Cyber Terrorism
Cyber Terrorism
Adrian Suarez
Gabriel Otero
Fraz Bokhari
Professor G. S. Young
CS375 Computers &
Society
August 10, 2012
Historical Facts
One of the first recorded cyber-terrorist attacks was in 1996
when a computer hacker allegedly associated with the White
Supremacist movement temporarily disabled a
Massachusetts Internet service provider (ISP) and damaged
part of the ISP's record keeping system.
The ISP had attempted to stop the hacker from sending out
worldwide racist messages under the ISP's name.
The hacker signed off with the threat, "you have yet to see
true electronic terrorism. This is a promise.
." Since 1996, attacks have continued with increasing
severity.
Cyber Terrorism
Why cyber terrorism?
- Cheaper than other methods
- More difficult to get caught
- Can be done from anywhere.
- Can affect more people
Countries with most cyber terrorism as in 2002
- United States = 35.4%
- South Korea = 12.8%
- China
= 6.2 %
- Germany
= 6.7 %
- France
= 4.0 %
More statistics
In the first half of 2002, there were more than 180,000 Internet based
attacks on business.
Attacks against the Internet increase at an annual rate above 60%.
The average business will experience 32 break-in attempts this week.
Reported systems vulnerabilities and security incidents are doubling
each year.
The reported number of vulnerabilities and security incidents represent
an estimated 10% of the actual total.
Anonymous
Hacker leaderless movement.
Originated in 2003 on the imageboard 4chan
Use masks for disguise.
Most famous hacktivist group in the world.
Use their technological knowledge to attack corporations and
organizations they consider corrupt.
Their first act was against the church of Scientology
- Released videos on YouTube to inform people
about the danger scientology and conduct protests against them.
- Showed hundreds of illegal actions, fraudulent
activities and violations of human rights committed by the
church of scientology.
- Released another video on YouTube calling for global
protest.
Legal Provisions
Amendments under the Information Technology Act, 2000 has
defined the term Cyberterrorism U/Sec. 66F. This is the first
ever attempt to define the term.
It includes:1. Threatening the unity, integrity, security or sovereignty
2. Denying access to authourized person to access computer
resource
Legal Provisions
3. Contaminating computer with mallware
4. Conduct causes death, injuries,damage to or destruction of property.
Cybercrime Treaty
1.
International agreement to foster international cooperation among
law enforcement agencies of different countries in fighting cyber
terrorism
2.
Treaty sets common standards to resolve international cases
Punishment
Whoever commits or conspires to commit cyber
terrorism shall be punishable with imprisonment
which may extend to imprisonment for life. I.e.
Imprisonment not exceeding fourteen years (Sec.
55, IPC)
In some countries whoever commits the offence
of cyber terrorism and causes death of any
person shall be punishable with death or
imprisonment for life.
Works Cited
Krasavin , Serge . "What is Cyber-terrorism?." Computer Crime
Research Center (CCRC). Computer Crime Research Center,
2002. Web. 5 Jul 2012. <http://www.crimeresearch.org/library/Cyber-terrorism.htm>.
Tafoya, William L.. "Cyber Terror." Federal Bureau of
Investigations. FBI, Nov 2011. Web. 5 Jul 2012.
<http://www.fbi.gov/stats-services/publications/law-enforcementbulletin/november-2011/cyber-terror>.
Wright, M.. Technology and terrorism: how the internet facilitates
radicalization. N.p., 2008. Web. 5 Jul 2012.
<http://www.theforensicexaminer.com/archive/winter08/7/>.
Gabriel, W.."Internet modern." . N.p., 2005. Web. 5 Jul 2012.
<http://www.securityaffairs.org/issues/2005/08/weimann.php/>.
"International Activists Use Facebook To Fight Terrorism."
FoxNews. Fox News, 08 Dec 2008. Web. 5 Jul 2012.
<http://www.foxnews.com/story/0,2933,459945,00.html>.