Terror And Technology

TERRORISM, THE INTERNET
   AND SOCIAL MEDIA-




  THE INTERSECTION OF
TERROR AND TECHNOLOGY
“The video camera has become as important a
tool of insurgency as the rocket launcher”
SHIFT IN TERRORIST OP PHILOSOPHY

 From   Mil campaigns sp by info ops.


 To     Strat comn campaigns sp by guerilla
        and terrorist ops.
“The internet is the ideal medium for terrorism
       today: anonymous but pervasive”.
WHY THE INTERNET IS AN IDEAL TOOL FOR
         TERRORIST ORGANISATIONS

• Enables rapid communications.
    – Ease of access.
    – Lack of regulation.
    – Fast flow of info.
    – Vast potential audiences.
•   Low cost.
•   Ubiquity of the internet.
•   Growth in band width - complex info.
•   Anonymity by encryption - offers a ‘virtual
    sanctuary’.
FACILITIES BEING MADE USE OF BY
             TERRORISTS
• E-Mail.

• Chat rooms and e-groups.

• Forums and blogs.

• Social media networks.

• Online knowledge base.

• Video sharing sites.

• Internet TV and radio.
TECHNOLOGY ENABLERS
• ‘Mash-ups’ and XML in Web 2.0.
• User generated content.
• Going ‘Viral’.
• Social media.
• Video and photo sharing.
• Language translation.
• GPS apps.
• Google Earth.
• Smart-phones.
• Steganography.
DIFFERENT WAYS IN WHICH TERRORISTS
       CAN USE THE INTERNET

• Psychological Warfare.
• Publicity and Propaganda.
• Data Mining.
• Fundraising.
• Recruitment and Training.
• Networking.
• Sharing Information.
• Planning and coordination.
DISSEMINATING HATE


               ONLINE VIDEOS




DVDs AND CDs
VIDEO OF DANIEL PEARL EXECUTION ON
             YOUTUBE
Abu Musab al-Zarqawi used streaming media on Web sites
                 promoting terrorism
A BIZARRE AND FASCINATING SUBCULTURE
• Videos and pictures of smiling suicide bombers.




• Victorious Army Group (Islamist) announced a competition to
  design its new Web page. The winner would get to fire a
  rocket at an American base in Afghanistan!
THE MILITARY IS VULNERABLE TOO
• November 2009 - Nidal Hasan, a serving US Army major, used
  his service rifle to gun down 13 comrades in Fort Hood, Texas.
• Indoctrinated and deeply influenced by

  Anwar al-Awlaki, a fundamentalist spiritual leader.
• He motivated and guided him, helping him overcome any moral
  compunctions to slaughter innocent people.
• This activity took place over the Internet:

   – Awlaki used his blog to broadcast his radical preaching

   – A series of email exchanges pushed Hasan into committing
     this act.
DIFFERENT WAYS IN WHICH TERRORISTS
       CAN USE THE INTERNET

• Psychological Warfare.
• Publicity and Propaganda.
• Data Mining.
• Fundraising.
• Recruitment and Training.
• Networking.
• Sharing Information.
• Planning and coordination.
THE POWER OF VIDEO AND BLOGS

• Videos -    Upload, share, comment in real
                         time.
• Blogs   -   Write, read, comment, link to other
              content.
VIDEO SHARING
    YOU TUBE: WHERE WE ALL VIEW AND SHARE VIDEOS ONLINE




AQSA TUBE: WHERE HAMAS AND OTHER TERROR ORGS SHARE VIDEOS
                         ONLINE




                      Lt Col Sushil Pradhan
VIDEO SHARING – WHEREVER THE
      INTERNET PREVAILS
Terror And Technology
Terror And Technology
AL QAEDA ADVERTISING ON AL JAZEERA




             Lt Col Sushil Pradhan
GLORIFICATION OF SUICIDE BOMBERS ON
            INTERNET TV
VIDEOS AND PICTURES OF TROOPS COMMITING
   ATROCITIES GO VIRAL ON THE INTERNET


                  INFAMOUS APACHE ATTACK
                    ON REPORTERS IN IRAQ




 INAPPROPRIATE
    BEHAVIOUR
  BY US MARINES
 IN AFGHANISTAN
VIRTUAL WORLDS AND VIDEO GAMES


• Video games -   Moulding the psyche.
• MMORPGs     -   Virtual worlds and
                  avatars.
SPECIAL FORCE 1 & 2 – CREATED BY
          HEZBOLLAH
SPECIAL FORCE 1 & 2 – CREATED BY
          HEZBOLLAH
MORE GAMES FOR TERRORISTS


                                     CALL OF DUTY




QUEST FOR BUSH



                 Lt Col Sushil Pradhan
DIFFERENT WAYS IN WHICH TERRORISTS
       CAN USE THE INTERNET

• Psychological Warfare.
• Publicity and Propaganda.
• Data Mining.
• Fundraising.
• Recruitment and Training.
• Networking.
• Sharing Information.
• Planning and coordination.
THE UBIQUITOUS INTERNET KNOWLEDGE BASE
THE UBIQUITOUS INTERNET KNOWLEDGE BASE
DIFFERENT WAYS IN WHICH TERRORISTS
       CAN USE THE INTERNET

• Psychological Warfare.
• Publicity and Propaganda.
• Data Mining.
• Fundraising.
• Recruitment and Training.
• Networking.
• Sharing Information.
• Planning and coordination.
FUND-RAISING

• Donations from religious and ideological
 groups – online transfer of funds.
• Soliciting donations on the Internet.

• Charities and NGOs – online donations.

• Internet fraud and cyber-crime.
FUND-RAISING

• “Cyber-crime     has     now      surpassed
 international drug trafficking as a terrorist
 financing enterprise."


     - US Congressional Research Service Report
DIFFERENT WAYS IN WHICH TERRORISTS
       CAN USE THE INTERNET

• Psychological Warfare.
• Publicity and Propaganda.
• Data Mining.
• Fundraising.
• Recruitment and Training.
• Networking.
• Sharing Information.
• Planning and coordination.
RECRUITING GOES ONLINE - TERRORISTS
   MAKING 'FRIENDS' ON FACEBOOK




             Lt Col Sushil Pradhan
SOLICITING RECRUITS




     Lt Col Sushil Pradhan
WEBSITE OF AL-FATEH, A CHILDREN’S ONLINE MAGAZINE
       BY HAMAS – GLORIFYING ARMED JIHAD
TARGETING TEENAGERS

• One example -a rap song titled
  Dirty Kuffar ("kuffar" being the
  Arabic word for "nonbelievers").
• Downloaded by millions of web
  surfers worldwide.
• Praises Bin Laden, Hamas, and
  Hezbollah.
• Features a masked rapper who
  carries a rifle and a Quran.
CONTENTS OF AL QAEDA TRAINING MANUAL
          AVAILABLE ON THE INTERNET
•   Necessary Qualifications and Characteristics for the Organization's Members
•   Counterfeit Currency and Forged Documents
•   Organization Military Bases, "Apartments Places" - Hiding
•   Means of Communication and Transportation
•   Training
•   Weapons: Measure Related to Buying and Transporting Them
•   Member Safety
•   Security Plan
•   Definition of Special Operations
•   Espionage (1) Information-Gathering Using Open Methods
•   Espionage (2) Information-Gathering Using Covert Methods
•   Secret Writing and Cipher and Codes
•   Kidnapping and Assassinations Using Rifles and Pistols
•   Explosives
•   Assassinations Using Poisons and Cold Steel
•   Torture Methods
•   Prisons and Detention Centers
CONTENTS OF IRA GREEN BOOK AVAILABLE ON
               THE INTERNET
The book contains information on:
• Political philosophy of the IRA.
• Irish history in terms of struggle against the occupation of
  Ireland.
• The military objectives of the organisation.
• The military strategy for guerrilla fighters.
• The military equipment and tools that can be used by Guerrilla
  fighters.
• The military equipment and training for tools available to the
  IRA.
• Propaganda techniques within the theatre of operations.
• Interrogation techniques and how to resist them.
SHARING OF ‘PROFESSIONAL INFORMATION’

• An exchange found on the open, non-coded forum
  belonging to Hamas's military wing, the Izz ad-Din al-
  Qassam Brigades:

"I have a kilogram of acetone. I want to know how to
  make an explosive with it to blow up a military
  jeep."
• Another member promptly provided the instructions.
ONLINE MAOIST TRAINING MANUAL FOUND




             Lt Col Sushil Pradhan
It’s easier for terrorists to organise virtual
training sessions on the internet than to
hold practical classes like this.
DIFFERENT WAYS IN WHICH TERRORISTS
       CAN USE THE INTERNET

• Psychological Warfare.
• Publicity and Propaganda.
• Data Mining.
• Fundraising.
• Recruitment and Training.
• Networking.
• Sharing Information.
• Planning and coordination.
OFFICIAL WEBSITES
OFFICIAL WEBSITES
OFFICIAL WEBSITES
OFFICIAL WEBSITES
OFFICIAL WEBSITES
OFFICIAL WEBSITES
OFFICIAL WEBSITES
CLOSER HOME- OFFICIAL WEBSITES,
 SOCIAL MEDIA PAGES AND BLOGS




            Lt Col Sushil Pradhan
CLOSER HOME- OFFICIAL WEBSITES,
 SOCIAL MEDIA PAGES AND BLOGS




            Lt Col Sushil Pradhan
CLOSER HOME- OFFICIAL WEBSITES,
 SOCIAL MEDIA PAGES AND BLOGS




            Lt Col Sushil Pradhan
CLOSER HOME- OFFICIAL WEBSITES,
 SOCIAL MEDIA PAGES AND BLOGS




            Lt Col Sushil Pradhan
CLOSER HOME- OFFICIAL WEBSITES,
 SOCIAL MEDIA PAGES AND BLOGS




            Lt Col Sushil Pradhan
Terror And Technology
Terror And Technology
Terror And Technology
OFFICIAL FACEBOOK COMMENT

• “Our website tries to strike a very delicate balance
  between giving people the freedom to express
  their opinions and viewpoints; and maintaining a
  safe and trusted environment."
DIFFERENT WAYS IN WHICH TERRORISTS
       CAN USE THE INTERNET

• Psychological Warfare.
• Publicity and Propaganda.
• Data Mining.
• Fundraising.
• Recruitment and Training.
• Networking.
• Sharing Information.
• Planning and coordination.
SHARING OF ‘PROFESSIONAL INFORMATION’
• Instructions for assembling a rocket published on the
  Hamas/Izz al-Din al-Qassam Brigades forum.
SHARING OF ‘PROFESSIONAL INFORMATION’
• Al-Qaeda-Affiliated Media Center publishes online English-
  language Handbook on Making Homemade Explosives.
SHARING OF ‘PROFESSIONAL INFORMATION’
• The Media Center of the Afghan Taliban publishes its monthly
  Arabic-language e-magazine, “al-Samoud,” on its website and
  jihadist forums.
SHARING OF ‘PROFESSIONAL INFORMATION’
• The Islamic Movement of Uzbekistan (IMU) released an album
  of 102 photographs taken at the Military Training Camp of
  Professor Abu Abdullah al-Pakistani on its website.
SHARING OF ‘PROFESSIONAL INFORMATION’
• A video showing four possible “solutions” for women to
  participate in jihad, including the role of suicide bomber and
  wife to a male fighter, posted on the Shumukh al-Islam forum.
SHARING OF ‘PROFESSIONAL INFORMATION’
• "The Lofty Woman" (Al-Shamikha), an online jihadi magazine
  dedicated to Muslim women, offers advice to female jihadists.
SHARING OF ‘PROFESSIONAL INFORMATION’
• The Turkistan Islamic Party (TIP) publishes its Arabic-language
  training e-magazine "Islamic Turkistan”.
SHARING OF ‘PROFESSIONAL INFORMATION’
• Online video tutorial to make a "homemade electronic igniter"
  that terrorists can use in their explosive devices or manufacture
  into an electrocution device.
SHARING OF ‘PROFESSIONAL INFORMATION’
• The Global Islamic Media Front (GIMF) published a 64-page
  English-language security and intelligence manual and released
  the document on online jihadist forums.
SHARING OF ‘PROFESSIONAL INFORMATION’
• Training videos on AqsaTube.
DIFFERENT WAYS IN WHICH TERRORISTS
       CAN USE THE INTERNET

• Psychological Warfare.
• Publicity and Propaganda.
• Data Mining.
• Fundraising.
• Recruitment and Training.
• Networking.
• Sharing Information.
• Planning and coordination.
PLANNING A TERRORIST ATTACK VIA THE
             INTERNET
 • Building target profiles, hacking, exploiting security gaps.

 • Communication via chat rooms, websites, blogs, forums.

 • Encryption via spam, speech compression, steganography.

 • Spread disinformation, threats, recruit, mobilize hackers.

 • Fund-raising, transfer of funds.

 • Training, instructions, familiarisation with eqpt.

 • Avoid geographical risk, use of GPS, maps.

 • Command and control - chat rooms, e-mails.

 • Direct attention from a real attack scenario -dxn.
E-COMMERCE PORTALS MAKE IT EASY TO
PURCHASE DUAL-USE MTRL OFF THE INTERNET




               Lt Col Sushil Pradhan
E-COMMERCE PORTALS MAKE IT EASY TO
PURCHASE DUAL-USE MTRL OFF THE INTERNET




               Lt Col Sushil Pradhan
TERRORIST CYBER ATTACKS

Aim: Publicity.

Manifestation :
  • Loss of integrity.

  • Loss of availability.

  • Loss of confidentiality.

  • Physical destruction.

Feasibility:        Bite the hand that feeds?
et in
                       te rn
                     In
                 the
             on dia?
        ri sm n In
Te   rro      i
TERRORISM ON THE INTERNET IN INDIA

• Poor Internet penetration.

• However, smart-phone dispersion.

• Language barriers.



• However,      beware         of   speed   of
  (dis)information flow and rumours.
“On the Internet people are uploading and

 downloading ideologies. In a few years,

 every citizen of the world will be able to

 compare between his country, his own

   government and the one next door.”

                         Thomas Freidman
TERRORISM, THE INTERNET AND
       SOCIAL MEDIA



            PART 2



     MEETING THE CHALLENGE
MEETING THE CHALLENGE



     CROWD-SOURCING

            OR

INPUTS FROM THE ENVIRONMENT
MEETING THE CHALLENGE
1. Get informed.
2. The Int dilemma – to monitor or control (ESM or
   ECM)?
3. Enact and enforce (??) laws – what about civil
   liberties?
4. Perception management - proactive measures (spin
   doctoring).
5. Monitor terrorist activities - specially trained cyber-
   teams.
6. Involvement of pvt sector – ISPs and hosting sites.
7. Infiltrate extremist virtual communities - indls, govt
   agencies, citizen gps.
8. Back-up measures and strategies.
PLEASE CONTRIBUTE YOUR SUGGESTIONS

 1. Drop them off at my office / home.

 2. Mail me at pradhansushil@gmail.com.

 3. SMS me when your think of something-
    9730005457.
THANK YOU
1 sur 83

Recommandé

The Role Of Technology In Modern Terrorism par
The Role Of Technology In Modern TerrorismThe Role Of Technology In Modern Terrorism
The Role Of Technology In Modern TerrorismPierluigi Paganini
6.3K vues29 diapositives
ISIS and Cyber Terrorism par
ISIS and Cyber TerrorismISIS and Cyber Terrorism
ISIS and Cyber TerrorismLondon School of Cyber Security
2.2K vues24 diapositives
Cyber warfare Threat to Cyber Security by Prashant Mali par
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
1.6K vues21 diapositives
Cyberwarfare par
CyberwarfareCyberwarfare
CyberwarfareSpace Defense Newsletter
647 vues16 diapositives
Cyber warfare ss par
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
1.2K vues14 diapositives
Keep in touch for cyber peace_20150212 par
Keep in touch for cyber peace_20150212Keep in touch for cyber peace_20150212
Keep in touch for cyber peace_20150212Kunihiro Maeda
757 vues27 diapositives

Contenu connexe

Tendances

Cyber Warfare - Jamie Reece Moore par
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece MooreJamie Moore
1.6K vues17 diapositives
Cyberterrorism - Conflict in Cyberspace par
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
1.1K vues57 diapositives
Cyber warfare capabiliites : A Reality Check par
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality CheckRajeev Chauhan
305 vues40 diapositives
Cyber terrorism fact or fiction - 2011 par
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011hassanzadeh20
1.9K vues40 diapositives
Cyber Warfare - par
Cyber Warfare -Cyber Warfare -
Cyber Warfare -ideaflashed
13K vues67 diapositives
Session 3.2 Zahri Hj Yunos par
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosCommonwealth Telecommunications Organisation
1.4K vues34 diapositives

Tendances(20)

Cyber Warfare - Jamie Reece Moore par Jamie Moore
Cyber Warfare - Jamie Reece MooreCyber Warfare - Jamie Reece Moore
Cyber Warfare - Jamie Reece Moore
Jamie Moore1.6K vues
Cyberterrorism - Conflict in Cyberspace par Dr David Probert
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
Dr David Probert1.1K vues
Cyber warfare capabiliites : A Reality Check par Rajeev Chauhan
Cyber warfare capabiliites : A Reality CheckCyber warfare capabiliites : A Reality Check
Cyber warfare capabiliites : A Reality Check
Rajeev Chauhan305 vues
Cyber terrorism fact or fiction - 2011 par hassanzadeh20
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
hassanzadeh201.9K vues
Technical, Legal and Political Issues of Combating Terrorism on the Internet. par Abzetdin Adamov
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Abzetdin Adamov678 vues
Cyber war a threat to indias homeland security 2015 par Ajay Serohi
Cyber war a threat to indias homeland security 2015Cyber war a threat to indias homeland security 2015
Cyber war a threat to indias homeland security 2015
Ajay Serohi2.1K vues
Clt3328fisk par Julesroa
Clt3328fiskClt3328fisk
Clt3328fisk
Julesroa647 vues
Cyberwar and Geopolitics par tnwac
Cyberwar and GeopoliticsCyberwar and Geopolitics
Cyberwar and Geopolitics
tnwac160 vues
ciso-platform-annual-summit-2013-South asia cyber security landscape post sno... par Priyanka Aash
ciso-platform-annual-summit-2013-South asia cyber security landscape post sno...ciso-platform-annual-summit-2013-South asia cyber security landscape post sno...
ciso-platform-annual-summit-2013-South asia cyber security landscape post sno...
Priyanka Aash732 vues
Cyber Terrorism Presentation par merlyna
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
merlyna32.6K vues
Shubhrat.presentationfor cybercrime.ppt par Shubhrat Mishra
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
Shubhrat Mishra274 vues

En vedette

Media & Terrorism par
Media & TerrorismMedia & Terrorism
Media & TerrorismFizza Rizvi
4.8K vues25 diapositives
Social media and terrorism par
Social media and terrorismSocial media and terrorism
Social media and terrorismRobbie Fordyce
2.9K vues37 diapositives
Ppt terrorism par
Ppt terrorismPpt terrorism
Ppt terrorismAbha Gupta
73.7K vues19 diapositives
Capstone_SingleSpaced par
Capstone_SingleSpacedCapstone_SingleSpaced
Capstone_SingleSpacedCameron Banks
254 vues19 diapositives
Australian Foreign Fighter Nexus: OSINT and Social Media Extremism par
Australian Foreign Fighter Nexus: OSINT and Social Media ExtremismAustralian Foreign Fighter Nexus: OSINT and Social Media Extremism
Australian Foreign Fighter Nexus: OSINT and Social Media ExtremismInfo Ops HQ
2.2K vues32 diapositives
Modern Mass Media and International Terrorism par
Modern Mass Media and International TerrorismModern Mass Media and International Terrorism
Modern Mass Media and International TerrorismAgnieszka Stępińska
478 vues11 diapositives

En vedette(11)

Ppt terrorism par Abha Gupta
Ppt terrorismPpt terrorism
Ppt terrorism
Abha Gupta73.7K vues
Australian Foreign Fighter Nexus: OSINT and Social Media Extremism par Info Ops HQ
Australian Foreign Fighter Nexus: OSINT and Social Media ExtremismAustralian Foreign Fighter Nexus: OSINT and Social Media Extremism
Australian Foreign Fighter Nexus: OSINT and Social Media Extremism
Info Ops HQ2.2K vues
Social Strategy & the Landscape of Modern Warfare par Amy Brown
Social Strategy & the Landscape of Modern WarfareSocial Strategy & the Landscape of Modern Warfare
Social Strategy & the Landscape of Modern Warfare
Amy Brown551 vues
GLOBAL WARMING (GOOD PRESENTATION) par elenadimo
GLOBAL WARMING (GOOD PRESENTATION)GLOBAL WARMING (GOOD PRESENTATION)
GLOBAL WARMING (GOOD PRESENTATION)
elenadimo481.6K vues

Similaire à Terror And Technology

#UnitedCVE: Countering Violent Extremism and Counter Narratives par
#UnitedCVE: Countering Violent Extremism and Counter Narratives#UnitedCVE: Countering Violent Extremism and Counter Narratives
#UnitedCVE: Countering Violent Extremism and Counter NarrativesOnnik James Krikorian
785 vues20 diapositives
Crowdmapping & Verification Hanoi Workshop par
Crowdmapping & Verification Hanoi WorkshopCrowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi WorkshopBrian Herbert
1K vues41 diapositives
JRN 450 - Disinformation Introduction par
JRN 450 - Disinformation IntroductionJRN 450 - Disinformation Introduction
JRN 450 - Disinformation IntroductionRich Hanley
199 vues51 diapositives
Zia sadiq-isil par
Zia sadiq-isilZia sadiq-isil
Zia sadiq-isilZia, Cadet College Kohat, Pakistan
1.8K vues32 diapositives
CVE, Civil Society, And The Media par
CVE, Civil Society, And The MediaCVE, Civil Society, And The Media
CVE, Civil Society, And The MediaOnnik James Krikorian
584 vues25 diapositives
Internet threatens states par
Internet threatens statesInternet threatens states
Internet threatens statesWillem Kuypers
122 vues17 diapositives

Similaire à Terror And Technology(20)

#UnitedCVE: Countering Violent Extremism and Counter Narratives par Onnik James Krikorian
#UnitedCVE: Countering Violent Extremism and Counter Narratives#UnitedCVE: Countering Violent Extremism and Counter Narratives
#UnitedCVE: Countering Violent Extremism and Counter Narratives
Crowdmapping & Verification Hanoi Workshop par Brian Herbert
Crowdmapping & Verification Hanoi WorkshopCrowdmapping & Verification Hanoi Workshop
Crowdmapping & Verification Hanoi Workshop
Brian Herbert1K vues
JRN 450 - Disinformation Introduction par Rich Hanley
JRN 450 - Disinformation IntroductionJRN 450 - Disinformation Introduction
JRN 450 - Disinformation Introduction
Rich Hanley199 vues
Isis In Libya - Winning the Propaganda War par movelibyaforward
Isis In Libya - Winning the Propaganda WarIsis In Libya - Winning the Propaganda War
Isis In Libya - Winning the Propaganda War
movelibyaforward570 vues
Radicalisation and Countering Violent Extremism (CVE) in Georgia par Oneworld Multimedia
Radicalisation and Countering Violent Extremism (CVE) in GeorgiaRadicalisation and Countering Violent Extremism (CVE) in Georgia
Radicalisation and Countering Violent Extremism (CVE) in Georgia
Citizen journalism examples par Charis Creber
Citizen journalism examplesCitizen journalism examples
Citizen journalism examples
Charis Creber16.6K vues
Social networking&it’s models par Vishal Raj
Social networking&it’s modelsSocial networking&it’s models
Social networking&it’s models
Vishal Raj387 vues
Dark side of it and cyber crime par Puja Dhakal
Dark side of it and cyber crimeDark side of it and cyber crime
Dark side of it and cyber crime
Puja Dhakal98 vues
SOCIAL MEDIA - BIG BROTHER IS WATCHING YOU par Arshad Sharif
SOCIAL MEDIA - BIG BROTHER IS WATCHING YOUSOCIAL MEDIA - BIG BROTHER IS WATCHING YOU
SOCIAL MEDIA - BIG BROTHER IS WATCHING YOU
Arshad Sharif681 vues
Bjmc i, met, unit-i, defination of media par Rai University
Bjmc i, met, unit-i, defination of mediaBjmc i, met, unit-i, defination of media
Bjmc i, met, unit-i, defination of media
Rai University612 vues
Effective Counters to Terrorism & Violent Extremism par ENODO Global, Inc.
Effective Counters to Terrorism & Violent ExtremismEffective Counters to Terrorism & Violent Extremism
Effective Counters to Terrorism & Violent Extremism
ENODO Global, Inc.1.1K vues

Terror And Technology

  • 1. TERRORISM, THE INTERNET AND SOCIAL MEDIA- THE INTERSECTION OF TERROR AND TECHNOLOGY
  • 2. “The video camera has become as important a tool of insurgency as the rocket launcher”
  • 3. SHIFT IN TERRORIST OP PHILOSOPHY From Mil campaigns sp by info ops. To Strat comn campaigns sp by guerilla and terrorist ops.
  • 4. “The internet is the ideal medium for terrorism today: anonymous but pervasive”.
  • 5. WHY THE INTERNET IS AN IDEAL TOOL FOR TERRORIST ORGANISATIONS • Enables rapid communications. – Ease of access. – Lack of regulation. – Fast flow of info. – Vast potential audiences. • Low cost. • Ubiquity of the internet. • Growth in band width - complex info. • Anonymity by encryption - offers a ‘virtual sanctuary’.
  • 6. FACILITIES BEING MADE USE OF BY TERRORISTS • E-Mail. • Chat rooms and e-groups. • Forums and blogs. • Social media networks. • Online knowledge base. • Video sharing sites. • Internet TV and radio.
  • 7. TECHNOLOGY ENABLERS • ‘Mash-ups’ and XML in Web 2.0. • User generated content. • Going ‘Viral’. • Social media. • Video and photo sharing. • Language translation. • GPS apps. • Google Earth. • Smart-phones. • Steganography.
  • 8. DIFFERENT WAYS IN WHICH TERRORISTS CAN USE THE INTERNET • Psychological Warfare. • Publicity and Propaganda. • Data Mining. • Fundraising. • Recruitment and Training. • Networking. • Sharing Information. • Planning and coordination.
  • 9. DISSEMINATING HATE ONLINE VIDEOS DVDs AND CDs
  • 10. VIDEO OF DANIEL PEARL EXECUTION ON YOUTUBE
  • 11. Abu Musab al-Zarqawi used streaming media on Web sites promoting terrorism
  • 12. A BIZARRE AND FASCINATING SUBCULTURE • Videos and pictures of smiling suicide bombers. • Victorious Army Group (Islamist) announced a competition to design its new Web page. The winner would get to fire a rocket at an American base in Afghanistan!
  • 13. THE MILITARY IS VULNERABLE TOO • November 2009 - Nidal Hasan, a serving US Army major, used his service rifle to gun down 13 comrades in Fort Hood, Texas. • Indoctrinated and deeply influenced by Anwar al-Awlaki, a fundamentalist spiritual leader. • He motivated and guided him, helping him overcome any moral compunctions to slaughter innocent people. • This activity took place over the Internet: – Awlaki used his blog to broadcast his radical preaching – A series of email exchanges pushed Hasan into committing this act.
  • 14. DIFFERENT WAYS IN WHICH TERRORISTS CAN USE THE INTERNET • Psychological Warfare. • Publicity and Propaganda. • Data Mining. • Fundraising. • Recruitment and Training. • Networking. • Sharing Information. • Planning and coordination.
  • 15. THE POWER OF VIDEO AND BLOGS • Videos - Upload, share, comment in real time. • Blogs - Write, read, comment, link to other content.
  • 16. VIDEO SHARING YOU TUBE: WHERE WE ALL VIEW AND SHARE VIDEOS ONLINE AQSA TUBE: WHERE HAMAS AND OTHER TERROR ORGS SHARE VIDEOS ONLINE Lt Col Sushil Pradhan
  • 17. VIDEO SHARING – WHEREVER THE INTERNET PREVAILS
  • 20. AL QAEDA ADVERTISING ON AL JAZEERA Lt Col Sushil Pradhan
  • 21. GLORIFICATION OF SUICIDE BOMBERS ON INTERNET TV
  • 22. VIDEOS AND PICTURES OF TROOPS COMMITING ATROCITIES GO VIRAL ON THE INTERNET INFAMOUS APACHE ATTACK ON REPORTERS IN IRAQ INAPPROPRIATE BEHAVIOUR BY US MARINES IN AFGHANISTAN
  • 23. VIRTUAL WORLDS AND VIDEO GAMES • Video games - Moulding the psyche. • MMORPGs - Virtual worlds and avatars.
  • 24. SPECIAL FORCE 1 & 2 – CREATED BY HEZBOLLAH
  • 25. SPECIAL FORCE 1 & 2 – CREATED BY HEZBOLLAH
  • 26. MORE GAMES FOR TERRORISTS CALL OF DUTY QUEST FOR BUSH Lt Col Sushil Pradhan
  • 27. DIFFERENT WAYS IN WHICH TERRORISTS CAN USE THE INTERNET • Psychological Warfare. • Publicity and Propaganda. • Data Mining. • Fundraising. • Recruitment and Training. • Networking. • Sharing Information. • Planning and coordination.
  • 28. THE UBIQUITOUS INTERNET KNOWLEDGE BASE
  • 29. THE UBIQUITOUS INTERNET KNOWLEDGE BASE
  • 30. DIFFERENT WAYS IN WHICH TERRORISTS CAN USE THE INTERNET • Psychological Warfare. • Publicity and Propaganda. • Data Mining. • Fundraising. • Recruitment and Training. • Networking. • Sharing Information. • Planning and coordination.
  • 31. FUND-RAISING • Donations from religious and ideological groups – online transfer of funds. • Soliciting donations on the Internet. • Charities and NGOs – online donations. • Internet fraud and cyber-crime.
  • 32. FUND-RAISING • “Cyber-crime has now surpassed international drug trafficking as a terrorist financing enterprise." - US Congressional Research Service Report
  • 33. DIFFERENT WAYS IN WHICH TERRORISTS CAN USE THE INTERNET • Psychological Warfare. • Publicity and Propaganda. • Data Mining. • Fundraising. • Recruitment and Training. • Networking. • Sharing Information. • Planning and coordination.
  • 34. RECRUITING GOES ONLINE - TERRORISTS MAKING 'FRIENDS' ON FACEBOOK Lt Col Sushil Pradhan
  • 35. SOLICITING RECRUITS Lt Col Sushil Pradhan
  • 36. WEBSITE OF AL-FATEH, A CHILDREN’S ONLINE MAGAZINE BY HAMAS – GLORIFYING ARMED JIHAD
  • 37. TARGETING TEENAGERS • One example -a rap song titled Dirty Kuffar ("kuffar" being the Arabic word for "nonbelievers"). • Downloaded by millions of web surfers worldwide. • Praises Bin Laden, Hamas, and Hezbollah. • Features a masked rapper who carries a rifle and a Quran.
  • 38. CONTENTS OF AL QAEDA TRAINING MANUAL AVAILABLE ON THE INTERNET • Necessary Qualifications and Characteristics for the Organization's Members • Counterfeit Currency and Forged Documents • Organization Military Bases, "Apartments Places" - Hiding • Means of Communication and Transportation • Training • Weapons: Measure Related to Buying and Transporting Them • Member Safety • Security Plan • Definition of Special Operations • Espionage (1) Information-Gathering Using Open Methods • Espionage (2) Information-Gathering Using Covert Methods • Secret Writing and Cipher and Codes • Kidnapping and Assassinations Using Rifles and Pistols • Explosives • Assassinations Using Poisons and Cold Steel • Torture Methods • Prisons and Detention Centers
  • 39. CONTENTS OF IRA GREEN BOOK AVAILABLE ON THE INTERNET The book contains information on: • Political philosophy of the IRA. • Irish history in terms of struggle against the occupation of Ireland. • The military objectives of the organisation. • The military strategy for guerrilla fighters. • The military equipment and tools that can be used by Guerrilla fighters. • The military equipment and training for tools available to the IRA. • Propaganda techniques within the theatre of operations. • Interrogation techniques and how to resist them.
  • 40. SHARING OF ‘PROFESSIONAL INFORMATION’ • An exchange found on the open, non-coded forum belonging to Hamas's military wing, the Izz ad-Din al- Qassam Brigades: "I have a kilogram of acetone. I want to know how to make an explosive with it to blow up a military jeep." • Another member promptly provided the instructions.
  • 41. ONLINE MAOIST TRAINING MANUAL FOUND Lt Col Sushil Pradhan
  • 42. It’s easier for terrorists to organise virtual training sessions on the internet than to hold practical classes like this.
  • 43. DIFFERENT WAYS IN WHICH TERRORISTS CAN USE THE INTERNET • Psychological Warfare. • Publicity and Propaganda. • Data Mining. • Fundraising. • Recruitment and Training. • Networking. • Sharing Information. • Planning and coordination.
  • 51. CLOSER HOME- OFFICIAL WEBSITES, SOCIAL MEDIA PAGES AND BLOGS Lt Col Sushil Pradhan
  • 52. CLOSER HOME- OFFICIAL WEBSITES, SOCIAL MEDIA PAGES AND BLOGS Lt Col Sushil Pradhan
  • 53. CLOSER HOME- OFFICIAL WEBSITES, SOCIAL MEDIA PAGES AND BLOGS Lt Col Sushil Pradhan
  • 54. CLOSER HOME- OFFICIAL WEBSITES, SOCIAL MEDIA PAGES AND BLOGS Lt Col Sushil Pradhan
  • 55. CLOSER HOME- OFFICIAL WEBSITES, SOCIAL MEDIA PAGES AND BLOGS Lt Col Sushil Pradhan
  • 59. OFFICIAL FACEBOOK COMMENT • “Our website tries to strike a very delicate balance between giving people the freedom to express their opinions and viewpoints; and maintaining a safe and trusted environment."
  • 60. DIFFERENT WAYS IN WHICH TERRORISTS CAN USE THE INTERNET • Psychological Warfare. • Publicity and Propaganda. • Data Mining. • Fundraising. • Recruitment and Training. • Networking. • Sharing Information. • Planning and coordination.
  • 61. SHARING OF ‘PROFESSIONAL INFORMATION’ • Instructions for assembling a rocket published on the Hamas/Izz al-Din al-Qassam Brigades forum.
  • 62. SHARING OF ‘PROFESSIONAL INFORMATION’ • Al-Qaeda-Affiliated Media Center publishes online English- language Handbook on Making Homemade Explosives.
  • 63. SHARING OF ‘PROFESSIONAL INFORMATION’ • The Media Center of the Afghan Taliban publishes its monthly Arabic-language e-magazine, “al-Samoud,” on its website and jihadist forums.
  • 64. SHARING OF ‘PROFESSIONAL INFORMATION’ • The Islamic Movement of Uzbekistan (IMU) released an album of 102 photographs taken at the Military Training Camp of Professor Abu Abdullah al-Pakistani on its website.
  • 65. SHARING OF ‘PROFESSIONAL INFORMATION’ • A video showing four possible “solutions” for women to participate in jihad, including the role of suicide bomber and wife to a male fighter, posted on the Shumukh al-Islam forum.
  • 66. SHARING OF ‘PROFESSIONAL INFORMATION’ • "The Lofty Woman" (Al-Shamikha), an online jihadi magazine dedicated to Muslim women, offers advice to female jihadists.
  • 67. SHARING OF ‘PROFESSIONAL INFORMATION’ • The Turkistan Islamic Party (TIP) publishes its Arabic-language training e-magazine "Islamic Turkistan”.
  • 68. SHARING OF ‘PROFESSIONAL INFORMATION’ • Online video tutorial to make a "homemade electronic igniter" that terrorists can use in their explosive devices or manufacture into an electrocution device.
  • 69. SHARING OF ‘PROFESSIONAL INFORMATION’ • The Global Islamic Media Front (GIMF) published a 64-page English-language security and intelligence manual and released the document on online jihadist forums.
  • 70. SHARING OF ‘PROFESSIONAL INFORMATION’ • Training videos on AqsaTube.
  • 71. DIFFERENT WAYS IN WHICH TERRORISTS CAN USE THE INTERNET • Psychological Warfare. • Publicity and Propaganda. • Data Mining. • Fundraising. • Recruitment and Training. • Networking. • Sharing Information. • Planning and coordination.
  • 72. PLANNING A TERRORIST ATTACK VIA THE INTERNET • Building target profiles, hacking, exploiting security gaps. • Communication via chat rooms, websites, blogs, forums. • Encryption via spam, speech compression, steganography. • Spread disinformation, threats, recruit, mobilize hackers. • Fund-raising, transfer of funds. • Training, instructions, familiarisation with eqpt. • Avoid geographical risk, use of GPS, maps. • Command and control - chat rooms, e-mails. • Direct attention from a real attack scenario -dxn.
  • 73. E-COMMERCE PORTALS MAKE IT EASY TO PURCHASE DUAL-USE MTRL OFF THE INTERNET Lt Col Sushil Pradhan
  • 74. E-COMMERCE PORTALS MAKE IT EASY TO PURCHASE DUAL-USE MTRL OFF THE INTERNET Lt Col Sushil Pradhan
  • 75. TERRORIST CYBER ATTACKS Aim: Publicity. Manifestation : • Loss of integrity. • Loss of availability. • Loss of confidentiality. • Physical destruction. Feasibility: Bite the hand that feeds?
  • 76. et in te rn In the on dia? ri sm n In Te rro i
  • 77. TERRORISM ON THE INTERNET IN INDIA • Poor Internet penetration. • However, smart-phone dispersion. • Language barriers. • However, beware of speed of (dis)information flow and rumours.
  • 78. “On the Internet people are uploading and downloading ideologies. In a few years, every citizen of the world will be able to compare between his country, his own government and the one next door.” Thomas Freidman
  • 79. TERRORISM, THE INTERNET AND SOCIAL MEDIA PART 2 MEETING THE CHALLENGE
  • 80. MEETING THE CHALLENGE CROWD-SOURCING OR INPUTS FROM THE ENVIRONMENT
  • 81. MEETING THE CHALLENGE 1. Get informed. 2. The Int dilemma – to monitor or control (ESM or ECM)? 3. Enact and enforce (??) laws – what about civil liberties? 4. Perception management - proactive measures (spin doctoring). 5. Monitor terrorist activities - specially trained cyber- teams. 6. Involvement of pvt sector – ISPs and hosting sites. 7. Infiltrate extremist virtual communities - indls, govt agencies, citizen gps. 8. Back-up measures and strategies.
  • 82. PLEASE CONTRIBUTE YOUR SUGGESTIONS 1. Drop them off at my office / home. 2. Mail me at pradhansushil@gmail.com. 3. SMS me when your think of something- 9730005457.