The Destructive Influence of ISIS Threatens World Security

The Destructive Influence of ISIS Threatens World Security

Never underestimate the power of social influence – positive and negative peer pressure, controlling someone’s mind, instilling fear and obedience into a person and even brainwashing. These are all techniques that ISIS uses to not only recruit its members but to “encourage” them to stay and actively participate in ways unrecognizable to people who intimately know them. This is where the terror begins.

The extremism of ISIS can be seen daily in newspapers, online, in magazines, on blogs and social media. As a world, we have responded to this terrorism crisis by actively talking about it, engaging with each other, hoping there’s some way to put an end to it. Yet, ISIS not only brutally murders with weapons, it murders people’s lives by stealing people’s true realities. ISIS leaders literally create a new reality for recruited members, one of obedience to the group in the name of entire world dominance and to annihilate the infidels.

But, how? Any logical person would be able to see what a potential ISIS recruiter is doing, right? After all, killing is wrong. Well, not necessarily. ISIS recruiters are masters at mind control, “a process that involves a set of basic social psychological principles,” according to the American Psychological Association. Mind control consists of numerous steps including isolating people, interrupting their information flow, doing information overload, throwing off their balance or creating mystical experiences to control someone’s behavior, information, thoughts and emotions. Perhaps even more terrifying is the illusion that you have control over your life.

The trap of mind control is real, although outsiders tend to blame the victim, attaching descriptions like “weak” or “defective,” especially with readily available videos of people being lined up and brutally executed by ISIS members. Social psychology teaches that we are very social beings who want to conform to whatever we perceive our social group to be. The key word here is “perceive;” remember how mind control changes people’s perceptions of reality? I’ll admit, though, it’s almost impossible to see ISIS murderers as the victims.

We also have to realize that there is a huge difference between those who are born into ISIS and those who are recruited and join. For the ones born into ISIS, it’s the only life they know, but for those coming into ISIS, they are leaving a previous life behind and must be “retaught” what defines their current reality.

Let the mind games begin!

About the Author

Ginger Hill is Group Social Media Manager.

Featured

  • Ransomware Attacks Rise for the First Time in Six Months

    Ransomware attacks have risen for the first time in six months, increasing by 28% month-on-month to 421 attacks. While overall attack volume remained below 500, the uptick may signal a renewed escalation heading into the year’s most active period for cyber criminals. Read Now

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

New Products

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities