SlideShare ist ein Scribd-Unternehmen logo
1 von 20
InformatIon
technology used
 by terrorIsts
           Presented   by
       -
            Pravin Devkar
 INTRODUCTION   TO TERRORISM.

 WHO   PROVIDES FUNDS TO TERRORIST.

 INFORMATION    TECHNOLOGY

 CONCLUSION.
 The word terrorism was first used in France to
 describe a new system of government adopted
 during the French revolution.(1789-1799).

 Theirintention was to promote democracy and to
 write-off the revolution of its enemies and there by
 purifying it. However , the oppression and the violent
 excesses the revolution and transformed it into the
 feared instrument of state.

 From that time on, terrorism has had a decidedly
 negative connection.                                     3
  Terrorist is not new, and even though it has been used
since the beginning of recorded history it can be
relatively hard to define.

 The strategy of terrorist is to commit act of violence,
which draws the attention of local population and the
respective government.
A Terrorist group commits acts
of violence to:-
   Produce wide spread fear.
   To capture the attention of the media.
   Harass, weaken, or embarrass government
    security forces.
   Steal or extort money & equipment to fulfill
    their operation of their group.
   Destroy facilities or disrupt lines of
    communication.
   Discourage foreign investments, tourism, or
    assistance programs that can affect the
    target country’s economy and support of the
    government in power.

   Influence government decisions, legislation,
    or other critical decisions.

   Free prisoners.
 TO carry on a mission that is a terror attack the
 terrorists require a lot of fund. Saudi Arabia remains
 the world's leading source of money for Al Qaeda
 and other extremist networks.

 Furthermore,  terrorist organizations have created
 links with the Russian Mafia, Colombian drug cartel,
 and a number of other international criminal
 organizations. These links of politics, money,
 geography, and arms create a mutually beneficial
 relationship that allows both the terrorists and the
 criminal organizations to prosper.
 Drug  trafficking, an estimated $2 trillion market per
 year, has become the best weapon for terrorists.
 Beyond helping terrorists to finance their wide range
 of illegal activities, the drug market has also allowed
 terrorist organizations to undermine targeted
 countries both politically and economically.

 Terrorists   also generate money from criminal
 activities such as extortion, prostitution rings, video
 pirating, and drug trafficking which gives them $2
 trillion per year
 Satellite   phone

 Google   earth
World Trade Center : 11th
    September 2001
Mumbai : 26th November 2008
Lahore :
Pakistan
In all such terror attacks Information Technology has
been extensively used
(or rather misused)

In fact the terrorism is day by day becoming more &
more techno-savvy without which it may not achieve
the expected results


For Example --------
 Satellite
          phone is the greater invention in IT
 Technology.

 The greater advantage of satellite phone is that, the
 instrument can be used in any where all around the
 world.

 IT
   does not require any sim card facility ,it is directly
 connected to the satellite.

 Thus Due to which it helps them to communicate
 easily.

 Thissatellite phones was used by terrorist in this
 recent Mumbai attack.
Among the other objects found in the boat used
by the terrorists, satellite phone, a model, was
discovered which could be the key to find more
information about the terrorists


“On  2008 Nov. 18, Indian intelligence also
intercepted a satellite phone call to a number
in Pakistan known to be used by a leader of the
terror group, Lashkare Taiba, believed to be
responsible for the weekend attack”
Among all the commercial technologies used by the
terrorists are GPS and SATELLITE PHONES

Locations were pinpointed by using GPS very
accurately during Mumbai attack

The terrorists used them to monitor the situation
using British medias

It appears the terrorists proclaimed their identity
by sending various forged emails to news outlets by
using a REMAILERS
French counter-terror experts leading an international
inquiry into the attacks discovered that a facility, set up
there by Abu Musab al Zarqawi, al Qaeda’s late Iraq
commander, had developed the new design which works
through Internet messengers like Skype or MSN.

Network-connected mobile phones can remotely detonate
over the Internet simultaneous explosions hundreds of
miles apart, anywhere in the world
Google Earth provides
free Internet satellite
pictures    to   sensitive
locations in India, which
are being misused by
terror agents.
CONCLUSION

Information technology is a very high tech
system It provides lots of knowledge to the new
generation

It should be used for the welfare and the
progress of the society …..

…..so let us hope it will be used for the benefits
of the mankind only

Weitere ähnliche Inhalte

Andere mochten auch

E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,Noel Tan
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed docHassan Shahzad
 
4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. project4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. projectDat Lien
 
Terrorism and pakistan
Terrorism and pakistanTerrorism and pakistan
Terrorism and pakistanUmar Saeed
 
terrorism in Pakistan
terrorism in Pakistanterrorism in Pakistan
terrorism in PakistanKhalid Khan
 
On Board Security Risk Management
On Board Security Risk ManagementOn Board Security Risk Management
On Board Security Risk ManagementAnten
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patternsNoel Tan
 
ISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security DutyISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security DutyCapt Moin Uddin
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistanXee Shani
 
Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Yasir Dil
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorismtariqmehsud
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsSrun Sakada
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and TypesShaan Yaduvanshi
 

Andere mochten auch (18)

Al qaeda
Al qaedaAl qaeda
Al qaeda
 
I love my town
I love my townI love my town
I love my town
 
Physical security of premises
Physical security of premisesPhysical security of premises
Physical security of premises
 
E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,E. recognition, on a non discriminatory basis,
E. recognition, on a non discriminatory basis,
 
Terrorism Detailed doc
Terrorism Detailed docTerrorism Detailed doc
Terrorism Detailed doc
 
4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. project4D bim construction scheduling on the 1885 St. James pl. project
4D bim construction scheduling on the 1885 St. James pl. project
 
Terrorism and pakistan
Terrorism and pakistanTerrorism and pakistan
Terrorism and pakistan
 
terrorism in Pakistan
terrorism in Pakistanterrorism in Pakistan
terrorism in Pakistan
 
Terrorism in Pakistan
Terrorism in PakistanTerrorism in Pakistan
Terrorism in Pakistan
 
On Board Security Risk Management
On Board Security Risk ManagementOn Board Security Risk Management
On Board Security Risk Management
 
A. security threats and patterns
A. security threats and patternsA. security threats and patterns
A. security threats and patterns
 
ISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security DutyISPS: Security Awareness Training / Designated Security Duty
ISPS: Security Awareness Training / Designated Security Duty
 
terrorism in pakistan
terrorism in pakistanterrorism in pakistan
terrorism in pakistan
 
Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)Terrorism in Pakistan (Data collection)
Terrorism in Pakistan (Data collection)
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
Presentation OnTerrorism
Presentation OnTerrorismPresentation OnTerrorism
Presentation OnTerrorism
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 

Ähnlich wie It technology used by terrorist

Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportarchiejones4
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracyCol Mukteshwar Prasad
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorismAishaAL9
 
Terrorism and tourism
Terrorism and tourismTerrorism and tourism
Terrorism and tourismpriyattb
 
Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threatabhinav_cfa
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17Ed Alcantara
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weaponFernando Alcoforado
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docxvickeryr87
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptxRoleenPearlPanal
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7Daniel Dufourt
 
11.terrorism and role of media
11.terrorism and role of media11.terrorism and role of media
11.terrorism and role of mediaAlexander Decker
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Alireza Ghahrood
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital AgeYogeshIJTSRD
 
150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docxdrennanmicah
 

Ähnlich wie It technology used by terrorist (20)

Iftf state sponsored_trolling_report
Iftf state sponsored_trolling_reportIftf state sponsored_trolling_report
Iftf state sponsored_trolling_report
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
 
Biased media is a real threat to indian democracy
Biased media is a real threat to indian democracyBiased media is a real threat to indian democracy
Biased media is a real threat to indian democracy
 
Global Terrorism
Global TerrorismGlobal Terrorism
Global Terrorism
 
Intelligence and counter terrorism
Intelligence and counter terrorismIntelligence and counter terrorism
Intelligence and counter terrorism
 
Terrorism and tourism
Terrorism and tourismTerrorism and tourism
Terrorism and tourism
 
Terror Global Threat
Terror Global ThreatTerror Global Threat
Terror Global Threat
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
DarkNet_article_wn17
DarkNet_article_wn17DarkNet_article_wn17
DarkNet_article_wn17
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Intelligence Collection
Intelligence CollectionIntelligence Collection
Intelligence Collection
 
Cyber war as a modern war weapon
Cyber war as a modern war weaponCyber war as a modern war weapon
Cyber war as a modern war weapon
 
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
250 words agree or disagreeWeek 5 ForumMaiwand Khyber(Jul .docx
 
comparative_police_system.pptx
comparative_police_system.pptxcomparative_police_system.pptx
comparative_police_system.pptx
 
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7Cybercrimes. Looking for Safer Spaces? Freedom from Fear  Issue 7
Cybercrimes. Looking for Safer Spaces? Freedom from Fear Issue 7
 
11.terrorism and role of media
11.terrorism and role of media11.terrorism and role of media
11.terrorism and role of media
 
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
Countering Terrorism, Preventing Radicalization and Protecting Cultural Herit...
 
114-116
114-116114-116
114-116
 
Organised Crime in the Digital Age
Organised Crime in the Digital AgeOrganised Crime in the Digital Age
Organised Crime in the Digital Age
 
150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx150 words agree or disagreeIn today’s technology and the threa.docx
150 words agree or disagreeIn today’s technology and the threa.docx
 

Kürzlich hochgeladen

Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In DubaiDubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In Dubaikojalkojal131
 
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Insiger
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdflambardar420420
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...srinuseo15
 
The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdomlunadelior
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptxYasinAhmad20
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfssuser5750e1
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...Andy (Avraham) Blumenthal
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...anjanibaddipudi1
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...IT Industry
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...hyt3577
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdfFIRST INDIA
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...Faga1939
 
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...tewhimanshu23
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsVoterMood
 

Kürzlich hochgeladen (20)

Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In DubaiDubai Call Girls Pinky O525547819 Call Girl's In Dubai
Dubai Call Girls Pinky O525547819 Call Girl's In Dubai
 
Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024Job-Oriеntеd Courses That Will Boost Your Career in 2024
Job-Oriеntеd Courses That Will Boost Your Career in 2024
 
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7call girls inMahavir Nagar  (delhi) call me [🔝9953056974🔝] escort service 24X7
call girls inMahavir Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf422524114-Patriarchy-Kamla-Bhasin gg.pdf
422524114-Patriarchy-Kamla-Bhasin gg.pdf
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
9953056974 Call Girls In Pratap Nagar, Escorts (Delhi) NCR
 
The political system of the united kingdom
The political system of the united kingdomThe political system of the united kingdom
The political system of the united kingdom
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf10052024_First India Newspaper Jaipur.pdf
10052024_First India Newspaper Jaipur.pdf
 
declarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdfdeclarationleaders_sd_re_greens_theleft_5.pdf
declarationleaders_sd_re_greens_theleft_5.pdf
 
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
America Is the Target; Israel Is the Front Line _ Andy Blumenthal _ The Blogs...
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
*Navigating Electoral Terrain: TDP's Performance under N Chandrababu Naidu's ...
 
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
KING VISHNU BHAGWANON KA BHAGWAN PARAMATMONKA PARATOMIC PARAMANU KASARVAMANVA...
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 
06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf06052024_First India Newspaper Jaipur.pdf
06052024_First India Newspaper Jaipur.pdf
 
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
THE OBSTACLES THAT IMPEDE THE DEVELOPMENT OF BRAZIL IN THE CONTEMPORARY ERA A...
 
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
Unveiling the Characteristics of Political Institutions_ A Comprehensive Anal...
 
Politician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full DetailsPolitician uddhav thackeray biography- Full Details
Politician uddhav thackeray biography- Full Details
 

It technology used by terrorist

  • 1. InformatIon technology used by terrorIsts Presented by - Pravin Devkar
  • 2.  INTRODUCTION TO TERRORISM.  WHO PROVIDES FUNDS TO TERRORIST.  INFORMATION TECHNOLOGY  CONCLUSION.
  • 3.  The word terrorism was first used in France to describe a new system of government adopted during the French revolution.(1789-1799).  Theirintention was to promote democracy and to write-off the revolution of its enemies and there by purifying it. However , the oppression and the violent excesses the revolution and transformed it into the feared instrument of state.  From that time on, terrorism has had a decidedly negative connection. 3
  • 4.  Terrorist is not new, and even though it has been used since the beginning of recorded history it can be relatively hard to define.  The strategy of terrorist is to commit act of violence, which draws the attention of local population and the respective government.
  • 5. A Terrorist group commits acts of violence to:-  Produce wide spread fear.  To capture the attention of the media.  Harass, weaken, or embarrass government security forces.  Steal or extort money & equipment to fulfill their operation of their group.  Destroy facilities or disrupt lines of communication.
  • 6. Discourage foreign investments, tourism, or assistance programs that can affect the target country’s economy and support of the government in power.  Influence government decisions, legislation, or other critical decisions.  Free prisoners.
  • 7.  TO carry on a mission that is a terror attack the terrorists require a lot of fund. Saudi Arabia remains the world's leading source of money for Al Qaeda and other extremist networks.  Furthermore, terrorist organizations have created links with the Russian Mafia, Colombian drug cartel, and a number of other international criminal organizations. These links of politics, money, geography, and arms create a mutually beneficial relationship that allows both the terrorists and the criminal organizations to prosper.
  • 8.  Drug trafficking, an estimated $2 trillion market per year, has become the best weapon for terrorists. Beyond helping terrorists to finance their wide range of illegal activities, the drug market has also allowed terrorist organizations to undermine targeted countries both politically and economically.  Terrorists also generate money from criminal activities such as extortion, prostitution rings, video pirating, and drug trafficking which gives them $2 trillion per year
  • 9.  Satellite phone  Google earth
  • 10. World Trade Center : 11th September 2001
  • 11. Mumbai : 26th November 2008
  • 13. In all such terror attacks Information Technology has been extensively used (or rather misused) In fact the terrorism is day by day becoming more & more techno-savvy without which it may not achieve the expected results For Example --------
  • 14.
  • 15.  Satellite phone is the greater invention in IT Technology.  The greater advantage of satellite phone is that, the instrument can be used in any where all around the world.  IT does not require any sim card facility ,it is directly connected to the satellite.  Thus Due to which it helps them to communicate easily.  Thissatellite phones was used by terrorist in this recent Mumbai attack.
  • 16. Among the other objects found in the boat used by the terrorists, satellite phone, a model, was discovered which could be the key to find more information about the terrorists “On 2008 Nov. 18, Indian intelligence also intercepted a satellite phone call to a number in Pakistan known to be used by a leader of the terror group, Lashkare Taiba, believed to be responsible for the weekend attack”
  • 17. Among all the commercial technologies used by the terrorists are GPS and SATELLITE PHONES Locations were pinpointed by using GPS very accurately during Mumbai attack The terrorists used them to monitor the situation using British medias It appears the terrorists proclaimed their identity by sending various forged emails to news outlets by using a REMAILERS
  • 18. French counter-terror experts leading an international inquiry into the attacks discovered that a facility, set up there by Abu Musab al Zarqawi, al Qaeda’s late Iraq commander, had developed the new design which works through Internet messengers like Skype or MSN. Network-connected mobile phones can remotely detonate over the Internet simultaneous explosions hundreds of miles apart, anywhere in the world
  • 19. Google Earth provides free Internet satellite pictures to sensitive locations in India, which are being misused by terror agents.
  • 20. CONCLUSION Information technology is a very high tech system It provides lots of knowledge to the new generation It should be used for the welfare and the progress of the society ….. …..so let us hope it will be used for the benefits of the mankind only