SlideShare a Scribd company logo
1 of 20
Terrorism & Cybercrime J. Levi White, MS, CEECS, CFCE AJ 200 August 31, 2009
Terrorism ,[object Object],[object Object],[object Object]
Forms or Types of Terrorism ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Characteristics of Terrorists ,[object Object],[object Object],[object Object]
Terrorist Organizations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Timeline of Terrorism  (Last 40 Years, Almost) ,[object Object],See pages 370-371 in your text
What is Bioterrorism? ,[object Object],[object Object],[object Object]
History of Biowarfare ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History of Biowarfare (cont.) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
History of Biowarfare (cont.) ,[object Object],[object Object],[object Object]
Why use Biological Weapons? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
A Question of Scale ,[object Object]
Routes of Entry ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cybercrime ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who are Cyber Criminals? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crimes Against a Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Crimes Committed with  the aid of a Computer ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity Theft ,[object Object],[object Object],[object Object],[object Object],[object Object]
U.S. Patriot Act ,[object Object],[object Object],[object Object],[object Object],[object Object]
Any Questions?? Thank you!

More Related Content

Viewers also liked

Terrorism and fundamentalism
Terrorism and fundamentalismTerrorism and fundamentalism
Terrorism and fundamentalismAnge Santana
 
Griffithpark
GriffithparkGriffithpark
Griffithparkshahmora
 
Albrighton Consulting
Albrighton ConsultingAlbrighton Consulting
Albrighton ConsultingClubs SA
 
Bkump Ed Media 20080627
Bkump Ed Media 20080627Bkump Ed Media 20080627
Bkump Ed Media 20080627bkump
 
Forwarder@ CMS Introduction
Forwarder@ CMS IntroductionForwarder@ CMS Introduction
Forwarder@ CMS Introductionarl-shipping.com
 
Digital AdAge 2011 Summary Trends
Digital AdAge 2011 Summary TrendsDigital AdAge 2011 Summary Trends
Digital AdAge 2011 Summary TrendsRapporteuse
 
2459455 adsl
2459455 adsl2459455 adsl
2459455 adslnnh banh
 
Databasenarrative
DatabasenarrativeDatabasenarrative
DatabasenarrativeSean Cubitt
 
Assessment of the thruway authority
Assessment of the thruway authorityAssessment of the thruway authority
Assessment of the thruway authorityUnshackle Upstate
 
Global Classroom 2011-12: Looking Forwards, Looking Back
Global Classroom 2011-12: Looking Forwards, Looking BackGlobal Classroom 2011-12: Looking Forwards, Looking Back
Global Classroom 2011-12: Looking Forwards, Looking BackMichael Graffin
 
Marketing with-social-media
Marketing with-social-mediaMarketing with-social-media
Marketing with-social-mediaLinda Coles
 
Impossible Flights - Rewind Italia
Impossible Flights - Rewind ItaliaImpossible Flights - Rewind Italia
Impossible Flights - Rewind ItaliaSean Cubitt
 
meganireland
meganirelandmeganireland
meganirelandirelandm
 

Viewers also liked (20)

Terrorism and fundamentalism
Terrorism and fundamentalismTerrorism and fundamentalism
Terrorism and fundamentalism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Terrorism in Pakistan
 
Griffithpark
GriffithparkGriffithpark
Griffithpark
 
Albrighton Consulting
Albrighton ConsultingAlbrighton Consulting
Albrighton Consulting
 
Imagine
ImagineImagine
Imagine
 
Bkump Ed Media 20080627
Bkump Ed Media 20080627Bkump Ed Media 20080627
Bkump Ed Media 20080627
 
Forwarder@ CMS Introduction
Forwarder@ CMS IntroductionForwarder@ CMS Introduction
Forwarder@ CMS Introduction
 
Digital AdAge 2011 Summary Trends
Digital AdAge 2011 Summary TrendsDigital AdAge 2011 Summary Trends
Digital AdAge 2011 Summary Trends
 
2459455 adsl
2459455 adsl2459455 adsl
2459455 adsl
 
Databasenarrative
DatabasenarrativeDatabasenarrative
Databasenarrative
 
Desfile primavera
Desfile primaveraDesfile primavera
Desfile primavera
 
Web page
Web pageWeb page
Web page
 
Start with If
Start with If Start with If
Start with If
 
Assessment of the thruway authority
Assessment of the thruway authorityAssessment of the thruway authority
Assessment of the thruway authority
 
Global Classroom 2011-12: Looking Forwards, Looking Back
Global Classroom 2011-12: Looking Forwards, Looking BackGlobal Classroom 2011-12: Looking Forwards, Looking Back
Global Classroom 2011-12: Looking Forwards, Looking Back
 
120706 manho up
120706 manho up120706 manho up
120706 manho up
 
Marketing with-social-media
Marketing with-social-mediaMarketing with-social-media
Marketing with-social-media
 
Impossible Flights - Rewind Italia
Impossible Flights - Rewind ItaliaImpossible Flights - Rewind Italia
Impossible Flights - Rewind Italia
 
meganireland
meganirelandmeganireland
meganireland
 

Similar to Aj 200 Terrorism & Cybercrime

Similar to Aj 200 Terrorism & Cybercrime (20)

Terrorism
TerrorismTerrorism
Terrorism
 
6651
66516651
6651
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
6651 (1).ppt
6651 (1).ppt6651 (1).ppt
6651 (1).ppt
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism 2010
Terrorism 2010Terrorism 2010
Terrorism 2010
 
Terrorism
TerrorismTerrorism
Terrorism
 
0647515
06475150647515
0647515
 
Buck pr 522
Buck pr 522Buck pr 522
Buck pr 522
 
CYBER TERRORISM
CYBER TERRORISM CYBER TERRORISM
CYBER TERRORISM
 
Terrorism,Peace & Love.
Terrorism,Peace & Love.Terrorism,Peace & Love.
Terrorism,Peace & Love.
 
Presentation
PresentationPresentation
Presentation
 
C:\Documents And Settings\James Loerch\My Documents\Ew\Ew\20081216 Presentati...
C:\Documents And Settings\James Loerch\My Documents\Ew\Ew\20081216 Presentati...C:\Documents And Settings\James Loerch\My Documents\Ew\Ew\20081216 Presentati...
C:\Documents And Settings\James Loerch\My Documents\Ew\Ew\20081216 Presentati...
 
ChemBio Tutorial
ChemBio Tutorial ChemBio Tutorial
ChemBio Tutorial
 
Biological Terrorism: Anthrax
Biological Terrorism: AnthraxBiological Terrorism: Anthrax
Biological Terrorism: Anthrax
 
Corruption, the AIDS of civilization
Corruption, the AIDS of civilization Corruption, the AIDS of civilization
Corruption, the AIDS of civilization
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threat
 

Aj 200 Terrorism & Cybercrime