SlideShare a Scribd company logo
Ethical Hacking and
CountermeasuresCountermeasures
Version6
Mod le LXVIIModule LXVII
Identifying the Terrorists
Module Objective
This module will familiarize you with:
• What is Terrorism
This module will familiarize you with:
What is Terrorism
• How People Become Terrorists
• Terrorist Operations
• Terrorist Training
G l d M ti ti f T i t• Goals and Motivations of Terrorists
• Necessary Qualifications And Characteristics to Join Al-Qaida
• Terrorist Incidents
• Terrorist Surveillance Programg
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
What is Terrorism Terrorist Training
Goals and Motivations
f T i
How People Become
T i of TerroristsTerrorists
Terrorist Surveillance
Program
Terrorist Operations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.nytimes.com/
News
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://news.xinhuanet.com
What is Terrorism
According to FBI “The unlawful use of force or violence against personsAccording to FBI The unlawful use of force or violence against persons
or property to intimidate or coerce a government or civilian population,
or any segment thereof, in furtherance of political or social objectives is
terrorism”
The term “international terrorism” refers to the terrorism involving
iti th t it f th tcitizens or the territory of more than one country
The term “terrorist group” refers to any group or a group having
significant subgroups, practicing international terrorism
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Terrorists
A terrorist is a person who practices terrorism
The two basic categories of terrorists are:
I t ti l T i t
• Originate outside the country
• Get support from outside the country as well as within
A k h i ll i hi
International Terrorists:
• Attack other country interests overseas as well as targets within
the country
Domestic Terrorists:
• Originate in the country
• Receive their support solely from individuals and organizations
in the country
o est c e o sts:
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
y
• Commit their crimes in the country
How People Become Terrorists
People try to address their legal issues to the
d f d hgovernment and get frustrated over the
slowness of the system
People feel that their issues are kept aside, or
treated unjustly, or has been ignored
People believe that their cause is important
and take their own actions and become
terroristterrorist
People commit crimes, or go to jail, or die, or
kill f h i
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
kill someone for their cause
Goals and Motivations of
TerroristsTerrorists
To instigate fear among the peopleTo instigate fear among the people
To obtain local, national, or worldwide recognition for their cause
To harass weaken or embarrass government security forcesTo harass, weaken, or embarrass government security forces
To steal or extort money and equipment (weapons and ammunition)
T d t f iliti di t li f i tiTo destroy facilities or disrupt lines of communication
To discourage foreign investments, tourism, or assistance programs
T i fl t d i i l i l ti th iti l d i iTo influence government decisions, legislation, or other critical decisions
To free prisoners
T i f
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
To satisfy vengeance
Terrorist Operations
Communications & Recruiting
• Instant and anonymous email communications
• Websites displaying philosophies
• Shared electronic resources
Disruption of Telecommunications, Utilities, and Transportation
• Computer viruses
• Email bombs (high volume traffic that causes a site to crash)
Information Gathering
• Hacking into private areas
St li fid ti l i f ti• Stealing confidential information
Fraud
• Stealing money to fund worldwide terrorist operations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Stealing money to fund worldwide terrorist operations
• Creation of false identities for operators
Terrorist Training
Extremists around the globe are encouraged to undergo terrorist
training and religious indoctrinationtraining and religious indoctrination
Th t i d i kill h
Personal security
They are trained in skills such as:
• Personal security
• Map-reading and field operations
• Use of firearms and explosives
• Kidnapping and assassinations
• Military strategies
• Espionage and information gathering
• Torture methods
• Communications methods
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Communications methods
Behavior of Terrorists
According to the definitions by FBI and UnitedAccording to the definitions by FBI and United
States Department of Defense, the behavior of
terrorists are categorized as:
• Political: It is committed with an objective to cause a political effect
on the community
• Psychological: Terrorists target the audience a particular• Psychological: Terrorists target the audience, a particular
community, or complete population to induce terror or fear in them
• Coercive: Terrorists adopt violence and destruction to produce their
desired effect
• Deliberate: Terrorists carry a planned and intended activity to• Deliberate: Terrorists carry a planned and intended activity to
achieve their goals
• Dynamic: Terrorist groups want to bring revolution in the country
and take extreme actions to destroy or alter the status of a nation
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Terrorists Weapon: Weapons of
Mass DestructionMass Destruction
Weapons of Mass Destruction (WMD) are used to kill multiple people
it h t lor it can cause heavy property loss
WMD weapons contain powerful bombs and high end automatics
weapons
Hazardous materials are used to prepare WMDa a dous ate a s a e used to p epa e
WMDs use the following:g
• Chemicals
• Biological
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Radiological (bomb wrapped with radioactive waste)
• Nuclear
Potential Terrorist Targets
• Involves targeting and blowing some important personalities
and buildingsPolitical and buildings
• Targeting this section can bring heavy losses to the
governmentEconomic
• These are soft targets without any security and any
pyroterrorist can cause ecological disasterEcological
• Terrorist mainly targets schools and colleges of rich studentsEducational
• These are open and soft targets where rich, wealthy, and
famous peoples are targetedTourist
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• These are hard targets and terrorists face difficulties while
attacking military servicesMilitary
Terrorist Incidents
• Involves killing of selected victims using bombs and arms
Attacks and
i i
• Involves killing of selected victims using bombs and arms
Assassinations
• Involves firebombing against government buildings,
Fire bombings g g g g ,
Universities, hotels, or industrial centersFire bombings
• Terrorists indulge in kidnappings for money or to release
Kid i s Terrorists indulge in kidnappings for money or to release
their prisonersKidnappings
• Terrorists capture any vehicle passengers and their
Hij ki • Terrorists capture any vehicle, passengers, and their
belongings forciblyHijackings
• Terrorists acquire the control of any aircraft and forcibly
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Terrorists acquire the control of any aircraft and forcibly
relocate the aircraft to their placeSkyjackings
Other Terrorist Crimes
Terrorists can perform the following crimes
• Identity Theft – Credit Card Fraud
N ti
Terrorists can perform the following crimes
to fulfill their goals or for financial gain:
• Narcotics
• Robberies
• Retail and Investment Scams
• Charitable Fronts
• Legal Businesses supporting illegal activity (i.e. selling untaxed
cigarettes)
• Money Laundering
• Extortion• Extortion
• Larceny
• Counterfeiting
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Islamic Extremists
Islamic extremists receive support frompp
various people, movements, and countries
Al-Qaida is the famous Islamic extremist
group
Islamic extremists believe that western
influence is spoiling the minds of its people
and taking them away from Islamand taking them away from Islam
Islamic extremists wants to spread Islamic
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
government all over the world
State Sponsored Groups
State Sponsored Groups is one of the major
international source of terrorism
State sponsored terrorism is
used by a country to:
• Take revenge
• Gain economic, social, military, or political
advantageadvantage
• Intimidate and silence its opposition
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Current List of Designated
Foreign Terrorist OrganizationsForeign Terrorist Organizations
Abu Nidal Organization (ANO)
Armed Islamic Group (GIA)p ( )
Basque Fatherland and Liberty (ETA)
Communist Party of the Philippines/New People's Army
(CPP/NPA)
Continuity Irish Republican Army
Harakat ul-Mujahidin (HUM)
Lashkar-e Tayyiba (LT) (Army of the Righteous)
Liberation Tigers of Tamil Eelam (LTTE)
Al-Qaeda
Revolutionary Armed Forces of Colombia (FARC)
Revolutionary Nuclei (formerly ELA)
Revolutionary People’s Liberation Party/Front (DHKP/C)
Shining Path (Sendero Luminoso, SL)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
United Self-Defense Forces of Colombia (AUC)
Source: www.state.gov
Lebanese Forces Party (LPF)
The “Lebanese Forces” was created as a result of excruciating
circumstances in Lebanon in late seventies when the Lebanesecircumstances in Lebanon in late seventies when the Lebanese
Christian community felt the need to defend itself against impending
internal and external dangers and threats
Bashir Gemayel founded the “Lebanese Forces”
Bashir Gemayel created it, organized the cadres and molded it with
his own patriotic spirit, hopes and aspirations
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.lebanese-forces.org/
Screenshot: Lebanese Forces
PartyParty
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Liberation Tigers of Tamil Eelam
(LTTE)(LTTE)
Liberation Tigers of Tamil Eelam (LTTE)
was formed after the failure of many years
of peaceful demonstration by Tamil leadersp y
in order to win their freedom from the
successive Sinhala majority governments
LTTE was founded on May 5, 1976 under
the leadership of Mr Velupillai Pirabakaranthe leadership of Mr. Velupillai Pirabakaran
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.eelamweb.com/
Screenshot: Liberation Tigers of
Tamil EelamTamil Eelam
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Harkat Ul Mujahideen (HUM)
Harkat Ul Mujahideen is a Jihadi organization and their primej g p
object is to provide awareness with regard to Jihad
HUM apprises the orld to differentiate bet een terrorismHUM apprises the world to differentiate between terrorism
and Jihad
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.harkatulmujahideen.org/
Screenshot: Harkat Ul
MujahideenMujahideen
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Jewish Defense League (JDL)
The Jewish Defense League founded in 1968 by
Rabbi Meir Kahane
JDL is a militant Jewish organization whose
stated goal is to protect Jews from antisemitismstated goal is to protect Jews from antisemitism
FBI referred JDL as a “violent extremist JewishFBI referred JDL as a violent extremist Jewish
organization” and stated that the FBI was
responsible for thwarting at least one of its
terrorist acts
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.jdl.org/
Screenshot: Jewish Defense
LeagueLeague
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Necessary Qualifications and
Characteristics to Join Terrorist Groupp
Commitment to the organization’s ideology
MaturityMaturity
Keeping secrets and concealing information
Listening and obedience
Sacrifice
Patience
Free of Illness
Tranquility and unflappability
Truthfulness and counsel
I lli d i i hIntelligence and insight
Caution and prudence
Ability to observe and analyze
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Ability to act, change positions, and conceal oneself
Attacks Associated with Al-Qaida
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Source: http://www.number-10.gov.uk
Attacks Associated with Al-Qaida
(cont’d)(cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Attacks Associated with Al-Qaida
(cont’d)(cont d)
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
How to Identify the Terrorist
Identifying a terrorist involves a series
of suspicious incidents such as:
• Unusual enquiry for information
• Strange activities
F k id ifi i• Fake identification
• Numerous visitors
• Avoiding community contact
• Large/unusual/high risk deliveries
• Unusual purchases or thefts
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Unusual Enquiry for Information
U l i f i f tiUnusual enquiry for information can
be a caveat of a terrorist activity:
• It can be a phone call enquiring about the security system
• It can be a phone call asking about the behavior of any officer
• It can be a mail asking for comments on the response time• It can be a mail asking for comments on the response time
and behavior of emergency personnel
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Strange Activities
T i b id ifi d bTerrorists can be identified by some
strange activities, such as:
• Trying to act strangely and suspiciously
• Trying to avoid direct eye contact
T i i kl h h d• Trying to move quickly when seen or approached
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Fake Identification
Most of the terrorists use the fake identityMost of the terrorists use the fake identity
People make fake identity cards to stay in a country other than their
own country
Fake identity includes:
• Social security card
Fake identity includes:
• Social security card
• Driving license
• Passport
• Birth certificate
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Numerous Visitors
Terrorists often come in group to meet their counterparts
They can be identified by their
suspicious behavior such as:
• Arriving and departing at unusual hours
• avoiding from getting noticed
• Acting in a suspicious manner• Acting in a suspicious manner
• Parking their vehicles at an unusual distance from the
meeting
• Unusual number of unrelated people staying together
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Avoiding Community Contact
Terrorists intent doing illegal
things and try to avoid
community contact and may:
• Change the locks often
y y
• Change the locks often
• Never allow maid service in a hotel
room
• Take hotel room service outside theTake hotel room service outside the
door
• Accepts deliveries at the hotel’s front
desk
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Large/Unusual/High Risk
DeliveriesDeliveries
T i t ft i d li i t tTerrorists may often receive deliveries to carry out
attacks
People should be aware of a vehicle with
hazardous material
Terrorists may receive unusual deliveries of
chemicals
Terrorists may carry unattended bags or boxes in a
public access place
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
public access place
Unusual Purchases or Thefts
Terrorists need some medium to carry out their attacksTerrorists need some medium to carry out their attacks
and goals
People need to pay attention
to purchase, rent, or steal:
• Police, security, public utility, mail carrier,
or airline uniforms and equipmentor airline uniforms and equipment
• Explosives
• Weapons and ammunition
T i h i l
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
• Toxic chemicals
Terrorist Surveillance Program
in U Sin U.S.
Terrorist surveillance program detects terrorist attacks andp g
prevents the American people from these attacks
i i l h ll d il (i d ) fIt targets international phone calls and emails(in and out) of
the United States
It is an effective tool in the war against terrorism
This program mainly targets and focuses on key tactics of Al-
Qaeda
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Q
Terrorist Surveillance Indicators
According to “The United States Departmentg p
of Homeland Security”, following are the
indicators of potential terrorist activity:
• Fixed surveillance: Also termed as static, terrorists
select any public place to establish themselves
• Mobile surveillance: Terrorists observe and follow• Mobile surveillance: Terrorists observe and follow
persons or individual human targets
• Progressive surveillance: Terrorists observe a target
for a certain time from one position, withdraws for a timefor a certain time from one position, withdraws for a time
and then resumes surveillance from another position,
and continues until the target is suitability determined
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Summary
The term “international terrorism” refers to terrorism involving
i i h i f hcitizens or the territory of more than one country
Islamic Extremists believe that, the western influence is spoiling the, p g
minds of its people and taking them away from Islam, the right path
Extremists from around the globe are encouraged to undergo terroristg b g g
training and religious indoctrination
Terrorist Surveillance Program detects terrorist attacks and preventsTerrorist Surveillance Program detects terrorist attacks and prevents
the American people from these attacks
Weapons of Mass Destruction (WMD) can kill multiple people or
EC-Council
Copyright © by EC-Council
All Rights Reserved. Reproduction is Strictly Prohibited
Weapons of Mass Destruction (WMD) can kill multiple people or
cause heavy property loss when used

More Related Content

What's hot

Manual SC Topico_A
Manual SC Topico_AManual SC Topico_A
Manual SC Topico_APREFEMUN
 
The Players and the Playing Field: Anarchy, States, and Non-State Actors
The Players and the Playing Field: Anarchy, States, and Non-State ActorsThe Players and the Playing Field: Anarchy, States, and Non-State Actors
The Players and the Playing Field: Anarchy, States, and Non-State Actors
kkrassan
 
Protective Intelligence Assessment Presentation
Protective Intelligence Assessment PresentationProtective Intelligence Assessment Presentation
Protective Intelligence Assessment PresentationPatrick Thomas Cannon
 
Individual protection vs national security
Individual protection vs  national securityIndividual protection vs  national security
Individual protection vs national security
Bangladesh University of Professionals
 
Libya: Opportunities and Risks for UK Defence, Security and Dual Use Exporters
Libya: Opportunities and Risks for UK Defence, Security and Dual Use ExportersLibya: Opportunities and Risks for UK Defence, Security and Dual Use Exporters
Libya: Opportunities and Risks for UK Defence, Security and Dual Use Exporters
Green Light Exports Consulting Ltd
 
World politics -UN
World politics -UNWorld politics -UN
World politics -UN
Nguyễn Trọng Tấn
 
Managing Peace And Security
Managing Peace And SecurityManaging Peace And Security
Managing Peace And Securitys1981dr
 
Geneva Acadamy - 7th Multi-Stakeholder Forum on Responsible Mineral Supply Ch...
Geneva Acadamy - 7th Multi-Stakeholder Forum on Responsible Mineral Supply Ch...Geneva Acadamy - 7th Multi-Stakeholder Forum on Responsible Mineral Supply Ch...
Geneva Acadamy - 7th Multi-Stakeholder Forum on Responsible Mineral Supply Ch...
OECD Directorate for Financial and Enterprise Affairs
 

What's hot (10)

Manual SC Topico_A
Manual SC Topico_AManual SC Topico_A
Manual SC Topico_A
 
The Players and the Playing Field: Anarchy, States, and Non-State Actors
The Players and the Playing Field: Anarchy, States, and Non-State ActorsThe Players and the Playing Field: Anarchy, States, and Non-State Actors
The Players and the Playing Field: Anarchy, States, and Non-State Actors
 
Protective Intelligence Assessment Presentation
Protective Intelligence Assessment PresentationProtective Intelligence Assessment Presentation
Protective Intelligence Assessment Presentation
 
Individual protection vs national security
Individual protection vs  national securityIndividual protection vs  national security
Individual protection vs national security
 
Libya: Opportunities and Risks for UK Defence, Security and Dual Use Exporters
Libya: Opportunities and Risks for UK Defence, Security and Dual Use ExportersLibya: Opportunities and Risks for UK Defence, Security and Dual Use Exporters
Libya: Opportunities and Risks for UK Defence, Security and Dual Use Exporters
 
World politics -UN
World politics -UNWorld politics -UN
World politics -UN
 
Managing Peace And Security
Managing Peace And SecurityManaging Peace And Security
Managing Peace And Security
 
Categories of Indian Security Services
Categories of Indian Security ServicesCategories of Indian Security Services
Categories of Indian Security Services
 
Sharia
Sharia Sharia
Sharia
 
Geneva Acadamy - 7th Multi-Stakeholder Forum on Responsible Mineral Supply Ch...
Geneva Acadamy - 7th Multi-Stakeholder Forum on Responsible Mineral Supply Ch...Geneva Acadamy - 7th Multi-Stakeholder Forum on Responsible Mineral Supply Ch...
Geneva Acadamy - 7th Multi-Stakeholder Forum on Responsible Mineral Supply Ch...
 

Similar to Ce hv6 module 67 identifying the terrorists

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Vi Tính Hoàng Nam
 
Terrorism investigation
Terrorism investigationTerrorism investigation
Terrorism investigation
rosikinemo
 
Transnational organized crime
Transnational organized crimeTransnational organized crime
Transnational organized crimeAndrew Novak
 
Defence Of Thesis Script
Defence Of Thesis ScriptDefence Of Thesis Script
Defence Of Thesis Script
mohandezoysa
 
Terrorism
TerrorismTerrorism
Terrorism
Vishal Agarwal
 
introduction to international politics... terrorism
introduction to international politics... terrorismintroduction to international politics... terrorism
introduction to international politics... terrorism
AbdulAzeez938159
 
The threat of terrorism
The threat of terrorismThe threat of terrorism
The threat of terrorismCate Ramos
 
Terrorism
TerrorismTerrorism
Terrorism
Jashan Kainth
 
White7e ppt ch03
White7e ppt ch03White7e ppt ch03
White7e ppt ch03difordham
 
Global terrorism
Global terrorismGlobal terrorism
Global terrorism
saundriya
 
Terrorism
TerrorismTerrorism
weapon of mass destruction
weapon of mass destructionweapon of mass destruction
weapon of mass destruction
Mohd Zulhairi Mohd Noor
 
Overview of preventing and countering violent extremism
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremism
Richard Ali
 
Equality, Diversity, and Inclusion in Apprenticeships 2017
Equality, Diversity, and Inclusion in Apprenticeships 2017Equality, Diversity, and Inclusion in Apprenticeships 2017
Equality, Diversity, and Inclusion in Apprenticeships 2017
The Pathway Group
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
Srun Sakada
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issuerandima Dulanjani
 
Impact Of Terrorism
Impact Of TerrorismImpact Of Terrorism
Impact Of Terrorismspclife
 
An Introduction to Terrorism, by Professor Joel hayward
An Introduction to Terrorism, by Professor Joel haywardAn Introduction to Terrorism, by Professor Joel hayward
An Introduction to Terrorism, by Professor Joel hayward
Professor Joel Hayward
 

Similar to Ce hv6 module 67 identifying the terrorists (20)

Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare  hacking al-qaida and terrorismCe hv6 module 43 cyber warfare  hacking al-qaida and terrorism
Ce hv6 module 43 cyber warfare hacking al-qaida and terrorism
 
Terrorism..
Terrorism..Terrorism..
Terrorism..
 
Terrorism investigation
Terrorism investigationTerrorism investigation
Terrorism investigation
 
Transnational organized crime
Transnational organized crimeTransnational organized crime
Transnational organized crime
 
Defence Of Thesis Script
Defence Of Thesis ScriptDefence Of Thesis Script
Defence Of Thesis Script
 
Terrorism
TerrorismTerrorism
Terrorism
 
introduction to international politics... terrorism
introduction to international politics... terrorismintroduction to international politics... terrorism
introduction to international politics... terrorism
 
The threat of terrorism
The threat of terrorismThe threat of terrorism
The threat of terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
White7e ppt ch03
White7e ppt ch03White7e ppt ch03
White7e ppt ch03
 
Global terrorism
Global terrorismGlobal terrorism
Global terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
weapon of mass destruction
weapon of mass destructionweapon of mass destruction
weapon of mass destruction
 
Overview of preventing and countering violent extremism
Overview of preventing and countering violent extremismOverview of preventing and countering violent extremism
Overview of preventing and countering violent extremism
 
Equality, Diversity, and Inclusion in Apprenticeships 2017
Equality, Diversity, and Inclusion in Apprenticeships 2017Equality, Diversity, and Inclusion in Apprenticeships 2017
Equality, Diversity, and Inclusion in Apprenticeships 2017
 
Terrorism causes, effects, and solutions
Terrorism causes, effects, and solutionsTerrorism causes, effects, and solutions
Terrorism causes, effects, and solutions
 
International Terrorism As a World Political Issue
International Terrorism As a World Political IssueInternational Terrorism As a World Political Issue
International Terrorism As a World Political Issue
 
Impact Of Terrorism
Impact Of TerrorismImpact Of Terrorism
Impact Of Terrorism
 
An Introduction to Terrorism, by Professor Joel hayward
An Introduction to Terrorism, by Professor Joel haywardAn Introduction to Terrorism, by Professor Joel hayward
An Introduction to Terrorism, by Professor Joel hayward
 
Chapter14
Chapter14Chapter14
Chapter14
 

More from Vi Tính Hoàng Nam

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
Vi Tính Hoàng Nam
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
Vi Tính Hoàng Nam
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
Vi Tính Hoàng Nam
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
Vi Tính Hoàng Nam
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
Vi Tính Hoàng Nam
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
Vi Tính Hoàng Nam
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
Vi Tính Hoàng Nam
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
Vi Tính Hoàng Nam
 
Qtx 6404
Qtx 6404Qtx 6404
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
Vi Tính Hoàng Nam
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
Vi Tính Hoàng Nam
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
Vi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
Vi Tính Hoàng Nam
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
Vi Tính Hoàng Nam
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
Vi Tính Hoàng Nam
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
Vi Tính Hoàng Nam
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
Vi Tính Hoàng Nam
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
Vi Tính Hoàng Nam
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
Vi Tính Hoàng Nam
 

More from Vi Tính Hoàng Nam (20)

CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)CATALOGUE QUESTEK (Tiếng Việt)
CATALOGUE QUESTEK (Tiếng Việt)
 
CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)CATALOG KBVISION (Tiếng Việt)
CATALOG KBVISION (Tiếng Việt)
 
Catalogue 2015
Catalogue 2015Catalogue 2015
Catalogue 2015
 
Tl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vnTl wr740 n-v4_user_guide_1910010682_vn
Tl wr740 n-v4_user_guide_1910010682_vn
 
CATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁTCATALOGUE CAMERA GIÁM SÁT
CATALOGUE CAMERA GIÁM SÁT
 
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
HƯỚNG DẪN SỬ DỤNG ĐẦU GHI QTD-6108
 
Các loại cáp mạng
Các loại cáp mạngCác loại cáp mạng
Các loại cáp mạng
 
Catalogue 10-2014-new
Catalogue 10-2014-newCatalogue 10-2014-new
Catalogue 10-2014-new
 
Qtx 6404
Qtx 6404Qtx 6404
Qtx 6404
 
Camera QTX-1210
Camera QTX-1210Camera QTX-1210
Camera QTX-1210
 
Brochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 SeriesBrochua đầu ghi hình QTD-6100 Series
Brochua đầu ghi hình QTD-6100 Series
 
NSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báoNSRT: Dụng cụ tháo đầu báo
NSRT: Dụng cụ tháo đầu báo
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
SLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quangSLV-24N: Đầu báo khói quang
SLV-24N: Đầu báo khói quang
 
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQPEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
PEX-xx: Bộ hiển thị phụ 5-210 zone cho tủ RPP, RPS, RPQ
 
HRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008EHRA-1000: Hiển thị phụ cho TT HCP-1008E
HRA-1000: Hiển thị phụ cho TT HCP-1008E
 
RPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênhRPP-ABW: TT báo cháy 10-20 kênh
RPP-ABW: TT báo cháy 10-20 kênh
 
RPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênhRPP-ECW: TT báo cháy 3-5 kênh
RPP-ECW: TT báo cháy 3-5 kênh
 
HCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênhHCP-1008E: TT báo cháy 8-24 kênh
HCP-1008E: TT báo cháy 8-24 kênh
 
HCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênhHCV-2/4/8: TT báo cháy 2,4,8 kênh
HCV-2/4/8: TT báo cháy 2,4,8 kênh
 

Recently uploaded

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
Jen Stirrup
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 

Recently uploaded (20)

GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...The Metaverse and AI: how can decision-makers harness the Metaverse for their...
The Metaverse and AI: how can decision-makers harness the Metaverse for their...
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 

Ce hv6 module 67 identifying the terrorists

  • 1. Ethical Hacking and CountermeasuresCountermeasures Version6 Mod le LXVIIModule LXVII Identifying the Terrorists
  • 2. Module Objective This module will familiarize you with: • What is Terrorism This module will familiarize you with: What is Terrorism • How People Become Terrorists • Terrorist Operations • Terrorist Training G l d M ti ti f T i t• Goals and Motivations of Terrorists • Necessary Qualifications And Characteristics to Join Al-Qaida • Terrorist Incidents • Terrorist Surveillance Programg EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 3. Module Flow What is Terrorism Terrorist Training Goals and Motivations f T i How People Become T i of TerroristsTerrorists Terrorist Surveillance Program Terrorist Operations EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 4. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.nytimes.com/
  • 5. News EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://news.xinhuanet.com
  • 6. What is Terrorism According to FBI “The unlawful use of force or violence against personsAccording to FBI The unlawful use of force or violence against persons or property to intimidate or coerce a government or civilian population, or any segment thereof, in furtherance of political or social objectives is terrorism” The term “international terrorism” refers to the terrorism involving iti th t it f th tcitizens or the territory of more than one country The term “terrorist group” refers to any group or a group having significant subgroups, practicing international terrorism EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 7. Terrorists A terrorist is a person who practices terrorism The two basic categories of terrorists are: I t ti l T i t • Originate outside the country • Get support from outside the country as well as within A k h i ll i hi International Terrorists: • Attack other country interests overseas as well as targets within the country Domestic Terrorists: • Originate in the country • Receive their support solely from individuals and organizations in the country o est c e o sts: EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited y • Commit their crimes in the country
  • 8. How People Become Terrorists People try to address their legal issues to the d f d hgovernment and get frustrated over the slowness of the system People feel that their issues are kept aside, or treated unjustly, or has been ignored People believe that their cause is important and take their own actions and become terroristterrorist People commit crimes, or go to jail, or die, or kill f h i EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited kill someone for their cause
  • 9. Goals and Motivations of TerroristsTerrorists To instigate fear among the peopleTo instigate fear among the people To obtain local, national, or worldwide recognition for their cause To harass weaken or embarrass government security forcesTo harass, weaken, or embarrass government security forces To steal or extort money and equipment (weapons and ammunition) T d t f iliti di t li f i tiTo destroy facilities or disrupt lines of communication To discourage foreign investments, tourism, or assistance programs T i fl t d i i l i l ti th iti l d i iTo influence government decisions, legislation, or other critical decisions To free prisoners T i f EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited To satisfy vengeance
  • 10. Terrorist Operations Communications & Recruiting • Instant and anonymous email communications • Websites displaying philosophies • Shared electronic resources Disruption of Telecommunications, Utilities, and Transportation • Computer viruses • Email bombs (high volume traffic that causes a site to crash) Information Gathering • Hacking into private areas St li fid ti l i f ti• Stealing confidential information Fraud • Stealing money to fund worldwide terrorist operations EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Stealing money to fund worldwide terrorist operations • Creation of false identities for operators
  • 11. Terrorist Training Extremists around the globe are encouraged to undergo terrorist training and religious indoctrinationtraining and religious indoctrination Th t i d i kill h Personal security They are trained in skills such as: • Personal security • Map-reading and field operations • Use of firearms and explosives • Kidnapping and assassinations • Military strategies • Espionage and information gathering • Torture methods • Communications methods EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Communications methods
  • 12. Behavior of Terrorists According to the definitions by FBI and UnitedAccording to the definitions by FBI and United States Department of Defense, the behavior of terrorists are categorized as: • Political: It is committed with an objective to cause a political effect on the community • Psychological: Terrorists target the audience a particular• Psychological: Terrorists target the audience, a particular community, or complete population to induce terror or fear in them • Coercive: Terrorists adopt violence and destruction to produce their desired effect • Deliberate: Terrorists carry a planned and intended activity to• Deliberate: Terrorists carry a planned and intended activity to achieve their goals • Dynamic: Terrorist groups want to bring revolution in the country and take extreme actions to destroy or alter the status of a nation EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 13. Terrorists Weapon: Weapons of Mass DestructionMass Destruction Weapons of Mass Destruction (WMD) are used to kill multiple people it h t lor it can cause heavy property loss WMD weapons contain powerful bombs and high end automatics weapons Hazardous materials are used to prepare WMDa a dous ate a s a e used to p epa e WMDs use the following:g • Chemicals • Biological EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Radiological (bomb wrapped with radioactive waste) • Nuclear
  • 14. Potential Terrorist Targets • Involves targeting and blowing some important personalities and buildingsPolitical and buildings • Targeting this section can bring heavy losses to the governmentEconomic • These are soft targets without any security and any pyroterrorist can cause ecological disasterEcological • Terrorist mainly targets schools and colleges of rich studentsEducational • These are open and soft targets where rich, wealthy, and famous peoples are targetedTourist EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • These are hard targets and terrorists face difficulties while attacking military servicesMilitary
  • 15. Terrorist Incidents • Involves killing of selected victims using bombs and arms Attacks and i i • Involves killing of selected victims using bombs and arms Assassinations • Involves firebombing against government buildings, Fire bombings g g g g , Universities, hotels, or industrial centersFire bombings • Terrorists indulge in kidnappings for money or to release Kid i s Terrorists indulge in kidnappings for money or to release their prisonersKidnappings • Terrorists capture any vehicle passengers and their Hij ki • Terrorists capture any vehicle, passengers, and their belongings forciblyHijackings • Terrorists acquire the control of any aircraft and forcibly EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Terrorists acquire the control of any aircraft and forcibly relocate the aircraft to their placeSkyjackings
  • 16. Other Terrorist Crimes Terrorists can perform the following crimes • Identity Theft – Credit Card Fraud N ti Terrorists can perform the following crimes to fulfill their goals or for financial gain: • Narcotics • Robberies • Retail and Investment Scams • Charitable Fronts • Legal Businesses supporting illegal activity (i.e. selling untaxed cigarettes) • Money Laundering • Extortion• Extortion • Larceny • Counterfeiting EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 17. Islamic Extremists Islamic extremists receive support frompp various people, movements, and countries Al-Qaida is the famous Islamic extremist group Islamic extremists believe that western influence is spoiling the minds of its people and taking them away from Islamand taking them away from Islam Islamic extremists wants to spread Islamic EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited government all over the world
  • 18. State Sponsored Groups State Sponsored Groups is one of the major international source of terrorism State sponsored terrorism is used by a country to: • Take revenge • Gain economic, social, military, or political advantageadvantage • Intimidate and silence its opposition EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 19. Current List of Designated Foreign Terrorist OrganizationsForeign Terrorist Organizations Abu Nidal Organization (ANO) Armed Islamic Group (GIA)p ( ) Basque Fatherland and Liberty (ETA) Communist Party of the Philippines/New People's Army (CPP/NPA) Continuity Irish Republican Army Harakat ul-Mujahidin (HUM) Lashkar-e Tayyiba (LT) (Army of the Righteous) Liberation Tigers of Tamil Eelam (LTTE) Al-Qaeda Revolutionary Armed Forces of Colombia (FARC) Revolutionary Nuclei (formerly ELA) Revolutionary People’s Liberation Party/Front (DHKP/C) Shining Path (Sendero Luminoso, SL) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited United Self-Defense Forces of Colombia (AUC) Source: www.state.gov
  • 20. Lebanese Forces Party (LPF) The “Lebanese Forces” was created as a result of excruciating circumstances in Lebanon in late seventies when the Lebanesecircumstances in Lebanon in late seventies when the Lebanese Christian community felt the need to defend itself against impending internal and external dangers and threats Bashir Gemayel founded the “Lebanese Forces” Bashir Gemayel created it, organized the cadres and molded it with his own patriotic spirit, hopes and aspirations EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.lebanese-forces.org/
  • 21. Screenshot: Lebanese Forces PartyParty EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 22. Liberation Tigers of Tamil Eelam (LTTE)(LTTE) Liberation Tigers of Tamil Eelam (LTTE) was formed after the failure of many years of peaceful demonstration by Tamil leadersp y in order to win their freedom from the successive Sinhala majority governments LTTE was founded on May 5, 1976 under the leadership of Mr Velupillai Pirabakaranthe leadership of Mr. Velupillai Pirabakaran EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.eelamweb.com/
  • 23. Screenshot: Liberation Tigers of Tamil EelamTamil Eelam EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 24. Harkat Ul Mujahideen (HUM) Harkat Ul Mujahideen is a Jihadi organization and their primej g p object is to provide awareness with regard to Jihad HUM apprises the orld to differentiate bet een terrorismHUM apprises the world to differentiate between terrorism and Jihad EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.harkatulmujahideen.org/
  • 25. Screenshot: Harkat Ul MujahideenMujahideen EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 26. Jewish Defense League (JDL) The Jewish Defense League founded in 1968 by Rabbi Meir Kahane JDL is a militant Jewish organization whose stated goal is to protect Jews from antisemitismstated goal is to protect Jews from antisemitism FBI referred JDL as a “violent extremist JewishFBI referred JDL as a violent extremist Jewish organization” and stated that the FBI was responsible for thwarting at least one of its terrorist acts EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.jdl.org/
  • 27. Screenshot: Jewish Defense LeagueLeague EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 28. Necessary Qualifications and Characteristics to Join Terrorist Groupp Commitment to the organization’s ideology MaturityMaturity Keeping secrets and concealing information Listening and obedience Sacrifice Patience Free of Illness Tranquility and unflappability Truthfulness and counsel I lli d i i hIntelligence and insight Caution and prudence Ability to observe and analyze EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Ability to act, change positions, and conceal oneself
  • 29. Attacks Associated with Al-Qaida EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Source: http://www.number-10.gov.uk
  • 30. Attacks Associated with Al-Qaida (cont’d)(cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 31. Attacks Associated with Al-Qaida (cont’d)(cont d) EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 32. How to Identify the Terrorist Identifying a terrorist involves a series of suspicious incidents such as: • Unusual enquiry for information • Strange activities F k id ifi i• Fake identification • Numerous visitors • Avoiding community contact • Large/unusual/high risk deliveries • Unusual purchases or thefts EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 33. Unusual Enquiry for Information U l i f i f tiUnusual enquiry for information can be a caveat of a terrorist activity: • It can be a phone call enquiring about the security system • It can be a phone call asking about the behavior of any officer • It can be a mail asking for comments on the response time• It can be a mail asking for comments on the response time and behavior of emergency personnel EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 34. Strange Activities T i b id ifi d bTerrorists can be identified by some strange activities, such as: • Trying to act strangely and suspiciously • Trying to avoid direct eye contact T i i kl h h d• Trying to move quickly when seen or approached EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 35. Fake Identification Most of the terrorists use the fake identityMost of the terrorists use the fake identity People make fake identity cards to stay in a country other than their own country Fake identity includes: • Social security card Fake identity includes: • Social security card • Driving license • Passport • Birth certificate EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 36. Numerous Visitors Terrorists often come in group to meet their counterparts They can be identified by their suspicious behavior such as: • Arriving and departing at unusual hours • avoiding from getting noticed • Acting in a suspicious manner• Acting in a suspicious manner • Parking their vehicles at an unusual distance from the meeting • Unusual number of unrelated people staying together EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 37. Avoiding Community Contact Terrorists intent doing illegal things and try to avoid community contact and may: • Change the locks often y y • Change the locks often • Never allow maid service in a hotel room • Take hotel room service outside theTake hotel room service outside the door • Accepts deliveries at the hotel’s front desk EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 38. Large/Unusual/High Risk DeliveriesDeliveries T i t ft i d li i t tTerrorists may often receive deliveries to carry out attacks People should be aware of a vehicle with hazardous material Terrorists may receive unusual deliveries of chemicals Terrorists may carry unattended bags or boxes in a public access place EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited public access place
  • 39. Unusual Purchases or Thefts Terrorists need some medium to carry out their attacksTerrorists need some medium to carry out their attacks and goals People need to pay attention to purchase, rent, or steal: • Police, security, public utility, mail carrier, or airline uniforms and equipmentor airline uniforms and equipment • Explosives • Weapons and ammunition T i h i l EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited • Toxic chemicals
  • 40. Terrorist Surveillance Program in U Sin U.S. Terrorist surveillance program detects terrorist attacks andp g prevents the American people from these attacks i i l h ll d il (i d ) fIt targets international phone calls and emails(in and out) of the United States It is an effective tool in the war against terrorism This program mainly targets and focuses on key tactics of Al- Qaeda EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Q
  • 41. Terrorist Surveillance Indicators According to “The United States Departmentg p of Homeland Security”, following are the indicators of potential terrorist activity: • Fixed surveillance: Also termed as static, terrorists select any public place to establish themselves • Mobile surveillance: Terrorists observe and follow• Mobile surveillance: Terrorists observe and follow persons or individual human targets • Progressive surveillance: Terrorists observe a target for a certain time from one position, withdraws for a timefor a certain time from one position, withdraws for a time and then resumes surveillance from another position, and continues until the target is suitability determined EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
  • 42. Summary The term “international terrorism” refers to terrorism involving i i h i f hcitizens or the territory of more than one country Islamic Extremists believe that, the western influence is spoiling the, p g minds of its people and taking them away from Islam, the right path Extremists from around the globe are encouraged to undergo terroristg b g g training and religious indoctrination Terrorist Surveillance Program detects terrorist attacks and preventsTerrorist Surveillance Program detects terrorist attacks and prevents the American people from these attacks Weapons of Mass Destruction (WMD) can kill multiple people or EC-Council Copyright © by EC-Council All Rights Reserved. Reproduction is Strictly Prohibited Weapons of Mass Destruction (WMD) can kill multiple people or cause heavy property loss when used