SlideShare uma empresa Scribd logo
1 de 17
Terrorism!
What  is   Terrorism? Terrorism is using violence against innocent civilians to get what you want *  Many terrorist groups have:  *  political ,  religious  or  environmental  beliefs which they try to force on society  *  Unlike guerilla armies, terrorists do not expect victory by  just  military success. *  They aim to  frighten the public  into changing the way society works .
Facts About Terrorism It is difficult to make statistics about terrorism, but some facts are clearer than others….. ,[object Object],[object Object],[object Object]
How do Terrorists Work? (1) ,[object Object],[object Object],[object Object]
How do Terrorists Work? (2) Organised Terror Making an Impact Direct Terror Death or Destruction? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Who Become Terrorists? (1) Many,(but not all) terrorists are quite well-off, educated people…………….. POLITICS ,[object Object],[object Object]
Who Become Terrorists? (2) RELIGION ,[object Object],[object Object],[object Object],[object Object]
Who Become Terrorists? (3) Eco Terrorism ,[object Object],[object Object],[object Object],[object Object]
Paying for Terrorism * Terrorists need money to buy weapons and to keep operations ‘secret’. * ‘Missions’ cost lots of money (fake passports, safe houses etc.) Some methods used to raise money are : Fake charities Donations and gifts (eg, Osama Bin Laden) Drug smuggling and prostitution DVD pirating Robberies, kidnappings and ransoms
Limits to Terror It is easier to imagine terrorists having access to very destructive weapons - but this is easier said than done... ,[object Object],[object Object],[object Object],[object Object]
Examples of Terrorism (1) 1995 AUM SHINRIKYO ,[object Object],[object Object],[object Object],[object Object],[object Object]
Examples of Terrorism (2) September 11th, 2001 The Twin Towers, New York ,[object Object],[object Object],[object Object],[object Object],[object Object]
Results of September 11th (1) The Invasion of Afghanistan ,[object Object],[object Object],[object Object],[object Object],[object Object]
Results of September 11th (2) The Invasion of Iraq ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Countering Terrorism Terrorism is difficult to fight against.  Terrorists are usually well-armed and are often supported by the community they believe they are fighting for….. However, some methods used are: *  Anti-terrorist  ‘hit’ squads  to find and kill terrorists *  Information-gathering  intelligence  to head off attacks and arrest terrorists *  Increasing security on possible targets  like airports (but often terrorists may switch to easier targets) *   Last resort is to  ‘punish’ community  supporting terrorists if cannot find them
The Future? Many people in poor countries want to resist Western influence - one way is terrorism Some governments are preparing for terrorist attacks on computer networks Many major countries of the world are sharing intelligence and monitoring flows of people and money around the world.
The End

Mais conteúdo relacionado

Mais procurados

International Terrorism
International Terrorism International Terrorism
International Terrorism
Sayantan Sur
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
randima Dulanjani
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global Threat
Faheem Ul Hasan
 
Impact Of Terrorism
Impact Of TerrorismImpact Of Terrorism
Impact Of Terrorism
spclife
 

Mais procurados (20)

Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
International Terrorism
International Terrorism International Terrorism
International Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism- An International Problem
Terrorism- An International ProblemTerrorism- An International Problem
Terrorism- An International Problem
 
Terrorism
TerrorismTerrorism
Terrorism
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
 
Terrorism-Causes and Types
Terrorism-Causes and TypesTerrorism-Causes and Types
Terrorism-Causes and Types
 
Ppt ..terrorism
Ppt ..terrorismPpt ..terrorism
Ppt ..terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism-what,why,where,how
Terrorism-what,why,where,howTerrorism-what,why,where,how
Terrorism-what,why,where,how
 
Terrorism A Global Threat
Terrorism A Global ThreatTerrorism A Global Threat
Terrorism A Global Threat
 
Introduction To Terrorism
Introduction To TerrorismIntroduction To Terrorism
Introduction To Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Impact Of Terrorism
Impact Of TerrorismImpact Of Terrorism
Impact Of Terrorism
 

Destaque

Exercises Financial Accounting - EPS & Investment
Exercises Financial Accounting - EPS & InvestmentExercises Financial Accounting - EPS & Investment
Exercises Financial Accounting - EPS & Investment
Fabiola Kristi
 
Purchase Order Approval Using Approval Management Engine
Purchase Order Approval Using Approval Management EnginePurchase Order Approval Using Approval Management Engine
Purchase Order Approval Using Approval Management Engine
Ah_Ismail
 
Formation of shadows
Formation of shadowsFormation of shadows
Formation of shadows
harila78
 
Exercises Financial Accounting - Leasing
Exercises Financial Accounting - LeasingExercises Financial Accounting - Leasing
Exercises Financial Accounting - Leasing
Fabiola Kristi
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
Dr Paul Norman
 
Terrorism presentation
Terrorism presentationTerrorism presentation
Terrorism presentation
Kamala Imanova
 

Destaque (19)

6651
66516651
6651
 
Anti-Terrorism Laws in Australia
Anti-Terrorism Laws in AustraliaAnti-Terrorism Laws in Australia
Anti-Terrorism Laws in Australia
 
Licao da escola sabatina
Licao da escola sabatinaLicao da escola sabatina
Licao da escola sabatina
 
A sikertelen nyelvvizsga TITKA
A sikertelen nyelvvizsga TITKAA sikertelen nyelvvizsga TITKA
A sikertelen nyelvvizsga TITKA
 
Femap 11.3 Whats New Presentation
Femap 11.3 Whats New PresentationFemap 11.3 Whats New Presentation
Femap 11.3 Whats New Presentation
 
Prezentacija Kursana
Prezentacija KursanaPrezentacija Kursana
Prezentacija Kursana
 
Basidiomycotinaa
BasidiomycotinaaBasidiomycotinaa
Basidiomycotinaa
 
Baloncesto jugadas
Baloncesto jugadasBaloncesto jugadas
Baloncesto jugadas
 
Exercises Financial Accounting - EPS & Investment
Exercises Financial Accounting - EPS & InvestmentExercises Financial Accounting - EPS & Investment
Exercises Financial Accounting - EPS & Investment
 
Purchase Order Approval Using Approval Management Engine
Purchase Order Approval Using Approval Management EnginePurchase Order Approval Using Approval Management Engine
Purchase Order Approval Using Approval Management Engine
 
Terrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorismTerrorism in International Law: The struggle to define terrorism
Terrorism in International Law: The struggle to define terrorism
 
Formation of shadows
Formation of shadowsFormation of shadows
Formation of shadows
 
Escola sabatina lição 11 entristecendo e resistindo ao espírito
Escola sabatina lição 11  entristecendo e resistindo ao espíritoEscola sabatina lição 11  entristecendo e resistindo ao espírito
Escola sabatina lição 11 entristecendo e resistindo ao espírito
 
Unidad 6. historia y tiempo histórico
Unidad 6. historia y tiempo históricoUnidad 6. historia y tiempo histórico
Unidad 6. historia y tiempo histórico
 
Exercises Financial Accounting - Leasing
Exercises Financial Accounting - LeasingExercises Financial Accounting - Leasing
Exercises Financial Accounting - Leasing
 
UK Counter Terrorism Case Study
UK Counter Terrorism Case Study UK Counter Terrorism Case Study
UK Counter Terrorism Case Study
 
Final presentation
Final presentationFinal presentation
Final presentation
 
Terrorism presentation
Terrorism presentationTerrorism presentation
Terrorism presentation
 
Workshop 1 May 11
Workshop 1 May 11Workshop 1 May 11
Workshop 1 May 11
 

Semelhante a Terrorism

Semelhante a Terrorism (8)

0647515
06475150647515
0647515
 
Terrorism 2010
Terrorism 2010Terrorism 2010
Terrorism 2010
 
Essay Terrorism
Essay TerrorismEssay Terrorism
Essay Terrorism
 
Terrorism Essay
Terrorism EssayTerrorism Essay
Terrorism Essay
 
Essay On Terrisom
Essay On TerrisomEssay On Terrisom
Essay On Terrisom
 
Cause Of Terrorism Essay
Cause Of Terrorism EssayCause Of Terrorism Essay
Cause Of Terrorism Essay
 
Today's War on Terror
Today's War on TerrorToday's War on Terror
Today's War on Terror
 
Essays On Terrorism International
Essays On Terrorism InternationalEssays On Terrorism International
Essays On Terrorism International
 

Mais de socialsubjects (20)

effect of gangs
effect of gangseffect of gangs
effect of gangs
 
Gangs 3
Gangs 3Gangs 3
Gangs 3
 
Gangs 2
Gangs 2Gangs 2
Gangs 2
 
Gangs
GangsGangs
Gangs
 
Crime 1
Crime 1Crime 1
Crime 1
 
Pass Modern Studies Higher
Pass Modern Studies HigherPass Modern Studies Higher
Pass Modern Studies Higher
 
DME
DMEDME
DME
 
Health & Wealth
Health & WealthHealth & Wealth
Health & Wealth
 
Health Inequalities
Health InequalitiesHealth Inequalities
Health Inequalities
 
Original aims of the NHS
Original aims of the NHSOriginal aims of the NHS
Original aims of the NHS
 
Health & Social Class
Health & Social ClassHealth & Social Class
Health & Social Class
 
Inequalities - Health Care Provision
Inequalities - Health Care ProvisionInequalities - Health Care Provision
Inequalities - Health Care Provision
 
Inequalities in health - social class
Inequalities in health - social classInequalities in health - social class
Inequalities in health - social class
 
Inequalities in health - lifestyle
Inequalities in health - lifestyleInequalities in health - lifestyle
Inequalities in health - lifestyle
 
Inequalities in health care
Inequalities in health careInequalities in health care
Inequalities in health care
 
Health and wealth
Health and wealthHealth and wealth
Health and wealth
 
Health comparison
Health comparisonHealth comparison
Health comparison
 
voter behaviour
voter behaviourvoter behaviour
voter behaviour
 
Wealth and Health
Wealth and HealthWealth and Health
Wealth and Health
 
Wealth and Health
Wealth and HealthWealth and Health
Wealth and Health
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Último (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Terrorism

  • 2. What is Terrorism? Terrorism is using violence against innocent civilians to get what you want * Many terrorist groups have: * political , religious or environmental beliefs which they try to force on society * Unlike guerilla armies, terrorists do not expect victory by just military success. * They aim to frighten the public into changing the way society works .
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Paying for Terrorism * Terrorists need money to buy weapons and to keep operations ‘secret’. * ‘Missions’ cost lots of money (fake passports, safe houses etc.) Some methods used to raise money are : Fake charities Donations and gifts (eg, Osama Bin Laden) Drug smuggling and prostitution DVD pirating Robberies, kidnappings and ransoms
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15. Countering Terrorism Terrorism is difficult to fight against. Terrorists are usually well-armed and are often supported by the community they believe they are fighting for….. However, some methods used are: * Anti-terrorist ‘hit’ squads to find and kill terrorists * Information-gathering intelligence to head off attacks and arrest terrorists * Increasing security on possible targets like airports (but often terrorists may switch to easier targets) * Last resort is to ‘punish’ community supporting terrorists if cannot find them
  • 16. The Future? Many people in poor countries want to resist Western influence - one way is terrorism Some governments are preparing for terrorist attacks on computer networks Many major countries of the world are sharing intelligence and monitoring flows of people and money around the world.