Professional Documents
Culture Documents
CEHv6 Module 67 Identifying The Terrorists PDF
CEHv6 Module 67 Identifying The Terrorists PDF
Countermeasures
Version6
Mod le LXVII
Module
Identifying the Terrorists
Module Objective
• What is Terrorism
• How People Become Terrorists
• Terrorist Operations
• Terrorist Training
• G l and
Goals dMMotivations
ti ti off T
Terrorists
i t
• Necessary Qualifications And Characteristics to Join Al-Qaida
• Terrorist Incidents
• Terrorist Surveillance Program
g
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Module Flow
Terrorist Surveillance
Terrorist Operations
Program
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
News
Source: http://www.nytimes.com/
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
News
Source: http://news.xinhuanet.com
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
What is Terrorism
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorists
I t
International
ti lTTerrorists:
i t
• Originate outside the country
• Get support from outside the country as well as within
• Attack
A k other
h country iinterests overseas as well
ll as targets within
i hi
the country
Domestic
o est c Terrorists:
e o sts:
• Originate in the country
• Receive their support solely from individuals and organizations
in the countryy
• Commit their crimes in the country
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How People Become Terrorists
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Goals and Motivations of
Terrorists
To harass,
harass weaken
weaken, or embarrass government security forces
T destroy
To d t facilities
f iliti or di
disruptt li
lines off communication
i ti
T influence
To i fl governmentt d
decisions,
i i llegislation,
i l ti or other
th critical
iti l ddecisions
i i
To free prisoners
T satisfy
To i f vengeance
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorist Operations
Information Gathering
• Hacking into private areas
• Stealing
St li confidential
fid ti l iinformation
f ti
Fraud
• Stealing money to fund worldwide terrorist operations
• Creation of false identities for operators
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorist Training
Th are trained
They t i d ini skills
kill such
h as:
• Personal security
• Map-reading and field operations
• Use of firearms and explosives
• Kidnapping and assassinations
• Military strategies
• Espionage and information gathering
• Torture methods
• Communications methods
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Behavior of Terrorists
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorists Weapon: Weapons of
Mass Destruction
Weapons of Mass Destruction (WMD) are used to kill multiple people
or it can cause h
heavy property
t lloss
Hazardous
a a dous materials
ate a s aaree used to p
prepare
epa e WMD
• Chemicals
• Biological
• Radiological (bomb wrapped with radioactive waste)
• Nuclear
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Potential Terrorist Targets
• These are open and soft targets where rich, wealthy, and
Tourist famous peoples are targeted
Attacks and • Involves killing of selected victims using bombs and arms
Assassinations
i i
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Other Terrorist Crimes
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Islamic Extremists
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
State Sponsored Groups
• Take revenge
• Gain economic, social, military, or political
advantage
• Intimidate and silence its opposition
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Current List of Designated
Foreign Terrorist Organizations
~ Abu Nidal Organization (ANO)
~ Armed Islamic Group
p ((GIA))
~ Basque Fatherland and Liberty (ETA)
~ Communist Party of the Philippines/New People's Army
(CPP/NPA)
~ Continuity Irish Republican Army
~ Harakat ul-Mujahidin (HUM)
~ Lashkar-e Tayyiba (LT) (Army of the Righteous)
~ Liberation Tigers of Tamil Eelam (LTTE)
~ Al-Qaeda
~ Revolutionary Armed Forces of Colombia (FARC)
~ Revolutionary Nuclei (formerly ELA)
~ Revolutionary People’s Liberation Party/Front (DHKP/C)
~ Shining Path (Sendero Luminoso, SL)
~ United Self-Defense Forces of Colombia (AUC)
Source: www.state.gov
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Lebanese Forces Party (LPF)
Bashir Gemayel created it, organized the cadres and molded it with
his own patriotic spirit, hopes and aspirations
Source: http://www.lebanese-forces.org/
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot: Lebanese Forces
Party
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Liberation Tigers of Tamil Eelam
(LTTE)
Source: http://www.eelamweb.com/
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot: Liberation Tigers of
Tamil Eelam
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Harkat Ul Mujahideen (HUM)
Harkat Ul Mujahideen
j is a Jihadi organization
g and their p
prime
object is to provide awareness with regard to Jihad
Source: http://www.harkatulmujahideen.org/
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot: Harkat Ul
Mujahideen
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Jewish Defense League (JDL)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Screenshot: Jewish Defense
League
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Necessary Qualifications and
Characteristics to Join Terrorist Group
p
~ Commitment to the organization’s ideology
~ Maturity
~ Keeping secrets and concealing information
~ Listening and obedience
~ Sacrifice
~ Patience
~ Free of Illness
~ Tranquility and unflappability
~ Truthfulness and counsel
~ I lli
Intelligence and
d iinsight
i h
~ Caution and prudence
~ Ability to observe and analyze
~ Ability to act, change positions, and conceal oneself
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Attacks Associated with Al-Qaida
Source: http://www.number-10.gov.uk
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Attacks Associated with Al-Qaida
(cont d)
(cont’d)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Attacks Associated with Al-Qaida
(cont d)
(cont’d)
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
How to Identify the Terrorist
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Unusual Enquiry for Information
Unusuall enquiry
U i ffor iinformation
f ti can
be a caveat of a terrorist activity:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Strange Activities
Terrorists
T i can be b id
identified
ifi d by
b some
strange activities, such as:
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Fake Identification
People make fake identity cards to stay in a country other than their
own country
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Numerous Visitors
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Avoiding Community Contact
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Large/Unusual/High Risk
Deliveries
Terrorists
T i t may often
ft receive
i d deliveries
li i tto carry outt
attacks
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Unusual Purchases or Thefts
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorist Surveillance Program
in U.S.
US
Terrorist surveillance p
program
g detects terrorist attacks and
prevents the American people from these attacks
It targets international
i i l phone
h calls
ll and
d emails(in
il (i and
d out)) off
the United States
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Terrorist Surveillance Indicators
Copyright © by EC-Council
EC-Council All Rights Reserved. Reproduction is Strictly Prohibited
Summary