SlideShare a Scribd company logo
1 of 3
SEA (SyrianElectronicArmy)
The SEA (Syrian Electronic Army) is an organized group of Syrian computer hackers aligned
with the actual regime, using cyber attacks (DDoS, spam and straight hacking) targeting
political opposition and Western websites(1).
Although not directly related to the Syrian government, they share similar agendas. The SEA
has a strong political orientation, its main objective being “to fight those who use the Internet
and especially Facebook to “spread hatred” and “destabilize the security” in Syria (2).
Terrorist attacks of special interest
-

AP Hack (23 April 2013): The SEA hijacked the Associated Press Twitter account and
falsely claimed the White House had been bombed and President Barack Obama
injured. This caused a temporary $136 billion in Dow Jones stock market index (3).

-

15 August 2013: Advertising serviceOutbrain was hacked by the SEA. This allowed
them to place posts into the websites of The Washington Post, Time, and CNN (4).

Terrorist nature and context
We first need to try to define what terrorism and cyberterrorism is. If we search Oxford
Dictionary :
Terrorism –“the unofficial or unauthorized use of violence and intimidation in the pursuit of
political aims” (5).
Cyberterrorism –“the politically motivated use of computers and information technology to
cause severe disruption or widespread fear” (6).
As we can see, terrorism and cyberterrorism are quite similar in essence, both focusing in
spreading fear with a political aim. Using the revised consensus academic definition on
terrorism made by Schmid (7), we see further relations between terrorism and cyberterrorism:
fear generating intention, propagandistic agitation by non-state actors in zones of conflict,
threat based communication processes, the targeting of civilians, political use and being part
of an organized campaign of acts.
Cyberterrorism does not intent to cause direct deaths (although one of the main concerns of
technical experts is the chance of a cyberterrorist group to successfully attack critical
infrastructures of a country like dams, power grids or nuclear plants), but nevertheless is
violent in its nature.
Its violence is mainly psychological: Through attacks to mass media (like those mentioned
above) and a massive use of social networks like Facebook and Twitter, the SEA spreads its
propaganda in order to influence public opinion, with the main objective being to force foreign
states to accept Al-Assad regime and crushing online the opposition.
The SEA has publicly taken credit for these attacks in its own website (solving one of the
greatest issues of cyberterrorism, the attribution), and are with no doubt an organized group
(divided as they say into battalions). If we refer to the EU Common Position 2001/931/CFSP
(8), Article 3 defines what can be considered as a terrorist act, while Article 2 defines a
terrorist group.
According to Article 3 (iii)(d): “seriously destabilizing or destroying the fundamental political,
constitutional, economic or social structures of acountry or an international
organization:causing extensive destruction to a Government orpublic facility, a transport
system, an infrastructurefacility, including an information system, a fixed platform located on
the continental shelf, a public place or private property, likely to endanger human life orresult
in major economic loss”.
The SEA activities fall perfectly into this article. Several international organizations have
watched SEA’s rising with concern, and FBI has put them on a watch list (9), and UK
government has several SEA membersassets freezed under finantial sanctions (10)
Conclusion
Cyberterrorism has several differences with terrorism but its essence is the same: use violence
with political intent. And cyberterrorism is a rising tide, with an onerous risk of a successful
attack to a critical infrastructure which causes severe human loss, so it just can’t be left aside.
The Syrian Electronic Army is a dedicated group that uses cyber attacks to influence public
opinion and politicians, following to the letter the"Terrorists want a lot of people watching, not
a lot of people dead" cited by Jenkins (11).
Although SEA has not commited extremely severe attacks, its potential to cause damage is
clear. This is the main reason the EU should mark it as a terrorist group, being the first entity to
officially list cyberterrorism as a critical menace and giving its due relevance.
Sources
(1) Syrian Electronic Army - Homepage
http://sea.sy/index/en
(2)The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East:
The Case of the Syrian Electronic Army
https://opennet.net/emergence-open-and-organized-pro-government-cyber-attacks-middleeast-case-syrian-electronic-army
(3) Washinton Post – Associated Press Hack
http://www.washingtonpost.com/blogs/worldviews/wp/2013/04/23/syrian-hackers-claim-aphack-that-tipped-stock-market-by-136-billion-is-it-terrorism/
(4) BBC – Washington Post, CNN and Time websites hit by pro-Assad hackers
http://www.bbc.co.uk/news/technology-23712007
(5) Oxford Dictionaries: Definition of terrorism
http://oxforddictionaries.com/definition/english/terrorism
(6) Oxford dictionaries - Cyberterrorism
http://oxforddictionaries.com/definition/english/cyberterrorism
(7) Schmid, Alex P. - The Revised Academic Consensus Definition of Terrorism, Perspectives on
Terrorism, Vol 6 No 2 (2012)
(8)COUNCIL COMMON POSITIONof 27 December 2001on the application of specific measures
to combat terrorism
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2001:344:0093:0096:EN:PDF
(9) FBI Advisory list- SEA
http://publicintelligence.net/fbi-sea/
(10) Consolidated list of financial sanctions targets in the UK
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/227452/00_
syria.pdf
(11) Brian Michael Jenkins.Unconquerable Nation: Knowing Our Enemy, Strengthening
Ourselves

More Related Content

Similar to SEA - Syrian Electronic Army - Cyberterrorism

P A R T VCyber Terrorism The New”Face of Terrorism.docx
P A R T  VCyber Terrorism The New”Face of Terrorism.docxP A R T  VCyber Terrorism The New”Face of Terrorism.docx
P A R T VCyber Terrorism The New”Face of Terrorism.docxgerardkortney
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxoreo10
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816Nicole Fields
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation OllieShoresna
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxdorishigh
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research PaperRachel Phillips
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationBenjamin Morley
 

Similar to SEA - Syrian Electronic Army - Cyberterrorism (8)

P A R T VCyber Terrorism The New”Face of Terrorism.docx
P A R T  VCyber Terrorism The New”Face of Terrorism.docxP A R T  VCyber Terrorism The New”Face of Terrorism.docx
P A R T VCyber Terrorism The New”Face of Terrorism.docx
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 
Essay On Terrorism In World
Essay On Terrorism In WorldEssay On Terrorism In World
Essay On Terrorism In World
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 

More from Antonio Sanz Alcober

Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Antonio Sanz Alcober
 
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.Antonio Sanz Alcober
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideAntonio Sanz Alcober
 
Sex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminSex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminAntonio Sanz Alcober
 
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Antonio Sanz Alcober
 
Harry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en WordpressHarry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en WordpressAntonio Sanz Alcober
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminAntonio Sanz Alcober
 
Cibercrimen qué hace tu dinero cuando no lo miras
Cibercrimen   qué hace tu dinero cuando no lo mirasCibercrimen   qué hace tu dinero cuando no lo miras
Cibercrimen qué hace tu dinero cuando no lo mirasAntonio Sanz Alcober
 
Administracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadanoAdministracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadanoAntonio Sanz Alcober
 
Solving Big problems with Condor - II HPC Sysadmins Meeting
Solving Big problems with Condor - II HPC Sysadmins MeetingSolving Big problems with Condor - II HPC Sysadmins Meeting
Solving Big problems with Condor - II HPC Sysadmins MeetingAntonio Sanz Alcober
 
Supercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañanaSupercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañanaAntonio Sanz Alcober
 
Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...Antonio Sanz Alcober
 
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)Antonio Sanz Alcober
 
Capacidades de China para la ciberguerra
Capacidades de China para la ciberguerraCapacidades de China para la ciberguerra
Capacidades de China para la ciberguerraAntonio Sanz Alcober
 

More from Antonio Sanz Alcober (20)

Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
 
Zen y el arte de pescar APT
Zen y el arte de pescar APTZen y el arte de pescar APT
Zen y el arte de pescar APT
 
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
 
Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
Sex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminSex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadmin
 
Cómo comprar seguro en internet
Cómo comprar seguro en internetCómo comprar seguro en internet
Cómo comprar seguro en internet
 
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
 
Harry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en WordpressHarry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en Wordpress
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadmin
 
Cibercrimen qué hace tu dinero cuando no lo miras
Cibercrimen   qué hace tu dinero cuando no lo mirasCibercrimen   qué hace tu dinero cuando no lo miras
Cibercrimen qué hace tu dinero cuando no lo miras
 
Administracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadanoAdministracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadano
 
Solving Big problems with Condor - II HPC Sysadmins Meeting
Solving Big problems with Condor - II HPC Sysadmins MeetingSolving Big problems with Condor - II HPC Sysadmins Meeting
Solving Big problems with Condor - II HPC Sysadmins Meeting
 
Supercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañanaSupercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañana
 
Historia de la inteligencia china
Historia de la inteligencia chinaHistoria de la inteligencia china
Historia de la inteligencia china
 
Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...
 
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
 
Seguridad en redes sociales
Seguridad en redes socialesSeguridad en redes sociales
Seguridad en redes sociales
 
Capacidades de China para la ciberguerra
Capacidades de China para la ciberguerraCapacidades de China para la ciberguerra
Capacidades de China para la ciberguerra
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 

Recently uploaded

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

SEA - Syrian Electronic Army - Cyberterrorism

  • 1. SEA (SyrianElectronicArmy) The SEA (Syrian Electronic Army) is an organized group of Syrian computer hackers aligned with the actual regime, using cyber attacks (DDoS, spam and straight hacking) targeting political opposition and Western websites(1). Although not directly related to the Syrian government, they share similar agendas. The SEA has a strong political orientation, its main objective being “to fight those who use the Internet and especially Facebook to “spread hatred” and “destabilize the security” in Syria (2). Terrorist attacks of special interest - AP Hack (23 April 2013): The SEA hijacked the Associated Press Twitter account and falsely claimed the White House had been bombed and President Barack Obama injured. This caused a temporary $136 billion in Dow Jones stock market index (3). - 15 August 2013: Advertising serviceOutbrain was hacked by the SEA. This allowed them to place posts into the websites of The Washington Post, Time, and CNN (4). Terrorist nature and context We first need to try to define what terrorism and cyberterrorism is. If we search Oxford Dictionary : Terrorism –“the unofficial or unauthorized use of violence and intimidation in the pursuit of political aims” (5). Cyberterrorism –“the politically motivated use of computers and information technology to cause severe disruption or widespread fear” (6). As we can see, terrorism and cyberterrorism are quite similar in essence, both focusing in spreading fear with a political aim. Using the revised consensus academic definition on terrorism made by Schmid (7), we see further relations between terrorism and cyberterrorism: fear generating intention, propagandistic agitation by non-state actors in zones of conflict, threat based communication processes, the targeting of civilians, political use and being part of an organized campaign of acts. Cyberterrorism does not intent to cause direct deaths (although one of the main concerns of technical experts is the chance of a cyberterrorist group to successfully attack critical infrastructures of a country like dams, power grids or nuclear plants), but nevertheless is violent in its nature. Its violence is mainly psychological: Through attacks to mass media (like those mentioned above) and a massive use of social networks like Facebook and Twitter, the SEA spreads its propaganda in order to influence public opinion, with the main objective being to force foreign states to accept Al-Assad regime and crushing online the opposition. The SEA has publicly taken credit for these attacks in its own website (solving one of the greatest issues of cyberterrorism, the attribution), and are with no doubt an organized group
  • 2. (divided as they say into battalions). If we refer to the EU Common Position 2001/931/CFSP (8), Article 3 defines what can be considered as a terrorist act, while Article 2 defines a terrorist group. According to Article 3 (iii)(d): “seriously destabilizing or destroying the fundamental political, constitutional, economic or social structures of acountry or an international organization:causing extensive destruction to a Government orpublic facility, a transport system, an infrastructurefacility, including an information system, a fixed platform located on the continental shelf, a public place or private property, likely to endanger human life orresult in major economic loss”. The SEA activities fall perfectly into this article. Several international organizations have watched SEA’s rising with concern, and FBI has put them on a watch list (9), and UK government has several SEA membersassets freezed under finantial sanctions (10) Conclusion Cyberterrorism has several differences with terrorism but its essence is the same: use violence with political intent. And cyberterrorism is a rising tide, with an onerous risk of a successful attack to a critical infrastructure which causes severe human loss, so it just can’t be left aside. The Syrian Electronic Army is a dedicated group that uses cyber attacks to influence public opinion and politicians, following to the letter the"Terrorists want a lot of people watching, not a lot of people dead" cited by Jenkins (11). Although SEA has not commited extremely severe attacks, its potential to cause damage is clear. This is the main reason the EU should mark it as a terrorist group, being the first entity to officially list cyberterrorism as a critical menace and giving its due relevance.
  • 3. Sources (1) Syrian Electronic Army - Homepage http://sea.sy/index/en (2)The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army https://opennet.net/emergence-open-and-organized-pro-government-cyber-attacks-middleeast-case-syrian-electronic-army (3) Washinton Post – Associated Press Hack http://www.washingtonpost.com/blogs/worldviews/wp/2013/04/23/syrian-hackers-claim-aphack-that-tipped-stock-market-by-136-billion-is-it-terrorism/ (4) BBC – Washington Post, CNN and Time websites hit by pro-Assad hackers http://www.bbc.co.uk/news/technology-23712007 (5) Oxford Dictionaries: Definition of terrorism http://oxforddictionaries.com/definition/english/terrorism (6) Oxford dictionaries - Cyberterrorism http://oxforddictionaries.com/definition/english/cyberterrorism (7) Schmid, Alex P. - The Revised Academic Consensus Definition of Terrorism, Perspectives on Terrorism, Vol 6 No 2 (2012) (8)COUNCIL COMMON POSITIONof 27 December 2001on the application of specific measures to combat terrorism http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2001:344:0093:0096:EN:PDF (9) FBI Advisory list- SEA http://publicintelligence.net/fbi-sea/ (10) Consolidated list of financial sanctions targets in the UK https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/227452/00_ syria.pdf (11) Brian Michael Jenkins.Unconquerable Nation: Knowing Our Enemy, Strengthening Ourselves