Escolar Documentos
Profissional Documentos
Cultura Documentos
Dhairya Sunil Malde Manthan Uday Doshi Bhakti Sawant Heena Jekin Dinesh Lapsia
Batch Details Commencement Date: 11th January, 2010. Centre Name: Charni Road Batch Timings: 12pm to 4pm
introDuction
Terrorism has been with us for centuries, and it has always attracted inordinate attention because of its dramatic character and its sudden, often wholly unexpected, occurrence. Terrorism is violence, but not every form of violence is terrorism. It is vitally important to recognize that terrorism, although difficult to define precisely, as his brief history will show, is not a synonym for civil war, banditry, or guerrilla warfare. The term guerrilla often has a positive connotation in our language whereas terrorism almost always has a negative meaning. British and French news media will take a dim view of those engaging in terrorist operations in London and Paris, and will not hesitate to call the perpetrators terrorists.
What is terrorism???
Criminal activities or actions Uses violence or unlawful means Not just a belief Has political or social cause Terrorists bypass all estd. Institutes They get the govt. To forcefully listen to Them & bring about change in their favour
terrorist is liKe us, he WalKs liKe us, he eats liKe us, the onlY DiFFerence is he is carrYinG BomB With him
WHY..???
Targets of terrorist
International Airports Metropolitan Cities Railway Stations Major International Events Resorts, Theatres, Parks, Landmarks or any public place. Religious places.
use oF internet
The internet has opened many doors for a variety of stakeholders, such as: Students: Education Scientists: Investigation Teachers: Teaching, learning Business: Communication, transaction, cyber market. Terrorists: Ease of access, lack of regulations, vast audiences, fast flow of data & communication, anonymity, etc.
anonYmitY
Anonymity is the important factor in cyber terrorism as it is extremely difficult to find these persons as with the use of laptops they can change their location in a matter of minutes (even seconds) even though they have a single IP address. And if they are in a remote location to send a squad search they might have left the area long before they are reached. There are also cyber-coffees that stop you from knowing the exact person who used the computer at the time the virus (or others) was sent.
use oF technoloGY
Terrorists have seized upon the worldwide practice of using information technology (IT) in daily life. They embrace IT for several reasons; it improves communication and aids organization, allows members to coordinate quickly with large numbers of followers, and provides a platform for propaganda. The Internet also allows terrorists to reach a wide audience of potential donors and recruits who may be located over a large geographic area. There is an old truism - we can not stop progress. The truism has been used to justify investments in technologies that could potentially not only harm people but wipe out the entire planet. While we cannot stop the progress, we still should think carefully about the consequences of the technologies that we invent. Particularly because, since September 11 2001, we are all wondering when the next terrorist will attack occur.
Advantages: easy access little or no regulation, other forms of government control potentially huge audiences spread throughout the world fast flow of information inexpensive development and maintenance of a web presence This feature enable terrorist to use the Internet.
Weapons
Terrorists use weapons of mass destruction. Weapons includes toxic or poisonous chemicals, dangerous radiation, explosive incendiary or poison gas bombs, grenades, rockets or missiles, Landmines, versatile kinds of Arms & Ammunitions. Terrorists often use threats to create fear among the public -- to try to convince citizens that their government is powerless to prevent terrorism, and to get immediate publicity for their causes. This could include threats of mass destruction using weapons of mass destruction or more traditional kidnappings and airplane hijackings where hostages are held in exchange for money or some other demand. The Department of Defense estimates that about two dozen nations may possess chemical agents and/or weapons. Additional nations are also seeking to develop them. The Central Intelligence Agency reports that at least 10 countries are believed to have, or to be conducting, research on biological agents for weaponization.
cell phones
One of the most obvious technologies is cell phones. While terrorists can used these to keep in touch, so can the security forces, which makes communication easier and quicker and allows people to keep in touch while on the move. Calls can also be tapped and recorded by either side and newer model cell phones which include cameras, video recorders and sound recorders are also useful as the battle heats up. In more killing method, rebels and terrorists can use mobile phones to create a single personal bomb; they can replace the speaker of the phone with the detonator of the phone, so when the phones receives the signal of call and send electricity where the speaker normally is to produce the sound, instead of producing a sound it would explode affecting its surrounding.
WHY TECHNOLOGY???? Psychological warfare Publicity & propaganda Data mining Fund raising Recruitment & mobilization Networking Sharing information Planning & coordination
Terrorists involved in the Mumbai terror attacks were tech-savvy. If youve been following the news on television, you'd have heard about the terrorists using 'satellite phone' for communication; this device was recovered from a trawler abandoned on the high seas. As it turns out, this gadget is now one of the most crucial pieces of evidence connected to the terror attacks on Mumbai because it shows evidence regarding calls made to Karachi before and after the attacks
WHO IS NEXT.?????
We Do not create terrorism BY FiGhtinG the terrorists. We invite terrorism BY iGnorinG them. -GeorGe W. Bush
If we like them, they're freedom fighters . . . If we don't like them, they're terrorists. In the unlikely case we can't make up our minds, they're temporarily only guerrillas.
Fighting terrorism is like being a goalkeeper. You can make a hundred brilliant saves but the only shot that people remember is the one that gets past you.
Terrorism is a complex problem with many diverse causes. Consequently no single effective method to counter it exists. To combat terrorism, one must first understand the underlying motivations for each particular group's actions. Then a strategy needs to be developed based on those findings. Regardless, it is difficult to fight terrorism without endangering civil liberties, such as is the case in Northern Ireland. Many innocent people get caught in the cross-fire. Ending terrorist threats requires imaginative and fluid thinking, whether to attack the roots of terrorism or neutralize a particular group.
Thank you!!!!!!