• Latest
  • All
  • How To
online privacy

Privacy and Technology in the Wake of 21st Century Terrorism

January 21, 2016
Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Which ISP is best in Kenya

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025
Cars in port awaiting clearing

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

June 30, 2025
kenya nil returns process

KRA Extends Tax Return Deadline After iTax System Crashes

June 30, 2025
DHgate Tablet Cases deals
the process of setting up an Internet service provider (ISP) in Kenya

Airtel Rises While Safaricom Drops in Network Quality Scores

June 30, 2025
google gmail

Google Rolls Out AI Cleanup Tool on Web for Messy Gmail Inboxes

June 30, 2025
KRA's eTIMS System Targets Fuel Tax Cheats

Fuel Stations Must Now Link to KRA’s eTIMS or Risk Penalties

June 30, 2025
Facebook

New Facebook AI Tool Can Access Private Images on Your Phone

June 30, 2025
Windows 11 25H2

Microsoft Confirms Windows 11 25H2 As the Next Big Upgrade

June 30, 2025
Infinix Hot 60i

Infinix Quietly Launches the Hot 60i in Bangladesh

June 29, 2025
Counterfeit Products Infiltrate Kenya's Online Market

Counterfeit Goods Flood Kenyan Online Shops Like Jumia and Facebook

June 29, 2025
Top 5 Platforms to Sell Bitcoin for Cash Without Stress

Top 5 Platforms to Sell Bitcoin for Cash Without Stress

June 30, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

Privacy and Technology in the Wake of 21st Century Terrorism

Samuel Mutugi by Samuel Mutugi
January 21, 2016
in Editorial
Reading Time: 4 mins read
261
1
online privacy
online privacy surveillance
IMG Credit www.wordstream.com

In the 2nd decade of the 21st century, it’s hard to believe that we are living in a perpetual state of war. Not a conventional war but the war on terror. The first time I checked up the word terror in the dictionary, I thought the dictionary had a problem. Terror means fear. I mean as a ten year old, I wondered how there could be a war on fear. Growing up and in fact more recently it’s when I am coming to terms to the uniqueness on the war on terror.

Unless you have been living under a rock you must be aware of the numerous terror attacks in various parts of the world. Garissa University, Westgate mall to Paris in France, every day in Syria and Iran and most recently San Bernardino shootings in California. Also, there were a couple of Al Shabaab attacks during the Christmas period.

So much can be said on terrorism but for this article, the aim is to interrogate the role technology plays in aiding the terrorists achieve their sinister motives and the other subtle issue of privacy that arises from this. One crucial thing you will notice is that it appears (or is actually the case?) that the terrorists are one step ahead of the authorities. Something that is not in doubt is that the terrorists have embraced technology. There are several aspects of tech which are involved in terror and in the war on terror but here I will focus more on social media or instant messaging (IM).

One significant facet of terrorism is recruitment, spreading propaganda and planning of the terror attacks. These activities require communication and inevitably so, social media/IM plays a huge role. A good example to consider is one app called Telegram. Telegram is an Instant messaging app service. In fact, it works a lot like WhatsApp and it’s a very popular app even here in Kenya, and is available in most platforms. It is a cloud-based instant messaging platform. I use the app, though not frequently, and it looks a lot like WhatsApp. Too similar in layout and functionality in fact.

However telegram’s strong point is its privacy and security features. It’s said to be one of the most secure instant messaging app. Telegram even offered 200,000 dollars to anyone who can hack it in some annual contest. Security and privacy have become extremely crucial after Edward Snowden revealed illegal surveillance by the United States government on its citizens. This makes encrypted apps very attractive as it assures you of privacy.

The encryption on this app is end to end. It also has a self-destruct feature where messages self-destruct after being viewed by the user, much like Snapchat. While the intention behind its security features is very noble, it becomes a very attractive tool for terrorists as they can communicate over a secured and practically a unhackable platform. For some services for example Apple’s iCloud not even the service provider can decipher the encryption. Governments and their spy agencies have noted this issue with great concern. And they have voiced this concern.

The truth of the matter is Isis have been using this platform to send secret messages through the app’s channels. It was reported that ISIS declared that ‘Paris was first of the storm’ in addition to claiming responsibility to the bombing of a Russian airliner from Egypt. Telegram had acknowledged that its platform could be used by terrorists but they said, either way, the privacy of users is paramount. Telegram’s CEO was quoted to say ‘……our right for privacy is more important than our fear of bad things happening, like terrorism’. Something to note is that after the Paris attacks Telegram began shutting all channels used by ISIS. I am yet to understand why Telegram only began to shut these channels after Paris. A racism angle here?? I really cannot tell.

A number of issues arise from all this.

  1. Terrorism is a huge problem and one thing is clear, the terrorists are on step ahead of the authorities.
  2. A terrorist is not a different brand of person, it could be anyone living among us, within us. This includes sympathizers of terrorist activities.
  3. The terrorists have embraced technology as a means of spreading terror.
  4. The government and the authorities have to take action to protect citizens. One of the devices employed by government is surveillance and spying on the citizenry.
  5. This method conflicts the right to privacy which for example in Kenya is provided for in our constitution.
  6. Question is whether the right to privacy absolute?

Number 3-6 are quite important. How far can the government go to protect it citizens? Does this mean it can infringe the right to privacy through means such as surveillance?? Again, do the citizens have to insist on absolute privacy if in the end other people (read terrorists) take advantage of this and commit acts of terror??

Telegram’s CEO comment which I highlighted above was a bit pedestrian in my opinion. It’s true that the right to privacy is very critical because the danger of fascist or dictatorial kind of governments coming to power is very real. The right to privacy particularly came up after the world war two because of the damage caused by the fascist and Nazi governments on their citizens and the Jews. Kenya in the 1980’s was crazy with government ‘surveillance’ and spying. But on the other side, the danger we face right now is against terrorists. These are people who are prepared to lose their lives for the sake of their beliefs. What are you prepared to lose in order to help the government fight these nutcases?? Your right to privacy??

One concern that arises in the Kenyan scenario. Is the problem the lack of surveillance or the police officer who lets in a potential terrorist for a bribe? The question of corruption and its contribution to terrorism in Kenya cannot be ignored. But for the purposes for this article, I will not delve much into that aspect.

Anyway, this is a huge concern for most countries in the world right now. All said and done, are you pro-surveillance or for absolute privacy?

SendShare146Tweet92
Samuel Mutugi

Samuel Mutugi

I am an upcoming tech writer with a bias to legal and regulatory issues. This includes competition law. data privacy, intellectual property and several other issues. My aim is to evaluate the opportunities and problems that arise from the interaction of technology, Law and business.

Related Posts

Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Which ISP is best in Kenya

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025
Cars in port awaiting clearing

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

June 30, 2025
kenya nil returns process

KRA Extends Tax Return Deadline After iTax System Crashes

June 30, 2025
the process of setting up an Internet service provider (ISP) in Kenya

Airtel Rises While Safaricom Drops in Network Quality Scores

June 30, 2025
google gmail

Google Rolls Out AI Cleanup Tool on Web for Messy Gmail Inboxes

June 30, 2025

Latest

Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Which ISP is best in Kenya

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025
Cars in port awaiting clearing

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

June 30, 2025
kenya nil returns process

KRA Extends Tax Return Deadline After iTax System Crashes

June 30, 2025
the process of setting up an Internet service provider (ISP) in Kenya

Airtel Rises While Safaricom Drops in Network Quality Scores

June 30, 2025
google gmail

Google Rolls Out AI Cleanup Tool on Web for Messy Gmail Inboxes

June 30, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Fuel Stations Must Now Link to KRA’s eTIMS or Risk Penalties

New Facebook AI Tool Can Access Private Images on Your Phone

Microsoft Confirms Windows 11 25H2 As the Next Big Upgrade

Infinix Quietly Launches the Hot 60i in Bangladesh

Counterfeit Goods Flood Kenyan Online Shops Like Jumia and Facebook

Top 5 Platforms to Sell Bitcoin for Cash Without Stress

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.