2. CONTENTS Title Page Content Page Definition of Cyber Terrorism A New Era Evolution of Terrorism Background Information Effects of Cyber Terrorism History & Examples of Cyber Terrorism Countering Cyber Terrorism
3. Definition of Cyber Terrorism The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate a person in furtherance of such objectives.
4. A New Era is arising and within the past couple of years the United States and the rest of the World has been challenged with new tactics that have never been used or seen before.
5. Terrorism has evolved into an act that is not only unpredictable but is now able to affect us from all Terrorism is the new terrorism that can affect not only affects us physically and mentally, but financially and emotionally as well.
6. Background Info on Cyber Terrorism Public interest in cyber terrorism began in the late 1980s. As the year 2000 approached, the fear and uncertainty about the millennium bug heightened and interest in potential cyber terrorist attacks also increased.” We all remember when the year 2000 was near and the craze that began over what computers would and would not do. Even the government was worried about national security during this time.
7.
8.
9. EffectsofCyberTerrorismContinued: Water Supply System- Water systems may be another target for cyber terrorism. For example, if the flood gates of a dam were targeted a lot of damage could be the result, including the loss of lives. Also, the water supply could be shut off leaving thousands without water
10. Effects of Cyber Terrorism Continued: Air Traffic Systems- While aircrafts do not yet operate solely on computer systems, attacking the air traffic system could disrupt it causing thousands of delayed flights. -911 Emergency Response System- Cyber terrorists could overload the system therefore disabling it from actual emergency calls.
11. Effects of Cyber Terrorism Continued: Healthcare Infrastructure- Now that most healthcare systems rely on the Internet cyber terrorism could potentially affect the healthcare facilities of a nation. Computerized medical, pharmacy, or health insurance records could be erased or altered
12. Effects of Cyber Terrorism Continued: While all of these examples of critical infrastructure are just hypothetical, cyber terrorism is a real threat that we should deal with now rather than later when it's too late. Although no cyber terrorist attacks have happened yet, the risk of groups such as Al Qaeda using cyber terrorism is there. Some believe that cyber terrorism isn't an option for terrorists because it doesn't cause the physical damage, nor does it put fear in people, such as a bomb or other physical attack. Many others believe that terrorists would most likely use cyber terrorism as a "force multiplier" for a physical attack following it.If this is the case, the effects could be devastating if terrorists found a way to knock out power, water, telecommunications, and other critical infrastructure just before another large scale attack such as 9/11.
13. History/Background 1997: The Electronic Disturbance Theater (EDT) starts conducting Web "sit-ins" against various domains in support of the Zapatistas of Mexico. Thousands of protesters point their browser at a site using software that overloads the site with requests for downloads
14. History/Background 1997: Chaos Computer Club creates ActiveX Controls that trick Quicken into removing money from a user's account and transferring it someplace else.
15. History/Background 1998: Ethnic Tamil guerrillas swamped Sri Lanken embassies with over 800 e-mails a day for more than two weeks. Some say this was the first known attack by terrorists against a country's IT infrastructure.
16. History/Background 1999:NATO computers are blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the bombings in Kosovo. 1999:Assassins hack into a hospital computer to change the medication of a patient so that he would be given a lethal injection. He was dead within a few hours
17. History/Background 2001: After a Chinese fighter collided with an American surveillance plane in April, Chinese hacker groups spent the next week or so cyber-attacking American targets causing millions of dollars in damage.” While some of these events may seem isolated, think of what would happen if terrorists hacked into our computers that controlled our transportation system, including airplanes, subways, trains, and even traffic lights. With that kind of control, they could kill thousands of innocent Americans by only keying in a code on their computer
18. Countering Cyber Terrorism Because of this need the International Multilateral Partnership Against Cyber Threats (IMPACT) was formed. -IMPACT is the first global public-private initiative against cyber-terrorism. -IMPACT is dedicated to bringing together governments, industry leaders and Cyber Security experts to enhance the global community’s capacity to prevent, defend and respond to Cyber Threats. -IMPACT’s global HQ facility is located in Cyberjaya, Malaysia
19. Countering Cyber Terrorism It’s extensive infrastructure contains training rooms, computer labs, auditorium, well-equipped meeting facilities and administrative offices. -IMPACT acts as the foremost Cyber Threat resource center for the global community complete with an emergency response center to facilitate swift identification and sharing of available resources to assist member-governments during emergencies. -IMPACT’s role also includes establishing a comprehensive Early Warning System for the benefit of all member-countries and providing proactive protection across the globe.
20. Countering Cyber Terrorism The Department of Defense charged the United States Strategic Command with the duty of combating cyber terrorism. Countering attacks is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies.
21. Countering Cyber Terrorism Many issues are involved when dealing with countering cyber terrorism. For example, some people believe that their privacy and civil rights are at stake. The question is: What’s more important our privacy or our protection?
22. EAGLE EYE 2008 The "technology is everywhere" idea for "Eagle Eye" was hatched several years ago from the brilliant mind of executive producer Steven Spielberg. He wanted to do for electronic devices what he successfully did for sharks in "Jaws." People feared going to the water after watching Spielberg's 1975 masterpiece but I doubt they will stop using technology because of "Eagle Eye."
23. LIVE FREE OR DIE HARD Thomas Gabriel is a talented computer hacker who was once a top expert for the National Security Agency, but was fired and his reputation smeared for trying to warn his superiors about the country's vulnerability to cyber attack. He has contacted a number of hackers across the United States, paying them handsomely to write code. However, after they have delivered their code, they are killed by a team of assassins sent by Mai, Gabriel's girlfriend.
24. Conclusion It is impossible to ignore the fact of how extreme Cyber Terrorism can and will be in the future to come. Cyber Terrorism may be more preventable then actual physical attacks on cities, civilians and other countries
25. REFERENCES wikipedia. (n.d.). Cyberterrorism. Retrieved July 3, 2009, from wikipedia.com: http://en.wikipedia.org/wiki/Cyberterrorism#Background_Information .http://faculty.ist.psu.edu/bagby/Fall05/346F05T4/intro.html http://www.youtube.com/watch?v=zCmJd6TI3w0 http://csis.org/files/media/csis/pubs/021101_risks_of_cyberterror.pdf Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500
26. REFERENCES Breakey, M. (2006, March 7). Cyber-Terrorism: Its Origins and Impact: Part 1. Retrieved July 3, 2009, from americanchronicle.com: http://www.americanchronicle.com/articles/view/6500 http://pdm.medicine.wisc.edu/18-3pdfs/272Clem.pdf http://www.impact-alliane.org Britz, M. T. (2009). Computer Forensics and Cyber Crime: An Introduction. Upper Saddle River, NJ & Columbus OH: Prentice Hall.