SlideShare a Scribd company logo
1 of 20
CYBER
TERRORISM
BY ANSH RAJ
CYBER TERRORISM IS THE USE OF INTERNET ATTACKS
IN TERRORIST ACTIVITIES, INCLUDING ACTS OF
DELIBERATE, LARGE-SCALE DISRUPTION OF COMPUTER
NETWORKS, ESPECIALLY OF PERSONAL COMPUTERS
ATTACHED TO THE INTERNET, BY THE MEANS OF TOOLS
SUCH AS COMPUTER VIRUSES.
What is cyber terrorism?
Cyber terrorism can be also defined as the intentional
use of computer, networks, and public internet to
cause destruction and harm for personal
objectives. Objectives may be political or ideological
since this can be seen as a form of terrorism.[2]
There is much concern from government and media
sources about potential damages that could be
caused by cyber terrorism, and this has prompted
official responses from government agencies.
Several minor incidents of cyber terrorism have been
documented.
There is debate over the basic definition of the scope of cyber
terrorism.There is variation in qualification by motivation,
targets, methods, and centrality of computer use in the act.
Depending on context, cyber terrorism may overlap
considerably with cybercrime, cyber war or
ordinary terrorism. Eugene Kaspersky founder of , now feels
that "cyberterrorism" is a more accurate terman "cyberwar."
He states that "with today's attacks, you are clueless about
who did it or when they will strike again. It's not cyber-war, but
cyberterrorism." He also equates large-scale cyber weapons,
such as the FlameVirus and NetTravelerVirus which his
company discovered, to biological weapons claiming that in
an interconnected world, they have the potential to be equally
If cyberterrorism is treated similarly to
traditional terrorism, then it only includes
attacks that threaten property or lives, and
can be defined as the leveraging of a
target's computers and information,
particularly via the Internet, to cause
physical, real-world harm or severe
disruption of infrastructure.terrorism does
not exist and is really a matter
of hacking or information warfare They
disagree with labelling it terrorism because
of the unlikelihood of the creation of fear,
significant physical harm, or death in a
population using electronic means,
considering current attack and protective
technologies.
Broad definition
Cyberterrorism is defined by
the Technolytics Institute as "The
premeditated use of disruptive
activities, or the threat thereof, against
computers and/or networks, with the
intention to cause harm or further
social, ideological, religious, political
or similar objectives. Or to intimidate
any person in furtherance of such
objectives." The term was coined by
Barry C. Collin.
Types of cyberterror capability
As the Internet becomes more pervasive in all areas of human endeavor,
individuals or groups can use the anonymity afforded by cyberspace to
threaten citizens, specific groups (i.e. with membership based on
ethnicity or belief), communities and entire countries, without the
inherent threat of capture, injury, or death to the attacker that being
physically present would bring. Many groups such as Anonymous, use
tools such as Denial-of-se rvic attack to attack and censor groups who
oppose them, creating many concerns for freedom and respect for
differences of thought.
Many believe that cyber terrorism is an extreme threat to our economy,
and fear an attack could potentially lead to another Great Depression.
Several leaders agree that cyber terrorism has the highest percentage of
threat over other possible attacks on U.S. territory. Although natural
disasters are considered a top threat and have proven to be devastating
to people and land, there is ultimately little that can be done to prevent
such events from happening. Thus, the expectation is to focus more on
preventative measures that will make Internet attacks impossible for
execution.
P U B L I C I N T E R E S T I N C Y B E R T E R R O R I S M
B E G A N I N T H E L A T E 1 9 8 0 S . A S 2 0 0 0
A P P R O A C H E D , T H E F E A R A N D U N C E R T A I N T Y
A B O U T T H E M I L L E N N I U M B U G H E I G H T E N E D ,
A S D I D T H E P O T E N T I A L F O R A T T A C K S B Y
C Y B E R T E R R O R I S T S . A L T H O U G H T H E
M I L L E N N I U M B U G W A S B Y N O M E A N S A
T E R R O R I S T A T T A C K O R P L O T A G A I N S T T H E
W O R L D O R T H E U N I T E D S T A T E S , I T D I D A C T
A S A C A T A L Y S T I N S P A R K I N G T H E F E A R S O F
A P O S S I B L Y L A R G E - S C A L E D E V A S T A T I N G
C Y B E R - A T T A C K . C O M M E N T A T O R S N O T E D
T H A T M A N Y O F T H E F A C T S O F S U C H
I N C I D E N T S S E E M E D T O C H A N G E , O F T E N
W I T H E X A G G E R A T E D M E D I A R E P O R T S .
History
T H E U S D E PA R T M E N T O F D E F E N S E ( D O D ) C H A R G E D
T H E U N I T E D S TAT E S S T R AT E G I C C O M M A N D W I T H T H E
D U T Y O F C O M B AT I N G C Y B E R T E R R O R I S M . T H I S I S
A C C O M P L I S H E D T H R O U G H T H E J O I N T TA S K F O R C E -
G L O B A L N E T W O R K O P E R AT I O N S , W H I C H O P E R AT I O N A L
C O M P O N E N T S U P P O R T I N G U S S T R AT C O M I N D E F E N S E O F
T H E D O D ' S G L O B A L I N F O R M AT I O N G R I D . T H I S I S D O N E
B Y I N T E G R AT I N G G N O C A PA B I L I T I E S I N T O T H E
O P E R AT I O N S O F A L L D O D C O M P U T E R S , N E T W O R K S ,
A N D S Y S T E M S U S E D B Y D O D C O M B ATA N T C O M M A N D S ,
S E R V I C E S A N D A G E N C I E S .
O N N O V E M B E R 2 , 2 0 0 6 , T H E S E C R E TA R Y O F T H E A I R
F O R C E A N N O U N C E D T H E C R E AT I O N O F T H E A I R
F O R C E ' S N E W E S T M A J C O M , T H E A I R F O R C E C Y B E R
C O M M A N D , W H I C H W O U L D B E TA S K E D T O M O N I T O R A N D
D E F E N D A M E R I C A N I N T E R E S T I N C Y B E R S PA C E . T H E
P L A N W A S H O W E V E R R E P L A C E D B Y T H E C R E AT I O N
O F T W E N T Y- F O U R T H A I R F O R C E
U.S. military
The Baltic state of Estonia was target to a massive denial-of-
service attack that ultimately rendered the country offline and
shut out from services dependent on Internet connectivity for
three weeks in the spring of 2007. The infrastructure of Estonia
including everything from online banking and mobile phone
networks to government services and access to health care
information was disabled for a time. The tech-dependent state
was in severe problem and there was a great deal of concern
over the nature and intent of the attack.
The cyber attack corresponded to an Estonian-Russian dispute
over the removal of a bronze statue depicting a World War II-
era Soviet soldier from the center of the capital, Tallinn. In the
midst of the armed conflict with Russia, Georgia likewise was
subject to sustanined and coordinated attacks on its electronic
infrastructure in August 2008. In both of these cases,
circumstantial
CHINA
The Chinese Defense Ministry
confirmed the existence of an
online defense unit in May 2011.
Composed of about thirty elite
internet specialists, the so-called
"Cyber Blue Team," or "Blue
Army," is officially claimed to be
engaged in cyber-defense
operations, though there are
fears the unit has been used to
penetrate secure online systems
of foreign
EXAMPLES
An operation can be done by
anyone anywhere in the world, for
it can be performed thousands of
miles away from a target. An
attack can cause serious damage
to a critical infrastructure which
may result in
casualties. Attacking an
infrastructure can be power
grids, monetary systems, dams,
media, and personal information.
In 1996, a computer hacker allegedly
associated with the White Supremacist
movement temporarily disabled a
Massachusetts ISP and damaged part of the
ISP's record keeping system. The ISP had
attempted to stop the hacker from sending
out worldwide racist messages under the ISP's
name. The hacker signed off with the threat,
"you have yet to see true electronic
terrorism. This is a promise."
I N 1 9 9 8 , S P A N I S H P R O T E S T E R S B O M B A R D E D T H E
I N S T I T U T E F O R G L O B A L C O M M U N I C A T I O N S ( I G C ) W I T H
T H O U S A N D S O F B O G U S E - M A I L M E S S A G E S . E - M A I L W A S
T I E D U P A N D U N D E L I V E R A B L E T O T H E I S P ' S U S E R S ,
A N D S U P P O R T L I N E S W E R E T I E D U P W I T H P E O P L E W H O
C O U L D N ' T G E T T H E I R M A I L . T H E P R O T E S T O R S A L S O
S P A M M E D I G C S T A F F A N D M E M B E R A C C O U N T S ,
C L O G G E D T H E I R I G C S E R V I C E S . T H E Y D E M A N D E D T H A T
I G C S T O P H O S T I N G T H E W E B S I T E F O R T H E E U S K A L
H E R R I A J O U R N A L , A N E W Y O R K - B A S E D P U B L I C A T I O N
S U P P O R T I N G B A S Q U E I N D E P E N D E N C E . P R O T E S T O R S
S A I D I G C S U P P O R T E D T E R R O R I S M B E C A U S E A S E C T I O N
O N T H E W E B P A G E S C O N T A I N E D M A T E R I A L S O N T H E
T E R R O R I S T G R O U P E T A , W H I C H C L A I M E D
R E S P O N S I B I L I T Y F O R A S S A S S I N A T I O N S O F S P A N I S H
P O L I T I C A L A N D S E C U R I T Y O F F I C I A L S , A N D A T T A C K S O N
M I L I T A R Y I N S T A L L A T I O N S . I G C F I N A L L Y R E L E N T E D
A N D P U L L E D T H E S I T E B E C A U S E O F T H E " M A I L
B O M B I N G S
DISASTOROUS ATTACKS
Non-political acts of sabotage have caused financial and other damage, as in a
case where a disgruntled employee, Vitek Boden (aka Peter Markan) caused the
release of 800,000 litres of untreated sewage into waterways in Maroochy Shire,
Australia.
More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the
wake of the removal of a Russian World War II war memorial from downtown
Tallinn. The attack was a distributed denial-of-service attack were knocked
offline; in addition, the political party website of Estonia's current Prime Minister
Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the
memorial statue. Despite speculation that the attack had been coordinated by the
Russian government, Estonia's defense minister admitted he had no conclusive
evidence linking cyber attacks to Russian authorities. Russia called accusations of
its involvement "unfounded," and neither NATO nor European Commission experts
were able to find any conclusive proof of official Russian government
participation. In January 2008 a man from Estonia was convicted for launching the
attacks against the Estonian Reform Party website and fined.
Even more recently, in October 2007, the website of Ukrainian
president Viktor Yushchenko was attacked by hackers. A radical
Russian nationalist youth group, the Eurasian Youth Movement,
claimed responsibility. against the NATO bombings of the Chinese
embassy in Belgrade. Businesses, public organizations and
academic institutions were bombarded with highly politicized
emails containing viruses from other European countries
The Japanese cyberpunk manga, Ghost in the Shell (as well
as its popular movie and TV adaptations) centers around
an anti-cyberterrorism and cybercrime unit. In its mid-21st
century Japan setting such attacks are made all the more
threatening by an even more widespread use of
technology including cybernetic enhancements to the
human body allowing people themselves to be direct In
1999 hackers attacked NATOcomputers. The computers
flooded them with email and hit them with a denial of
service(DoS). The hackers were protesting against the
NATO bombings of the Chinese embassy in Belgrade.
Businesses, public organizations and academic
institutions were bombarded with highly politicized
emails containing viruses from other
There are some who say that cyberterrorism does not
exist and is really a matter of hacking or information
warfare. They disagree with labelling it terrorism because
of the unlikelihood of the creation of fear, significant
physical harm, or death in a population using electronic
means, considering current attack and protective
technologies.
If a strict definition is assumed, then there have been no
or almost no identifiable incidents of cyberterrorism,
although there has been much public concern.
However, there is an old saying that death or loss of
property are the side products of terrorism, the main
purpose of such incidents is to create terror in peoples
mind. If any incident in the cyber world can create terror, it
may be called a Cyber-terrorism.
Cyber crime

More Related Content

What's hot

Bostater_Undergraduate_Portfolio
Bostater_Undergraduate_PortfolioBostater_Undergraduate_Portfolio
Bostater_Undergraduate_PortfolioSean Bostater
 
13 Fintech Startups to Watch in 2017 | Ajay Nagpal
13 Fintech Startups to Watch in 2017 | Ajay Nagpal13 Fintech Startups to Watch in 2017 | Ajay Nagpal
13 Fintech Startups to Watch in 2017 | Ajay NagpalAjay Nagpal
 
13 Industry Trends You Can't Afford to Ignore
13 Industry Trends You Can't Afford to Ignore13 Industry Trends You Can't Afford to Ignore
13 Industry Trends You Can't Afford to IgnoreErik Ingvoldstad
 
STC-PMC November 2016 Presentation - Mobile First Content
STC-PMC November 2016 Presentation - Mobile First ContentSTC-PMC November 2016 Presentation - Mobile First Content
STC-PMC November 2016 Presentation - Mobile First ContentSTC-Philadelphia Metro Chapter
 
Smart Retail Concepts using Artificial Intelligence
Smart Retail Concepts using Artificial IntelligenceSmart Retail Concepts using Artificial Intelligence
Smart Retail Concepts using Artificial IntelligenceGokul Alex
 
Meet Lorn Huxley
Meet Lorn HuxleyMeet Lorn Huxley
Meet Lorn HuxleyLorn Huxley
 
Codecademy Live QA Presentation
Codecademy Live QA PresentationCodecademy Live QA Presentation
Codecademy Live QA PresentationJames Kim
 
The evolution of the internet
The evolution of the internetThe evolution of the internet
The evolution of the internetRachelQuince
 
Social media creates social power
Social media creates social powerSocial media creates social power
Social media creates social powerStephanie G. Brooks
 
Introduction to facebook advertisement for beginners
Introduction to facebook advertisement for beginners Introduction to facebook advertisement for beginners
Introduction to facebook advertisement for beginners NupurSamaddar2
 
Broadcast Asia 2015: Converging Media
Broadcast Asia 2015: Converging MediaBroadcast Asia 2015: Converging Media
Broadcast Asia 2015: Converging MediaMartin Andanar
 
Project Management & Innovation
Project Management & InnovationProject Management & Innovation
Project Management & Innovationmade4gov
 
Gujarat Agro Business Policy 2016-21
Gujarat Agro Business Policy 2016-21Gujarat Agro Business Policy 2016-21
Gujarat Agro Business Policy 2016-21Shubham Soni
 
When Will Polar Ice Melt Be A Burning Issue?
When Will Polar Ice Melt Be A Burning Issue?When Will Polar Ice Melt Be A Burning Issue?
When Will Polar Ice Melt Be A Burning Issue?Peter Getty
 
SEO: A Crash Course | What is SEO in 2015? An Ethoseo™ Presentation
SEO: A Crash Course | What is SEO in 2015? An Ethoseo™ PresentationSEO: A Crash Course | What is SEO in 2015? An Ethoseo™ Presentation
SEO: A Crash Course | What is SEO in 2015? An Ethoseo™ PresentationDamien Wright
 
Org 536 effective business communications portfolio (f) copy
Org 536 effective business communications portfolio (f)   copyOrg 536 effective business communications portfolio (f)   copy
Org 536 effective business communications portfolio (f) copyYorkCSU
 
WWDC 2019 Cheatsheet
WWDC 2019 CheatsheetWWDC 2019 Cheatsheet
WWDC 2019 CheatsheetWanbok Choi
 
Disruptive Technologists: Grappling with the Economic Impact of AI & Automati...
Disruptive Technologists: Grappling with the Economic Impact of AI & Automati...Disruptive Technologists: Grappling with the Economic Impact of AI & Automati...
Disruptive Technologists: Grappling with the Economic Impact of AI & Automati...Oliver Christie
 

What's hot (20)

Bostater_Undergraduate_Portfolio
Bostater_Undergraduate_PortfolioBostater_Undergraduate_Portfolio
Bostater_Undergraduate_Portfolio
 
13 Fintech Startups to Watch in 2017 | Ajay Nagpal
13 Fintech Startups to Watch in 2017 | Ajay Nagpal13 Fintech Startups to Watch in 2017 | Ajay Nagpal
13 Fintech Startups to Watch in 2017 | Ajay Nagpal
 
1910s
1910s 1910s
1910s
 
13 Industry Trends You Can't Afford to Ignore
13 Industry Trends You Can't Afford to Ignore13 Industry Trends You Can't Afford to Ignore
13 Industry Trends You Can't Afford to Ignore
 
STC-PMC November 2016 Presentation - Mobile First Content
STC-PMC November 2016 Presentation - Mobile First ContentSTC-PMC November 2016 Presentation - Mobile First Content
STC-PMC November 2016 Presentation - Mobile First Content
 
Iccs report
Iccs report Iccs report
Iccs report
 
Smart Retail Concepts using Artificial Intelligence
Smart Retail Concepts using Artificial IntelligenceSmart Retail Concepts using Artificial Intelligence
Smart Retail Concepts using Artificial Intelligence
 
Meet Lorn Huxley
Meet Lorn HuxleyMeet Lorn Huxley
Meet Lorn Huxley
 
Codecademy Live QA Presentation
Codecademy Live QA PresentationCodecademy Live QA Presentation
Codecademy Live QA Presentation
 
The evolution of the internet
The evolution of the internetThe evolution of the internet
The evolution of the internet
 
Social media creates social power
Social media creates social powerSocial media creates social power
Social media creates social power
 
Introduction to facebook advertisement for beginners
Introduction to facebook advertisement for beginners Introduction to facebook advertisement for beginners
Introduction to facebook advertisement for beginners
 
Broadcast Asia 2015: Converging Media
Broadcast Asia 2015: Converging MediaBroadcast Asia 2015: Converging Media
Broadcast Asia 2015: Converging Media
 
Project Management & Innovation
Project Management & InnovationProject Management & Innovation
Project Management & Innovation
 
Gujarat Agro Business Policy 2016-21
Gujarat Agro Business Policy 2016-21Gujarat Agro Business Policy 2016-21
Gujarat Agro Business Policy 2016-21
 
When Will Polar Ice Melt Be A Burning Issue?
When Will Polar Ice Melt Be A Burning Issue?When Will Polar Ice Melt Be A Burning Issue?
When Will Polar Ice Melt Be A Burning Issue?
 
SEO: A Crash Course | What is SEO in 2015? An Ethoseo™ Presentation
SEO: A Crash Course | What is SEO in 2015? An Ethoseo™ PresentationSEO: A Crash Course | What is SEO in 2015? An Ethoseo™ Presentation
SEO: A Crash Course | What is SEO in 2015? An Ethoseo™ Presentation
 
Org 536 effective business communications portfolio (f) copy
Org 536 effective business communications portfolio (f)   copyOrg 536 effective business communications portfolio (f)   copy
Org 536 effective business communications portfolio (f) copy
 
WWDC 2019 Cheatsheet
WWDC 2019 CheatsheetWWDC 2019 Cheatsheet
WWDC 2019 Cheatsheet
 
Disruptive Technologists: Grappling with the Economic Impact of AI & Automati...
Disruptive Technologists: Grappling with the Economic Impact of AI & Automati...Disruptive Technologists: Grappling with the Economic Impact of AI & Automati...
Disruptive Technologists: Grappling with the Economic Impact of AI & Automati...
 

Viewers also liked

Viewers also liked (20)

Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism Presentation
Cyber Terrorism PresentationCyber Terrorism Presentation
Cyber Terrorism Presentation
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Debaratiitactcyberterrorimchapter
DebaratiitactcyberterrorimchapterDebaratiitactcyberterrorimchapter
Debaratiitactcyberterrorimchapter
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
network security
network securitynetwork security
network security
 
Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011Cyber terrorism fact or fiction - 2011
Cyber terrorism fact or fiction - 2011
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Trabajo de competencias
Trabajo de competenciasTrabajo de competencias
Trabajo de competencias
 

Similar to Cyber crime

Social Media and the Social Identity & Knowledge Gap Theory
Social Media and the Social Identity & Knowledge Gap TheorySocial Media and the Social Identity & Knowledge Gap Theory
Social Media and the Social Identity & Knowledge Gap TheoryDavid Onoue
 
Transformative identity and social constructions
Transformative identity and social constructionsTransformative identity and social constructions
Transformative identity and social constructionsfairyrings
 
English project .pdf topic Test vs T20 cricket
English project .pdf topic Test vs T20 cricketEnglish project .pdf topic Test vs T20 cricket
English project .pdf topic Test vs T20 cricketDevSharma303884
 
People + Machines
People + MachinesPeople + Machines
People + MachinesDigiday
 
Internet of Things: An Introduction
Internet of Things: An IntroductionInternet of Things: An Introduction
Internet of Things: An IntroductionNina Pilar Daniels
 
Sowk 388 Power Point Final
Sowk 388 Power Point FinalSowk 388 Power Point Final
Sowk 388 Power Point Finalsarahm2
 
8 Practical Ways to Help Children Who Are Syrian Refugees: Part One
8 Practical Ways to Help Children Who Are Syrian Refugees: Part One8 Practical Ways to Help Children Who Are Syrian Refugees: Part One
8 Practical Ways to Help Children Who Are Syrian Refugees: Part OneJohn Slifko, Ph.D
 
Fredy martinez
Fredy martinezFredy martinez
Fredy martinezdranalos
 
Student Assignment Agrarian Law - Lecturer Ricco Survival Yubaidi (14).pdf
Student Assignment Agrarian Law - Lecturer Ricco Survival Yubaidi (14).pdfStudent Assignment Agrarian Law - Lecturer Ricco Survival Yubaidi (14).pdf
Student Assignment Agrarian Law - Lecturer Ricco Survival Yubaidi (14).pdf224100501
 
Connecting the dots of user experience in retail
Connecting the dots of user experience in retailConnecting the dots of user experience in retail
Connecting the dots of user experience in retailioTHEATRE
 
Domenica Cresap on the Yahoo Hack
Domenica Cresap on the Yahoo HackDomenica Cresap on the Yahoo Hack
Domenica Cresap on the Yahoo HackDomenica Cresap
 
Oil Vs. Renewables Energies, Tradition Vs. Pragmatism.
Oil Vs. Renewables Energies, Tradition Vs. Pragmatism. Oil Vs. Renewables Energies, Tradition Vs. Pragmatism.
Oil Vs. Renewables Energies, Tradition Vs. Pragmatism. Javier N Blassiotto
 
T minus 10 - Rocket Scientist Livingston Holder
T minus 10 - Rocket Scientist Livingston HolderT minus 10 - Rocket Scientist Livingston Holder
T minus 10 - Rocket Scientist Livingston HolderDylan Taylor
 
The Unicorn Leaps into Tech Talk
The Unicorn Leaps into Tech TalkThe Unicorn Leaps into Tech Talk
The Unicorn Leaps into Tech TalkQuid Inc.
 
Formazione social rsi g iornata 1 - modulo 1
Formazione social rsi   g iornata 1 - modulo 1 Formazione social rsi   g iornata 1 - modulo 1
Formazione social rsi g iornata 1 - modulo 1 Massimo Salomoni
 
Open day 2021 -scienze cantone
Open day   2021  -scienze cantoneOpen day   2021  -scienze cantone
Open day 2021 -scienze cantoneSOSStoria
 

Similar to Cyber crime (20)

Social Media and the Social Identity & Knowledge Gap Theory
Social Media and the Social Identity & Knowledge Gap TheorySocial Media and the Social Identity & Knowledge Gap Theory
Social Media and the Social Identity & Knowledge Gap Theory
 
Transformative identity and social constructions
Transformative identity and social constructionsTransformative identity and social constructions
Transformative identity and social constructions
 
English project .pdf topic Test vs T20 cricket
English project .pdf topic Test vs T20 cricketEnglish project .pdf topic Test vs T20 cricket
English project .pdf topic Test vs T20 cricket
 
People + Machines
People + MachinesPeople + Machines
People + Machines
 
Internet of Things: An Introduction
Internet of Things: An IntroductionInternet of Things: An Introduction
Internet of Things: An Introduction
 
Sowk 388 Power Point Final
Sowk 388 Power Point FinalSowk 388 Power Point Final
Sowk 388 Power Point Final
 
8 Practical Ways to Help Children Who Are Syrian Refugees: Part One
8 Practical Ways to Help Children Who Are Syrian Refugees: Part One8 Practical Ways to Help Children Who Are Syrian Refugees: Part One
8 Practical Ways to Help Children Who Are Syrian Refugees: Part One
 
Fredy martinez
Fredy martinezFredy martinez
Fredy martinez
 
13 Industry Trends You Can't Afford to Ignore
13 Industry Trends You Can't Afford to Ignore13 Industry Trends You Can't Afford to Ignore
13 Industry Trends You Can't Afford to Ignore
 
Student Assignment Agrarian Law - Lecturer Ricco Survival Yubaidi (14).pdf
Student Assignment Agrarian Law - Lecturer Ricco Survival Yubaidi (14).pdfStudent Assignment Agrarian Law - Lecturer Ricco Survival Yubaidi (14).pdf
Student Assignment Agrarian Law - Lecturer Ricco Survival Yubaidi (14).pdf
 
Fortress Tomis
Fortress TomisFortress Tomis
Fortress Tomis
 
Connecting the dots of user experience in retail
Connecting the dots of user experience in retailConnecting the dots of user experience in retail
Connecting the dots of user experience in retail
 
Domenica Cresap on the Yahoo Hack
Domenica Cresap on the Yahoo HackDomenica Cresap on the Yahoo Hack
Domenica Cresap on the Yahoo Hack
 
Oil Vs. Renewables Energies, Tradition Vs. Pragmatism.
Oil Vs. Renewables Energies, Tradition Vs. Pragmatism. Oil Vs. Renewables Energies, Tradition Vs. Pragmatism.
Oil Vs. Renewables Energies, Tradition Vs. Pragmatism.
 
La tecnologia
La tecnologiaLa tecnologia
La tecnologia
 
T minus 10 - Rocket Scientist Livingston Holder
T minus 10 - Rocket Scientist Livingston HolderT minus 10 - Rocket Scientist Livingston Holder
T minus 10 - Rocket Scientist Livingston Holder
 
The Unicorn Leaps into Tech Talk
The Unicorn Leaps into Tech TalkThe Unicorn Leaps into Tech Talk
The Unicorn Leaps into Tech Talk
 
-la-historia-del-telefono
-la-historia-del-telefono-la-historia-del-telefono
-la-historia-del-telefono
 
Formazione social rsi g iornata 1 - modulo 1
Formazione social rsi   g iornata 1 - modulo 1 Formazione social rsi   g iornata 1 - modulo 1
Formazione social rsi g iornata 1 - modulo 1
 
Open day 2021 -scienze cantone
Open day   2021  -scienze cantoneOpen day   2021  -scienze cantone
Open day 2021 -scienze cantone
 

Recently uploaded

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Lucknow
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 

Recently uploaded (20)

VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICECall Girls Service Dwarka @9999965857 Delhi 🫦 No Advance  VVIP 🍎 SERVICE
Call Girls Service Dwarka @9999965857 Delhi 🫦 No Advance VVIP 🍎 SERVICE
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
sasti delhi Call Girls in munirka 🔝 9953056974 🔝 escort Service-
 
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja VipCall Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
Call Girls Service Adil Nagar 7001305949 Need escorts Service Pooja Vip
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 

Cyber crime

  • 2. CYBER TERRORISM IS THE USE OF INTERNET ATTACKS IN TERRORIST ACTIVITIES, INCLUDING ACTS OF DELIBERATE, LARGE-SCALE DISRUPTION OF COMPUTER NETWORKS, ESPECIALLY OF PERSONAL COMPUTERS ATTACHED TO THE INTERNET, BY THE MEANS OF TOOLS SUCH AS COMPUTER VIRUSES. What is cyber terrorism?
  • 3. Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this can be seen as a form of terrorism.[2] There is much concern from government and media sources about potential damages that could be caused by cyber terrorism, and this has prompted official responses from government agencies. Several minor incidents of cyber terrorism have been documented.
  • 4. There is debate over the basic definition of the scope of cyber terrorism.There is variation in qualification by motivation, targets, methods, and centrality of computer use in the act. Depending on context, cyber terrorism may overlap considerably with cybercrime, cyber war or ordinary terrorism. Eugene Kaspersky founder of , now feels that "cyberterrorism" is a more accurate terman "cyberwar." He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism." He also equates large-scale cyber weapons, such as the FlameVirus and NetTravelerVirus which his company discovered, to biological weapons claiming that in an interconnected world, they have the potential to be equally
  • 5. If cyberterrorism is treated similarly to traditional terrorism, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.terrorism does not exist and is really a matter of hacking or information warfare They disagree with labelling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.
  • 6. Broad definition Cyberterrorism is defined by the Technolytics Institute as "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives." The term was coined by Barry C. Collin.
  • 7. Types of cyberterror capability
  • 8. As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. Many groups such as Anonymous, use tools such as Denial-of-se rvic attack to attack and censor groups who oppose them, creating many concerns for freedom and respect for differences of thought. Many believe that cyber terrorism is an extreme threat to our economy, and fear an attack could potentially lead to another Great Depression. Several leaders agree that cyber terrorism has the highest percentage of threat over other possible attacks on U.S. territory. Although natural disasters are considered a top threat and have proven to be devastating to people and land, there is ultimately little that can be done to prevent such events from happening. Thus, the expectation is to focus more on preventative measures that will make Internet attacks impossible for execution.
  • 9. P U B L I C I N T E R E S T I N C Y B E R T E R R O R I S M B E G A N I N T H E L A T E 1 9 8 0 S . A S 2 0 0 0 A P P R O A C H E D , T H E F E A R A N D U N C E R T A I N T Y A B O U T T H E M I L L E N N I U M B U G H E I G H T E N E D , A S D I D T H E P O T E N T I A L F O R A T T A C K S B Y C Y B E R T E R R O R I S T S . A L T H O U G H T H E M I L L E N N I U M B U G W A S B Y N O M E A N S A T E R R O R I S T A T T A C K O R P L O T A G A I N S T T H E W O R L D O R T H E U N I T E D S T A T E S , I T D I D A C T A S A C A T A L Y S T I N S P A R K I N G T H E F E A R S O F A P O S S I B L Y L A R G E - S C A L E D E V A S T A T I N G C Y B E R - A T T A C K . C O M M E N T A T O R S N O T E D T H A T M A N Y O F T H E F A C T S O F S U C H I N C I D E N T S S E E M E D T O C H A N G E , O F T E N W I T H E X A G G E R A T E D M E D I A R E P O R T S . History
  • 10. T H E U S D E PA R T M E N T O F D E F E N S E ( D O D ) C H A R G E D T H E U N I T E D S TAT E S S T R AT E G I C C O M M A N D W I T H T H E D U T Y O F C O M B AT I N G C Y B E R T E R R O R I S M . T H I S I S A C C O M P L I S H E D T H R O U G H T H E J O I N T TA S K F O R C E - G L O B A L N E T W O R K O P E R AT I O N S , W H I C H O P E R AT I O N A L C O M P O N E N T S U P P O R T I N G U S S T R AT C O M I N D E F E N S E O F T H E D O D ' S G L O B A L I N F O R M AT I O N G R I D . T H I S I S D O N E B Y I N T E G R AT I N G G N O C A PA B I L I T I E S I N T O T H E O P E R AT I O N S O F A L L D O D C O M P U T E R S , N E T W O R K S , A N D S Y S T E M S U S E D B Y D O D C O M B ATA N T C O M M A N D S , S E R V I C E S A N D A G E N C I E S . O N N O V E M B E R 2 , 2 0 0 6 , T H E S E C R E TA R Y O F T H E A I R F O R C E A N N O U N C E D T H E C R E AT I O N O F T H E A I R F O R C E ' S N E W E S T M A J C O M , T H E A I R F O R C E C Y B E R C O M M A N D , W H I C H W O U L D B E TA S K E D T O M O N I T O R A N D D E F E N D A M E R I C A N I N T E R E S T I N C Y B E R S PA C E . T H E P L A N W A S H O W E V E R R E P L A C E D B Y T H E C R E AT I O N O F T W E N T Y- F O U R T H A I R F O R C E U.S. military
  • 11. The Baltic state of Estonia was target to a massive denial-of- service attack that ultimately rendered the country offline and shut out from services dependent on Internet connectivity for three weeks in the spring of 2007. The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time. The tech-dependent state was in severe problem and there was a great deal of concern over the nature and intent of the attack. The cyber attack corresponded to an Estonian-Russian dispute over the removal of a bronze statue depicting a World War II- era Soviet soldier from the center of the capital, Tallinn. In the midst of the armed conflict with Russia, Georgia likewise was subject to sustanined and coordinated attacks on its electronic infrastructure in August 2008. In both of these cases, circumstantial
  • 12. CHINA The Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team," or "Blue Army," is officially claimed to be engaged in cyber-defense operations, though there are fears the unit has been used to penetrate secure online systems of foreign
  • 13. EXAMPLES An operation can be done by anyone anywhere in the world, for it can be performed thousands of miles away from a target. An attack can cause serious damage to a critical infrastructure which may result in casualties. Attacking an infrastructure can be power grids, monetary systems, dams, media, and personal information.
  • 14. In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise."
  • 15. I N 1 9 9 8 , S P A N I S H P R O T E S T E R S B O M B A R D E D T H E I N S T I T U T E F O R G L O B A L C O M M U N I C A T I O N S ( I G C ) W I T H T H O U S A N D S O F B O G U S E - M A I L M E S S A G E S . E - M A I L W A S T I E D U P A N D U N D E L I V E R A B L E T O T H E I S P ' S U S E R S , A N D S U P P O R T L I N E S W E R E T I E D U P W I T H P E O P L E W H O C O U L D N ' T G E T T H E I R M A I L . T H E P R O T E S T O R S A L S O S P A M M E D I G C S T A F F A N D M E M B E R A C C O U N T S , C L O G G E D T H E I R I G C S E R V I C E S . T H E Y D E M A N D E D T H A T I G C S T O P H O S T I N G T H E W E B S I T E F O R T H E E U S K A L H E R R I A J O U R N A L , A N E W Y O R K - B A S E D P U B L I C A T I O N S U P P O R T I N G B A S Q U E I N D E P E N D E N C E . P R O T E S T O R S S A I D I G C S U P P O R T E D T E R R O R I S M B E C A U S E A S E C T I O N O N T H E W E B P A G E S C O N T A I N E D M A T E R I A L S O N T H E T E R R O R I S T G R O U P E T A , W H I C H C L A I M E D R E S P O N S I B I L I T Y F O R A S S A S S I N A T I O N S O F S P A N I S H P O L I T I C A L A N D S E C U R I T Y O F F I C I A L S , A N D A T T A C K S O N M I L I T A R Y I N S T A L L A T I O N S . I G C F I N A L L Y R E L E N T E D A N D P U L L E D T H E S I T E B E C A U S E O F T H E " M A I L B O M B I N G S DISASTOROUS ATTACKS
  • 16. Non-political acts of sabotage have caused financial and other damage, as in a case where a disgruntled employee, Vitek Boden (aka Peter Markan) caused the release of 800,000 litres of untreated sewage into waterways in Maroochy Shire, Australia. More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn. The attack was a distributed denial-of-service attack were knocked offline; in addition, the political party website of Estonia's current Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue. Despite speculation that the attack had been coordinated by the Russian government, Estonia's defense minister admitted he had no conclusive evidence linking cyber attacks to Russian authorities. Russia called accusations of its involvement "unfounded," and neither NATO nor European Commission experts were able to find any conclusive proof of official Russian government participation. In January 2008 a man from Estonia was convicted for launching the attacks against the Estonian Reform Party website and fined.
  • 17. Even more recently, in October 2007, the website of Ukrainian president Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility. against the NATO bombings of the Chinese embassy in Belgrade. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries
  • 18. The Japanese cyberpunk manga, Ghost in the Shell (as well as its popular movie and TV adaptations) centers around an anti-cyberterrorism and cybercrime unit. In its mid-21st century Japan setting such attacks are made all the more threatening by an even more widespread use of technology including cybernetic enhancements to the human body allowing people themselves to be direct In 1999 hackers attacked NATOcomputers. The computers flooded them with email and hit them with a denial of service(DoS). The hackers were protesting against the NATO bombings of the Chinese embassy in Belgrade. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other
  • 19. There are some who say that cyberterrorism does not exist and is really a matter of hacking or information warfare. They disagree with labelling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies. If a strict definition is assumed, then there have been no or almost no identifiable incidents of cyberterrorism, although there has been much public concern. However, there is an old saying that death or loss of property are the side products of terrorism, the main purpose of such incidents is to create terror in peoples mind. If any incident in the cyber world can create terror, it may be called a Cyber-terrorism.