NEWS
- 28 April | India to Witness Deadliest Event of World History Mega El Nino Click Here →
- 15 April | The 3-Attempt Strategy No One Talks About | How He Scored 420+ in GS Click Here →
- 30 March | The Honest UPSC Talk Nobody Tells You Click Here to see Abhijit Asokan AIR 234 talk →
- Little or no dependence on the location and existence of the mastermind, the plotters are anonymous.
- The handling is performed through the use of internet, keeping the identity of the plotter anonymous.
- Carrying and shifting of arms gets easier.
- Connection between the lone actor and the remote controller is facilitated by the growth of social media and encrypted communication applications.
- Steganography for an instance is a technique used to hide messages in graphic files, and “dead dropping” is a way to transmit information through saved email drafts in an online email account accessible to anyone with the password.
- Islamic States(IS) try and take all the responsibilities of being the controller behind the remote but there are several other terrorist groups that have uncanny but similar agendas.
- The planning consists of refining the actor, the actor already has an inclination towards the agenda or the plotters brainwash them.
- The finance needed for carrying out the attack is also done using internet.
- Buying arms to carry the attack also becomes easier since there is no transportation is required.




