Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter Six: Types of Modern Terrorism. Cyberterrorism.

Similar presentations


Presentation on theme: "Chapter Six: Types of Modern Terrorism. Cyberterrorism."— Presentation transcript:

1 Chapter Six: Types of Modern Terrorism

2 Cyberterrorism

3 Cyberterrorism Definition Definition Use of information technology by terrorists for the purpose of promoting a political agenda Use of information technology by terrorists for the purpose of promoting a political agenda Barry Collin coined the term in the early 1990s Barry Collin coined the term in the early 1990s

4 Targets for cyberterrorism Targets for cyberterrorism Computers Computers Computer networks Computer networks Information storage and retrieval systems Information storage and retrieval systems Attractiveness of computer technology Attractiveness of computer technology Allows terrorist groups to remain connected, providing covert discussions and anonymity Allows terrorist groups to remain connected, providing covert discussions and anonymity Much less expensive and work intensive Much less expensive and work intensive Allows terrorists to reach their audience with little effort Allows terrorists to reach their audience with little effort Cyberterrorism

5 Barry Collin Barry Collin All forms of cyberterrorism are designed to strike at one or more of three areas: All forms of cyberterrorism are designed to strike at one or more of three areas: The place where information is accessed The place where information is accessed The place where data is controlled The place where data is controlled The points where information is mined The points where information is mined Cyberterrorism

6 Joshua Green Joshua Green The actual dangers of cyber attacks are merely economic The actual dangers of cyber attacks are merely economic National Cyber Alert System National Cyber Alert System Unveiled by the Department of Homeland Security in 2004, the system is designed to detect and destroy cyber attacks and cyberterrorism Unveiled by the Department of Homeland Security in 2004, the system is designed to detect and destroy cyber attacks and cyberterrorism Cyberterrorism

7 Suicide Terrorism

8 Definition Definition Involves the intentional sacrifice of an attacker’s life for the purpose of inflicting damage on an enemy Involves the intentional sacrifice of an attacker’s life for the purpose of inflicting damage on an enemy Suicide operations are part of military history Suicide operations are part of military history Homicide bomber Homicide bomber Some people use the phrase “homicide bomber” to describe suicide terrorism, arguing that it places the emphasis on the victims and blames the attacker for political murder Some people use the phrase “homicide bomber” to describe suicide terrorism, arguing that it places the emphasis on the victims and blames the attacker for political murder

9 Suicide Terrorism Suicide Terrorism Reasons suicide attacks are popular Reasons suicide attacks are popular The virtually guarantee some type of delivery and they serve as cheap guided missiles The virtually guarantee some type of delivery and they serve as cheap guided missiles They are intimidating They are intimidating They are difficult to stop They are difficult to stop They generate high casualties as well as publicity for the attacking group They generate high casualties as well as publicity for the attacking group The nature of the attack strikes fear into an enemy The nature of the attack strikes fear into an enemy The attacks are effective against superior forces and weapons The attacks are effective against superior forces and weapons They give terrorist groups maximum control over the attack They give terrorist groups maximum control over the attack

10 Suicide Terrorism Suicide Terrorism Three things all suicide attacks have in common Three things all suicide attacks have in common Secrecy Secrecy Reconnaissance Reconnaissance Rehearsal Rehearsal

11 Suicide Terrorism Suicide Terrorism Suicide bomber profile Suicide bomber profile At one time, suicide bombers could be profiled At one time, suicide bombers could be profiled The previous profile no longer applies The previous profile no longer applies More than 40% of suicide bombers are over 40 More than 40% of suicide bombers are over 40 Women and the wealthy have joined the ranks of suicide bombers Women and the wealthy have joined the ranks of suicide bombers

12 Suicide Terrorism Suicide Terrorism Groups throughout the world that use suicide bombing Groups throughout the world that use suicide bombing Hezbollah Hezbollah Hamas Hamas Egyptian Islamic Jihad Egyptian Islamic Jihad The Egyptian Islamic Group The Egyptian Islamic Group The Armed Islamic Group of Algeria The Armed Islamic Group of Algeria Barbar Khalsa in India Barbar Khalsa in India The Kurdish Workers’ Party The Kurdish Workers’ Party The LTTE The LTTE Al Qaeda Al Qaeda

13 Suicide Terrorism Suicide Terrorism Trend in suicide bombing Trend in suicide bombing Popularity in suicide bombing is rising Popularity in suicide bombing is rising They are cheap and effective They are cheap and effective Regardless of counter tactics, most analysts believe that suicide terrorism will continue Regardless of counter tactics, most analysts believe that suicide terrorism will continue

14 Weapons of Mass Destruction: Biological Agents

15 Four types of biological agents Four types of biological agents Natural poisons, or toxins that occur without human modification Natural poisons, or toxins that occur without human modification Viruses Viruses Bacteria Bacteria Plagues Plagues

16 Weapons of Mass Destruction: Biological Agents The most threatening agents The most threatening agents Smallpox Smallpox Anthrax Anthrax Plague Plague Botulism Botulism Tularemia Tularemia Hemorrhagic fever Hemorrhagic fever

17 Weapons of Mass Destruction: Biological Agents Biological terrorism in the United States Biological terrorism in the United States September 1984: Engineered by followers of the Bhagwan Shree Rajneesh in Oregon, the attack occurred when Rajneeshees, as they were called, contaminated salad bars in the Dalles, Oregon, with the bacterium Salmonella September 1984: Engineered by followers of the Bhagwan Shree Rajneesh in Oregon, the attack occurred when Rajneeshees, as they were called, contaminated salad bars in the Dalles, Oregon, with the bacterium Salmonella In the wake of the September 11, 2001 attacks: Two tabloid writers were infected by anthrax through the mail, followed by numerous anthrax attacks throughout the United States In the wake of the September 11, 2001 attacks: Two tabloid writers were infected by anthrax through the mail, followed by numerous anthrax attacks throughout the United States

18 Weapons of Mass Destruction: Biological Agents Practical problems for terrorists Practical problems for terrorists When an agent is released, it is very difficult to control the spread of the disease When an agent is released, it is very difficult to control the spread of the disease

19 Weapons of Mass Destruction: Chemical and Radiological Agents

20 Four types of chemical agents Four types of chemical agents Nerve agents Nerve agents Blood agents Blood agents Choking agents Choking agents Blistering agents Blistering agents

21 Weapons of Mass Destruction: Chemical and Radiological Agents Attractiveness of chemical weapons Attractiveness of chemical weapons Easy to control Easy to control Users can avoid the area they attack Users can avoid the area they attack Problems of chemical weapons Problems of chemical weapons Terrorists must have a delivery mechanism Terrorists must have a delivery mechanism It takes a lot of chemicals to present a threat It takes a lot of chemicals to present a threat Weather patterns, air, and water can neutralize a chemical threat Weather patterns, air, and water can neutralize a chemical threat

22 Weapons of Mass Destruction: Chemical and Radiological Agents Dirty bomb Dirty bomb A conventional explosive used to spread a chemical or radioactive agent around a large area A conventional explosive used to spread a chemical or radioactive agent around a large area Drawback of the dirty bomb Drawback of the dirty bomb The hear produced by the explosion may destroy the chemicals attached to the bomb The hear produced by the explosion may destroy the chemicals attached to the bomb

23 Weapons of Mass Destruction: Chemical and Radiological Agents Nuclear weapons Nuclear weapons Nuclear weapons are available on the black market from sources in the former Soviet Union Nuclear weapons are available on the black market from sources in the former Soviet Union Terrorists have placed instructions online for building a nuclear device Terrorists have placed instructions online for building a nuclear device It is difficult to obtain and detonate nuclear weapons It is difficult to obtain and detonate nuclear weapons Nuclear waste is a ready-made dirty bomb Nuclear waste is a ready-made dirty bomb

24 Weapons of Mass Destruction: Chemical and Radiological Agents The threat of weapons of mass destruction The threat of weapons of mass destruction Terrorists may say they have a dirty bomb or they have released smallpox or they have poisoned the food supply with radiation, and the public may well panic Terrorists may say they have a dirty bomb or they have released smallpox or they have poisoned the food supply with radiation, and the public may well panic Fear of fear is one of the greatest problems associated with terrorism Fear of fear is one of the greatest problems associated with terrorism


Download ppt "Chapter Six: Types of Modern Terrorism. Cyberterrorism."

Similar presentations


Ads by Google