SlideShare a Scribd company logo
Green Place HSSEQ-RECM Clean Technology
HSE - RECM ANTI-TERRORISM
WHAT IS A TERRORIST?
WHAT IS TERRORISM ? – WHAT IS THE MEANING ?
HOW THE TERRORISM WORKS ?
TYPES OF TERRORISM ?
THE MOST COMMON TERRORISM IN OUR ENVIRONMEN
BIO-TERRORISM OR BIOLOGICAL TERRORISM
NUCLEAR OR ATOMIC TERRORISM
HOW TO FIGHT TERRORISM ?
Marco Parodi
PORTAL PARODI
Green Place HSSEQ-RECM Clean Technology
WHAT IS A TERRORIST?
Person or persons, organizations implanting their objectives
based in fear.
Terrorism is, in the broadest sense, the use of intentional violence to achieve political aims.
It is used in this regard primarily to refer to violence during peacetime or in the context of
war against non-combatants (mostly civilians and neutral military personnel). The terms
"terrorist" and "terrorism" originated during the French Revolution of the late 18th century
but became widely used internationally and gained worldwide attention in the 1970s during
the conflicts of Northern Ireland, the Basque Country, and the Israeli–Palestinian conflict.
The increased use of suicide attacks from the 1980s onwards was typified by the September
11 attacks in New York City, Arlington and Pennsylvania in 2001.
Marco Parodi
Green Place HSSEQ-RECM Clean Technology
WHAT IS TERRORISM ? – WHAT IS THE MEANING ?
Dominium, possession and control based in fear
Marco Parodi
The terms "terrorist" and "terrorism" originated during
the French Revolution of the late 18th century but became
widely used internationally and gained worldwide
attention in the 1970s during the conflicts of Northern
Ireland, the Basque Country, and the Israeli–Palestinian
conflict.
Terrorism is, in the broadest sense, the use of intentional violence to
achieve political, religious, cultural aims.
PORTAL PARODI
Green Place HSSEQ-RECM Clean Technology
TYPES OF TERRORISM ?
PORTAL PARODI
1.Civil disorder
2.Political terrorism
3.Non-Political terrorism
4.Anonymous terrorism
5.Quasi-terrorism
6.Limited political terrorism
7.Official or state terrorism
Other sources have defined the typology of terrorism in different ways, for
example, broadly classifying it into domestic terrorism and international
terrorism, or using categories such as vigilante terrorism or insurgent terrorism.
Green Place HSSEQ-RECM Clean Technology
HOW THE TERRORISM WORKS ?
PORTAL PARODI
1. Act as a form of asymmetric warfare in order to directly force a government to agree to
demands
2. Intimidate a group of people into capitulating to the demands in order to avoid future
injury
3. Get attention and thus political support for a cause
4. Directly inspire more people to the cause (such as revolutionary acts) – propaganda of
the deed
5. Indirectly inspire more people to the cause by provoking a hostile response or over-
reaction from enemies to the cause
6. Attacks on "collaborators" are used to intimidate people from cooperating with the
state in order to undermine state control. This strategy was used in Ireland, in Kenya, in
Algeria and in Cyprus during their independence struggles.
Green Place HSSEQ-RECM Clean Technology
THE MOST COMMON TERRORISM IN OUR ENVIRONMEN
PORTAL PARODI
Criminal acts intended or calculated to provoke a state of terror
in the public, a group of persons or particular persons for
political purposes are in any circumstance unjustifiable,
whatever the considerations of a political, philosophical,
ideological, racial, ethnic, religious or any other nature that may
be invoked to justify them, public places are the most commun
target.
Green Place HSSEQ-RECM Clean Technology
BIO-TERRORISM OR BIOLOGICAL TERRORISM
PORTAL PARODI
BIOTERRORISM OR BIOLOGICAL TERRORISM is terrorism involving
the intentional release or dissemination of biological agents. These
agents are bacteria, viruses, insects, fungi or toxins, and may be in a
naturally occurring or a human-modified form, in much the same
way as in biological warfare. Further, modern agribusiness is
vulnerable to anti-agricultural attacks by terrorists, and such attacks
can seriously damage economy as well as consumer confidence. The
latter destructive activity is called agro-bioterrorism and is a
subtype of agro-terrorism.
Green Place HSSEQ-RECM Clean Technology
NUCLEAR OR ATOMIC TERRORISM
PORTAL PARODI
NUCLEAR TERRORISM refers to any person or persons detonating a nuclear
weapon as an act of terrorism (i.e., illegal or immoral use of violence for a
political or religious cause). Some definitions of nuclear terrorism include the
sabotage of a nuclear facility and/or the detonation of a radiological device,
colloquially termed a dirty bomb, but consensus is lacking. In legal terms,
nuclear terrorism is an offense committed if a person unlawfully and
intentionally "uses in any way radioactive material … with the intent to cause
death or serious bodily injury; or with the intent to cause substantial damage
to property or to the environment; or with the intent to compel a natural or
legal person, an international organization or a State to do or refrain from
doing an act",
Green Place Clean Technology
HOW TO FIGHT TERRORISM ?
PORTAL PARODI
1. EMERGENCY MANAGEMENT GUIDELINES
2. EMERGENCY PROTOCOL – GUIDELINES
3. ISO 27000 - PREPARING FOR TERRORIST ATTACK IMPACT
4. ISO 31000 - GUIDELINES - RISK ASSESSMENT
5. SECURITY MANUAL - PATRIOT ACT - OPERATIONS CONTROL – AUDIT

More Related Content

Similar to TERRORISM.pptx

How Does Terrorism Affect Global Politics
How Does Terrorism Affect Global PoliticsHow Does Terrorism Affect Global Politics
How Does Terrorism Affect Global Politics
Order Custom Paper Cedar City
 
Terrorism
TerrorismTerrorism
Terrorism
Avinash Rajput
 
Terrorism
TerrorismTerrorism
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docx
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docxWhittaker and CrottyTerrorism DefinedTerrorism is a di.docx
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docx
alanfhall8953
 
6651
66516651
The_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfThe_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdf
Mohammed Saaida
 
The Threat of Global Terrorism
The Threat of Global TerrorismThe Threat of Global Terrorism
The Threat of Global Terrorism
meducationdotnet
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
paperpublications3
 
International Terrorism, post 9/11 development.
International Terrorism, post 9/11 development.International Terrorism, post 9/11 development.
International Terrorism, post 9/11 development.
RakiBiswal1
 
Terrorism
TerrorismTerrorism
Terrorism
mccluma2
 
Terrorism
TerrorismTerrorism
Terrorism
mccluma2
 
6651
66516651
Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism
Mian Muhammad Zafar
 
11.challenges of global terrorism strategies, dimensions and response in sea...
11.challenges of global terrorism  strategies, dimensions and response in sea...11.challenges of global terrorism  strategies, dimensions and response in sea...
11.challenges of global terrorism strategies, dimensions and response in sea...
Alexander Decker
 
Challenges of global terrorism strategies, dimensions and response in search...
Challenges of global terrorism  strategies, dimensions and response in search...Challenges of global terrorism  strategies, dimensions and response in search...
Challenges of global terrorism strategies, dimensions and response in search...
Alexander Decker
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
paperpublications3
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
paperpublications3
 
Terrorism
TerrorismTerrorism
Terrorism
Aysel Muradlı
 
Terrorism
TerrorismTerrorism
Terrorism
TerrorismTerrorism
Terrorism
MohitLilhare
 

Similar to TERRORISM.pptx (20)

How Does Terrorism Affect Global Politics
How Does Terrorism Affect Global PoliticsHow Does Terrorism Affect Global Politics
How Does Terrorism Affect Global Politics
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docx
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docxWhittaker and CrottyTerrorism DefinedTerrorism is a di.docx
Whittaker and CrottyTerrorism DefinedTerrorism is a di.docx
 
6651
66516651
6651
 
The_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdfThe_Global_Terrorism_Threats_to_the_Stat.pdf
The_Global_Terrorism_Threats_to_the_Stat.pdf
 
The Threat of Global Terrorism
The Threat of Global TerrorismThe Threat of Global Terrorism
The Threat of Global Terrorism
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
International Terrorism, post 9/11 development.
International Terrorism, post 9/11 development.International Terrorism, post 9/11 development.
International Terrorism, post 9/11 development.
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
6651
66516651
6651
 
Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism Terrorism | Types of Terrorism | Impacts of terrorism
Terrorism | Types of Terrorism | Impacts of terrorism
 
11.challenges of global terrorism strategies, dimensions and response in sea...
11.challenges of global terrorism  strategies, dimensions and response in sea...11.challenges of global terrorism  strategies, dimensions and response in sea...
11.challenges of global terrorism strategies, dimensions and response in sea...
 
Challenges of global terrorism strategies, dimensions and response in search...
Challenges of global terrorism  strategies, dimensions and response in search...Challenges of global terrorism  strategies, dimensions and response in search...
Challenges of global terrorism strategies, dimensions and response in search...
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...Counter Terrorism and the Protection of Human Rights in the Perspective of th...
Counter Terrorism and the Protection of Human Rights in the Perspective of th...
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 
Terrorism
TerrorismTerrorism
Terrorism
 

Recently uploaded

Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Christina Lin
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
Divyam548318
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
KrishnaveniKrishnara1
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
gerogepatton
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
symbo111
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
ihlasbinance2003
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
obonagu
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
bhadouriyakaku
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
obonagu
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 

Recently uploaded (20)

Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming PipelinesHarnessing WebAssembly for Real-time Stateless Streaming Pipelines
Harnessing WebAssembly for Real-time Stateless Streaming Pipelines
 
bank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdfbank management system in java and mysql report1.pdf
bank management system in java and mysql report1.pdf
 
22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt22CYT12-Unit-V-E Waste and its Management.ppt
22CYT12-Unit-V-E Waste and its Management.ppt
 
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODELDEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
DEEP LEARNING FOR SMART GRID INTRUSION DETECTION: A HYBRID CNN-LSTM-BASED MODEL
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Building Electrical System Design & Installation
Building Electrical System Design & InstallationBuilding Electrical System Design & Installation
Building Electrical System Design & Installation
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
5214-1693458878915-Unit 6 2023 to 2024 academic year assignment (AutoRecovere...
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
在线办理(ANU毕业证书)澳洲国立大学毕业证录取通知书一模一样
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.pptPROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
PROJECT FORMAT FOR EVS AMITY UNIVERSITY GWALIOR.ppt
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
原版制作(unimelb毕业证书)墨尔本大学毕业证Offer一模一样
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 

TERRORISM.pptx

  • 1. Green Place HSSEQ-RECM Clean Technology HSE - RECM ANTI-TERRORISM WHAT IS A TERRORIST? WHAT IS TERRORISM ? – WHAT IS THE MEANING ? HOW THE TERRORISM WORKS ? TYPES OF TERRORISM ? THE MOST COMMON TERRORISM IN OUR ENVIRONMEN BIO-TERRORISM OR BIOLOGICAL TERRORISM NUCLEAR OR ATOMIC TERRORISM HOW TO FIGHT TERRORISM ? Marco Parodi PORTAL PARODI
  • 2. Green Place HSSEQ-RECM Clean Technology WHAT IS A TERRORIST? Person or persons, organizations implanting their objectives based in fear. Terrorism is, in the broadest sense, the use of intentional violence to achieve political aims. It is used in this regard primarily to refer to violence during peacetime or in the context of war against non-combatants (mostly civilians and neutral military personnel). The terms "terrorist" and "terrorism" originated during the French Revolution of the late 18th century but became widely used internationally and gained worldwide attention in the 1970s during the conflicts of Northern Ireland, the Basque Country, and the Israeli–Palestinian conflict. The increased use of suicide attacks from the 1980s onwards was typified by the September 11 attacks in New York City, Arlington and Pennsylvania in 2001. Marco Parodi
  • 3. Green Place HSSEQ-RECM Clean Technology WHAT IS TERRORISM ? – WHAT IS THE MEANING ? Dominium, possession and control based in fear Marco Parodi The terms "terrorist" and "terrorism" originated during the French Revolution of the late 18th century but became widely used internationally and gained worldwide attention in the 1970s during the conflicts of Northern Ireland, the Basque Country, and the Israeli–Palestinian conflict. Terrorism is, in the broadest sense, the use of intentional violence to achieve political, religious, cultural aims. PORTAL PARODI
  • 4. Green Place HSSEQ-RECM Clean Technology TYPES OF TERRORISM ? PORTAL PARODI 1.Civil disorder 2.Political terrorism 3.Non-Political terrorism 4.Anonymous terrorism 5.Quasi-terrorism 6.Limited political terrorism 7.Official or state terrorism Other sources have defined the typology of terrorism in different ways, for example, broadly classifying it into domestic terrorism and international terrorism, or using categories such as vigilante terrorism or insurgent terrorism.
  • 5. Green Place HSSEQ-RECM Clean Technology HOW THE TERRORISM WORKS ? PORTAL PARODI 1. Act as a form of asymmetric warfare in order to directly force a government to agree to demands 2. Intimidate a group of people into capitulating to the demands in order to avoid future injury 3. Get attention and thus political support for a cause 4. Directly inspire more people to the cause (such as revolutionary acts) – propaganda of the deed 5. Indirectly inspire more people to the cause by provoking a hostile response or over- reaction from enemies to the cause 6. Attacks on "collaborators" are used to intimidate people from cooperating with the state in order to undermine state control. This strategy was used in Ireland, in Kenya, in Algeria and in Cyprus during their independence struggles.
  • 6. Green Place HSSEQ-RECM Clean Technology THE MOST COMMON TERRORISM IN OUR ENVIRONMEN PORTAL PARODI Criminal acts intended or calculated to provoke a state of terror in the public, a group of persons or particular persons for political purposes are in any circumstance unjustifiable, whatever the considerations of a political, philosophical, ideological, racial, ethnic, religious or any other nature that may be invoked to justify them, public places are the most commun target.
  • 7. Green Place HSSEQ-RECM Clean Technology BIO-TERRORISM OR BIOLOGICAL TERRORISM PORTAL PARODI BIOTERRORISM OR BIOLOGICAL TERRORISM is terrorism involving the intentional release or dissemination of biological agents. These agents are bacteria, viruses, insects, fungi or toxins, and may be in a naturally occurring or a human-modified form, in much the same way as in biological warfare. Further, modern agribusiness is vulnerable to anti-agricultural attacks by terrorists, and such attacks can seriously damage economy as well as consumer confidence. The latter destructive activity is called agro-bioterrorism and is a subtype of agro-terrorism.
  • 8. Green Place HSSEQ-RECM Clean Technology NUCLEAR OR ATOMIC TERRORISM PORTAL PARODI NUCLEAR TERRORISM refers to any person or persons detonating a nuclear weapon as an act of terrorism (i.e., illegal or immoral use of violence for a political or religious cause). Some definitions of nuclear terrorism include the sabotage of a nuclear facility and/or the detonation of a radiological device, colloquially termed a dirty bomb, but consensus is lacking. In legal terms, nuclear terrorism is an offense committed if a person unlawfully and intentionally "uses in any way radioactive material … with the intent to cause death or serious bodily injury; or with the intent to cause substantial damage to property or to the environment; or with the intent to compel a natural or legal person, an international organization or a State to do or refrain from doing an act",
  • 9. Green Place Clean Technology HOW TO FIGHT TERRORISM ? PORTAL PARODI 1. EMERGENCY MANAGEMENT GUIDELINES 2. EMERGENCY PROTOCOL – GUIDELINES 3. ISO 27000 - PREPARING FOR TERRORIST ATTACK IMPACT 4. ISO 31000 - GUIDELINES - RISK ASSESSMENT 5. SECURITY MANUAL - PATRIOT ACT - OPERATIONS CONTROL – AUDIT