Você está na página 1de 27

USE OF INFORMATION TECHNOLOGY BY TERRORIST

Dhairya Sunil Malde Manthan Uday Doshi Bhakti Sawant Heena Jekin Dinesh Lapsia

Batch Details Commencement Date: 11th January, 2010. Centre Name: Charni Road Batch Timings: 12pm to 4pm

Reason for selecting this topic


To get an insight on how the terrorist use the technologies. Modern technologies like computer , Weapons , satellite phones makes it easy for them to communicate , plan & execute their terrorist activities To make people more alert and give more knowledge on the same.

introDuction

Terrorism has been with us for centuries, and it has always attracted inordinate attention because of its dramatic character and its sudden, often wholly unexpected, occurrence. Terrorism is violence, but not every form of violence is terrorism. It is vitally important to recognize that terrorism, although difficult to define precisely, as his brief history will show, is not a synonym for civil war, banditry, or guerrilla warfare. The term guerrilla often has a positive connotation in our language whereas terrorism almost always has a negative meaning. British and French news media will take a dim view of those engaging in terrorist operations in London and Paris, and will not hesitate to call the perpetrators terrorists.

What is terrorism???
Criminal activities or actions Uses violence or unlawful means Not just a belief Has political or social cause Terrorists bypass all estd. Institutes They get the govt. To forcefully listen to Them & bring about change in their favour
terrorist is liKe us, he WalKs liKe us, he eats liKe us, the onlY DiFFerence is he is carrYinG BomB With him

Every decent, honest person should ask

WHY..???

Targets of terrorist

International Airports Metropolitan Cities Railway Stations Major International Events Resorts, Theatres, Parks, Landmarks or any public place. Religious places.

use oF internet
The internet has opened many doors for a variety of stakeholders, such as: Students: Education Scientists: Investigation Teachers: Teaching, learning Business: Communication, transaction, cyber market. Terrorists: Ease of access, lack of regulations, vast audiences, fast flow of data & communication, anonymity, etc.

anonYmitY
Anonymity is the important factor in cyber terrorism as it is extremely difficult to find these persons as with the use of laptops they can change their location in a matter of minutes (even seconds) even though they have a single IP address. And if they are in a remote location to send a squad search they might have left the area long before they are reached. There are also cyber-coffees that stop you from knowing the exact person who used the computer at the time the virus (or others) was sent.

use oF technoloGY
Terrorists have seized upon the worldwide practice of using information technology (IT) in daily life. They embrace IT for several reasons; it improves communication and aids organization, allows members to coordinate quickly with large numbers of followers, and provides a platform for propaganda. The Internet also allows terrorists to reach a wide audience of potential donors and recruits who may be located over a large geographic area. There is an old truism - we can not stop progress. The truism has been used to justify investments in technologies that could potentially not only harm people but wipe out the entire planet. While we cannot stop the progress, we still should think carefully about the consequences of the technologies that we invent. Particularly because, since September 11 2001, we are all wondering when the next terrorist will attack occur.

"terrorists sWim in an ocean oF Bits anD BYtes."


A huge resource for the world's population, the internet can be used to move money for terrorist activities, find simple and ingenious ways to commit terrorist acts or make bombs, be used for computer hacking, research targets or keep in touch with other terrorist cells via email.

Advantages: easy access little or no regulation, other forms of government control potentially huge audiences spread throughout the world fast flow of information inexpensive development and maintenance of a web presence This feature enable terrorist to use the Internet.

Weapons
Terrorists use weapons of mass destruction. Weapons includes toxic or poisonous chemicals, dangerous radiation, explosive incendiary or poison gas bombs, grenades, rockets or missiles, Landmines, versatile kinds of Arms & Ammunitions. Terrorists often use threats to create fear among the public -- to try to convince citizens that their government is powerless to prevent terrorism, and to get immediate publicity for their causes. This could include threats of mass destruction using weapons of mass destruction or more traditional kidnappings and airplane hijackings where hostages are held in exchange for money or some other demand. The Department of Defense estimates that about two dozen nations may possess chemical agents and/or weapons. Additional nations are also seeking to develop them. The Central Intelligence Agency reports that at least 10 countries are believed to have, or to be conducting, research on biological agents for weaponization.

cell phones
One of the most obvious technologies is cell phones. While terrorists can used these to keep in touch, so can the security forces, which makes communication easier and quicker and allows people to keep in touch while on the move. Calls can also be tapped and recorded by either side and newer model cell phones which include cameras, video recorders and sound recorders are also useful as the battle heats up. In more killing method, rebels and terrorists can use mobile phones to create a single personal bomb; they can replace the speaker of the phone with the detonator of the phone, so when the phones receives the signal of call and send electricity where the speaker normally is to produce the sound, instead of producing a sound it would explode affecting its surrounding.

other mass meDia


Closely linked to cell phones and CCTV monitoring are the other methods of tracking terrorism. These can include covert technology such as phone tapping or GPS, which is used to reach destinations easily and quickly. The problem with some of these methods, like GPS, is that they can also benefit terrorism. The mass media of the television, radio and newspapers can be used to spread the dangers of terrorism and warn the population of an increased threat. While terrorists can use video cameras or digital images to post information on the internet or boast of success, these can also be used to bring the horrors of terrorism and the evil of terrorism into our houses to impact on our lives and make us more aware.

Gps: GloBal positioninG sYstem


The Global Positioning System (GPS) is a global navigation satellite system (GNSS) developed by the United States Department of Defense and managed by the United States Air Force 50th Space Wing. It is the only fully functional GNSS in the world, can be used freely by anyone, anywhere, and is often used by civilians for navigation purposes. It uses a constellation of between 24 and 32 medium Earth orbit satellites that transmit precise radio wave signals, which allow GPS receivers to determine their current location, the time, and their velocity. Its official name is NAVSTAR GPS. Since it became fully operational on April 27, 1995, GPS has become a widely used aid to navigation worldwide, and a useful tool for map-making, land surveying, commerce, scientific uses, tracking and surveillance, and hobbies such as geocaching. Also, the precise time reference is used in many applications including the scientific study of earthquakes and as a required time synchronization method for cellular network protocols such as the IS-95 standard for CDMA.

use oF GooGle earth


Google earth is a type of program which shouldnt be accessed from the internet for any user. This is because it is based on satellite photo shooting of the earth structure and country location. Therefore if rebels and terrorists have easy access to this program, they would know better about the earth structure and plan some sort of attack to a specific nation that can cause a vital damage. Other advantage for the rebels and terrorists is that they would know the exact location if they are planning on kidnap someone important, for instance the US president, the rebels and terrorists would see in what building is he located, plan some strategies to avoid eye contact from the guards and polices, see what transportation could be use and what road to take to go to the building and leave the building.

WHY TECHNOLOGY???? Psychological warfare Publicity & propaganda Data mining Fund raising Recruitment & mobilization Networking Sharing information Planning & coordination

Terrorists involved in the Mumbai terror attacks were tech-savvy. If youve been following the news on television, you'd have heard about the terrorists using 'satellite phone' for communication; this device was recovered from a trawler abandoned on the high seas. As it turns out, this gadget is now one of the most crucial pieces of evidence connected to the terror attacks on Mumbai because it shows evidence regarding calls made to Karachi before and after the attacks

WHO IS NEXT.?????

We Do not create terrorism BY FiGhtinG the terrorists. We invite terrorism BY iGnorinG them. -GeorGe W. Bush

If we like them, they're freedom fighters . . . If we don't like them, they're terrorists. In the unlikely case we can't make up our minds, they're temporarily only guerrillas.

Fighting terrorism is like being a goalkeeper. You can make a hundred brilliant saves but the only shot that people remember is the one that gets past you.

Terrorism is a complex problem with many diverse causes. Consequently no single effective method to counter it exists. To combat terrorism, one must first understand the underlying motivations for each particular group's actions. Then a strategy needs to be developed based on those findings. Regardless, it is difficult to fight terrorism without endangering civil liberties, such as is the case in Northern Ireland. Many innocent people get caught in the cross-fire. Ending terrorist threats requires imaginative and fluid thinking, whether to attack the roots of terrorism or neutralize a particular group.

THE ONLY BENEFIT IS TERRORISM UNITES US!!!!!

www.google.co.in www.wikipedia.com www.hindubusiness.com www.causes-of-terrorism.net www.santabanta.com

maY the martYrs soul rest in peace

Thank you!!!!!!

Você também pode gostar