3. “Wars in the 21st century will increasingly require all elements of national power – not just the military. They will require that economic, diplomatic, financial, law enforcement and intelligence capabilities work together.”Ex-President: Mr. APJ Abdul Kalam
8. Imagine Planning for These Contingencies ATM Failures Power Outages Parliament Attack Bridges Down Airliner Crash Mumbai City Oil Refinery Fire Telephone Outages Poisoned Water Supply ISPs All Offline Emergency Assistance (100/101) System Down Unrelated Events or Strategic Attack?
12. Real World Example – USA 2001 San Francisco FBI Field Office Investigation Internet probes from Saudi Arabia, Indonesia, Pakistan Casings of web sites regarding emergency telephone systems, electrical generation and transmissions, water storage and distribution, nuclear power plants and gas facilities Exploring digital systems used to manage these systems
32. In the future, cyber terrorism may become a viable option to traditional physical acts of violence due to:Perceived anonymity Diverse targets Low risk of detection Low risk of personnel injury Low investment Operate from nearly any location Few resources are needed
38. Hacktivism Hacktivism is hacking with a cause and is concerned with influencing opinions on a specific issue. Example:ELF hacks into the web page of a local ski resort and defaces the web page. This is done to reflect the groups objections to environmental issues.
42. Web sites also contain information necessary to construct weapons, obtain false identification
43. Use Internet as a communications tool via chat rooms, BBS, email
44.
45. KamelDaoudi – Believed to be Al-Qaeda Cyber Terrorist. Arrested for alleged involvement in plot to bomb American Embassy in Paris
46. Cyberterrorism Cyberterrorism is a criminal act perpetrated by the use of computers and telecommunications capabilities, resulting in violence, destruction and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a particular political, social, or ideological agenda.
47. THE CYBERTERRORIST THREAT Assessing the Threat Behavioral Profile Technical Feasibility THREAT Operational Practicality
48. Availability of Capability Precision Guided Munitions Cruise Missile Invasion Computer Strategic Nuclear Weapons Missiles ICBM & SLBM Cost & Means of Attack Cost of Capability 1955 1960 1970 1975 1985 1945 Today