The preceding case studies show a direct relationship between political conflicts and increased cyber attack activity. Further, they highlight that this malicious cyber activity can have concrete political and economic consequences. In the Israel/Palestinian conflict, following events such as car bombings and mortar shellings, there were increases in the number of cyber attacks. Subsequent to the April 1, 2001 mid-air collision between an American surveillance plane and a Chinese fighter aircraft, Chinese hacker groups immediately organized a massive and sustained week-long campaign of cyber attacks against American targets.
The cyberwar strategy relies on hacking, virus writing, electronic snooping and plenty of good old-fashioned human spying. Much disruption can be unleashed over the Internet, but attackers first need to pry open electronic gates to private and secure networks with well-placed insiders, or at least inside knowledge, before they can be effective. Source: Far Eastern Economic Review , Copyright (c) 2001, Dow Jones & Company, Inc., Thursday, August 16, 2001, Innovation, Cyberwar, Combat on The Web; Charles Bickers in Tokyo
... a Hewlett Packard printer at the Navy's Space and Naval Warfare Systems Command Center (SPAWAR) in San Diego was reportedly reprogrammed to print out additional copies of all documents to a printer in Russia. Domain Name Service (DNS) attacks are ones we have not paid much attention to. The vulnerability at the local level is very high by a malicious insider. Lack of cyber diversity increases the chances of a simple but widely effective attack. Routing Vulnerabilities. Example - Possibly attacking the border gateway protocol (BGP) which routers use to made decisions about where to sent traffic on the Internet. This protocol is vulnerable to information poisoning that could corrupt routing tables. The result of this action would be a very effective Internet 'black hole' where large volumes of information header for destination all over the world would be lost.
California Independent System Operator Berkowitz source: http://www.nap.edu/issues/17.2/berkowitz.htm Information Warfare: Time to Prepare Cooperation between the government and industry is essential to protecting the nation's information infrastructure.
Cyberterrorism: The Bloodless War?
The threat of terrorist attacks against U.S. citizens and U.S. interests around the world has become the nation’s most pressing national security issue. … This aggression may include cyber attacks by the terrorists themselves or by targeted nation-states . “ The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.” This broad definition was created by Kevin G. Coleman of the Technolytics Institute.
Even more likely are cyber attacks by sympathizers of the terrorists, hackers with general anti-US or anti-allied sentiments, or thrill-seekers with no particular political motivation. Cyber Attacks During the War on Terrorism: A Predictive Analysis
Dartmouth Institute for Security Technology Studies
For 11 days in Feb 2001, a development server at cal-ISO electricity exchange was left connected to the internet and was being quietly hacked
“ A foreign adversary could significantly hinder U.S. Forces in reaching, say, the Persian gulf or Taiwan straits by attacking the computers at commercial harbor facilities used to ship ammunition or the air traffic control system that would be needed to support and airlift personnel and supplies” ( Bruce Berkowitz )