Written by: ForumIASPosted on Last modified on Comments
Little or no dependence on the location and existence of the mastermind, the plotters are anonymous.
The handling is performed through the use of internet, keeping the identity of the plotter anonymous.
Carrying and shifting of arms gets easier.
Connection between the lone actor and the remote controller is facilitated by the growth of social media and encrypted communication applications.
Steganography for an instance is a technique used to hide messages in graphic files, and “dead dropping” is a way to transmit information through saved email drafts in an online email account accessible to anyone with the password.
Islamic States(IS) try and take all the responsibilities of being the controller behind the remote but there are several other terrorist groups that have uncanny but similar agendas.
The planning consists of refining the actor, the actor already has an inclination towards the agenda or the plotters brainwash them.
The finance needed for carrying out the attack is also done using internet.
Buying arms to carry the attack also becomes easier since there is no transportation is required.