First page Back Continue Last page Summary Graphics
Other uses of IT
IT provides terrorists with many capabilities
- FARC use of Colombian government computer networks
- Used government databases to track people stopped at roadblocks
- Used radio communications between computers to databases
- Command and control of forces via encrypted computer links
- Bookkeeping and other management functions via computers
- Email for support and advice of John Walker
- Used to keep up spirits while approaching end of mission
- Used for covert communications with handlers
- Encryption technology used in Al Queda planning computers
- IRA use of digital bomb control technologies
- Digital circuits and lasers to control bombs from afar
Notes: