Your SlideShare is downloading. ×
Presentation 6
Presentation 6
Presentation 6
Presentation 6
Presentation 6
Presentation 6
Presentation 6
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

Presentation 6

137

Published on

Published in: News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
137
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
7
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • \n\n
  • Transcript

    • 1. History of Terrorism• Early forms of terrorism involved assassination and resistance to oppressive rule• Examples being the Zealots of Judea and the assassins located in Northern Iran• Leading examples from the 1st to 14th centuries A.D.• In the 18th century The Reign of Terror was the lead example of terrorism; first use of words terrorist and terrorism
    • 2. History of Terrorism (Continued) • Terrorist groups, for example the Russian Narodnya Volya (Peoples Will) terrorist group, had developed many modern terrorist attitudes • Nationalist terrorist groups spread all over the world in the 1950s • Nations under imperialism often had terrorist groups
    • 3. Methods of terrorism• The form of terrorism that is the best known typically involves bombs and other weaponry• Suicide is typical• Disregard of civilian damage• Goal: to receive media coverage
    • 4. Methods of Terrorism (continued)• Cyberterrorism is a form of terrorism involving computers• Stealing or deleting of information, shutting down of systems, damaging computer function, putting viruses into the system, ect.• Governments are steadily becoming more and more computerized• For example: The pentagon spent over 100 million dollars last year defending from Cyber attacks
    • 5. Methods of terrorism (continued)• Narcoterrorism is a form of terrorism involving drugs• The distinctions between political, non- political, civil unrest, and official or state terrorism• Can be distinguished by methods and goals
    • 6. Osama bin Laden and al-Qaeda• He was born into a wealthy family; inherited millions• In 1979 he joined the Afghani resistance against the Soviet Union• Formed al-Qaeda in 1988• Al Qaeda coordinated multiple bombings of US embassies and 9-11• War in Afghanistan started with goal of destroying al-Qaeda• Osama bin Laden is dead
    • 7. 9-11

    ×