• Latest
  • All
  • How To
online privacy

Privacy and Technology in the Wake of 21st Century Terrorism

January 21, 2016
Nairobi declaration

How Connected Africa Summit 2025 Is Driving Africa’s Digital Transformation

May 30, 2025
kenya-parliament

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025
ConnectedAfrica2025(Day4)-meta-foondamate

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025
google-veo-3

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

May 29, 2025
DHgate Tablet Cases deals
iOS 26

Apple Plans Big Rename for iOS and macOS at WWDC 2025

May 29, 2025
University student fined for defamatory Facebook posts

University Student Fined KES 7.5 Million for Defamatory Facebook Posts

May 29, 2025
AI Africa policies database

New Platform Brings All African AI Policies Under One Database

May 28, 2025
POATE 2025

Kenya’s Tourism Sector Grows as Travel Gets Easier Across East Africa

May 28, 2025
sodium-ion battery

Researchers Develop Sodium-Ion Battery That Charges to 80% in 6 Minutes

May 27, 2025
TV Gambling Ads

Regulator Fines Stations Using Religious Shows to Push Gambling

May 27, 2025
Connected Africa Summit 2025

Connected Africa 2025 Day 2: Focus on Digital Inclusion & Cybersecurity

May 27, 2025
whatsapp chatbots

iPad Users May Finally Get a Native WhatsApp App

May 28, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Privacy and Technology in the Wake of 21st Century Terrorism

Samuel Mutugi by Samuel Mutugi
January 21, 2016
in Editorial
Reading Time: 4 mins read
261
1
online privacy
online privacy surveillance
IMG Credit www.wordstream.com

In the 2nd decade of the 21st century, it’s hard to believe that we are living in a perpetual state of war. Not a conventional war but the war on terror. The first time I checked up the word terror in the dictionary, I thought the dictionary had a problem. Terror means fear. I mean as a ten year old, I wondered how there could be a war on fear. Growing up and in fact more recently it’s when I am coming to terms to the uniqueness on the war on terror.

Unless you have been living under a rock you must be aware of the numerous terror attacks in various parts of the world. Garissa University, Westgate mall to Paris in France, every day in Syria and Iran and most recently San Bernardino shootings in California. Also, there were a couple of Al Shabaab attacks during the Christmas period.

So much can be said on terrorism but for this article, the aim is to interrogate the role technology plays in aiding the terrorists achieve their sinister motives and the other subtle issue of privacy that arises from this. One crucial thing you will notice is that it appears (or is actually the case?) that the terrorists are one step ahead of the authorities. Something that is not in doubt is that the terrorists have embraced technology. There are several aspects of tech which are involved in terror and in the war on terror but here I will focus more on social media or instant messaging (IM).

One significant facet of terrorism is recruitment, spreading propaganda and planning of the terror attacks. These activities require communication and inevitably so, social media/IM plays a huge role. A good example to consider is one app called Telegram. Telegram is an Instant messaging app service. In fact, it works a lot like WhatsApp and it’s a very popular app even here in Kenya, and is available in most platforms. It is a cloud-based instant messaging platform. I use the app, though not frequently, and it looks a lot like WhatsApp. Too similar in layout and functionality in fact.

However telegram’s strong point is its privacy and security features. It’s said to be one of the most secure instant messaging app. Telegram even offered 200,000 dollars to anyone who can hack it in some annual contest. Security and privacy have become extremely crucial after Edward Snowden revealed illegal surveillance by the United States government on its citizens. This makes encrypted apps very attractive as it assures you of privacy.

The encryption on this app is end to end. It also has a self-destruct feature where messages self-destruct after being viewed by the user, much like Snapchat. While the intention behind its security features is very noble, it becomes a very attractive tool for terrorists as they can communicate over a secured and practically a unhackable platform. For some services for example Apple’s iCloud not even the service provider can decipher the encryption. Governments and their spy agencies have noted this issue with great concern. And they have voiced this concern.

The truth of the matter is Isis have been using this platform to send secret messages through the app’s channels. It was reported that ISIS declared that ‘Paris was first of the storm’ in addition to claiming responsibility to the bombing of a Russian airliner from Egypt. Telegram had acknowledged that its platform could be used by terrorists but they said, either way, the privacy of users is paramount. Telegram’s CEO was quoted to say ‘……our right for privacy is more important than our fear of bad things happening, like terrorism’. Something to note is that after the Paris attacks Telegram began shutting all channels used by ISIS. I am yet to understand why Telegram only began to shut these channels after Paris. A racism angle here?? I really cannot tell.

A number of issues arise from all this.

  1. Terrorism is a huge problem and one thing is clear, the terrorists are on step ahead of the authorities.
  2. A terrorist is not a different brand of person, it could be anyone living among us, within us. This includes sympathizers of terrorist activities.
  3. The terrorists have embraced technology as a means of spreading terror.
  4. The government and the authorities have to take action to protect citizens. One of the devices employed by government is surveillance and spying on the citizenry.
  5. This method conflicts the right to privacy which for example in Kenya is provided for in our constitution.
  6. Question is whether the right to privacy absolute?

Number 3-6 are quite important. How far can the government go to protect it citizens? Does this mean it can infringe the right to privacy through means such as surveillance?? Again, do the citizens have to insist on absolute privacy if in the end other people (read terrorists) take advantage of this and commit acts of terror??

Telegram’s CEO comment which I highlighted above was a bit pedestrian in my opinion. It’s true that the right to privacy is very critical because the danger of fascist or dictatorial kind of governments coming to power is very real. The right to privacy particularly came up after the world war two because of the damage caused by the fascist and Nazi governments on their citizens and the Jews. Kenya in the 1980’s was crazy with government ‘surveillance’ and spying. But on the other side, the danger we face right now is against terrorists. These are people who are prepared to lose their lives for the sake of their beliefs. What are you prepared to lose in order to help the government fight these nutcases?? Your right to privacy??

One concern that arises in the Kenyan scenario. Is the problem the lack of surveillance or the police officer who lets in a potential terrorist for a bribe? The question of corruption and its contribution to terrorism in Kenya cannot be ignored. But for the purposes for this article, I will not delve much into that aspect.

Anyway, this is a huge concern for most countries in the world right now. All said and done, are you pro-surveillance or for absolute privacy?

SendShare146Tweet92
Samuel Mutugi

Samuel Mutugi

I am an upcoming tech writer with a bias to legal and regulatory issues. This includes competition law. data privacy, intellectual property and several other issues. My aim is to evaluate the opportunities and problems that arise from the interaction of technology, Law and business.

Related Posts

Nairobi declaration

How Connected Africa Summit 2025 Is Driving Africa’s Digital Transformation

May 30, 2025
kenya-parliament

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025
ConnectedAfrica2025(Day4)-meta-foondamate

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025
google-veo-3

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

May 29, 2025
iOS 26

Apple Plans Big Rename for iOS and macOS at WWDC 2025

May 29, 2025
University student fined for defamatory Facebook posts

University Student Fined KES 7.5 Million for Defamatory Facebook Posts

May 29, 2025

Latest

Nairobi declaration

How Connected Africa Summit 2025 Is Driving Africa’s Digital Transformation

May 30, 2025
kenya-parliament

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025
ConnectedAfrica2025(Day4)-meta-foondamate

Connected Africa 2025 Day 4: FoondaMate and Meta Team Up to Bring AI to Classrooms

May 29, 2025
google-veo-3

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

May 29, 2025
iOS 26

Apple Plans Big Rename for iOS and macOS at WWDC 2025

May 29, 2025
University student fined for defamatory Facebook posts

University Student Fined KES 7.5 Million for Defamatory Facebook Posts

May 29, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

How Connected Africa Summit 2025 Is Driving Africa’s Digital Transformation

May 30, 2025

Parliament Invites Public Feedback on Virtual Asset Bill 2025

May 30, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

Introducing A Brainbox Quiz: Techweez’s Monthly Trivia Night!

More News

New Platform Brings All African AI Policies Under One Database

Kenya’s Tourism Sector Grows as Travel Gets Easier Across East Africa

Researchers Develop Sodium-Ion Battery That Charges to 80% in 6 Minutes

Regulator Fines Stations Using Religious Shows to Push Gambling

Connected Africa 2025 Day 2: Focus on Digital Inclusion & Cybersecurity

iPad Users May Finally Get a Native WhatsApp App

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.