Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Countermeasures
Version6
Mod le LXVII
Module
Identifying the Terrorists
Module Objective
What is Terrorism
How People Become Terrorists
Terrorist Operations
Terrorist Training
G l and
Goals dMMotivations
ti ti off T
Terrorists
i t
Necessary Qualifications And Characteristics to Join Al-Qaida
Terrorist Incidents
Terrorist Surveillance Program
g
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Terrorist Surveillance
Terrorist Operations
Program
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
News
Source: http://www.nytimes.com/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
News
Source: http://news.xinhuanet.com
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
What is Terrorism
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorists
I t
International
ti lTTerrorists:
i t
Originate outside the country
Get support from outside the country as well as within
Attack
A k other
h country iinterests overseas as well
ll as targets within
i hi
the country
Domestic
o est c Terrorists:
e o sts:
Originate in the country
Receive their support solely from individuals and organizations
in the countryy
Commit their crimes in the country
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How People Become Terrorists
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Goals and Motivations of
Terrorists
To harass,
harass weaken
weaken, or embarrass government security forces
T destroy
To d t facilities
f iliti or di
disruptt li
lines off communication
i ti
T influence
To i fl governmentt d
decisions,
i i llegislation,
i l ti or other
th critical
iti l ddecisions
i i
To free prisoners
T satisfy
To i f vengeance
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorist Operations
Information Gathering
Hacking into private areas
Stealing
St li confidential
fid ti l iinformation
f ti
Fraud
Stealing money to fund worldwide terrorist operations
Creation of false identities for operators
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorist Training
Th are trained
They t i d ini skills
kill such
h as:
Personal security
Map-reading and field operations
Use of firearms and explosives
Kidnapping and assassinations
Military strategies
Espionage and information gathering
Torture methods
Communications methods
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Behavior of Terrorists
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorists Weapon: Weapons of
Mass Destruction
Weapons of Mass Destruction (WMD) are used to kill multiple people
or it can cause h
heavy property
t lloss
Hazardous
a a dous materials
ate a s aaree used to p
prepare
epa e WMD
Chemicals
Biological
Radiological (bomb wrapped with radioactive waste)
Nuclear
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Potential Terrorist Targets
These are open and soft targets where rich, wealthy, and
Tourist famous peoples are targeted
Attacks and Involves killing of selected victims using bombs and arms
Assassinations
i i
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Other Terrorist Crimes
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Islamic Extremists
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
State Sponsored Groups
Take revenge
Gain economic, social, military, or political
advantage
Intimidate and silence its opposition
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Current List of Designated
Foreign Terrorist Organizations
~ Abu Nidal Organization (ANO)
~ Armed Islamic Group
p ((GIA))
~ Basque Fatherland and Liberty (ETA)
~ Communist Party of the Philippines/New People's Army
(CPP/NPA)
~ Continuity Irish Republican Army
~ Harakat ul-Mujahidin (HUM)
~ Lashkar-e Tayyiba (LT) (Army of the Righteous)
~ Liberation Tigers of Tamil Eelam (LTTE)
~ Al-Qaeda
~ Revolutionary Armed Forces of Colombia (FARC)
~ Revolutionary Nuclei (formerly ELA)
~ Revolutionary Peoples Liberation Party/Front (DHKP/C)
~ Shining Path (Sendero Luminoso, SL)
~ United Self-Defense Forces of Colombia (AUC)
Source: www.state.gov
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Lebanese Forces Party (LPF)
Bashir Gemayel created it, organized the cadres and molded it with
his own patriotic spirit, hopes and aspirations
Source: http://www.lebanese-forces.org/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot: Lebanese Forces
Party
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Liberation Tigers of Tamil Eelam
(LTTE)
Source: http://www.eelamweb.com/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot: Liberation Tigers of
Tamil Eelam
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Harkat Ul Mujahideen (HUM)
Harkat Ul Mujahideen
j is a Jihadi organization
g and their p
prime
object is to provide awareness with regard to Jihad
Source: http://www.harkatulmujahideen.org/
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot: Harkat Ul
Mujahideen
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Jewish Defense League (JDL)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot: Jewish Defense
League
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Necessary Qualifications and
Characteristics to Join Terrorist Group
p
~ Commitment to the organizations ideology
~ Maturity
~ Keeping secrets and concealing information
~ Listening and obedience
~ Sacrifice
~ Patience
~ Free of Illness
~ Tranquility and unflappability
~ Truthfulness and counsel
~ I lli
Intelligence and
d iinsight
i h
~ Caution and prudence
~ Ability to observe and analyze
~ Ability to act, change positions, and conceal oneself
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Attacks Associated with Al-Qaida
Source: http://www.number-10.gov.uk
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Attacks Associated with Al-Qaida
(cont d)
(contd)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Attacks Associated with Al-Qaida
(cont d)
(contd)
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How to Identify the Terrorist
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Unusual Enquiry for Information
Unusuall enquiry
U i ffor iinformation
f ti can
be a caveat of a terrorist activity:
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Strange Activities
Terrorists
T i can be b id
identified
ifi d by
b some
strange activities, such as:
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Fake Identification
People make fake identity cards to stay in a country other than their
own country
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Numerous Visitors
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Avoiding Community Contact
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Large/Unusual/High Risk
Deliveries
Terrorists
T i t may often
ft receive
i d deliveries
li i tto carry outt
attacks
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Unusual Purchases or Thefts
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorist Surveillance Program
in U.S.
US
Terrorist surveillance p
program
g detects terrorist attacks and
prevents the American people from these attacks
It targets international
i i l phone
h calls
ll and
d emails(in
il (i and
d out)) off
the United States
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorist Surveillance Indicators
Copyright by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Summary