{[ promptMessage ]}

Bookmark it

{[ promptMessage ]}

4831 - Cyber Terrorism Part 2 of 2(When the Hackers Grow Up...

Info icon This preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
05/01/09 Hacking as Warfare 1 Cyber Terrorism Part 2 of 2 ( When the Hackers Grow Up)
Image of page 1

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
05/01/09 Hacking as Warfare 2 CYBER WARFIGHTER Terrorists Terrorist sympathizers Government agents Organized Crime Thrill seekers Incidents normally take the form of organized Asymmetric Attacks.
Image of page 2
05/01/09 3 Case #1 Pakistan/India Conflict Indian sites defaced by Pakistani hacker groups including G-Force and Doctor Nuker have been either political, highly visible, or involved in information dissemination 5 megabytes of possibly sensitive nuclear research information was downloaded from the Bhabha Atomic Research Center 0 50 100 150 200 250 300 1999 2000 2001
Image of page 3

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
05/01/09 4 Case #2 Israel/Palestinian Conflict Close connection between political events in the region between 1999 and 2001: Feb. 3: Barak-Arafat summit breaks up Feb. 8: Israel launches airstrikes against Hezbollah sites in Lebanon Oct. 17: Sharm el Sheikh summit Nov.20: bombs kill 4, injure 69 Israelis Nov: Israeli soldiers & artillery kill 32 Palestinians Jan. 12: Palestinian man shot & dragged; Arafat demands apology Apr.22: 2 weeks violence culminate in suicide bombing at bus stop 0 2 4 6 8 10 12 14 Feb. 13 Nov. 8 Apr. 23
Image of page 4
05/01/09 Hacking as Warfare 5 Case #3 Yugoslavia Conflict When NATO air strikes hit Former republic of Yugoslavia in Kosovo and Serbia, NATO web servers were subjected to sustained attacks by hackers employed by the Yugoslav military All NATO’s 100 servers were subjected to “ping saturation” DDoS assaults and bombarded with thousands of emails, many containing viruses The attacks on NATO servers coincided with numerous website defacements of American military, government, and commercial sites by Serbian, Russian, and Chinese sympathizers of Yugoslavia These attacks causes serious disruption of NATA communications infrastructures
Image of page 5

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
05/01/09 Hacking as Warfare 6 Case #4 China fighter plane collision with American spy plane On April 1, 2001, there was a mid-air collision between an American surveillance plane and a Chinese fighter aircraft. Chinese hacker groups, such as the Honker Union of China and the Chinese Red Guest Network Security Technology Alliance, organized a massive and sustained week-long campaign of cyber attacks against American targets in retaliation for the death of Chinese pilot Wang Wei Chinese hackers used Internet postings and IRC to plan and coordinate their assault against US systems. Approximately 1,200 U.S. sites, including those belonging to the White House, the U.S. Air Force, U.S. Geological Survey, and the Department of Energy, had been subjected to DDoS attacks or defaced with pro-Chinese images. A number of recent Internet worms including Lion, Adore, and Code Red are suspected of having originated in China CNN May 2, 2001
Image of page 6
05/01/09 Hacking as Warfare 7 Case #5 Vulnerabilities in the Nation's power distribution grid were first exposed during the Joint Chiefs of Staff exercise “Eligible Receiver” Mr. Kenneth H. Bacon, Pentagon spokesperson,
Image of page 7

Info icon This preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern