Tag: government and politics
Osama Bin Laden
As Nohria and Eccles they argue Moreover, even so of YOU allowed communication flows can help very a dispersed net to co-ordinate activities (thus increasing its flexibility and capacity of reply), can also present a security risk. Communication on electronic canals can become a risk, a time that leaves ' ' vestgios' ' digital. It has other examples of as the electrnica information that belongs the terrorist groups fell at the hands of the responsible ones for the application of the law. In 1995, the Hamas of the Abd-al-Rahman Zaydan was imprisoned and its computer, the apprehended computer it contained a data base of information for Hamas contact that was used withholds other suspicious (Soo Hoo, Goodman, and Greenberg, 1997, P. 139). In December of 1999, 15 on terrorists the Osama Bin Laden had been imprisoned in Jordan, together with material of production of bombs, automatic weapons, and detonators radio – controlled, a record number computer had been apprehended. Analysts of Intelligence had been capable to extract information on terrorist encampments of formation in the Afeganisto ' ' In June of 2000, the 19 suspected names of had been found in the computer records recouped from a watched house of the Hezbollah.
Finally, a computer with some codified registers pertaining Aum cultured Shinrikyo was apprehended by the Japanese authorities after recouping a electrnica password (Denning and Baugh, 1997). Thus, one becomes probable that the terrorist groups will go to adoptar models that are on this side of the total on ones, all the canals nets. Hybrids of hierarchies and nets they can better reflect the costs and the benefits of a bigger dependence relative as well as others of the group of the mission. Another important factor the determination of the adoption for terrorist groups information of the operations implies the relative atractividade of high offensive technology. Beyond making possible forms of organization in net, it can also improve the retraction and analysis of terrorist intelligence, as well as information offensive operations.