40
>> 0 >> 1 >> 2 >> 3 >> 4 >> INFORMATION TECHNOLOGY USED BY TERRORIST

It Used by Terrorist Ppt

Embed Size (px)

Citation preview

Page 1: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

INFORMATION TECHNOLOGY

USED BY TERRORIST

Page 2: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 3: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Reasons for choosing the topic• Terrorism is now a current issue.

• Terrorist uses Information technology at greater extend and we all need to know the which technology is misused and how..

• So to create an awareness we selected this topic.

Page 4: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

MEANING

• Terrorist" is a word used so often and so loosely that it has lost a clear meaning.

• This is a proposal to lend some clarity to the definition, and thus hopefully to the use, of the word "terrorist

• Terrorism refers here to the public health consequences and the methods for prevention of the purposeful use of violence or threats of violence by groups or individuals in order to serve political or personal agendas. 

Page 5: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

HOW TECHNOLOGY HELPS?• Terrorist have great knowledge of IT hence they know to

use it in their means!!!

• To misuse a technology is not that hard, simply searching on internet can help terrorist to make bombs and other Weapon of Mass Destructions!!

• GPS technology is also aiding terrorist to have their mission successful!!Google earth helped terrorist too as it is best technology to have maps with full destruction!

Page 6: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

8

Page 7: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

7

Page 8: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

6

Page 9: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

5

Page 10: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

4

Page 11: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

3

Page 12: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 13: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 14: It Used by Terrorist Ppt
Page 15: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 16: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

SOURCE OF FUNDS• Money Laundering i.e ‘HAWALAS’

• Sale of Drugs

• Extortion

• Frauds

• Illegal websites

• Hacking

• Political parties

Page 17: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

SOURCE OF FUNDS CONTD…

• Randsom money ‘FIROWTI’

• Foreign doners

• Pishing

• Malware

Page 18: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

TRAINING

• Selection of a candidate

purely on interests

• Brain washing

• Selection of a location

• Physical training

1) Training at various locations

2) Training under extreme conditions

Page 19: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

TRAINING contd…

• Weapon handling

• Technical know on internet and allied equipments

• Torture endurance

• How to cheat the lie-detector test &various other tests?

• Crisis management

Page 20: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Technology misused

Page 21: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

•Anything under the sun can be

searched

•Updated with the recent happenings

•Technical know how to make bombs

•Aids the functioning of others like

GPS, Google earth, satellite phones,

etc.

Page 22: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

INTERNET CONTD…

• Main source of their funding activity

• E-mail threats

• Hacking

• Spamming

• Emails sent with an

unprotected

server using Wi-Fi

Page 23: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

GPS satellites broadcast signals from space, which each GPS receiver uses to calculate its three-dimensional location (latitude, longitude, and altitude) plus the current time.•Originally used by military•Cell phones wih GPS•A Replacement for laser bombs •Easily accesible loctions

Page 24: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

JDAM

• Joint direct attack munition• It’s a guidance tail kit that converts existing

unguided free-fall bombs into accurate all weather guided bombs

• Clubbed with GPS for high accuracy on targeting• Multiple targets engagements at a time

Page 25: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 26: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• A software by Google.

•Through this 3d maps of any country can be downloaded easily..

•Even streets, landmarks are available!

•Familiarity with the place even without visiting.

Page 27: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 28: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

SATELLITE PHONES

• Uses satellite and not cellular

broad casting towers for calls

• Commonly called a ‘satphone’

• Hard to track

• No network hassels

• Fast and reliable data service

• True global coverage

Page 29: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

LAPTOPS

• Easy portability

• Highest configuration

laptops used

• Supports all other devices

• Use of web-cam

for video conferencing

Page 30: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

CELL PHONES

• Advent of high end cell phones

• GPS navigation in latest cell phones

• Google earth even supported

• Phone –bomb

• Usage of multiple sim-cards

• Use of black-berries handsets

Page 31: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 32: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

WTC

Page 33: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 34: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 35: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Examples• In the last six years alone, India has seen more than 600

people killed while hundreds others maimed and devastated as a result of terror strikes. The following is a chronology of the major terrorist attacks in the country as put together by the Times of India:Mumbai, Nov 26, 2008: Several killed and many more injured in seven terror attacks targetting mostly foreigners' hangout places.

• Assam, Oct 30, 2008: At least 45 killed (figure can change) and over 100 injured in 18 terror bombings across Assam.

Page 36: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Examples Contd• Imphal, Oct 21, 2008: 17 killed in a powerful blast near

Manipur Police Commando complex..• New Delhi, Sep 27, 2008: Three people killed after a

crude bomb was thrown in a busy market in Mehrauli.• New Delhi, Sep 13, 2008: 26 people killed in six blasts

across the city.• Ahmedabad, July 26, 2008: 57 people killed after 20-odd

synchronised bombs went off within less than two hours.• Jaipur, May 13, 2008: 68 people killed in serial

bombings.

Page 37: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Measures• Be united and fight against terrorist• When ever you find unidentified

objects do report• Don’t panic and try to keep cool• Stay connected with the news• Don’t spread rumors

Page 38: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Page 39: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

AN EFFORT BY SOME TERRORISTS

Dhaval ShirodariyaMithil ShahKaran Sheth Dhara kamdarKaran Gosalia

Page 40: It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

ANY QUESTIONS ???