The Destructive Influence of ISIS Threatens World Security

The Destructive Influence of ISIS Threatens World Security

Never underestimate the power of social influence – positive and negative peer pressure, controlling someone’s mind, instilling fear and obedience into a person and even brainwashing. These are all techniques that ISIS uses to not only recruit its members but to “encourage” them to stay and actively participate in ways unrecognizable to people who intimately know them. This is where the terror begins.

The extremism of ISIS can be seen daily in newspapers, online, in magazines, on blogs and social media. As a world, we have responded to this terrorism crisis by actively talking about it, engaging with each other, hoping there’s some way to put an end to it. Yet, ISIS not only brutally murders with weapons, it murders people’s lives by stealing people’s true realities. ISIS leaders literally create a new reality for recruited members, one of obedience to the group in the name of entire world dominance and to annihilate the infidels.

But, how? Any logical person would be able to see what a potential ISIS recruiter is doing, right? After all, killing is wrong. Well, not necessarily. ISIS recruiters are masters at mind control, “a process that involves a set of basic social psychological principles,” according to the American Psychological Association. Mind control consists of numerous steps including isolating people, interrupting their information flow, doing information overload, throwing off their balance or creating mystical experiences to control someone’s behavior, information, thoughts and emotions. Perhaps even more terrifying is the illusion that you have control over your life.

The trap of mind control is real, although outsiders tend to blame the victim, attaching descriptions like “weak” or “defective,” especially with readily available videos of people being lined up and brutally executed by ISIS members. Social psychology teaches that we are very social beings who want to conform to whatever we perceive our social group to be. The key word here is “perceive;” remember how mind control changes people’s perceptions of reality? I’ll admit, though, it’s almost impossible to see ISIS murderers as the victims.

We also have to realize that there is a huge difference between those who are born into ISIS and those who are recruited and join. For the ones born into ISIS, it’s the only life they know, but for those coming into ISIS, they are leaving a previous life behind and must be “retaught” what defines their current reality.

Let the mind games begin!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3