SlideShare une entreprise Scribd logo
1  sur  13
Terrorist and Rebel use of IT

      Jorge Alberto Yang Pai
            David Vidri
IT uses:
 Internet
    GPS
Encryption
Cell phones
IT use: The Internet
• The internet has opened many doors for a
  variety of stakeholders, such as:
  –   Students: Education
  –   Scientists: Investigation
  –   Teachers: Teaching, learning
  –   Business: Communication, transaction, cyber market
  –   Terrorists: Ease of access, lack of regulations, vast
      audiences, fast flow of data & communication,
      anonymity, etc.
Terrorism and the Internet: Ease of
                 access
Ease of access is the fact that as large
range of people can access an
amount of information, even from
the most remote location there is.
Meaning that terrorists can hack
almost anyone’s information/data an
steal it or modify it so that it benefits
their cause. So the internet can be a
help to terrorists but terrorizing to
society.
Terrorism and the Internet: Lack of
              Regulation
The lack of regulation is a very important factor in
cyber terrorism, as it allows these people to access
any/all data they need. And if they find themselves
blocked by anything, within moments there is a new
key to open more and more doors. Often within a
company (or a group of data) once you’ve unlocked
the first door the rest are protected less. There are
countries that have little of none internet regulation,
so which laws would you be breaking if the
communication, virus, etc. is sent internationally.
Terrorism and the Internet: Vast
    Audiences (+ their ignorance)
A large percentage of the population of the
world has access to the internet, meaning that
if a virus is placed at a few locations, in no
time it may have spread around the world
infecting loads of computers that may contain
                important data. And worse a
                large majority of the people are
                highly ignorant in IT, meaning
                that they could easily be fooled
                into phishing, spyware, etc.
Terrorism and the Internet: Fast Flow
       of Data & Communication
• The internet is basically known as a
  communication source, that allows individuals
  to talk to each other across the world within
  seconds. Therefore it makes it easier for
  terrorists to plan and execute an operation. By
  this you cannot find a real clan of people
  planning as it is not really necessary, one can
  be even at the scene that they want to cause
  damage.
Terrorism and the Internet: Anonymity
 Anonymity is the important factor in cyber terrorism
 as it is extremely difficult to find these persons as
 with the use of laptops they can change their
 location in a matter of minutes (even seconds) even
 though they have a single IP address. And if they are
 in a remote location to send a squad search they
 might have left the area long before they are
 reached. There are also cyber-coffees that stop you
 from knowing the exact person who used the
 computer at the time the virus (or others) was sent.
IT use: GPS
Rebels or terrorist can have easy access to GPS through
internet or stealing the system, in the use of GPS they
can locate places where they can target them and
define a strategy to attack. Anyone can use signals
from GPS satellites to launch nuclear weapons, which
can be bought or stolen. A terrorist can launch a cruise
type missile and guide it by a commercially available
packaged.
The use of GPS can guide missiles to target destruction
which means that terrorist and rebels have the
advantage of attacking the world without moving from
their hideout which this complicates on their capture
IT use: Encryption
Encryption is a very powerful tool within the
internet, and if most terrorist had the capability
to use the software effectively we would all be in
huge trouble. Encryption acts as an extremely
secure password, which would take a very long
time to decrypt. They could use the encryption
methods to have a totally spy-proof
communication from places far apart. With out
the necessary none-use of keywords that could
possibly alert the anti-terrorist systems. Words
such       as     “Bomb”,        “Osama       Bin
Laden”, “President”, etc.
IT use: Cell Phones

Cell phones are mechanisms used in the modern days
for communication. Communication are linked
between pairs of mobile phones or land line phone,
therefore rebels and terrorism can communicate
between their accomplices from different nation,
which this automatically can cut down the need to
travel from country to country if they are needed to
communicate. Another advantage for the rebels and
terrorist is that nowadays, modern cell phones have
the ability to send and receive pictures and
photographs which rebels and terrorists can use this
method to send pictures to their accomplices and see
who is their target and to who they are attacking.
IT use: Cell Phones
Rebels and terrorists have the ability to surveill people
communication by interfering the phone signals. This can be
very helpful for them because they would know about anything
and future plans from the people. For instance if the rebels and
terrorists decides to interfere with US communication, they
would know what are they planning, where might they attack,
who are they planning to arrest, hearing classified files etc. In
more killing method, rebels and terrorists can use mobile
phones to create a single personal bomb; they can replace the
speaker of the phone with the detonator of the phone, so when
the phones receives the signal of call and send electricity where
the speaker normally is to produce the sound, instead of
producing a sound it would explode affecting its surrounding.
IT use: Google Earth
Google earth is a type of program which shouldn’t be accessed
from the internet for any user. This is because it is based on
satellite photo shooting of the earth structure and country
location. Therefore if rebels and terrorists have easy access to
this program, they would know better about the earth structure
and plan some sort of attack to a specific nation that can cause a
vital damage. Other advantage for the rebels and terrorists is
that they would know the exact location if they are planning on
kidnap someone important, for instance the US president, the
rebels and terrorists would see in what building is he located,
plan some strategies to avoid eye contact from the guards and
polices, see what transportation could be use and what road to
take to go to the building and leave the building.

Contenu connexe

Tendances

Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docxShravani Patil
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime008_Anuj
 
Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not AlonemeJ_madayag
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedMichael Sexton
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftSteph Cliche
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentationmerlyna
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillancecfeutlinske
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }AkshayJha40
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance SocietyKaren Moxley
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayCallum Craigie
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentationaxnv
 

Tendances (20)

Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not Alone
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Dark net
Dark netDark net
Dark net
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Darknet
DarknetDarknet
Darknet
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraft
 
Leveraging mobile & wireless technology for Law and Order
Leveraging mobile & wireless technology for Law and OrderLeveraging mobile & wireless technology for Law and Order
Leveraging mobile & wireless technology for Law and Order
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 

Similaire à Revision Terrorist And Rebel Use Of It (David & Jorge)

Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet ReportAhmed Mater
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?FarjanaMitu3
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Shumail Tariq
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber lawsDr. Prashant Vats
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and securityMuhammad Hamza
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsMaurice Dawson
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTLuckeylama
 
Cybersecurity
CybersecurityCybersecurity
CybersecurityDiegoMtzS
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesMrityunjaySaraswat
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docxRAJU852744
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youSheher Bano
 

Similaire à Revision Terrorist And Rebel Use Of It (David & Jorge) (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
INTERNET
INTERNETINTERNET
INTERNET
 

Plus de itgsabc

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)itgsabc
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)itgsabc
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)itgsabc
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...itgsabc
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)itgsabc
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)itgsabc
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)itgsabc
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)itgsabc
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)itgsabc
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)itgsabc
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)itgsabc
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)itgsabc
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)itgsabc
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)itgsabc
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)itgsabc
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)itgsabc
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)itgsabc
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)itgsabc
 

Plus de itgsabc (20)

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)
 

Dernier

Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationReyMonsales
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerOmarCabrera39
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeAbdulGhani778830
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkbhavenpr
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsnaxymaxyy
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoSABC News
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest2
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victoryanjanibaddipudi1
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012ankitnayak356677
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkbhavenpr
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfauroraaudrey4826
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.NaveedKhaskheli1
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdfGerald Furnkranz
 

Dernier (13)

Opportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and informationOpportunities, challenges, and power of media and information
Opportunities, challenges, and power of media and information
 
Brief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert OppenheimerBrief biography of Julius Robert Oppenheimer
Brief biography of Julius Robert Oppenheimer
 
Rohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for JusticeRohan Jaitley: Central Gov't Standing Counsel for Justice
Rohan Jaitley: Central Gov't Standing Counsel for Justice
 
Manipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpkManipur-Book-Final-2-compressed.pdfsal'rpk
Manipur-Book-Final-2-compressed.pdfsal'rpk
 
Quiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the roundsQuiz for Heritage Indian including all the rounds
Quiz for Heritage Indian including all the rounds
 
Referendum Party 2024 Election Manifesto
Referendum Party 2024 Election ManifestoReferendum Party 2024 Election Manifesto
Referendum Party 2024 Election Manifesto
 
IndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global NewsIndiaWest: Your Trusted Source for Today's Global News
IndiaWest: Your Trusted Source for Today's Global News
 
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep VictoryAP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
AP Election Survey 2024: TDP-Janasena-BJP Alliance Set To Sweep Victory
 
VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012VIP Girls Available Call or WhatsApp 9711199012
VIP Girls Available Call or WhatsApp 9711199012
 
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfkcomplaint-ECI-PM-media-1-Chandru.pdfra;;prfk
complaint-ECI-PM-media-1-Chandru.pdfra;;prfk
 
Top 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdfTop 10 Wealthiest People In The World.pdf
Top 10 Wealthiest People In The World.pdf
 
Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.Global Terrorism and its types and prevention ppt.
Global Terrorism and its types and prevention ppt.
 
57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf57 Bidens Annihilation Nation Policy.pdf
57 Bidens Annihilation Nation Policy.pdf
 

Revision Terrorist And Rebel Use Of It (David & Jorge)

  • 1. Terrorist and Rebel use of IT Jorge Alberto Yang Pai David Vidri
  • 2. IT uses: Internet GPS Encryption Cell phones
  • 3. IT use: The Internet • The internet has opened many doors for a variety of stakeholders, such as: – Students: Education – Scientists: Investigation – Teachers: Teaching, learning – Business: Communication, transaction, cyber market – Terrorists: Ease of access, lack of regulations, vast audiences, fast flow of data & communication, anonymity, etc.
  • 4. Terrorism and the Internet: Ease of access Ease of access is the fact that as large range of people can access an amount of information, even from the most remote location there is. Meaning that terrorists can hack almost anyone’s information/data an steal it or modify it so that it benefits their cause. So the internet can be a help to terrorists but terrorizing to society.
  • 5. Terrorism and the Internet: Lack of Regulation The lack of regulation is a very important factor in cyber terrorism, as it allows these people to access any/all data they need. And if they find themselves blocked by anything, within moments there is a new key to open more and more doors. Often within a company (or a group of data) once you’ve unlocked the first door the rest are protected less. There are countries that have little of none internet regulation, so which laws would you be breaking if the communication, virus, etc. is sent internationally.
  • 6. Terrorism and the Internet: Vast Audiences (+ their ignorance) A large percentage of the population of the world has access to the internet, meaning that if a virus is placed at a few locations, in no time it may have spread around the world infecting loads of computers that may contain important data. And worse a large majority of the people are highly ignorant in IT, meaning that they could easily be fooled into phishing, spyware, etc.
  • 7. Terrorism and the Internet: Fast Flow of Data & Communication • The internet is basically known as a communication source, that allows individuals to talk to each other across the world within seconds. Therefore it makes it easier for terrorists to plan and execute an operation. By this you cannot find a real clan of people planning as it is not really necessary, one can be even at the scene that they want to cause damage.
  • 8. Terrorism and the Internet: Anonymity Anonymity is the important factor in cyber terrorism as it is extremely difficult to find these persons as with the use of laptops they can change their location in a matter of minutes (even seconds) even though they have a single IP address. And if they are in a remote location to send a squad search they might have left the area long before they are reached. There are also cyber-coffees that stop you from knowing the exact person who used the computer at the time the virus (or others) was sent.
  • 9. IT use: GPS Rebels or terrorist can have easy access to GPS through internet or stealing the system, in the use of GPS they can locate places where they can target them and define a strategy to attack. Anyone can use signals from GPS satellites to launch nuclear weapons, which can be bought or stolen. A terrorist can launch a cruise type missile and guide it by a commercially available packaged. The use of GPS can guide missiles to target destruction which means that terrorist and rebels have the advantage of attacking the world without moving from their hideout which this complicates on their capture
  • 10. IT use: Encryption Encryption is a very powerful tool within the internet, and if most terrorist had the capability to use the software effectively we would all be in huge trouble. Encryption acts as an extremely secure password, which would take a very long time to decrypt. They could use the encryption methods to have a totally spy-proof communication from places far apart. With out the necessary none-use of keywords that could possibly alert the anti-terrorist systems. Words such as “Bomb”, “Osama Bin Laden”, “President”, etc.
  • 11. IT use: Cell Phones Cell phones are mechanisms used in the modern days for communication. Communication are linked between pairs of mobile phones or land line phone, therefore rebels and terrorism can communicate between their accomplices from different nation, which this automatically can cut down the need to travel from country to country if they are needed to communicate. Another advantage for the rebels and terrorist is that nowadays, modern cell phones have the ability to send and receive pictures and photographs which rebels and terrorists can use this method to send pictures to their accomplices and see who is their target and to who they are attacking.
  • 12. IT use: Cell Phones Rebels and terrorists have the ability to surveill people communication by interfering the phone signals. This can be very helpful for them because they would know about anything and future plans from the people. For instance if the rebels and terrorists decides to interfere with US communication, they would know what are they planning, where might they attack, who are they planning to arrest, hearing classified files etc. In more killing method, rebels and terrorists can use mobile phones to create a single personal bomb; they can replace the speaker of the phone with the detonator of the phone, so when the phones receives the signal of call and send electricity where the speaker normally is to produce the sound, instead of producing a sound it would explode affecting its surrounding.
  • 13. IT use: Google Earth Google earth is a type of program which shouldn’t be accessed from the internet for any user. This is because it is based on satellite photo shooting of the earth structure and country location. Therefore if rebels and terrorists have easy access to this program, they would know better about the earth structure and plan some sort of attack to a specific nation that can cause a vital damage. Other advantage for the rebels and terrorists is that they would know the exact location if they are planning on kidnap someone important, for instance the US president, the rebels and terrorists would see in what building is he located, plan some strategies to avoid eye contact from the guards and polices, see what transportation could be use and what road to take to go to the building and leave the building.