It Used by Terrorist Ppt

Post on 07-Apr-2015

76 views 0 download

Transcript of It Used by Terrorist Ppt

>> 0 >> 1 >> 2 >> 3 >> 4 >>

INFORMATION TECHNOLOGY

USED BY TERRORIST

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Reasons for choosing the topic• Terrorism is now a current issue.

• Terrorist uses Information technology at greater extend and we all need to know the which technology is misused and how..

• So to create an awareness we selected this topic.

>> 0 >> 1 >> 2 >> 3 >> 4 >>

MEANING

• Terrorist" is a word used so often and so loosely that it has lost a clear meaning.

• This is a proposal to lend some clarity to the definition, and thus hopefully to the use, of the word "terrorist

• Terrorism refers here to the public health consequences and the methods for prevention of the purposeful use of violence or threats of violence by groups or individuals in order to serve political or personal agendas. 

>> 0 >> 1 >> 2 >> 3 >> 4 >>

HOW TECHNOLOGY HELPS?• Terrorist have great knowledge of IT hence they know to

use it in their means!!!

• To misuse a technology is not that hard, simply searching on internet can help terrorist to make bombs and other Weapon of Mass Destructions!!

• GPS technology is also aiding terrorist to have their mission successful!!Google earth helped terrorist too as it is best technology to have maps with full destruction!

>> 0 >> 1 >> 2 >> 3 >> 4 >>

8

>> 0 >> 1 >> 2 >> 3 >> 4 >>

7

>> 0 >> 1 >> 2 >> 3 >> 4 >>

6

>> 0 >> 1 >> 2 >> 3 >> 4 >>

5

>> 0 >> 1 >> 2 >> 3 >> 4 >>

4

>> 0 >> 1 >> 2 >> 3 >> 4 >>

3

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

SOURCE OF FUNDS• Money Laundering i.e ‘HAWALAS’

• Sale of Drugs

• Extortion

• Frauds

• Illegal websites

• Hacking

• Political parties

>> 0 >> 1 >> 2 >> 3 >> 4 >>

SOURCE OF FUNDS CONTD…

• Randsom money ‘FIROWTI’

• Foreign doners

• Pishing

• Malware

>> 0 >> 1 >> 2 >> 3 >> 4 >>

TRAINING

• Selection of a candidate

purely on interests

• Brain washing

• Selection of a location

• Physical training

1) Training at various locations

2) Training under extreme conditions

>> 0 >> 1 >> 2 >> 3 >> 4 >>

TRAINING contd…

• Weapon handling

• Technical know on internet and allied equipments

• Torture endurance

• How to cheat the lie-detector test &various other tests?

• Crisis management

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Technology misused

>> 0 >> 1 >> 2 >> 3 >> 4 >>

•Anything under the sun can be

searched

•Updated with the recent happenings

•Technical know how to make bombs

•Aids the functioning of others like

GPS, Google earth, satellite phones,

etc.

>> 0 >> 1 >> 2 >> 3 >> 4 >>

INTERNET CONTD…

• Main source of their funding activity

• E-mail threats

• Hacking

• Spamming

• Emails sent with an

unprotected

server using Wi-Fi

>> 0 >> 1 >> 2 >> 3 >> 4 >>

GPS satellites broadcast signals from space, which each GPS receiver uses to calculate its three-dimensional location (latitude, longitude, and altitude) plus the current time.•Originally used by military•Cell phones wih GPS•A Replacement for laser bombs •Easily accesible loctions

>> 0 >> 1 >> 2 >> 3 >> 4 >>

JDAM

• Joint direct attack munition• It’s a guidance tail kit that converts existing

unguided free-fall bombs into accurate all weather guided bombs

• Clubbed with GPS for high accuracy on targeting• Multiple targets engagements at a time

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

• A software by Google.

•Through this 3d maps of any country can be downloaded easily..

•Even streets, landmarks are available!

•Familiarity with the place even without visiting.

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

SATELLITE PHONES

• Uses satellite and not cellular

broad casting towers for calls

• Commonly called a ‘satphone’

• Hard to track

• No network hassels

• Fast and reliable data service

• True global coverage

>> 0 >> 1 >> 2 >> 3 >> 4 >>

LAPTOPS

• Easy portability

• Highest configuration

laptops used

• Supports all other devices

• Use of web-cam

for video conferencing

>> 0 >> 1 >> 2 >> 3 >> 4 >>

CELL PHONES

• Advent of high end cell phones

• GPS navigation in latest cell phones

• Google earth even supported

• Phone –bomb

• Usage of multiple sim-cards

• Use of black-berries handsets

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

WTC

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Examples• In the last six years alone, India has seen more than 600

people killed while hundreds others maimed and devastated as a result of terror strikes. The following is a chronology of the major terrorist attacks in the country as put together by the Times of India:Mumbai, Nov 26, 2008: Several killed and many more injured in seven terror attacks targetting mostly foreigners' hangout places.

• Assam, Oct 30, 2008: At least 45 killed (figure can change) and over 100 injured in 18 terror bombings across Assam.

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Examples Contd• Imphal, Oct 21, 2008: 17 killed in a powerful blast near

Manipur Police Commando complex..• New Delhi, Sep 27, 2008: Three people killed after a

crude bomb was thrown in a busy market in Mehrauli.• New Delhi, Sep 13, 2008: 26 people killed in six blasts

across the city.• Ahmedabad, July 26, 2008: 57 people killed after 20-odd

synchronised bombs went off within less than two hours.• Jaipur, May 13, 2008: 68 people killed in serial

bombings.

>> 0 >> 1 >> 2 >> 3 >> 4 >>

Measures• Be united and fight against terrorist• When ever you find unidentified

objects do report• Don’t panic and try to keep cool• Stay connected with the news• Don’t spread rumors

>> 0 >> 1 >> 2 >> 3 >> 4 >>

>> 0 >> 1 >> 2 >> 3 >> 4 >>

AN EFFORT BY SOME TERRORISTS

Dhaval ShirodariyaMithil ShahKaran Sheth Dhara kamdarKaran Gosalia

>> 0 >> 1 >> 2 >> 3 >> 4 >>

ANY QUESTIONS ???