4831 - Cyber Terrorism Part 2 of 2 (When the Hackers Grow...

Info iconThis preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
05/01/09 Hacking as Warfare 1 Cyber Terrorism Part 2 of 2 ( When the Hackers Grow Up)
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
05/01/09 Hacking as Warfare 2 CYBER WARFIGHTER Terrorists Terrorist sympathizers Government agents Organized Crime Thrill seekers Incidents normally take the form of organized Asymmetric Attacks.
Background image of page 2
05/01/09 3 Case #1 Pakistan/India Conflict Indian sites defaced by Pakistani hacker groups including G-Force and Doctor Nuker have been either political, highly visible, or involved in information dissemination 5 megabytes of possibly sensitive nuclear research information was downloaded from the Bhabha Atomic Research Center 0 50 100 150 200 250 300 1999 2000 2001
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
05/01/09 4 Case #2 Israel/Palestinian Conflict Close connection between political events in the region between 1999 and 2001: Feb. 3: Barak-Arafat summit breaks up Feb. 8: Israel launches airstrikes against Hezbollah sites in Lebanon Oct. 17: Sharm el Sheikh summit Nov.20: bombs kill 4, injure 69 Israelis Nov: Israeli soldiers & artillery kill 32 Palestinians Jan. 12: Palestinian man shot & dragged; Arafat demands apology Apr.22: 2 weeks violence culminate in suicide bombing at bus stop 0 2 4 6 8 10 12 14 Feb. 13 Nov. 8 Apr. 23
Background image of page 4
05/01/09 Hacking as Warfare 5 Case #3 Yugoslavia Conflict When NATO air strikes hit Former republic of Yugoslavia in Kosovo and Serbia, NATO web servers were subjected to sustained attacks by hackers employed by the Yugoslav military All NATO’s 100 servers were subjected to “ping saturation” DDoS assaults and bombarded with thousands of emails, many containing viruses The attacks on NATO servers coincided with numerous website defacements of American military, government, and commercial sites by Serbian, Russian, and Chinese sympathizers of Yugoslavia These attacks causes serious disruption of NATA communications infrastructures
Background image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
05/01/09 Hacking as Warfare 6 Case #4 China fighter plane collision with American spy plane On April 1, 2001, there was a mid-air collision between an American surveillance plane and a Chinese fighter aircraft. Chinese hacker groups, such as the Honker Union of China and the Chinese Red Guest Network Security Technology Alliance, organized a massive and sustained week-long campaign of cyber attacks against American targets in retaliation for the death of Chinese pilot Wang Wei Chinese hackers used Internet postings and IRC to plan and coordinate their assault against US systems. Approximately 1,200 U.S. sites, including those belonging to the White House, the U.S. Air Force, U.S. Geological Survey, and the Department of Energy, had been subjected to DDoS attacks or defaced with pro-Chinese images. A number of recent Internet worms including Lion, Adore, and Code Red are suspected of having originated in China CNN May 2, 2001
Background image of page 6
05/01/09 Hacking as Warfare 7 Case #5 Vulnerabilities in the Nation's power distribution grid were first exposed during the Joint Chiefs of Staff exercise “Eligible Receiver” Mr. Kenneth H. Bacon, Pentagon spokesperson,
Background image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 03/13/2012 for the course PHARM 300 taught by Professor Staff during the Fall '11 term at Rutgers.

Page1 / 28

4831 - Cyber Terrorism Part 2 of 2 (When the Hackers Grow...

This preview shows document pages 1 - 8. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online