cyber crime

20
CYBER TERRORISM BY ANSH RAJ Do not try at home

Upload: aman-raj

Post on 10-Aug-2015

15 views

Category:

Internet


0 download

TRANSCRIPT

CYBER TERRORISM BY ANSH

RAJ

Do not try at home

CYBER TERRORISM IS THE USE

OF INTERNET ATTACKS

IN TERRORIST ACTIVITIES, INCLUDING ACTS OF

DELIBERATE, LARGE-SCALE DISRUPTION OF

COMPUTER NETWORKS, ESPECIALLY OF

PERSONAL COMPUTERS ATTACHED TO THE

INTERNET, BY THE MEANS OF TOOLS SUCH

AS COMPUTER VIRUSES.

What is cyber terrorism?

A Great concern for the government?Cyber terrorism can be also defined as the intentional use of computer, networks, and public internet to cause destruction and harm for personal objectives. Objectives may be political or ideological since this can be seen as a form of terrorism.[2]

There is much concern from government and media sources about potential damages that could be caused by cyber terrorism, and this has prompted official responses from government agencies.Several minor incidents of cyber terrorism have been documented.

Definition……….There is debate over the basic definition of the scope of cyber terrorism. There is variation in qualification by motivation, targets, methods, and centrality of computer use in the act. Depending on context, cyber terrorism may overlap considerably with cybercrime, cyber war or ordinary terrorism. Eugene Kaspersky founder of , now feels that "cyberterrorism" is a more accurate terman "cyberwar." He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism." He also equates large-scale cyber weapons, such as the Flame Virus and NetTraveler Virus which his company discovered, to biological weapons claiming that in an interconnected world, they have the potential to be equally destructive.

Narrow definition

If cyberterrorism is treated similarly to traditional terrorism, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.terrorism does not exist and is really a matter of hacking or information warfare They disagree with labelling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.

Broad definitionCyberterrorism is defined by the Technolytics Institute as "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives."  The term was coined by Barry C. Collin.

THE FOLLOWING THREE LEVELS OF CYBERTERROR CAPABILITY IS DEFINED BY

MONTEREY GROUP

SIMPLE-UNSTRUCTURED: THE CAPABILITY TO CONDUCT BASIC HACKS AGAINST INDIVIDUAL

SYSTEMS USING TOOLS CREATED BY SOMEONE ELSE. THE ORGANIZATION.

ADVANCED-STRUCTURED: THE CAPABILITY TO CONDUCT MORE SOPHISTICATED ATTACKS

AGAINST MULTIPLE SYSTEMS OR NETWORKS AND POSSIBLY, TO MODIFY OR

CAPABLE OF CAUSING MASS-DISRUPTION AGAINST INTEGRATED, HETEROGENEOUS DEFENSES (INCLUDING CRYPTOGRAPHY).

ABILITY TO CREATE SOPHISTICATED

Types of cyberterror capability

ConcernsAs the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. Many groups such as Anonymous, use tools such as Denial-of-se rvic attack to attack and censor groups who oppose them, creating many concerns for freedom and respect for differences of thought.Many believe that cyber terrorism is an extreme threat to our economy, and fear an attack could potentially lead to another Great Depression. Several leaders agree that cyber terrorism has the highest percentage of threat over other possible attacks on U.S. territory. Although natural disasters are considered a top threat and have proven to be devastating to people and land, there is ultimately little that can be done to prevent such events from happening. Thus, the expectation is to focus more on preventative measures that will make Internet attacks impossible for execution.

PUBLIC INTEREST IN CYBERTERRORISM BEGAN IN THE LATE 1980S.  AS 2000

APPROACHED, THE FEAR AND UNCERTAINTY ABOUT THE MILLENNIUM

BUG HEIGHTENED, AS DID THE POTENTIAL FOR ATTACKS BY CYBER

TERRORISTS. ALTHOUGH THE MILLENNIUM BUG WAS BY NO MEANS A TERRORIST ATTACK OR PLOT AGAINST

THE WORLD OR THE UNITED STATES, IT DID ACT AS A CATALYST IN SPARKING THE

FEARS OF A POSSIBLY LARGE-SCALE DEVASTATING CYBER-ATTACK.

COMMENTATORS NOTED THAT MANY OF THE FACTS OF SUCH INCIDENTS SEEMED TO CHANGE, OFTEN WITH EXAGGERATED

MEDIA REPORTS.

History

T H E   U S D E PA RT M E N T O F D E F E N S E   ( D O D ) C H A R G E D T H E   U N I T E D S TAT E S S T R AT E G I C C O M M A N D   W I T H T H E

D U T Y O F C O M B AT I N G C Y B E RT E R R O R I S M . T H I S I S A C C O M P L I S H E D T H R O U G H T H E   J O I N T TA S K F O R C E -

G LO B A L N E T W O R K O P E R AT I O N S , W H I C H O P E R AT I O N A L C O M P O N E N T S U P P O RT I N G   U SS T R AT C O M   I N D E F E N S E O F T H E D O D ' S   G LO B A L I N F O R M AT I O N G R I D . T H I S I S D O N E

BY I N T E G R AT I N G G N O   C A PA B I L I T I E S I N T O T H E O P E R AT I O N S O F A L L D O D C O M P U T E R S , N E T W O R K S ,

A N D S Y S T E M S U S E D BY D O D C O M B ATA N T C O M M A N D S , S E R V I C E S A N D A G E N C I E S .

O N N O V E M B E R 2 , 2 0 0 6 , T H E S E C R E TA RY O F T H E A I R F O R C E A N N O U N C E D T H E C R E AT I O N O F T H E A I R F O R C E ' S

N E W E S T   M A J C O M , T H E   A I R F O R C E C Y B E R C O M M A N D , W H I C H W O U L D B E TA S K E D T O M O N I T O R A N D D E F E N D A M E R I C A N I N T E R E S T I N C Y B E R S PA C E . T H E P L A N WA S H O W E V E R R E P L A C E D BY T H E C R E AT I O N O F   T W E N T Y-

F O U RT H A I R F O R C E

U.S. military

Estonia and NATOThe Baltic state of Estonia was target to a massive denial-of-service attack that ultimately rendered the country offl ine and shut out from services dependent on Internet connectivity for three weeks in the spring of 2007. The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time. The tech-dependent state was in severe problem and there was a great deal of concern over the nature and intent of the attack.

The cyber attack corresponded to an Estonian-Russian dispute over the removal of a bronze statue depicting a World War II-era Soviet soldier from the center of the capital, Tallinn. In the midst of the armed conflict with Russia, Georgia likewise was subject to sustanined and coordinated attacks on its electronic infrastructure in August 2008. In both of these cases, circumstantial

CHINAThe Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team," or "Blue Army," is officially claimed to be engaged in cyber-defense operations, though there are fears the unit has been used to penetrate secure online systems of foreign

EXAMPLESAn operation can be done by anyone anywhere in the world, for it can be performed thousands of miles away from a target. An attack can cause serious damage to a critical infrastructure which may result in casualties. Attacking an infrastructure can be power grids, monetary systems, dams, media, and personal information.

ATTACKSIn 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise ."

I N 1 9 9 8 , S PA N I S H P R O T E S T E R S B O M B A R D E D T H E I N S T I T U T E F O R G L O B A L C O M M U N I C AT I O N S ( I G C )

W I T H T H O U S A N D S O F B O G U S E - M A I L M E S S A G E S . E -M A I L WA S T I E D U P A N D U N D E L I V E R A B L E T O T H E I S P ' S U S E R S , A N D S U P P O R T L I N E S W E R E T I E D U P

W I T H P E O P L E W H O C O U L D N ' T G E T T H E I R M A I L . T H E P R O T E S T O R S A L S O S PA M M E D I G C S TA F F A N D

M E M B E R A C C O U N T S , C L O G G E D T H E I R I G C S E R V I C E S . T H E Y D E M A N D E D T H AT I G C S T O P H O S T I N G T H E W E B

S I T E F O R T H E E U S KA L H E R R I A J O U R N A L , A N E W Y O R K- B A S E D P U B L I C AT I O N S U P P O R T I N G B A S Q U E

I N D E P E N D E N C E . P R O T E S T O R S S A I D I G C S U P P O R T E D T E R R O R I S M B E C A U S E A S E C T I O N O N T H E W E B PA G E S

C O N TA I N E D M AT E R I A L S O N T H E T E R R O R I S T G R O U P E TA , W H I C H C L A I M E D R E S P O N S I B I L I T Y F O R

A S S A S S I N AT I O N S O F S PA N I S H P O L I T I C A L A N D S E C U R I T Y O F F I C I A L S , A N D ATTA C K S O N M I L I TA RY

I N S TA L L AT I O N S . I G C F I N A L LY R E L E N T E D A N D P U L L E D T H E S I T E B E C A U S E O F T H E " M A I L B O M B I N G S

DISASTOROUS ATTACKS

SabotageNon-political acts of sabotage have caused financial and other damage, as in a case where a disgruntled employee, Vitek Boden (aka Peter Markan) caused the release of 800,000 litres of untreated sewage into waterways in Maroochy Shire, Australia.More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn. The attack was a distributed denial-of-service attack were knocked offline; in addition, the political party website of Estonia's current Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue. Despite speculation that the attack had been coordinated by the Russian government, Estonia's defense minister admitted he had no conclusive evidence linking cyber attacks to Russian authorities. Russia called accusations of its involvement "unfounded," and neither NATO nor European Commission experts were able to find any conclusive proof of official Russian government participation. In January 2008 a man from Estonia was convicted for launching the attacks against the Estonian Reform Party website and fined.

Website defacement and denial of serviceEven more recently, in October 2007, the website of Ukrainian president Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility. against the NATO bombings of the Chinese embassy in Belgrade. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries

In fictionThe Japanese cyberpunk manga, Ghost in the Shell (as well as its popular movie and TV adaptations) centers around an anti-cyberterrorism and cybercrime unit. In its mid-21st century Japan setting such attacks are made all the more threatening by an even more widespread use of technology including cybernetic enhancements to the human body allowing people themselves to be direct  In 1999 hackers attacked NATOcomputers. The computers flooded them with email and hit them with a denial of service(DoS). The hackers were protesting against the NATO bombings of the Chinese embassy in Belgrade. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other

TACTICS

There are some who say that cyberterrorism does not exist and is really a matter of hacking or information warfare. They disagree with labelling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.

If a strict definition is assumed, then there have been no or almost no identifiable incidents of cyberterrorism, although there has been much public concern.

However, there is an old saying that death or loss of property are the side products of terrorism, the main purpose of such incidents is to create terror in peoples mind. If any incident in the cyber world can create terror, it may be called a Cyber-terrorism.

END OF PRESENTATIO

N

THANK YOU GUD NIGHT

BYE

DO NOT COPY