• Latest
  • All
  • How To
online privacy

Privacy and Technology in the Wake of 21st Century Terrorism

January 21, 2016
Microsoft Edge browser

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

July 8, 2025
Weak Checks Make Kenyan Digital Lenders Easy Targets for Criminals

Weak Checks Make Kenyan Digital Lenders Easy Targets for Criminals

July 8, 2025
Open TV

Open TV Brings Fast and Ad-Free IPTV to Android

July 7, 2025
Microsoft

Laid-Off Microsoft Workers Told to Ask ChatGPT for Career Support

July 7, 2025
DHgate Tablet Cases deals
nairobi barricades

Live Barricades App Offers Relief to Stranded Nairobi Commuters on Saba Saba

July 7, 2025
Voter Verification Portal Offline Indefinitely for System Maintenance

IEBC Portal Shutdown for Undisclosed Maintenance Period

July 7, 2025
Infinix Note 50 Pro x Java House Collab

Infinix Teams Up with Java House to Launch Note 50 Pro Series

July 4, 2025
Instagram threads

Meta Adds Direct Messages to Instagram Threads

July 7, 2025
Infinix Hot 60i Pre-order

Infinix Hot 60i Now Available for Pre-Order in Kenya

July 4, 2025
Windows

Windows Loses Ground as Users Switch to Mac, Linux, and Mobile

July 7, 2025
Microsoft

Microsoft Slashes 9,100 Jobs in Biggest Layoffs Since 2023

July 4, 2025
NASA

NASA Brings Space Missions to Netflix at No Extra Cost

July 3, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Privacy and Technology in the Wake of 21st Century Terrorism

Samuel Mutugi by Samuel Mutugi
January 21, 2016
in Editorial
Reading Time: 4 mins read
261
1
online privacy
online privacy surveillance
IMG Credit www.wordstream.com

In the 2nd decade of the 21st century, it’s hard to believe that we are living in a perpetual state of war. Not a conventional war but the war on terror. The first time I checked up the word terror in the dictionary, I thought the dictionary had a problem. Terror means fear. I mean as a ten year old, I wondered how there could be a war on fear. Growing up and in fact more recently it’s when I am coming to terms to the uniqueness on the war on terror.

Unless you have been living under a rock you must be aware of the numerous terror attacks in various parts of the world. Garissa University, Westgate mall to Paris in France, every day in Syria and Iran and most recently San Bernardino shootings in California. Also, there were a couple of Al Shabaab attacks during the Christmas period.

So much can be said on terrorism but for this article, the aim is to interrogate the role technology plays in aiding the terrorists achieve their sinister motives and the other subtle issue of privacy that arises from this. One crucial thing you will notice is that it appears (or is actually the case?) that the terrorists are one step ahead of the authorities. Something that is not in doubt is that the terrorists have embraced technology. There are several aspects of tech which are involved in terror and in the war on terror but here I will focus more on social media or instant messaging (IM).

One significant facet of terrorism is recruitment, spreading propaganda and planning of the terror attacks. These activities require communication and inevitably so, social media/IM plays a huge role. A good example to consider is one app called Telegram. Telegram is an Instant messaging app service. In fact, it works a lot like WhatsApp and it’s a very popular app even here in Kenya, and is available in most platforms. It is a cloud-based instant messaging platform. I use the app, though not frequently, and it looks a lot like WhatsApp. Too similar in layout and functionality in fact.

However telegram’s strong point is its privacy and security features. It’s said to be one of the most secure instant messaging app. Telegram even offered 200,000 dollars to anyone who can hack it in some annual contest. Security and privacy have become extremely crucial after Edward Snowden revealed illegal surveillance by the United States government on its citizens. This makes encrypted apps very attractive as it assures you of privacy.

The encryption on this app is end to end. It also has a self-destruct feature where messages self-destruct after being viewed by the user, much like Snapchat. While the intention behind its security features is very noble, it becomes a very attractive tool for terrorists as they can communicate over a secured and practically a unhackable platform. For some services for example Apple’s iCloud not even the service provider can decipher the encryption. Governments and their spy agencies have noted this issue with great concern. And they have voiced this concern.

The truth of the matter is Isis have been using this platform to send secret messages through the app’s channels. It was reported that ISIS declared that ‘Paris was first of the storm’ in addition to claiming responsibility to the bombing of a Russian airliner from Egypt. Telegram had acknowledged that its platform could be used by terrorists but they said, either way, the privacy of users is paramount. Telegram’s CEO was quoted to say ‘……our right for privacy is more important than our fear of bad things happening, like terrorism’. Something to note is that after the Paris attacks Telegram began shutting all channels used by ISIS. I am yet to understand why Telegram only began to shut these channels after Paris. A racism angle here?? I really cannot tell.

A number of issues arise from all this.

  1. Terrorism is a huge problem and one thing is clear, the terrorists are on step ahead of the authorities.
  2. A terrorist is not a different brand of person, it could be anyone living among us, within us. This includes sympathizers of terrorist activities.
  3. The terrorists have embraced technology as a means of spreading terror.
  4. The government and the authorities have to take action to protect citizens. One of the devices employed by government is surveillance and spying on the citizenry.
  5. This method conflicts the right to privacy which for example in Kenya is provided for in our constitution.
  6. Question is whether the right to privacy absolute?

Number 3-6 are quite important. How far can the government go to protect it citizens? Does this mean it can infringe the right to privacy through means such as surveillance?? Again, do the citizens have to insist on absolute privacy if in the end other people (read terrorists) take advantage of this and commit acts of terror??

Telegram’s CEO comment which I highlighted above was a bit pedestrian in my opinion. It’s true that the right to privacy is very critical because the danger of fascist or dictatorial kind of governments coming to power is very real. The right to privacy particularly came up after the world war two because of the damage caused by the fascist and Nazi governments on their citizens and the Jews. Kenya in the 1980’s was crazy with government ‘surveillance’ and spying. But on the other side, the danger we face right now is against terrorists. These are people who are prepared to lose their lives for the sake of their beliefs. What are you prepared to lose in order to help the government fight these nutcases?? Your right to privacy??

One concern that arises in the Kenyan scenario. Is the problem the lack of surveillance or the police officer who lets in a potential terrorist for a bribe? The question of corruption and its contribution to terrorism in Kenya cannot be ignored. But for the purposes for this article, I will not delve much into that aspect.

Anyway, this is a huge concern for most countries in the world right now. All said and done, are you pro-surveillance or for absolute privacy?

SendShare146Tweet92
Samuel Mutugi

Samuel Mutugi

I am an upcoming tech writer with a bias to legal and regulatory issues. This includes competition law. data privacy, intellectual property and several other issues. My aim is to evaluate the opportunities and problems that arise from the interaction of technology, Law and business.

Related Posts

Microsoft Edge browser

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

July 8, 2025
Weak Checks Make Kenyan Digital Lenders Easy Targets for Criminals

Weak Checks Make Kenyan Digital Lenders Easy Targets for Criminals

July 8, 2025
Open TV

Open TV Brings Fast and Ad-Free IPTV to Android

July 7, 2025
Microsoft

Laid-Off Microsoft Workers Told to Ask ChatGPT for Career Support

July 7, 2025
nairobi barricades

Live Barricades App Offers Relief to Stranded Nairobi Commuters on Saba Saba

July 7, 2025
Voter Verification Portal Offline Indefinitely for System Maintenance

IEBC Portal Shutdown for Undisclosed Maintenance Period

July 7, 2025

Latest

Microsoft Edge browser

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

July 8, 2025
Weak Checks Make Kenyan Digital Lenders Easy Targets for Criminals

Weak Checks Make Kenyan Digital Lenders Easy Targets for Criminals

July 8, 2025
Open TV

Open TV Brings Fast and Ad-Free IPTV to Android

July 7, 2025
Microsoft

Laid-Off Microsoft Workers Told to Ask ChatGPT for Career Support

July 7, 2025
nairobi barricades

Live Barricades App Offers Relief to Stranded Nairobi Commuters on Saba Saba

July 7, 2025
Voter Verification Portal Offline Indefinitely for System Maintenance

IEBC Portal Shutdown for Undisclosed Maintenance Period

July 7, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Microsoft Makes Edge 40% Faster in a Bid to Lure Chrome Users

July 8, 2025

Weak Checks Make Kenyan Digital Lenders Easy Targets for Criminals

July 8, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Infinix Teams Up with Java House to Launch Note 50 Pro Series

Meta Adds Direct Messages to Instagram Threads

Infinix Hot 60i Now Available for Pre-Order in Kenya

Windows Loses Ground as Users Switch to Mac, Linux, and Mobile

Microsoft Slashes 9,100 Jobs in Biggest Layoffs Since 2023

NASA Brings Space Missions to Netflix at No Extra Cost

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.