SlideShare a Scribd company logo
1 of 32
Cyberterrorism
        Merlyna Lim
           JUS394
     IT  Social Justice
  Arizona State University
1996….
• .... a computer hacker allegedly associated
  with the White Supremacist movement
  temporarily disabled a Massachusetts
  Internet Service Provider and damaged part
  of the ISPs record keeping system.
• The ISP had attempted to stop the hacker
  from sending out worldwide racist
  messages under the ISPs name.
• The hacker signed off with the threat, “you
  have yet to see true electronic terrorism.
  This is a promise.”
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism
Lim JUS 394 Cyberterrorism

More Related Content

What's hot

Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifelAhmed Tememe
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixPaul Joyal
 
Ransomware attacks ravage computer networks in dozens of
Ransomware attacks ravage computer networks in dozens ofRansomware attacks ravage computer networks in dozens of
Ransomware attacks ravage computer networks in dozens ofMark Crawford
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareSecuricon
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
1.3 Understanding cyber crimes in detail
1.3 Understanding cyber crimes in detail1.3 Understanding cyber crimes in detail
1.3 Understanding cyber crimes in detailNavjyotsinh Jadeja
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassaultMohammad Husain
 
Digital divide final ppt
Digital divide final pptDigital divide final ppt
Digital divide final pptRowshan begum
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ssMaira Asif
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearNIST, berhampur
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 

What's hot (20)

Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
28658043 cyber-terrorism
28658043 cyber-terrorism28658043 cyber-terrorism
28658043 cyber-terrorism
 
Network security threats ahmed s. gifel
Network security threats ahmed s. gifelNetwork security threats ahmed s. gifel
Network security threats ahmed s. gifel
 
Cyber crime final
Cyber crime finalCyber crime final
Cyber crime final
 
Cyberterrorism final
Cyberterrorism finalCyberterrorism final
Cyberterrorism final
 
GovSec Joyal New Threat Matrix
GovSec Joyal New Threat MatrixGovSec Joyal New Threat Matrix
GovSec Joyal New Threat Matrix
 
Ransomware attacks ravage computer networks in dozens of
Ransomware attacks ravage computer networks in dozens ofRansomware attacks ravage computer networks in dozens of
Ransomware attacks ravage computer networks in dozens of
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
1.2 Who are Cyber Criminals
1.2 Who are Cyber Criminals1.2 Who are Cyber Criminals
1.2 Who are Cyber Criminals
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
1.3 Understanding cyber crimes in detail
1.3 Understanding cyber crimes in detail1.3 Understanding cyber crimes in detail
1.3 Understanding cyber crimes in detail
 
Business under cyberassault
Business under cyberassaultBusiness under cyberassault
Business under cyberassault
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Digital divide final ppt
Digital divide final pptDigital divide final ppt
Digital divide final ppt
 
Cyber warfare ss
Cyber warfare ssCyber warfare ss
Cyber warfare ss
 
cyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spearcyber crime, terrorism and corruption public spear
cyber crime, terrorism and corruption public spear
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 

Similar to Lim JUS 394 Cyberterrorism

[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet CrimeGerman Teran
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliAdv Prashant Mali
 
Emerging threats of cyberterrorism
Emerging threats of cyberterrorismEmerging threats of cyberterrorism
Emerging threats of cyberterrorismNishith Pandit
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptxKoukiGaz
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhanAhmed Sleem
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docxDesarae Veit
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsAdam David Brown
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Peter Timusk
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threatsisc2dfw
 

Similar to Lim JUS 394 Cyberterrorism (20)

[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime[Exposicion] Computer and Internet Crime
[Exposicion] Computer and Internet Crime
 
Report on Hacking
Report on HackingReport on Hacking
Report on Hacking
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyber Crime
Cyber  CrimeCyber  Crime
Cyber Crime
 
Cyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant MaliCyber warfare Threat to Cyber Security by Prashant Mali
Cyber warfare Threat to Cyber Security by Prashant Mali
 
Emerging threats of cyberterrorism
Emerging threats of cyberterrorismEmerging threats of cyberterrorism
Emerging threats of cyberterrorism
 
Cybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law PerspectiveCybercrime: An Analysis from Positive Law Perspective
Cybercrime: An Analysis from Positive Law Perspective
 
cyber_crime (1).pptx
cyber_crime (1).pptxcyber_crime (1).pptx
cyber_crime (1).pptx
 
Tema 5.cybersecurity
Tema 5.cybersecurityTema 5.cybersecurity
Tema 5.cybersecurity
 
Mohammed tariq alsharhan
Mohammed tariq alsharhanMohammed tariq alsharhan
Mohammed tariq alsharhan
 
HacktivismPaper.docx
HacktivismPaper.docxHacktivismPaper.docx
HacktivismPaper.docx
 
Challenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human RightsChallenges from the Cyber Domain: Cyber Security and Human Rights
Challenges from the Cyber Domain: Cyber Security and Human Rights
 
Cyber crime (2)
Cyber crime (2)Cyber crime (2)
Cyber crime (2)
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003Hacking Law Reform LAWS4305 2003
Hacking Law Reform LAWS4305 2003
 
Malwares
MalwaresMalwares
Malwares
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber crime
Cyber crimeCyber crime
Cyber crime
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 

More from merlyna

The truth of science for justice and peace(4)
The truth of science for justice and peace(4)The truth of science for justice and peace(4)
The truth of science for justice and peace(4)merlyna
 
Asu Complaint Choir 2009
Asu Complaint Choir 2009Asu Complaint Choir 2009
Asu Complaint Choir 2009merlyna
 
Lim Jus394 Internet Publicsphere
Lim Jus394 Internet PublicsphereLim Jus394 Internet Publicsphere
Lim Jus394 Internet Publicspheremerlyna
 
Lim Jus394 Utopian Dystopian
Lim Jus394 Utopian DystopianLim Jus394 Utopian Dystopian
Lim Jus394 Utopian Dystopianmerlyna
 
Jus394 Nethistory
Jus394 NethistoryJus394 Nethistory
Jus394 Nethistorymerlyna
 
Jus494 Politics Technology
Jus494 Politics TechnologyJus494 Politics Technology
Jus494 Politics Technologymerlyna
 
Jus394 Spring09 Intro
Jus394 Spring09 IntroJus394 Spring09 Intro
Jus394 Spring09 Intromerlyna
 
Lim Kuala Lumpur 2008
Lim Kuala Lumpur 2008Lim Kuala Lumpur 2008
Lim Kuala Lumpur 2008merlyna
 
Salvador Castro Globalization
Salvador Castro GlobalizationSalvador Castro Globalization
Salvador Castro Globalizationmerlyna
 
Joseph Vogt: Farming
Joseph Vogt: FarmingJoseph Vogt: Farming
Joseph Vogt: Farmingmerlyna
 
Karen Kasold: Media Globalization And Inequality
Karen Kasold: Media Globalization And InequalityKaren Kasold: Media Globalization And Inequality
Karen Kasold: Media Globalization And Inequalitymerlyna
 
Crystina Riffel: Pharmaceutical Drug Policies
Crystina Riffel: Pharmaceutical Drug PoliciesCrystina Riffel: Pharmaceutical Drug Policies
Crystina Riffel: Pharmaceutical Drug Policiesmerlyna
 
Douglass Swhwimer: Outsourcing
Douglass Swhwimer: OutsourcingDouglass Swhwimer: Outsourcing
Douglass Swhwimer: Outsourcingmerlyna
 
Kevin Overbeck: Race Science And Inequality
Kevin Overbeck: Race Science And InequalityKevin Overbeck: Race Science And Inequality
Kevin Overbeck: Race Science And Inequalitymerlyna
 
Erika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell PhoneErika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell Phonemerlyna
 
Paul Shenkyr Presentation
Paul Shenkyr PresentationPaul Shenkyr Presentation
Paul Shenkyr Presentationmerlyna
 
Tony Ngon: Corporate Use of Technology
Tony Ngon: Corporate Use of TechnologyTony Ngon: Corporate Use of Technology
Tony Ngon: Corporate Use of Technologymerlyna
 
Yvonne Plascencia: Malnutrition
Yvonne Plascencia: MalnutritionYvonne Plascencia: Malnutrition
Yvonne Plascencia: Malnutritionmerlyna
 
Ryan Carpenter: The Role Technology Played In The Cold War
Ryan Carpenter: The Role Technology Played In The Cold WarRyan Carpenter: The Role Technology Played In The Cold War
Ryan Carpenter: The Role Technology Played In The Cold Warmerlyna
 
Quinn Heydt: Steroids And Issues Of Inequality And Morality
Quinn Heydt: Steroids And Issues Of Inequality And MoralityQuinn Heydt: Steroids And Issues Of Inequality And Morality
Quinn Heydt: Steroids And Issues Of Inequality And Moralitymerlyna
 

More from merlyna (20)

The truth of science for justice and peace(4)
The truth of science for justice and peace(4)The truth of science for justice and peace(4)
The truth of science for justice and peace(4)
 
Asu Complaint Choir 2009
Asu Complaint Choir 2009Asu Complaint Choir 2009
Asu Complaint Choir 2009
 
Lim Jus394 Internet Publicsphere
Lim Jus394 Internet PublicsphereLim Jus394 Internet Publicsphere
Lim Jus394 Internet Publicsphere
 
Lim Jus394 Utopian Dystopian
Lim Jus394 Utopian DystopianLim Jus394 Utopian Dystopian
Lim Jus394 Utopian Dystopian
 
Jus394 Nethistory
Jus394 NethistoryJus394 Nethistory
Jus394 Nethistory
 
Jus494 Politics Technology
Jus494 Politics TechnologyJus494 Politics Technology
Jus494 Politics Technology
 
Jus394 Spring09 Intro
Jus394 Spring09 IntroJus394 Spring09 Intro
Jus394 Spring09 Intro
 
Lim Kuala Lumpur 2008
Lim Kuala Lumpur 2008Lim Kuala Lumpur 2008
Lim Kuala Lumpur 2008
 
Salvador Castro Globalization
Salvador Castro GlobalizationSalvador Castro Globalization
Salvador Castro Globalization
 
Joseph Vogt: Farming
Joseph Vogt: FarmingJoseph Vogt: Farming
Joseph Vogt: Farming
 
Karen Kasold: Media Globalization And Inequality
Karen Kasold: Media Globalization And InequalityKaren Kasold: Media Globalization And Inequality
Karen Kasold: Media Globalization And Inequality
 
Crystina Riffel: Pharmaceutical Drug Policies
Crystina Riffel: Pharmaceutical Drug PoliciesCrystina Riffel: Pharmaceutical Drug Policies
Crystina Riffel: Pharmaceutical Drug Policies
 
Douglass Swhwimer: Outsourcing
Douglass Swhwimer: OutsourcingDouglass Swhwimer: Outsourcing
Douglass Swhwimer: Outsourcing
 
Kevin Overbeck: Race Science And Inequality
Kevin Overbeck: Race Science And InequalityKevin Overbeck: Race Science And Inequality
Kevin Overbeck: Race Science And Inequality
 
Erika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell PhoneErika Ricard: Reliance and Dependency -- Cell Phone
Erika Ricard: Reliance and Dependency -- Cell Phone
 
Paul Shenkyr Presentation
Paul Shenkyr PresentationPaul Shenkyr Presentation
Paul Shenkyr Presentation
 
Tony Ngon: Corporate Use of Technology
Tony Ngon: Corporate Use of TechnologyTony Ngon: Corporate Use of Technology
Tony Ngon: Corporate Use of Technology
 
Yvonne Plascencia: Malnutrition
Yvonne Plascencia: MalnutritionYvonne Plascencia: Malnutrition
Yvonne Plascencia: Malnutrition
 
Ryan Carpenter: The Role Technology Played In The Cold War
Ryan Carpenter: The Role Technology Played In The Cold WarRyan Carpenter: The Role Technology Played In The Cold War
Ryan Carpenter: The Role Technology Played In The Cold War
 
Quinn Heydt: Steroids And Issues Of Inequality And Morality
Quinn Heydt: Steroids And Issues Of Inequality And MoralityQuinn Heydt: Steroids And Issues Of Inequality And Morality
Quinn Heydt: Steroids And Issues Of Inequality And Morality
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Lim JUS 394 Cyberterrorism

  • 1. Cyberterrorism Merlyna Lim JUS394 IT Social Justice Arizona State University
  • 2. 1996…. • .... a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts Internet Service Provider and damaged part of the ISPs record keeping system. • The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISPs name. • The hacker signed off with the threat, “you have yet to see true electronic terrorism. This is a promise.”