert systems which will act as a interpreter. It will have certain knowledge base of possible terrorist’s communication modules in every possible language, other suspicious behavioral graphics database, etc. The said system must be well equipped with recent hardware and software facilities so that it can easily trace, detect and to nearest police stations and police head quarters inform the details of unfair means if any. Media will make it possible to detect the illegitimate sources in the society. It requires proper planning, optimized utilization all kinds of resources (Man, Machine, Material) proper control and monitoring systems, effective and real feel feed back and above all the honesty, the loyalty, the morality and last but not the least is the patriotism, It is beyond the scope of this seminar to detail out the design and development of above cited system. Conclusion : In the years past, different involved in operations against terrorist did not even have a communication , full proof internet security , safety public places, enough intelligence services etc. It is need of an hour to strengthen all security services related related to every hardware and software aspects from all possible corners. The media is to be used in the real way to protect the society by coordinating all disciplines of media 27
  • 6. International Affairs and Global Strategy www.iiste.org ISSN 2224-574X (Paper) ISSN 2224-8951 (Online) Vol 4, 2012 and building a concrete and well secured so that even an evil will can not clear though. Secondly, it is equally important and essential to awaken a common man in preventing terrorism threats by use of technology. It is possible by launching certain awareness campaign designed and developed by the experts. The direction of non violence as far as their knowledge, capacity and strength in their own working arena is concerned. It comes to happen that the day will not be far away, where we will take – a sigh of relief, peace and happiness. Undoubtedly, the above discussed aspects are very difficult to act upon but not impossible. It reminds Hon. DR. A. P. J. Abdul Kalama’s saying – Indomitable spirit and unconquerable in the world. References: (1) Technology against Terrorism: Structuring Security January 1992 OTA-ISC-511 NTIS order #PB92-152529 (2) Terrorism: concepts, causes, and conflict resolution George Mason University Institute for Conflict Analysis and Resolution, Printed by the Defense Threat Reduction Agency, Fort Beloit, Virginia, January 2003 (3) Hudson, Rex A. Who Becomes a Terrorist, and Why: The 1999 Government Report on Profiling Terrorists, Federal Research Division,The Lyons Press,2002 (4) “Unemployment, Inequality and Terrorism: Another Look at the Relationship between Economics and Terrorism” (5) Library of Congress – Federal Research Division The Sociology and Psychology of Terrorism The Media and Terrorism: A Reassessment Paul Wilkinson. Terrorism and Political Violence, Vol.9, No.2 (Summer 1997), pp.51-64 Published by Frank Cass, London. 28
  • 7. International Journals Call for Paper The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org Business, Economics, Finance and Management PAPER SUBMISSION EMAIL European Journal of Business and Management EJBM@iiste.org Research Journal of Finance and Accounting RJFA@iiste.org Journal of Economics and Sustainable Development JESD@iiste.org Information and Knowledge Management IKM@iiste.org Developing Country Studies DCS@iiste.org Industrial Engineering Letters IEL@iiste.org Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Chemistry and Materials Research CMR@iiste.org Mathematical Theory and Modeling MTM@iiste.org Advances in Physics Theories and Applications APTA@iiste.org Chemical and Process Engineering Research CPER@iiste.org Engineering, Technology and Systems PAPER SUBMISSION EMAIL Computer Engineering and Intelligent Systems CEIS@iiste.org Innovative Systems Design and Engineering ISDE@iiste.org Journal of Energy Technologies and Policy JETP@iiste.org Information and Knowledge Management IKM@iiste.org Control Theory and Informatics CTI@iiste.org Journal of Information Engineering and Applications JIEA@iiste.org Industrial Engineering Letters IEL@iiste.org Network and Complex Systems NCS@iiste.org Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL Journal of Environment and Earth Science JEES@iiste.org Civil and Environmental Research CER@iiste.org Journal of Natural Sciences Research JNSR@iiste.org Civil and Environmental Research CER@iiste.org Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL Journal of Natural Sciences Research JNSR@iiste.org Journal of Biology, Agriculture and Healthcare JBAH@iiste.org Food Science and Quality Management FSQM@iiste.org Chemistry and Materials Research CMR@iiste.org Education, and other Social Sciences PAPER SUBMISSION EMAIL Journal of Education and Practice JEP@iiste.org Journal of Law, Policy and Globalization JLPG@iiste.org Global knowledge sharing: New Media and Mass Communication NMMC@iiste.org EBSCO, Index Copernicus, Ulrich's Journal of Energy Technologies and Policy JETP@iiste.org Periodicals Directory, JournalTOCS, PKP Historical Research Letter HRL@iiste.org Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Public Policy and Administration Research PPAR@iiste.org Zeitschriftenbibliothek EZB, Open J-Gate, International Affairs and Global Strategy IAGS@iiste.org OCLC WorldCat, Universe Digtial Library , Research on Humanities and Social Sciences RHSS@iiste.org NewJour, Google Scholar. Developing Country Studies DCS@iiste.org IISTE is member of CrossRef. All journals Arts and Design Studies ADS@iiste.org have high IC Impact Factor Values (ICV).