SlideShare una empresa de Scribd logo
1 de 20
InformatIon
technology used
 by terrorIsts
           Presented   by
       -
            Pravin Devkar
 INTRODUCTION   TO TERRORISM.

 WHO   PROVIDES FUNDS TO TERRORIST.

 INFORMATION    TECHNOLOGY

 CONCLUSION.
 The word terrorism was first used in France to
 describe a new system of government adopted
 during the French revolution.(1789-1799).

 Theirintention was to promote democracy and to
 write-off the revolution of its enemies and there by
 purifying it. However , the oppression and the violent
 excesses the revolution and transformed it into the
 feared instrument of state.

 From that time on, terrorism has had a decidedly
 negative connection.                                     3
  Terrorist is not new, and even though it has been used
since the beginning of recorded history it can be
relatively hard to define.

 The strategy of terrorist is to commit act of violence,
which draws the attention of local population and the
respective government.
A Terrorist group commits acts
of violence to:-
   Produce wide spread fear.
   To capture the attention of the media.
   Harass, weaken, or embarrass government
    security forces.
   Steal or extort money & equipment to fulfill
    their operation of their group.
   Destroy facilities or disrupt lines of
    communication.
   Discourage foreign investments, tourism, or
    assistance programs that can affect the
    target country’s economy and support of the
    government in power.

   Influence government decisions, legislation,
    or other critical decisions.

   Free prisoners.
 TO carry on a mission that is a terror attack the
 terrorists require a lot of fund. Saudi Arabia remains
 the world's leading source of money for Al Qaeda
 and other extremist networks.

 Furthermore,  terrorist organizations have created
 links with the Russian Mafia, Colombian drug cartel,
 and a number of other international criminal
 organizations. These links of politics, money,
 geography, and arms create a mutually beneficial
 relationship that allows both the terrorists and the
 criminal organizations to prosper.
 Drug  trafficking, an estimated $2 trillion market per
 year, has become the best weapon for terrorists.
 Beyond helping terrorists to finance their wide range
 of illegal activities, the drug market has also allowed
 terrorist organizations to undermine targeted
 countries both politically and economically.

 Terrorists   also generate money from criminal
 activities such as extortion, prostitution rings, video
 pirating, and drug trafficking which gives them $2
 trillion per year
 Satellite   phone

 Google   earth
World Trade Center : 11th
    September 2001
Mumbai : 26th November 2008
Lahore :
Pakistan
In all such terror attacks Information Technology has
been extensively used
(or rather misused)

In fact the terrorism is day by day becoming more &
more techno-savvy without which it may not achieve
the expected results


For Example --------
 Satellite
          phone is the greater invention in IT
 Technology.

 The greater advantage of satellite phone is that, the
 instrument can be used in any where all around the
 world.

 IT
   does not require any sim card facility ,it is directly
 connected to the satellite.

 Thus Due to which it helps them to communicate
 easily.

 Thissatellite phones was used by terrorist in this
 recent Mumbai attack.
Among the other objects found in the boat used
by the terrorists, satellite phone, a model, was
discovered which could be the key to find more
information about the terrorists


“On  2008 Nov. 18, Indian intelligence also
intercepted a satellite phone call to a number
in Pakistan known to be used by a leader of the
terror group, Lashkare Taiba, believed to be
responsible for the weekend attack”
Among all the commercial technologies used by the
terrorists are GPS and SATELLITE PHONES

Locations were pinpointed by using GPS very
accurately during Mumbai attack

The terrorists used them to monitor the situation
using British medias

It appears the terrorists proclaimed their identity
by sending various forged emails to news outlets by
using a REMAILERS
French counter-terror experts leading an international
inquiry into the attacks discovered that a facility, set up
there by Abu Musab al Zarqawi, al Qaeda’s late Iraq
commander, had developed the new design which works
through Internet messengers like Skype or MSN.

Network-connected mobile phones can remotely detonate
over the Internet simultaneous explosions hundreds of
miles apart, anywhere in the world
Google Earth provides
free Internet satellite
pictures    to   sensitive
locations in India, which
are being misused by
terror agents.
CONCLUSION

Information technology is a very high tech
system It provides lots of knowledge to the new
generation

It should be used for the welfare and the
progress of the society …..

…..so let us hope it will be used for the benefits
of the mankind only

Más contenido relacionado

Destacado

E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,Noel Tan
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed docHassan Shahzad
 
4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. project4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. projectDat Lien
 
Terrorism and pakistan
Terrorism and pakistanTerrorism and pakistan
Terrorism and pakistanUmar Saeed
 
terrorism in Pakistan
terrorism in Pakistanterrorism in Pakistan
terrorism in PakistanKhalid Khan
 
On Board Security Risk Management
On Board Security Risk ManagementOn Board Security Risk Management
On Board Security Risk ManagementAnten
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patternsNoel Tan
 
ISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security DutyISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security DutyCapt Moin Uddin
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistanXee Shani
 
Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Yasir Dil
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorismtariqmehsud
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 

Destacado (18)

Al qaeda
Al qaedaAl qaeda
Al qaeda
 
I love my town
I love my townI love my town
I love my town
 
Physical security of premises
Physical security of premisesPhysical security of premises
Physical security of premises
 
E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed doc
 
4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. project4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. project
 
Terrorism and pakistan
Terrorism and pakistanTerrorism and pakistan
Terrorism and pakistan
 
terrorism in Pakistan
terrorism in Pakistanterrorism in Pakistan
terrorism in Pakistan
 
Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Terrorism in Pakistan
 
On Board Security Risk Management
On Board Security Risk ManagementOn Board Security Risk Management
On Board Security Risk Management
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
ISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security DutyISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security Duty
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistan
 
Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorism
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 

Similar a It technology used by terrorist

Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportarchiejones4
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracyCol Mukteshwar Prasad
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorismAishaAL9
 
Terrorism and tourism
Terrorism and tourismTerrorism and tourism
Terrorism and tourismpriyattb
 
Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threatabhinav_cfa
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weaponFernando Alcoforado
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptxRoleenPearlPanal
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
11.terrorism and role of media
11.terrorism and role of media11.terrorism and role of media
11.terrorism and role of mediaAlexander Decker
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital AgeYogeshIJTSRD
 
150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docxdrennanmicah
 

Similar a It technology used by terrorist (20)

Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracy
 
Global Terrorism
Global TerrorismGlobal Terrorism
Global Terrorism
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
Terrorism and tourism
Terrorism and tourismTerrorism and tourism
Terrorism and tourism
 
Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threat
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weapon
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptx
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
11.terrorism and role of media
11.terrorism and role of media11.terrorism and role of media
11.terrorism and role of media
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
114-116
114-116114-116
114-116
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
 
150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx
 

Último

Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPsychicRuben LoveSpells
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...Axel Bruns
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Krish109503
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhbhavenpr
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKISHAN REDDY OFFICE
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkobhavenpr
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxjohnandrewcarlos
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfFahimUddin61
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docxkfjstone13
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfLorenzo Lemes
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreiebhavenpr
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Pooja Nehwal
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxAwaiskhalid96
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceDelhi Call girls
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadershipanjanibaddipudi1
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdfFIRST INDIA
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdfFIRST INDIA
 

Último (20)

Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!Israel Palestine Conflict, The issue and historical context!
Israel Palestine Conflict, The issue and historical context!
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopkoEmbed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
Embed-2 (1).pdfb[k[k[[k[kkkpkdpokkdpkopko
 
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptxKAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
KAHULUGAN AT KAHALAGAHAN NG GAWAING PANSIBIKO.pptx
 
Pakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdfPakistan PMLN Election Manifesto 2024.pdf
Pakistan PMLN Election Manifesto 2024.pdf
 
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
2024 03 13 AZ GOP LD4 Gen Meeting Minutes_FINAL.docx
 
How Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdfHow Europe Underdeveloped Africa_walter.pdf
How Europe Underdeveloped Africa_walter.pdf
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
Call Girls in Mira Road Mumbai ( Neha 09892124323 ) College Escorts Service i...
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 135 Noida Escorts >༒8448380779 Escort Service
 
Minto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptxMinto-Morley Reforms 1909 (constitution).pptx
Minto-Morley Reforms 1909 (constitution).pptx
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Indirapuram Escorts >༒8448380779 Escort Service
 
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s LeadershipTDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
TDP As the Party of Hope For AP Youth Under N Chandrababu Naidu’s Leadership
 
30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf28042024_First India Newspaper Jaipur.pdf
28042024_First India Newspaper Jaipur.pdf
 

It technology used by terrorist

  • 1. InformatIon technology used by terrorIsts Presented by - Pravin Devkar
  • 2.  INTRODUCTION TO TERRORISM.  WHO PROVIDES FUNDS TO TERRORIST.  INFORMATION TECHNOLOGY  CONCLUSION.
  • 3.  The word terrorism was first used in France to describe a new system of government adopted during the French revolution.(1789-1799).  Theirintention was to promote democracy and to write-off the revolution of its enemies and there by purifying it. However , the oppression and the violent excesses the revolution and transformed it into the feared instrument of state.  From that time on, terrorism has had a decidedly negative connection. 3
  • 4.  Terrorist is not new, and even though it has been used since the beginning of recorded history it can be relatively hard to define.  The strategy of terrorist is to commit act of violence, which draws the attention of local population and the respective government.
  • 5. A Terrorist group commits acts of violence to:-  Produce wide spread fear.  To capture the attention of the media.  Harass, weaken, or embarrass government security forces.  Steal or extort money & equipment to fulfill their operation of their group.  Destroy facilities or disrupt lines of communication.
  • 6. Discourage foreign investments, tourism, or assistance programs that can affect the target country’s economy and support of the government in power.  Influence government decisions, legislation, or other critical decisions.  Free prisoners.
  • 7.  TO carry on a mission that is a terror attack the terrorists require a lot of fund. Saudi Arabia remains the world's leading source of money for Al Qaeda and other extremist networks.  Furthermore, terrorist organizations have created links with the Russian Mafia, Colombian drug cartel, and a number of other international criminal organizations. These links of politics, money, geography, and arms create a mutually beneficial relationship that allows both the terrorists and the criminal organizations to prosper.
  • 8.  Drug trafficking, an estimated $2 trillion market per year, has become the best weapon for terrorists. Beyond helping terrorists to finance their wide range of illegal activities, the drug market has also allowed terrorist organizations to undermine targeted countries both politically and economically.  Terrorists also generate money from criminal activities such as extortion, prostitution rings, video pirating, and drug trafficking which gives them $2 trillion per year
  • 9.  Satellite phone  Google earth
  • 10. World Trade Center : 11th September 2001
  • 11. Mumbai : 26th November 2008
  • 13. In all such terror attacks Information Technology has been extensively used (or rather misused) In fact the terrorism is day by day becoming more & more techno-savvy without which it may not achieve the expected results For Example --------
  • 14.
  • 15.  Satellite phone is the greater invention in IT Technology.  The greater advantage of satellite phone is that, the instrument can be used in any where all around the world.  IT does not require any sim card facility ,it is directly connected to the satellite.  Thus Due to which it helps them to communicate easily.  Thissatellite phones was used by terrorist in this recent Mumbai attack.
  • 16. Among the other objects found in the boat used by the terrorists, satellite phone, a model, was discovered which could be the key to find more information about the terrorists “On 2008 Nov. 18, Indian intelligence also intercepted a satellite phone call to a number in Pakistan known to be used by a leader of the terror group, Lashkare Taiba, believed to be responsible for the weekend attack”
  • 17. Among all the commercial technologies used by the terrorists are GPS and SATELLITE PHONES Locations were pinpointed by using GPS very accurately during Mumbai attack The terrorists used them to monitor the situation using British medias It appears the terrorists proclaimed their identity by sending various forged emails to news outlets by using a REMAILERS
  • 18. French counter-terror experts leading an international inquiry into the attacks discovered that a facility, set up there by Abu Musab al Zarqawi, al Qaeda’s late Iraq commander, had developed the new design which works through Internet messengers like Skype or MSN. Network-connected mobile phones can remotely detonate over the Internet simultaneous explosions hundreds of miles apart, anywhere in the world
  • 19. Google Earth provides free Internet satellite pictures to sensitive locations in India, which are being misused by terror agents.
  • 20. CONCLUSION Information technology is a very high tech system It provides lots of knowledge to the new generation It should be used for the welfare and the progress of the society ….. …..so let us hope it will be used for the benefits of the mankind only