The Destructive Influence of ISIS Threatens World Security

The Destructive Influence of ISIS Threatens World Security

Never underestimate the power of social influence – positive and negative peer pressure, controlling someone’s mind, instilling fear and obedience into a person and even brainwashing. These are all techniques that ISIS uses to not only recruit its members but to “encourage” them to stay and actively participate in ways unrecognizable to people who intimately know them. This is where the terror begins.

The extremism of ISIS can be seen daily in newspapers, online, in magazines, on blogs and social media. As a world, we have responded to this terrorism crisis by actively talking about it, engaging with each other, hoping there’s some way to put an end to it. Yet, ISIS not only brutally murders with weapons, it murders people’s lives by stealing people’s true realities. ISIS leaders literally create a new reality for recruited members, one of obedience to the group in the name of entire world dominance and to annihilate the infidels.

But, how? Any logical person would be able to see what a potential ISIS recruiter is doing, right? After all, killing is wrong. Well, not necessarily. ISIS recruiters are masters at mind control, “a process that involves a set of basic social psychological principles,” according to the American Psychological Association. Mind control consists of numerous steps including isolating people, interrupting their information flow, doing information overload, throwing off their balance or creating mystical experiences to control someone’s behavior, information, thoughts and emotions. Perhaps even more terrifying is the illusion that you have control over your life.

The trap of mind control is real, although outsiders tend to blame the victim, attaching descriptions like “weak” or “defective,” especially with readily available videos of people being lined up and brutally executed by ISIS members. Social psychology teaches that we are very social beings who want to conform to whatever we perceive our social group to be. The key word here is “perceive;” remember how mind control changes people’s perceptions of reality? I’ll admit, though, it’s almost impossible to see ISIS murderers as the victims.

We also have to realize that there is a huge difference between those who are born into ISIS and those who are recruited and join. For the ones born into ISIS, it’s the only life they know, but for those coming into ISIS, they are leaving a previous life behind and must be “retaught” what defines their current reality.

Let the mind games begin!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3