CyberTerrorism JUS 394 Nick Messina
Objective <ul><li>To be able to determine which unlawful acts are actually considered CyberTerrorism. </li></ul><ul><li>Th...
What is CyberTerrorism? <ul><li>Since the idea of CyberTerrorism is relatively new, its definitions continue to evolve, wh...
Here are some of those definitions
<ul><li>“…the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of ...
<ul><li>“… the premeditated, politically motivated attack against information, computer systems, and data which result in ...
<ul><li>“ The extent to which cyber-techniques are used for espionage, sabotage, or terrorism (Bronskill, 2001)” </li></ul>
Key Point To Consider <ul><li>How to determine the difference between CyberTerrorism, hacking, and vandalism. </li></ul><u...
Desmond’s Example <ul><li>Most people would not view a 14-year-old launching a virus as Cyber-Terrorism; However launching...
Taking a look at the differences <ul><li>A 14-year-old could be motivated by the desire for attention, the desire to cause...
Taking a look at the differences cont. <ul><li>A CyberTerrorist group would most likely have more specific goals or object...
Just how susceptible is the United States? <ul><li>http:// youtube.com/watch?v =RaQCURNL5rQ </li></ul>
THE END
Upcoming SlideShare
Loading in...5
×

Cyber Terrorism Presentation

16,178

Published on

by Nick Mesina, a student of JUS394 IT & Social Justice, at Arizona State University

Published in: Technology, News & Politics
0 Comments
9 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
16,178
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
0
Comments
0
Likes
9
Embeds 0
No embeds

No notes for slide

Cyber Terrorism Presentation

  1. 1. CyberTerrorism JUS 394 Nick Messina
  2. 2. Objective <ul><li>To be able to determine which unlawful acts are actually considered CyberTerrorism. </li></ul><ul><li>The United States’ susceptibility to CyberTerrorism </li></ul>
  3. 3. What is CyberTerrorism? <ul><li>Since the idea of CyberTerrorism is relatively new, its definitions continue to evolve, which is why there is no official definition of CyberTerrorism. </li></ul><ul><li>It varies from… </li></ul><ul><li>Stealing Data and hacking </li></ul><ul><li>Planning terrorist attacks </li></ul><ul><li>Causing violence </li></ul><ul><li>Or attacking information systems </li></ul>
  4. 4. Here are some of those definitions
  5. 5. <ul><li>“…the convergence of terrorism and cyberspace. It is generally understood to mean unlawful attacks and threats of attacks against computers, networks, and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political and social objectives (Denning, 2000).” </li></ul>
  6. 6. <ul><li>“… the premeditated, politically motivated attack against information, computer systems, and data which result in violence against noncombatant targets by subnational groups and clandestine agents (Pollitt,2001).” </li></ul>
  7. 7. <ul><li>“ The extent to which cyber-techniques are used for espionage, sabotage, or terrorism (Bronskill, 2001)” </li></ul>
  8. 8. Key Point To Consider <ul><li>How to determine the difference between CyberTerrorism, hacking, and vandalism. </li></ul><ul><li>One major, identifying factor is understand the motivation or intention of the person or group carrying out the attack. </li></ul>
  9. 9. Desmond’s Example <ul><li>Most people would not view a 14-year-old launching a virus as Cyber-Terrorism; However launching a virus attack could easily be viewed as Cyber-Terrorism. </li></ul><ul><li>This is why it is important to consider the intentions and motivations of the person or group launching the attack. </li></ul>
  10. 10. Taking a look at the differences <ul><li>A 14-year-old could be motivated by the desire for attention, the desire to cause trouble, or the desire to prove themselves capable of launching a virus attack. </li></ul><ul><li>The character Zero Coolmovie, Hackers , is an example of this. </li></ul><ul><li>Dade &quot;Zero Cool&quot; Murphy is arrested and charged, at the age of 11, with crashing 1,507 systems in one day and causing a single day 7 point drop in the New York Stock Exchange. </li></ul>
  11. 11. Taking a look at the differences cont. <ul><li>A CyberTerrorist group would most likely have more specific goals or objectives, usually political. </li></ul><ul><li>The movie, Live Free Or Die Hard , is an example of this. </li></ul><ul><li>A terrorist group led by a vindictive, ex government employee, plotted to systematically shut down the United States infrastructure with a plan that consisted of three parts: </li></ul><ul><li>1) Disabling all traffic and transportation hubs/systems </li></ul><ul><li>2) Disrupt financial sectors and telecommunications </li></ul><ul><li>3) Disabling water/electric/ oil utilities, nuclear systems, and anything else tied into computers, </li></ul><ul><li>Notice the specific goals </li></ul>
  12. 12. Just how susceptible is the United States? <ul><li>http:// youtube.com/watch?v =RaQCURNL5rQ </li></ul>
  13. 13. THE END

×