SlideShare uma empresa Scribd logo
1 de 13
Terrorist and Rebel use of IT

      Jorge Alberto Yang Pai
            David Vidri
IT uses:
 Internet
    GPS
Encryption
Cell phones
IT use: The Internet
• The internet has opened many doors for a
  variety of stakeholders, such as:
  –   Students: Education
  –   Scientists: Investigation
  –   Teachers: Teaching, learning
  –   Business: Communication, transaction, cyber market
  –   Terrorists: Ease of access, lack of regulations, vast
      audiences, fast flow of data & communication,
      anonymity, etc.
Terrorism and the Internet: Ease of
                 access
Ease of access is the fact that as large
range of people can access an
amount of information, even from
the most remote location there is.
Meaning that terrorists can hack
almost anyone’s information/data an
steal it or modify it so that it benefits
their cause. So the internet can be a
help to terrorists but terrorizing to
society.
Terrorism and the Internet: Lack of
              Regulation
The lack of regulation is a very important factor in
cyber terrorism, as it allows these people to access
any/all data they need. And if they find themselves
blocked by anything, within moments there is a new
key to open more and more doors. Often within a
company (or a group of data) once you’ve unlocked
the first door the rest are protected less. There are
countries that have little of none internet regulation,
so which laws would you be breaking if the
communication, virus, etc. is sent internationally.
Terrorism and the Internet: Vast
    Audiences (+ their ignorance)
A large percentage of the population of the
world has access to the internet, meaning that
if a virus is placed at a few locations, in no
time it may have spread around the world
infecting loads of computers that may contain
                important data. And worse a
                large majority of the people are
                highly ignorant in IT, meaning
                that they could easily be fooled
                into phishing, spyware, etc.
Terrorism and the Internet: Fast Flow
       of Data & Communication
• The internet is basically known as a
  communication source, that allows individuals
  to talk to each other across the world within
  seconds. Therefore it makes it easier for
  terrorists to plan and execute an operation. By
  this you cannot find a real clan of people
  planning as it is not really necessary, one can
  be even at the scene that they want to cause
  damage.
Terrorism and the Internet: Anonymity
 Anonymity is the important factor in cyber terrorism
 as it is extremely difficult to find these persons as
 with the use of laptops they can change their
 location in a matter of minutes (even seconds) even
 though they have a single IP address. And if they are
 in a remote location to send a squad search they
 might have left the area long before they are
 reached. There are also cyber-coffees that stop you
 from knowing the exact person who used the
 computer at the time the virus (or others) was sent.
IT use: GPS
Rebels or terrorist can have easy access to GPS through
internet or stealing the system, in the use of GPS they
can locate places where they can target them and
define a strategy to attack. Anyone can use signals
from GPS satellites to launch nuclear weapons, which
can be bought or stolen. A terrorist can launch a cruise
type missile and guide it by a commercially available
packaged.
The use of GPS can guide missiles to target destruction
which means that terrorist and rebels have the
advantage of attacking the world without moving from
their hideout which this complicates on their capture
IT use: Encryption
Encryption is a very powerful tool within the
internet, and if most terrorist had the capability
to use the software effectively we would all be in
huge trouble. Encryption acts as an extremely
secure password, which would take a very long
time to decrypt. They could use the encryption
methods to have a totally spy-proof
communication from places far apart. With out
the necessary none-use of keywords that could
possibly alert the anti-terrorist systems. Words
such       as     “Bomb”,        “Osama       Bin
Laden”, “President”, etc.
IT use: Cell Phones

Cell phones are mechanisms used in the modern days
for communication. Communication are linked
between pairs of mobile phones or land line phone,
therefore rebels and terrorism can communicate
between their accomplices from different nation,
which this automatically can cut down the need to
travel from country to country if they are needed to
communicate. Another advantage for the rebels and
terrorist is that nowadays, modern cell phones have
the ability to send and receive pictures and
photographs which rebels and terrorists can use this
method to send pictures to their accomplices and see
who is their target and to who they are attacking.
IT use: Cell Phones
Rebels and terrorists have the ability to surveill people
communication by interfering the phone signals. This can be
very helpful for them because they would know about anything
and future plans from the people. For instance if the rebels and
terrorists decides to interfere with US communication, they
would know what are they planning, where might they attack,
who are they planning to arrest, hearing classified files etc. In
more killing method, rebels and terrorists can use mobile
phones to create a single personal bomb; they can replace the
speaker of the phone with the detonator of the phone, so when
the phones receives the signal of call and send electricity where
the speaker normally is to produce the sound, instead of
producing a sound it would explode affecting its surrounding.
IT use: Google Earth
Google earth is a type of program which shouldn’t be accessed
from the internet for any user. This is because it is based on
satellite photo shooting of the earth structure and country
location. Therefore if rebels and terrorists have easy access to
this program, they would know better about the earth structure
and plan some sort of attack to a specific nation that can cause a
vital damage. Other advantage for the rebels and terrorists is
that they would know the exact location if they are planning on
kidnap someone important, for instance the US president, the
rebels and terrorists would see in what building is he located,
plan some strategies to avoid eye contact from the guards and
polices, see what transportation could be use and what road to
take to go to the building and leave the building.

Mais conteúdo relacionado

Mais procurados

Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
Michael Sexton
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraft
Steph Cliche
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
Callum Craigie
 

Mais procurados (20)

Bluetooth Attacks.docx
Bluetooth Attacks.docxBluetooth Attacks.docx
Bluetooth Attacks.docx
 
ppt on child pornography and cyber crime
ppt on child pornography and cyber crimeppt on child pornography and cyber crime
ppt on child pornography and cyber crime
 
Darknet: We Are Not Alone
Darknet: We Are Not AloneDarknet: We Are Not Alone
Darknet: We Are Not Alone
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Dark net
Dark netDark net
Dark net
 
Smartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI DemystifiedSmartphone Encryption and the FBI Demystified
Smartphone Encryption and the FBI Demystified
 
Darknet
DarknetDarknet
Darknet
 
Osint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraftOsint 2ool-kit-on the-go-bag-o-tradecraft
Osint 2ool-kit-on the-go-bag-o-tradecraft
 
Leveraging mobile & wireless technology for Law and Order
Leveraging mobile & wireless technology for Law and OrderLeveraging mobile & wireless technology for Law and Order
Leveraging mobile & wireless technology for Law and Order
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Security Bytes - July 2013
Security Bytes -  July 2013Security Bytes -  July 2013
Security Bytes - July 2013
 
Internet Surveillance
Internet SurveillanceInternet Surveillance
Internet Surveillance
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Osint {open source intelligence }
Osint {open source intelligence }Osint {open source intelligence }
Osint {open source intelligence }
 
Surveillance
SurveillanceSurveillance
Surveillance
 
Surveillance Society
Surveillance SocietySurveillance Society
Surveillance Society
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Final Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research EssayFinal Copy Cyber Crime Research Essay
Final Copy Cyber Crime Research Essay
 
privtechsomeassemb
privtechsomeassembprivtechsomeassemb
privtechsomeassemb
 
Cyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 PresentationCyber Surveillance - Honors English 1 Presentation
Cyber Surveillance - Honors English 1 Presentation
 

Semelhante a Revision Terrorist And Rebel Use Of It (David & Jorge)

What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
FarjanaMitu3
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
RAJU852744
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
Sheher Bano
 

Semelhante a Revision Terrorist And Rebel Use Of It (David & Jorge) (20)

Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Tor project and Darknet Report
Tor project and Darknet ReportTor project and Darknet Report
Tor project and Darknet Report
 
What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?What are cybercrimes? How cybercrime works?
What are cybercrimes? How cybercrime works?
 
Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02Cybercrime 111205224958-phpapp02
Cybercrime 111205224958-phpapp02
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism Essays
Cyberterrorism EssaysCyberterrorism Essays
Cyberterrorism Essays
 
Cyber security and cyber laws
Cyber security and cyber lawsCyber security and cyber laws
Cyber security and cyber laws
 
Cyber crime and security
Cyber crime and securityCyber crime and security
Cyber crime and security
 
Security Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of ThingsSecurity Solutions for Hyperconnectivity and the Internet of Things
Security Solutions for Hyperconnectivity and the Internet of Things
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Ethical, Legal and Social issues IoT
Ethical, Legal and Social issues IoTEthical, Legal and Social issues IoT
Ethical, Legal and Social issues IoT
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Law and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone CrimesLaw and Technology - Mobile Phone Crimes
Law and Technology - Mobile Phone Crimes
 
Cyber Terrorism Essay
Cyber Terrorism EssayCyber Terrorism Essay
Cyber Terrorism Essay
 
Essay Cyber Crime
Essay Cyber CrimeEssay Cyber Crime
Essay Cyber Crime
 
Cyber crime
Cyber crime Cyber crime
Cyber crime
 
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx1Running head CYBERPHOBIA3CYBERPHOBIA.docx
1Running head CYBERPHOBIA3CYBERPHOBIA.docx
 
How the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on youHow the camera on your cellphone can be captured and used to spy on you
How the camera on your cellphone can be captured and used to spy on you
 
INTERNET
INTERNETINTERNET
INTERNET
 

Mais de itgsabc

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
itgsabc
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
itgsabc
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
itgsabc
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)
itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
itgsabc
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
itgsabc
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
itgsabc
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
itgsabc
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
itgsabc
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
itgsabc
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
itgsabc
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
itgsabc
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
itgsabc
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
itgsabc
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
itgsabc
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
itgsabc
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
itgsabc
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
itgsabc
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
itgsabc
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)
itgsabc
 

Mais de itgsabc (20)

Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)Smart Homes (Alberto & Eduardo)
Smart Homes (Alberto & Eduardo)
 
Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)Smart Houses (Alberto & Eduardo)
Smart Houses (Alberto & Eduardo)
 
Revision Data Protection Act ( Eduardo And Salvador)
Revision    Data  Protection  Act ( Eduardo And  Salvador)Revision    Data  Protection  Act ( Eduardo And  Salvador)
Revision Data Protection Act ( Eduardo And Salvador)
 
Revision Viruses ( Gerardo E)
Revision     Viruses ( Gerardo  E)Revision     Viruses ( Gerardo  E)
Revision Viruses ( Gerardo E)
 
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...Revision    Psychological Consequences Of Being In Constant Contact ( Jose,  ...
Revision Psychological Consequences Of Being In Constant Contact ( Jose, ...
 
Portfolio Teleworking ( Javier)
Portfolio    Teleworking ( Javier)Portfolio    Teleworking ( Javier)
Portfolio Teleworking ( Javier)
 
Revision Expert Systems (Claudia, Federico, Natalia)
Revision   Expert Systems (Claudia, Federico, Natalia)Revision   Expert Systems (Claudia, Federico, Natalia)
Revision Expert Systems (Claudia, Federico, Natalia)
 
Portfolio Internet Addiction (Monica And Lorena)
Portfolio   Internet Addiction (Monica And Lorena)Portfolio   Internet Addiction (Monica And Lorena)
Portfolio Internet Addiction (Monica And Lorena)
 
Portfolio Pro Ana Websites (Joanna And Rebecca)
Portfolio   Pro Ana Websites (Joanna And Rebecca)Portfolio   Pro Ana Websites (Joanna And Rebecca)
Portfolio Pro Ana Websites (Joanna And Rebecca)
 
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)Portfolio   Biometric Use In Schools       (Fingerprints) (Jenny)
Portfolio Biometric Use In Schools (Fingerprints) (Jenny)
 
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)Revision   Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
Revision Psychological Consequences Of Being In Constant Contact (Jose, Bobby)
 
Revision Data Protection Act (Eduardo And Salvador)
Revision   Data Protection Act (Eduardo And Salvador)Revision   Data Protection Act (Eduardo And Salvador)
Revision Data Protection Act (Eduardo And Salvador)
 
Revision Viruses (Gerardo E)
Revision    Viruses (Gerardo E)Revision    Viruses (Gerardo E)
Revision Viruses (Gerardo E)
 
Portfolio Should Students Use Wikipedia (David C)
Portfolio   Should Students Use Wikipedia (David C)Portfolio   Should Students Use Wikipedia (David C)
Portfolio Should Students Use Wikipedia (David C)
 
Portfolio Teleworking (Javier)
Portfolio   Teleworking (Javier)Portfolio   Teleworking (Javier)
Portfolio Teleworking (Javier)
 
School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)School Of 2020 (Monica & Mauxi)
School Of 2020 (Monica & Mauxi)
 
School Of 2020 (Willy)
School Of 2020 (Willy)School Of 2020 (Willy)
School Of 2020 (Willy)
 
School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)School Of 2020 (Nicolas & Salvador)
School Of 2020 (Nicolas & Salvador)
 
School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)School Of 2020 (Gerardo E)
School Of 2020 (Gerardo E)
 
School Of 2020 (Jose & David)
School Of 2020 (Jose & David)School Of 2020 (Jose & David)
School Of 2020 (Jose & David)
 

Último

₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
Diya Sharma
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
PsychicRuben LoveSpells
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
hyt3577
 

Último (20)

30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf30042024_First India Newspaper Jaipur.pdf
30042024_First India Newspaper Jaipur.pdf
 
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
₹5.5k {Cash Payment} Independent Greater Noida Call Girls In [Delhi INAYA] 🔝|...
 
Kishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdfKishan Reddy Report To People (2019-24).pdf
Kishan Reddy Report To People (2019-24).pdf
 
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Greater Noida Escorts >༒8448380779 Escort Service
 
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
AI as Research Assistant: Upscaling Content Analysis to Identify Patterns of ...
 
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
Enjoy Night ≽ 8448380779 ≼ Call Girls In Gurgaon Sector 47 (Gurgaon)
 
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost LoverPowerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
Powerful Love Spells in Phoenix, AZ (310) 882-6330 Bring Back Lost Lover
 
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Rajokri Delhi >༒8448380779 Escort Service
 
China's soft power in 21st century .pptx
China's soft power in 21st century   .pptxChina's soft power in 21st century   .pptx
China's soft power in 21st century .pptx
 
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
Defensa de JOH insiste que testimonio de analista de la DEA es falso y solici...
 
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 143 Noida Escorts >༒8448380779 Escort Service
 
05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf05052024_First India Newspaper Jaipur.pdf
05052024_First India Newspaper Jaipur.pdf
 
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover BackVerified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
Verified Love Spells in Little Rock, AR (310) 882-6330 Get My Ex-Lover Back
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
{Qatar{^🚀^(+971558539980**}})Abortion Pills for Sale in Dubai. .abu dhabi, sh...
 
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
Transformative Leadership: N Chandrababu Naidu and TDP's Vision for Innovatio...
 
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Sector 62 Noida Escorts >༒8448380779 Escort Service
 
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreieGujarat-SEBCs.pdf pfpkoopapriorjfperjreie
Gujarat-SEBCs.pdf pfpkoopapriorjfperjreie
 
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdhEmbed-4.pdf lkdiinlajeklhndklheduhuekjdh
Embed-4.pdf lkdiinlajeklhndklheduhuekjdh
 
04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf04052024_First India Newspaper Jaipur.pdf
04052024_First India Newspaper Jaipur.pdf
 

Revision Terrorist And Rebel Use Of It (David & Jorge)

  • 1. Terrorist and Rebel use of IT Jorge Alberto Yang Pai David Vidri
  • 2. IT uses: Internet GPS Encryption Cell phones
  • 3. IT use: The Internet • The internet has opened many doors for a variety of stakeholders, such as: – Students: Education – Scientists: Investigation – Teachers: Teaching, learning – Business: Communication, transaction, cyber market – Terrorists: Ease of access, lack of regulations, vast audiences, fast flow of data & communication, anonymity, etc.
  • 4. Terrorism and the Internet: Ease of access Ease of access is the fact that as large range of people can access an amount of information, even from the most remote location there is. Meaning that terrorists can hack almost anyone’s information/data an steal it or modify it so that it benefits their cause. So the internet can be a help to terrorists but terrorizing to society.
  • 5. Terrorism and the Internet: Lack of Regulation The lack of regulation is a very important factor in cyber terrorism, as it allows these people to access any/all data they need. And if they find themselves blocked by anything, within moments there is a new key to open more and more doors. Often within a company (or a group of data) once you’ve unlocked the first door the rest are protected less. There are countries that have little of none internet regulation, so which laws would you be breaking if the communication, virus, etc. is sent internationally.
  • 6. Terrorism and the Internet: Vast Audiences (+ their ignorance) A large percentage of the population of the world has access to the internet, meaning that if a virus is placed at a few locations, in no time it may have spread around the world infecting loads of computers that may contain important data. And worse a large majority of the people are highly ignorant in IT, meaning that they could easily be fooled into phishing, spyware, etc.
  • 7. Terrorism and the Internet: Fast Flow of Data & Communication • The internet is basically known as a communication source, that allows individuals to talk to each other across the world within seconds. Therefore it makes it easier for terrorists to plan and execute an operation. By this you cannot find a real clan of people planning as it is not really necessary, one can be even at the scene that they want to cause damage.
  • 8. Terrorism and the Internet: Anonymity Anonymity is the important factor in cyber terrorism as it is extremely difficult to find these persons as with the use of laptops they can change their location in a matter of minutes (even seconds) even though they have a single IP address. And if they are in a remote location to send a squad search they might have left the area long before they are reached. There are also cyber-coffees that stop you from knowing the exact person who used the computer at the time the virus (or others) was sent.
  • 9. IT use: GPS Rebels or terrorist can have easy access to GPS through internet or stealing the system, in the use of GPS they can locate places where they can target them and define a strategy to attack. Anyone can use signals from GPS satellites to launch nuclear weapons, which can be bought or stolen. A terrorist can launch a cruise type missile and guide it by a commercially available packaged. The use of GPS can guide missiles to target destruction which means that terrorist and rebels have the advantage of attacking the world without moving from their hideout which this complicates on their capture
  • 10. IT use: Encryption Encryption is a very powerful tool within the internet, and if most terrorist had the capability to use the software effectively we would all be in huge trouble. Encryption acts as an extremely secure password, which would take a very long time to decrypt. They could use the encryption methods to have a totally spy-proof communication from places far apart. With out the necessary none-use of keywords that could possibly alert the anti-terrorist systems. Words such as “Bomb”, “Osama Bin Laden”, “President”, etc.
  • 11. IT use: Cell Phones Cell phones are mechanisms used in the modern days for communication. Communication are linked between pairs of mobile phones or land line phone, therefore rebels and terrorism can communicate between their accomplices from different nation, which this automatically can cut down the need to travel from country to country if they are needed to communicate. Another advantage for the rebels and terrorist is that nowadays, modern cell phones have the ability to send and receive pictures and photographs which rebels and terrorists can use this method to send pictures to their accomplices and see who is their target and to who they are attacking.
  • 12. IT use: Cell Phones Rebels and terrorists have the ability to surveill people communication by interfering the phone signals. This can be very helpful for them because they would know about anything and future plans from the people. For instance if the rebels and terrorists decides to interfere with US communication, they would know what are they planning, where might they attack, who are they planning to arrest, hearing classified files etc. In more killing method, rebels and terrorists can use mobile phones to create a single personal bomb; they can replace the speaker of the phone with the detonator of the phone, so when the phones receives the signal of call and send electricity where the speaker normally is to produce the sound, instead of producing a sound it would explode affecting its surrounding.
  • 13. IT use: Google Earth Google earth is a type of program which shouldn’t be accessed from the internet for any user. This is because it is based on satellite photo shooting of the earth structure and country location. Therefore if rebels and terrorists have easy access to this program, they would know better about the earth structure and plan some sort of attack to a specific nation that can cause a vital damage. Other advantage for the rebels and terrorists is that they would know the exact location if they are planning on kidnap someone important, for instance the US president, the rebels and terrorists would see in what building is he located, plan some strategies to avoid eye contact from the guards and polices, see what transportation could be use and what road to take to go to the building and leave the building.