2. CYBER TERRORISM IS THE USE OF INTERNET ATTACKS
IN TERRORIST ACTIVITIES, INCLUDING ACTS OF
DELIBERATE, LARGE-SCALE DISRUPTION OF COMPUTER
NETWORKS, ESPECIALLY OF PERSONAL COMPUTERS
ATTACHED TO THE INTERNET, BY THE MEANS OF TOOLS
SUCH AS COMPUTER VIRUSES.
What is cyber terrorism?
3. Cyber terrorism can be also defined as the intentional
use of computer, networks, and public internet to
cause destruction and harm for personal
objectives. Objectives may be political or ideological
since this can be seen as a form of terrorism.[2]
There is much concern from government and media
sources about potential damages that could be
caused by cyber terrorism, and this has prompted
official responses from government agencies.
Several minor incidents of cyber terrorism have been
documented.
4. There is debate over the basic definition of the scope of cyber
terrorism.There is variation in qualification by motivation,
targets, methods, and centrality of computer use in the act.
Depending on context, cyber terrorism may overlap
considerably with cybercrime, cyber war or
ordinary terrorism. Eugene Kaspersky founder of , now feels
that "cyberterrorism" is a more accurate terman "cyberwar."
He states that "with today's attacks, you are clueless about
who did it or when they will strike again. It's not cyber-war, but
cyberterrorism." He also equates large-scale cyber weapons,
such as the FlameVirus and NetTravelerVirus which his
company discovered, to biological weapons claiming that in
an interconnected world, they have the potential to be equally
5. If cyberterrorism is treated similarly to
traditional terrorism, then it only includes
attacks that threaten property or lives, and
can be defined as the leveraging of a
target's computers and information,
particularly via the Internet, to cause
physical, real-world harm or severe
disruption of infrastructure.terrorism does
not exist and is really a matter
of hacking or information warfare They
disagree with labelling it terrorism because
of the unlikelihood of the creation of fear,
significant physical harm, or death in a
population using electronic means,
considering current attack and protective
technologies.
6. Broad definition
Cyberterrorism is defined by
the Technolytics Institute as "The
premeditated use of disruptive
activities, or the threat thereof, against
computers and/or networks, with the
intention to cause harm or further
social, ideological, religious, political
or similar objectives. Or to intimidate
any person in furtherance of such
objectives." The term was coined by
Barry C. Collin.
8. As the Internet becomes more pervasive in all areas of human endeavor,
individuals or groups can use the anonymity afforded by cyberspace to
threaten citizens, specific groups (i.e. with membership based on
ethnicity or belief), communities and entire countries, without the
inherent threat of capture, injury, or death to the attacker that being
physically present would bring. Many groups such as Anonymous, use
tools such as Denial-of-se rvic attack to attack and censor groups who
oppose them, creating many concerns for freedom and respect for
differences of thought.
Many believe that cyber terrorism is an extreme threat to our economy,
and fear an attack could potentially lead to another Great Depression.
Several leaders agree that cyber terrorism has the highest percentage of
threat over other possible attacks on U.S. territory. Although natural
disasters are considered a top threat and have proven to be devastating
to people and land, there is ultimately little that can be done to prevent
such events from happening. Thus, the expectation is to focus more on
preventative measures that will make Internet attacks impossible for
execution.
9. P U B L I C I N T E R E S T I N C Y B E R T E R R O R I S M
B E G A N I N T H E L A T E 1 9 8 0 S . A S 2 0 0 0
A P P R O A C H E D , T H E F E A R A N D U N C E R T A I N T Y
A B O U T T H E M I L L E N N I U M B U G H E I G H T E N E D ,
A S D I D T H E P O T E N T I A L F O R A T T A C K S B Y
C Y B E R T E R R O R I S T S . A L T H O U G H T H E
M I L L E N N I U M B U G W A S B Y N O M E A N S A
T E R R O R I S T A T T A C K O R P L O T A G A I N S T T H E
W O R L D O R T H E U N I T E D S T A T E S , I T D I D A C T
A S A C A T A L Y S T I N S P A R K I N G T H E F E A R S O F
A P O S S I B L Y L A R G E - S C A L E D E V A S T A T I N G
C Y B E R - A T T A C K . C O M M E N T A T O R S N O T E D
T H A T M A N Y O F T H E F A C T S O F S U C H
I N C I D E N T S S E E M E D T O C H A N G E , O F T E N
W I T H E X A G G E R A T E D M E D I A R E P O R T S .
History
10. T H E U S D E PA R T M E N T O F D E F E N S E ( D O D ) C H A R G E D
T H E U N I T E D S TAT E S S T R AT E G I C C O M M A N D W I T H T H E
D U T Y O F C O M B AT I N G C Y B E R T E R R O R I S M . T H I S I S
A C C O M P L I S H E D T H R O U G H T H E J O I N T TA S K F O R C E -
G L O B A L N E T W O R K O P E R AT I O N S , W H I C H O P E R AT I O N A L
C O M P O N E N T S U P P O R T I N G U S S T R AT C O M I N D E F E N S E O F
T H E D O D ' S G L O B A L I N F O R M AT I O N G R I D . T H I S I S D O N E
B Y I N T E G R AT I N G G N O C A PA B I L I T I E S I N T O T H E
O P E R AT I O N S O F A L L D O D C O M P U T E R S , N E T W O R K S ,
A N D S Y S T E M S U S E D B Y D O D C O M B ATA N T C O M M A N D S ,
S E R V I C E S A N D A G E N C I E S .
O N N O V E M B E R 2 , 2 0 0 6 , T H E S E C R E TA R Y O F T H E A I R
F O R C E A N N O U N C E D T H E C R E AT I O N O F T H E A I R
F O R C E ' S N E W E S T M A J C O M , T H E A I R F O R C E C Y B E R
C O M M A N D , W H I C H W O U L D B E TA S K E D T O M O N I T O R A N D
D E F E N D A M E R I C A N I N T E R E S T I N C Y B E R S PA C E . T H E
P L A N W A S H O W E V E R R E P L A C E D B Y T H E C R E AT I O N
O F T W E N T Y- F O U R T H A I R F O R C E
U.S. military
11. The Baltic state of Estonia was target to a massive denial-of-
service attack that ultimately rendered the country offline and
shut out from services dependent on Internet connectivity for
three weeks in the spring of 2007. The infrastructure of Estonia
including everything from online banking and mobile phone
networks to government services and access to health care
information was disabled for a time. The tech-dependent state
was in severe problem and there was a great deal of concern
over the nature and intent of the attack.
The cyber attack corresponded to an Estonian-Russian dispute
over the removal of a bronze statue depicting a World War II-
era Soviet soldier from the center of the capital, Tallinn. In the
midst of the armed conflict with Russia, Georgia likewise was
subject to sustanined and coordinated attacks on its electronic
infrastructure in August 2008. In both of these cases,
circumstantial
12. CHINA
The Chinese Defense Ministry
confirmed the existence of an
online defense unit in May 2011.
Composed of about thirty elite
internet specialists, the so-called
"Cyber Blue Team," or "Blue
Army," is officially claimed to be
engaged in cyber-defense
operations, though there are
fears the unit has been used to
penetrate secure online systems
of foreign
13. EXAMPLES
An operation can be done by
anyone anywhere in the world, for
it can be performed thousands of
miles away from a target. An
attack can cause serious damage
to a critical infrastructure which
may result in
casualties. Attacking an
infrastructure can be power
grids, monetary systems, dams,
media, and personal information.
14. In 1996, a computer hacker allegedly
associated with the White Supremacist
movement temporarily disabled a
Massachusetts ISP and damaged part of the
ISP's record keeping system. The ISP had
attempted to stop the hacker from sending
out worldwide racist messages under the ISP's
name. The hacker signed off with the threat,
"you have yet to see true electronic
terrorism. This is a promise."
15. I N 1 9 9 8 , S P A N I S H P R O T E S T E R S B O M B A R D E D T H E
I N S T I T U T E F O R G L O B A L C O M M U N I C A T I O N S ( I G C ) W I T H
T H O U S A N D S O F B O G U S E - M A I L M E S S A G E S . E - M A I L W A S
T I E D U P A N D U N D E L I V E R A B L E T O T H E I S P ' S U S E R S ,
A N D S U P P O R T L I N E S W E R E T I E D U P W I T H P E O P L E W H O
C O U L D N ' T G E T T H E I R M A I L . T H E P R O T E S T O R S A L S O
S P A M M E D I G C S T A F F A N D M E M B E R A C C O U N T S ,
C L O G G E D T H E I R I G C S E R V I C E S . T H E Y D E M A N D E D T H A T
I G C S T O P H O S T I N G T H E W E B S I T E F O R T H E E U S K A L
H E R R I A J O U R N A L , A N E W Y O R K - B A S E D P U B L I C A T I O N
S U P P O R T I N G B A S Q U E I N D E P E N D E N C E . P R O T E S T O R S
S A I D I G C S U P P O R T E D T E R R O R I S M B E C A U S E A S E C T I O N
O N T H E W E B P A G E S C O N T A I N E D M A T E R I A L S O N T H E
T E R R O R I S T G R O U P E T A , W H I C H C L A I M E D
R E S P O N S I B I L I T Y F O R A S S A S S I N A T I O N S O F S P A N I S H
P O L I T I C A L A N D S E C U R I T Y O F F I C I A L S , A N D A T T A C K S O N
M I L I T A R Y I N S T A L L A T I O N S . I G C F I N A L L Y R E L E N T E D
A N D P U L L E D T H E S I T E B E C A U S E O F T H E " M A I L
B O M B I N G S
DISASTOROUS ATTACKS
16. Non-political acts of sabotage have caused financial and other damage, as in a
case where a disgruntled employee, Vitek Boden (aka Peter Markan) caused the
release of 800,000 litres of untreated sewage into waterways in Maroochy Shire,
Australia.
More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the
wake of the removal of a Russian World War II war memorial from downtown
Tallinn. The attack was a distributed denial-of-service attack were knocked
offline; in addition, the political party website of Estonia's current Prime Minister
Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the
memorial statue. Despite speculation that the attack had been coordinated by the
Russian government, Estonia's defense minister admitted he had no conclusive
evidence linking cyber attacks to Russian authorities. Russia called accusations of
its involvement "unfounded," and neither NATO nor European Commission experts
were able to find any conclusive proof of official Russian government
participation. In January 2008 a man from Estonia was convicted for launching the
attacks against the Estonian Reform Party website and fined.
17. Even more recently, in October 2007, the website of Ukrainian
president Viktor Yushchenko was attacked by hackers. A radical
Russian nationalist youth group, the Eurasian Youth Movement,
claimed responsibility. against the NATO bombings of the Chinese
embassy in Belgrade. Businesses, public organizations and
academic institutions were bombarded with highly politicized
emails containing viruses from other European countries
18. The Japanese cyberpunk manga, Ghost in the Shell (as well
as its popular movie and TV adaptations) centers around
an anti-cyberterrorism and cybercrime unit. In its mid-21st
century Japan setting such attacks are made all the more
threatening by an even more widespread use of
technology including cybernetic enhancements to the
human body allowing people themselves to be direct In
1999 hackers attacked NATOcomputers. The computers
flooded them with email and hit them with a denial of
service(DoS). The hackers were protesting against the
NATO bombings of the Chinese embassy in Belgrade.
Businesses, public organizations and academic
institutions were bombarded with highly politicized
emails containing viruses from other
19. There are some who say that cyberterrorism does not
exist and is really a matter of hacking or information
warfare. They disagree with labelling it terrorism because
of the unlikelihood of the creation of fear, significant
physical harm, or death in a population using electronic
means, considering current attack and protective
technologies.
If a strict definition is assumed, then there have been no
or almost no identifiable incidents of cyberterrorism,
although there has been much public concern.
However, there is an old saying that death or loss of
property are the side products of terrorism, the main
purpose of such incidents is to create terror in peoples
mind. If any incident in the cyber world can create terror, it
may be called a Cyber-terrorism.