0
Cyber Terrorism -Global Threat- Carl Barrett Itayi Bunhu
Table of Contents <ul><li>What Is Cyber Terrorism </li></ul><ul><li>The First Acts Of Cyber Terrorism </li></ul><ul><li>Wh...
What is Cyber Terrorism <ul><li>The illegal use of computers and the internet to achieve some goal.  1 </li></ul><ul><li>T...
What is Cyber Terrorism <ul><li>Cyber terrorism: the use of the internet for terrorist purposes -   By Council of Europe  ...
First acts of Cyber Terrorism <ul><li>&quot;Phreaking&quot;.   People would use this method to trick telephone networks in...
First acts of Cyber Terrorism <ul><li>Barry C. Collin (senior research fellow at the Institute for Security and Intelligen...
Cyber Terrorism - Can This Happen <ul><li>Collins assertions have been questioned as to likelihood by  Mark Pollitt, speci...
The Cost of Cyber Terrorism <ul><li>Direct costs </li></ul><ul><ul><li>Sales </li></ul></ul><ul><ul><li>Time </li></ul></u...
The Vulnerability  Matrix Government Natural Gas 26,000 FDIC institutions 2,800 power plants 104 commercial  nuclear plant...
How are we protected from cyber Terrorism <ul><li>In today's technology, we are far more protected  and aware of the prese...
WHAT IS INTELLIGENCE GATHERING TO PROTECT US <ul><ul><li>Cyber terrorism requires many types of intelligence gathering to ...
WHAT IS THE DIFFERENCE BETWEEN CYBER CRIME AND CYBER TERRORISM <ul><li>Cybercrime  can involve theft of intellectual prope...
How is it done? <ul><li>Cyber terrorism acts  are done electronically, usually terrorist target serious official data by h...
How is it done? <ul><li>Cyber-crime can involve  theft of intellectual property, a violation of patent, trade secret, or c...
Summary and Conclusion <ul><li>Cyber Terrorism has advanced from the early days of telco sabotage </li></ul><ul><li>Threat...
Summary and Conclusion <ul><li>What have Countries and Organizations learnt from previous attacks </li></ul><ul><ul><li>US...
Summary and Conclusion <ul><ul><li>Are we better prepared? </li></ul></ul><ul><ul><ul><li>Yes but more diligence required ...
Questions <ul><li>? </li></ul>
References <ul><li>1- Websters Dictionary </li></ul><ul><li>2- FBI definition </li></ul><ul><li>3 – Cyber terrorism: the u...
Upcoming SlideShare
Loading in...5
×

Cyberterrorismv1

2,416

Published on

Cyberterrorism
Carl Barrett
Itayi Bunhu

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
2,416
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
206
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • 1 – On line Webster&apos;s dictionary 2 – FBI
  • According to the book Cyber terrorism: the use of the internet for terrorist purposes – compiled by the council of Europe The continued growing use and access of the internet is leading to this being a breeding ground for the new terrorist, the cyber terrorist The intent of these cyber terrorist is largely a three pronged: ECONOMIC CONFUSION – MEANING TO SHOW THE VULNERABILITY OF STATE AND ORGANIZATION DISCRIMINATION OF OPPONENT – SIMILAR TO THE ABOVE BUT SHOWING THEIR SUPERIORITY TECHNICALLY MONETARY INCOME – SELF EXPLANATORY BUT WILL PROVIDE FUNDS NEEDED FOR FUTURE TERRORIST ENDEAVORS
  • According to Time magazine article A Brief History of Cybercrime By Randy James Monday, Jun. 01, 2009 Telephone networks were first targets Corporate and academic networks DOS This attack method floods web servers, and networks with requests from many different computers at once. When these servers are flooded with so many requests, they can&apos;t process them all and freeze-up, or shut down. This can be a major problem to websites or networks vital to the national security infrastructure Read more: http://www.time.com/time/nation/article/0,8599,1902073,00.html#ixzz1I2klXctq
  • The Internet encyclopedia, Volume 1   By Hossein Bidgoli In the 1980s, Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, coined the term &amp;quot;cyber terrorism&amp;quot; to refer to the convergence of cyberspace and terrorism Listed modern cyber terrorism - remotely changing pressure in gas lines – explosions fires - computerized bombs remotely detonated using unique numeric patterns if one doesn’t detonate the others detonate simultaneously - Future air traffic attacks – mid air collisions etc
  • Activism, Hacktivism, and Cyber terrorism: The Internet as a Tool for Influencing Foreign Policy Dorothy E. Denning Georgetown University Collins - potential threats Food manufacturing – increasing chemicals or additives to make food not safe Air Traffic – disrupting navigation systems Remote bombing – placement of bombs to explode simultaneously Utilities disruption – knocking out service FBI Manufacturing – workers would notice increase in ingredients Air traffic – controllers and radar Utilities – alarmed services
  • 5 http://www.directionsmag.com/articles/cyber-terrorism/123840 Probability of occurrence of cyber terrorism - graph The cost Direct Cost Implications Loss of sales during the disruption Staff time, network delays, intermittent access for business users Increased insurance costs due to litigation Loss of intellectual property - research, pricing, etc. Costs of forensics for recovery and litigation Loss of critical communications in time of emergency Indirect Cost Implications Loss of confidence and credibility in our financial systems Tarnished relationships&amp; public image globally Strained business partner relationships - domestic and internationally Loss of future customer revenues for an individual or group of companies Loss of trust in the government and computer
  • Dan Verton Vice President &amp; Executive Editor www.itsecuritymagazine.com This slide represents the vulnerability of the united states to cyber terrorism and the areas of where attacks could take place. Utilities Banking Government Telco Transportation
  • 1 – On line websters dictionary 2 – FBI
  • 1 – On line websters dictionary 2 – FBI
  • 1 – On line websters dictionary 2 – FBI
  • 1 – On line websters dictionary 2 – FBI
  • 1 – On line websters dictionary 2 – FBI
  • III. Cyber Security Cyber threats to our national security are broad in nature, from acts of terrorism supported by the use of the Internet, to economic espionage by foreign countries, to sophisticated state- sponsored hackers. Such threats could compromise our national critical infrastructure, from energy, water, telecommunications and transportation systems to financial services. Cyber Threats With regard to the terrorist use of the Internet, terrorists have not used the Internet to launch a full-scale cyber attack. But terrorist sympathizers have used the Internet to hide their communications, attempted denial-of-service attacks, and defaced numerous websites. And while the damage may have been limited, such groups may attack for publicity or impact, and they are becoming more adept at both. The FBI, with our partners in the intelligence community, believes that the threat from the terrorist use of the Internet is a growing terrorist threat area. We speculate they will either train their own recruits or hire outsiders, with an eye toward leveraging physical attacks with use of the internet. The cyber threat is equally significant with regard to counterintelligence intrusions and economic espionage. Today, our adversaries sit within our networks, often unknown and undetected. They may be nation-state actors or mercenaries for hire, rogue hackers or transnational criminal syndicates. These hackers actively target both government and corporate networks. They seek our technology and our trade secrets, our intelligence and our intellectual property, even our military weapons and strategies. The FBI is actively pursuing each of these threats. We have cyber squads in each of our 56 field offices around the country, with more than 1,000 specially trained agents, analysts, and digital forensic examiners. Together, they run complex undercover operations and examine digital evidence. They share information with our law enforcement and intelligence partners, including the Secret Service, which also has strong capabilities in this area. And they teach their counterparts - both at home and abroad - how best to investigate cyber threats. But the FBI cannot do it alone. The National Cyber Investigative Joint Task Force includes 20 law enforcement and intelligence agencies, working side by side to share intelligence and to identify key players and schemes. The goal is to predict and prevent what is on the horizon, and to pursue the enterprises behind these attacks. Last year`s takedown of the Mariposa botnet is but one example of that collaboration. As you may know, Mariposa was an information- stealing botnet - one that infected millions of computers, including major banks and other Fortune 1000 companies. And this case, like so many others, emphasized the need for global cooperation. We look forward to working with Congress as it considers whether it should enact legislation requiring companies to report significant breaches of their network security to the FBI and other law enforcement agencies in real time. Such a requirement would promote coordination between appropriate agencies to investigate intrusions, identify the bad actors, and take actions to prevent further damage.
  • 1 – On line Webster&apos;s dictionary 2 – FBI
  • 1 – On line Webster&apos;s dictionary 2 – FBI
  • 1 – On line Webster&apos;s dictionary 2 – FBI
  • 1 – On line Webster&apos;s dictionary 2 – FBI
  • Transcript of "Cyberterrorismv1"

    1. 1. Cyber Terrorism -Global Threat- Carl Barrett Itayi Bunhu
    2. 2. Table of Contents <ul><li>What Is Cyber Terrorism </li></ul><ul><li>The First Acts Of Cyber Terrorism </li></ul><ul><li>Where And Who Was Attacked And Why </li></ul><ul><li>How Is Cyber Terrorism Carried Out And What Damage Can Be Done </li></ul><ul><li>What Protection Is In Place </li></ul><ul><li>Intelligence Gathering Methods </li></ul><ul><li>Cyber Crime Vs Cyber Terrorism </li></ul><ul><li>Conclusion And Summary </li></ul><ul><li>Questions </li></ul><ul><li>References </li></ul>
    3. 3. What is Cyber Terrorism <ul><li>The illegal use of computers and the internet to achieve some goal. 1 </li></ul><ul><li>Terrorism conducted in cyberspace, where criminals attempt to disrupt computer or telecommunications service. 1 </li></ul><ul><li>Cyber terrorism is any &quot;premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by sub-national groups or clandestine agents.&quot; 2 </li></ul>
    4. 4. What is Cyber Terrorism <ul><li>Cyber terrorism: the use of the internet for terrorist purposes -  By Council of Europe 3 </li></ul><ul><ul><li>The threat of Cyber terrorism and the proliferation of the internet is leading to more use of the medium for criminal activities. </li></ul></ul><ul><ul><li>Three different aims: Economic confusion, discrimination of opponent and monetary income. </li></ul></ul>
    5. 5. First acts of Cyber Terrorism <ul><li>&quot;Phreaking&quot;.   People would use this method to trick telephone networks into giving them free long distance phone calls – 1972. 4 </li></ul><ul><li>hacking into &quot;corporate and academic institutions, and causing millions of dollars in damage&quot;. </li></ul><ul><li>viruses, spyware and worms. </li></ul><ul><li>Denial of Service or DoS attack. </li></ul>
    6. 6. First acts of Cyber Terrorism <ul><li>Barry C. Collin (senior research fellow at the Institute for Security and Intelligence in California) coined the term Cyber Terrorism in the mid 80’s. 4 </li></ul><ul><li>Expert on Cyber terrorism listed acts that are classed as modern Cyber terrorism: </li></ul><ul><ul><li>Gas line disruption </li></ul></ul><ul><ul><li>Remote detonation of bombs </li></ul></ul><ul><ul><li>Air Traffic disruption </li></ul></ul>
    7. 7. Cyber Terrorism - Can This Happen <ul><li>Collins assertions have been questioned as to likelihood by Mark Pollitt, special agent for the FBI. 4 </li></ul><ul><li>Human intervention in most processes. </li></ul><ul><li>Complexity of systems. </li></ul><ul><li>Physical threats are more damaging. </li></ul>
    8. 8. The Cost of Cyber Terrorism <ul><li>Direct costs </li></ul><ul><ul><li>Sales </li></ul></ul><ul><ul><li>Time </li></ul></ul><ul><ul><li>Intellectual </li></ul></ul><ul><ul><li>Bullet 1 </li></ul></ul><ul><li>Indirect costs </li></ul><ul><ul><li>Confidence </li></ul></ul><ul><ul><li>Business partners </li></ul></ul><ul><ul><li>Trust </li></ul></ul>
    9. 9. The Vulnerability Matrix Government Natural Gas 26,000 FDIC institutions 2,800 power plants 104 commercial nuclear plants 1,600 municipal wastewater facilities 2 million miles of pipelines 66,000 chemical plants 5,800 registered hospitals E-commerce 2 billion miles of cable 5,000 airports 300 maritime ports 300,000 production sites 120,000 miles of major rails 3,000 govt. facilities Home Users Broadband Connections Wireless Viruses, Worms Banking Telecom Emergency Services Chemical Rail Natural Gas Water Waste Water Transportation Oil 80,000 Dams Insiders Configuration Problems 150,000 miles transmission lines 130 overlapping grid controllers Electric
    10. 10. How are we protected from cyber Terrorism <ul><li>In today's technology, we are far more protected and aware of the presence and impact of physical terrorism </li></ul><ul><li>http:// www.youtube.com/watch?v =XstQ58r8FXo </li></ul><ul><li>In today's technology, we are far more protected and aware of the presence and impact of physical terrorism </li></ul><ul><li>http:// www.youtube.com/watch?v =XstQ58r8FXo </li></ul><ul><li>In today's technology, we are far more protected and aware of the presence and impact of physical terrorism </li></ul><ul><li>http:// www.youtube.com/watch?v =XstQ58r8FXo </li></ul><ul><li>In today's technology, we are far more protected and aware of the presence and impact of physical terrorism </li></ul><ul><li>http://www.youtube.com/watch?v=XstQ58r8FXo </li></ul><ul><li>In today's technology, we are far more protected and aware of the presence and impact of physical terrorism </li></ul><ul><li>http:// www.youtube.com/watch?v =XstQ58r8FXo </li></ul><ul><li>In today's technology, we are far more protected and aware of the presence and impact of physical terrorism </li></ul><ul><li>http://www.youtube.com/watch?v=XstQ58r8FXo </li></ul><ul><li>In today's technology, we are far more protected and aware of the presence and impact of physical terrorism </li></ul><ul><li>http:// www.youtube.com/watch?v =XstQ58r8FXo </li></ul><ul><li>In today's technology, we are far more protected and aware of the presence and impact of physical terrorism </li></ul><ul><li>http:// www.youtube.com/watch?v=XstQ58r8FXo </li></ul>
    11. 11. WHAT IS INTELLIGENCE GATHERING TO PROTECT US <ul><ul><li>Cyber terrorism requires many types of intelligence gathering to protect us, ranging from using the internet to conduct </li></ul></ul><ul><ul><ul><li>pre-operational intelligence gathering </li></ul></ul></ul><ul><ul><ul><li>communicating operational plans to the authorities where the terrorists may be using the web to sabotage our: </li></ul></ul></ul><ul><ul><ul><ul><li>critical banking systems, </li></ul></ul></ul></ul><ul><ul><ul><ul><li>ops, and </li></ul></ul></ul></ul><ul><ul><ul><ul><li>recruitment.  </li></ul></ul></ul></ul>
    12. 12. WHAT IS THE DIFFERENCE BETWEEN CYBER CRIME AND CYBER TERRORISM <ul><li>Cybercrime can involve theft of intellectual property, a violation of patent, trade secret, or copyright laws. However, cybercrime also includes attacks against computers to deliberately disrupt processing, or may include espionage to make unauthorized copies of classified data. </li></ul><ul><li>Cyber terrorism can be defined in different ways. It can be unlawful attacks and threats of attack against computers, networks, and the information stored there in when done to intimidate or coerce a government </li></ul>
    13. 13. How is it done? <ul><li>Cyber terrorism acts are done electronically, usually terrorist target serious official data by hacking into non-public system and extracting targeted data . </li></ul><ul><li>For Example: Most hacking has involved a serious as a nuclear, biological, or chemical terrorist attack. </li></ul>
    14. 14. How is it done? <ul><li>Cyber-crime can involve theft of intellectual property, a violation of patent, trade secret, or copyright laws. </li></ul><ul><li>However, cybercrime also includes attacks against computers to include espionage to make unauthorized copies of classified data. </li></ul>
    15. 15. Summary and Conclusion <ul><li>Cyber Terrorism has advanced from the early days of telco sabotage </li></ul><ul><li>Threats to national security through the internet </li></ul><ul><li>Economic espionage from other countries </li></ul><ul><li>State sponsored hackers compromising national infrastructure </li></ul>
    16. 16. Summary and Conclusion <ul><li>What have Countries and Organizations learnt from previous attacks </li></ul><ul><ul><li>US and Britain appear to be further advanced than others in cyber security; FBI have Cyber squads in field offices </li></ul></ul><ul><ul><li>Terrorists not using internet for full fledged attack, but are advancing their cause </li></ul></ul><ul><ul><li>US have a National Cyber Investigative Joint Task Force </li></ul></ul>
    17. 17. Summary and Conclusion <ul><ul><li>Are we better prepared? </li></ul></ul><ul><ul><ul><li>Yes but more diligence required and cooperation within countries and allies </li></ul></ul></ul><ul><ul><li>What should we be doing differently? </li></ul></ul><ul><ul><ul><li>Reliance on automation and less human intervention could open the door for future attacks </li></ul></ul></ul><ul><ul><li>Physical Terrorism still a larger threat? </li></ul></ul><ul><ul><ul><li>As seen through out the world this needs to be job one </li></ul></ul></ul>
    18. 18. Questions <ul><li>? </li></ul>
    19. 19. References <ul><li>1- Websters Dictionary </li></ul><ul><li>2- FBI definition </li></ul><ul><li>3 – Cyber terrorism: the use of the internet for terrorist purposes -  By Council of Europe 3 </li></ul><ul><li>4- The Internet encyclopedia, Volume 1 </li></ul><ul><li>6- http://www.fas.org/irp/crs/RL32114.pdf </li></ul><ul><li>7- ROBERT S. MUELLER, III DIRECTOR FEDERAL BUREAU OF INVESTIGATION Source: </li></ul><ul><ul><li>FDCH Congressional Testimony, 03/16/2011; </li></ul></ul>
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×