The Destructive Influence of ISIS Threatens World Security

The Destructive Influence of ISIS Threatens World Security

Never underestimate the power of social influence – positive and negative peer pressure, controlling someone’s mind, instilling fear and obedience into a person and even brainwashing. These are all techniques that ISIS uses to not only recruit its members but to “encourage” them to stay and actively participate in ways unrecognizable to people who intimately know them. This is where the terror begins.

The extremism of ISIS can be seen daily in newspapers, online, in magazines, on blogs and social media. As a world, we have responded to this terrorism crisis by actively talking about it, engaging with each other, hoping there’s some way to put an end to it. Yet, ISIS not only brutally murders with weapons, it murders people’s lives by stealing people’s true realities. ISIS leaders literally create a new reality for recruited members, one of obedience to the group in the name of entire world dominance and to annihilate the infidels.

But, how? Any logical person would be able to see what a potential ISIS recruiter is doing, right? After all, killing is wrong. Well, not necessarily. ISIS recruiters are masters at mind control, “a process that involves a set of basic social psychological principles,” according to the American Psychological Association. Mind control consists of numerous steps including isolating people, interrupting their information flow, doing information overload, throwing off their balance or creating mystical experiences to control someone’s behavior, information, thoughts and emotions. Perhaps even more terrifying is the illusion that you have control over your life.

The trap of mind control is real, although outsiders tend to blame the victim, attaching descriptions like “weak” or “defective,” especially with readily available videos of people being lined up and brutally executed by ISIS members. Social psychology teaches that we are very social beings who want to conform to whatever we perceive our social group to be. The key word here is “perceive;” remember how mind control changes people’s perceptions of reality? I’ll admit, though, it’s almost impossible to see ISIS murderers as the victims.

We also have to realize that there is a huge difference between those who are born into ISIS and those who are recruited and join. For the ones born into ISIS, it’s the only life they know, but for those coming into ISIS, they are leaving a previous life behind and must be “retaught” what defines their current reality.

Let the mind games begin!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Cloud Adoption Gives Way to Hybrid Deployments

    Cloud adoption is growing at an astonishing rate, with Gartner forecasting that worldwide public cloud end-user spending will approach $600 billion by the end of this year—an increase of more than 21% over 2022. McKinsey believes that number could eclipse $1 trillion by the end of the decade, further underscoring the industry’s exponential growth. Read Now

  • AI on the Edge

    Discussions about the merits (or misgivings) around AI (artificial intelligence) are everywhere. In fact, you’d be hard-pressed to find an article or product literature without mention of it in our industry. If you’re not using AI by now in some capacity, congratulations may be in order since most people are using it in some form daily even without realizing it. Read Now

  • Securing the Future

    In an increasingly turbulent world, chief security officers (CSOs) are facing a multitude of challenges that threaten the stability of businesses worldwide. Read Now

    • Guard Services
  • Security Entrances Move to Center Stage

    Most organizations want to show a friendly face to the public. In today’s world, however, the need to keep people safe and secure has become a prime directive when designing and building facilities of all kinds. Fortunately, there is no need to construct a fortress-like entry that provides that high level of security. Today’s secured entry solutions make it possible to create a welcoming, attractive look and feel at the entry without compromising security. It is for this reason that security entrances have moved to the mainstream. Read Now

Featured Cybersecurity

Webinars

New Products

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3