Pre-cum-Mains GS Foundation Program for UPSC 2026 | Starting from 5th Dec. 2024 Click Here for more information
- Little or no dependence on the location and existence of the mastermind, the plotters are anonymous.
- The handling is performed through the use of internet, keeping the identity of the plotter anonymous.
- Carrying and shifting of arms gets easier.
- Connection between the lone actor and the remote controller is facilitated by the growth of social media and encrypted communication applications.
- Steganography for an instance is a technique used to hide messages in graphic files, and “dead dropping” is a way to transmit information through saved email drafts in an online email account accessible to anyone with the password.
- Islamic States(IS) try and take all the responsibilities of being the controller behind the remote but there are several other terrorist groups that have uncanny but similar agendas.
- The planning consists of refining the actor, the actor already has an inclination towards the agenda or the plotters brainwash them.
- The finance needed for carrying out the attack is also done using internet.
- Buying arms to carry the attack also becomes easier since there is no transportation is required.
Discover more from Free UPSC IAS Preparation For Aspirants
Subscribe to get the latest posts sent to your email.