Cyber Terrorism Report
Cyber Terrorism Report
Cyber Terrorism Report
Cyber Terrorism
Hurdles faced by the wired
World
www.seminarsTopics.com 1
Seminar Report Cyber Terrorism
ABSTRACT
Various situations that can be viewed as acts of cyber-terrorism have also been
covered. Banks are the most likely places to receive threats, but it cannot be said
that any establishment is beyond attack. Tips by which we can protect ourselves
from cyberterrorism have also been covered which can reduce problems created by
the cyberterrorist.
www.seminarsTopics.com 2
Seminar Report Cyber Terrorism
Introduction
The world is a very large place, but it is getting smaller, thanks to the advent of
computers and Information Technology. However, the progress that we've made in
these fields also has a dark side, in that a new terrorist tactic, commonly called
Cyberterrorism has developed. The old, conventional methods of assassination and
hostage taking are slowly fading, as terrorists head towards the Internet to pull
their stunts. The cause for this kind of a transition stems from the fact that the
terrorist has long since realized that removing one official from office only causes
another official to take his place; which is not the end-result the terrorist wished to
achieve. This causes the terrorist to take to the net, thus affecting a wider section
than could otherwise have been targeted. From disabling a country's economy to
shutting off power in large areas, it's all possible, with less risk to the terrorists.
Terrorist groups have been using computer technology to secure many of their
goals. They have been exploiting existing modern technology to accomplish the
same goals that they have been working towards in the past. However, the key
differences between their old tactics and their newer methods lie in the ease with
which their operations can be performed, as well as increased anonymity. It is
extremely difficult to detect such clandestine operations, and needless to say, even
www.seminarsTopics.com 3
Seminar Report Cyber Terrorism
more difficult to counter such acts. Terrorist groups take advantage of computer
technology to create support structures that serve to strengthen their tactical and
strategic plans and goals. These are achieved by:
• Political propaganda
• Recruitment
• Financing
• Intra and inter-group communication and coordination
• Information and intelligence gathering
• Ease of operations that are cost-effective, both in terms of resources used, and
ability to strike worldwide.
One of the most demonstrative examples, however, involves the case of the
December, 1996 takeover of the Japanese Ambassador's residence in Lima, Peru
by the Tupac Amaru Revolutionary Movement. Not only did this terrorist group
use the Internet to communicate its revolutionary message to the rest of the world
through a European website, it even offered a video clip of its members preparing
for their mission.
The added attractiveness of the Internet for terrorists is that the widest possible
audience for their violent activity not only reminds them of the major themes of
www.seminarsTopics.com 4
Seminar Report Cyber Terrorism
The nature of modern computer technology is such that it also lends itself to the
communication and intelligence activities of terrorist groups. The attractiveness of
this feature for groups eager to expand their activities can be explained as follows:
Information Technology gives individuals and groups a reach and influence that
was previously reserved for well-organized, state-funded terrorist organizations.
Physical distance and national borders that once separated terrorists from their co-
conspirators, their audience and their targets cease to exist in the world of modern
telecommunications and the Internet.
Organizations such as the Islamic fundamentalist groups that follow Osama Bin
Ladin rely on computers to coordinate their activity. The Revolutionary Armed
Forces of Colombia, for example, is known to respond to press inquiries via e-
mail. In the case of the intelligence gathering activities of terrorist groups,
computer networks and access to the World Wide Web are equally important.
Modern computer technology has not only enhanced much of the above activity,
but it has done so in such a fashion that the terrorist groups that utilize it are now
able to operate beyond the range of traditional counter terrorist approaches. The
terrorist ability to engage in "growth activity" such as recruitment, communication
and especially financing without the knowledge of state authorities may inevitably
lead to stronger and hence, more resilient terrorist groups. In turn, the potential for
terrorist groups to engage in activity that focuses less on threats and more on
actions that can be seen and felt is significantly heightened. Modern terrorist
www.seminarsTopics.com 5
Seminar Report Cyber Terrorism
groups that are able to develop undetected may become stronger, more elusive and
deadlier than their earlier counterparts.
Moreover, and perhaps even more importantly the advent of computer networks
has spawned a new direction in the organizational structure of terrorist groups.
Terrorist groups utilizing computers for communication are likely to move beyond
hierarchical organizational structures and employ networked ones.
www.seminarsTopics.com 6
Seminar Report Cyber Terrorism
What we occasionally see (what is reported) is actual damage to the above targets
in the form of temporary disruption of services, public inconveniences or financial
loss. These incidents, however, are most often in the form of cyber crime and fall
short of what is considered as cyberterrorism. In summary, there have been no
instances where cyberterrorism has been directly translated a catastrophic loss of
life or physical destruction associated with the most violent acts of "conventional"
terrorism. The threat, however, remains real and takes on an added significance
when the growing potential of terrorist group resources is considered.
Examples of Cyberterrorism
Cyber terrorism takes many forms. One of the more popular is to threaten a large
bank. The terrorists hack into the system and then leave an encrypted message for
senior directors, which threatens the bank. This message says that if the bank does
not pay a set amount of money, then the terrorists will use anything from logic
bombs to electromagnetic pulses and high-emission radio frequency guns to
destroy the bank's files. The fact that the terrorists may be in another in another
country adds to the difficulty of catching the criminals. A second difficulty is that
www.seminarsTopics.com 7
Seminar Report Cyber Terrorism
most banks would rather pay the money than have the public know how
vulnerable they are.
Significant confusion in understanding cyberterrorism also emerges when
cyberterrorism is confused with "cyber crime" and vice versa. Cyber crime is
similar to cyberterrorism in its use of computer networks and information systems
but clearly different in its motivation and goals. This appreciation, however, is
often overlooked. In many instances there is little effort to distinguish the obvious
differences between the two. Some people treat cyberterrorism simply as an
extension of cyber crime.
Cyberterrorists are often interested in gaining publicity in any possible way. For
example, information warfare techniques like Trojan horse viruses and network
worms are often used to not only do damage to computing resources, but also as a
way for the designer of the viruses to "show off" his "creativity". This is a serious
ethical issue, because many people are affected by these cases. For one, the viruses
can consume system resources until networks become useless, costing companies
lots of time and money. Even if the person never meant to harm someone with
their virus, it could have unpredictable effects that could have terrible results.
In one of its more unusual forms, cyber-terrorism can be used for an assassination.
In one case, a Mafia boss was shot but survived the shooting. That night while he
was in the hospital, the assassins hacked into the hospital computer and changed
his medication so that he would be given a lethal injection. He was dead a few
hours later.
They then changed the medication order back to its correct form, after it had been
incorrectly administered, to cover their tracks so that the nurse would be blamed
for the "accident". Thus, a man was killed by the hackers' actions. Also, the life of
the nurse was probably ruined, along with the reputation of the hospital and all its
www.seminarsTopics.com 8
Seminar Report Cyber Terrorism
employees. Thus, there are often more victims in a terrorist situation that the
immediate recipient of the terrorism.
Cyber-terrorists often commit acts of terrorism simply for personal gain. Such a
group, known as the Chaos Computer Club, was discovered in 1997. They had
created an Active X Control for the Internet that can trick the Quicken accounting
program into removing money from a user's bank account. This could easily be
used to steal money from users all over the world that have the Quicken software
installed on their computer. This type of file is only one of thousands of types of
viruses that can do everything from simply annoy users, to disable large networks,
which can have disastrous, even life and death, results.
Terrorism can also come in the form of disinformation. Terrorists can many times
say what they please without fear of action from authorities or of accountability
for what they say. Recently, the rumor that a group of people was stealing people's
kidneys and putting them for sale was spread via the Internet. The rumour caused
thousands of people to panic, and the number of people affected was unlimited.
Minor attacks come in the form of "data diddling", where information in the
computer is changed. This may involve changing medical or financial records or
stealing of passwords. Hackers may even prevent users who should have access
from gaining access to the machine. Ethical issues in this case include things like
invasion of privacy and ownership conflicts. It could be even more serious if, for
instance, the person who needed access to the machine was trying to save
someone's life in a hospital and couldn't access the machine. The patient could die
waiting for help because the computer wouldn't allow the necessary access for the
doctor to save his or her life.
www.seminarsTopics.com 9
Seminar Report Cyber Terrorism
Currently there are no foolproof ways to protect a system. The completely secure
system can never be accessed by anyone. Most of the militaries classified
information is kept on machines with no outside connection, as a form of
prevention of cyberterrorism. Apart from such isolation, the most common method
of protection is encryption. The wide spread use of encryption is inhibited by the
government's ban on its exportation, so intercontinental communication is left
relatively insecure. The Clinton administration and the FBI opposed the export of
encryption in favor of a system where by the government can gain the key to an
encrypted system after gaining a court order to do so. The director of the FBI's
stance was that the Internet was not intended to go unsupervised and that the
police need to protect people's privacy and public-safety rights there. Encryption's
drawback is that it does not protect the entire system, an attack designed to cripple
the whole system, such as a virus, is unaffected by encryption.
www.seminarsTopics.com 10
Seminar Report Cyber Terrorism
network configuration. Firewalls serve to define the services and access that are
permitted to each user. One method is to screen user requests to check if they
come from a previously defined domain or Internet Protocol (IP) address. Another
method is to prohibit Telnet access into the system.
Here are few key things to remember to protect yourself from cyber-terrorism:
1. All accounts should have passwords and the passwords should be
unusual, difficult to guess.
2. Change the network configuration when defects become know.
3. Check with venders for upgrades and patches.
4. Audit systems and check logs to help in detecting and tracing an intruder.
5. If you are ever unsure about the safety of a site, or receive suspicious
email from an unkown address, don't access it. It could be trouble.
Hacking:
Hackers might be
1. Code hackers – They know computers inside out. They can make the
computer do nearly anything they want it to.
www.seminarsTopics.com 11
Seminar Report Cyber Terrorism
IP spoofing: -
An IP (internet protocol) Spoofing attack occurs when an attacker out side the
network enters pretending as if he is inside network and takes all information
from network or destroy information. Password attacks, Distribution of sensitive
internal information to external sources.
www.seminarsTopics.com 12
Seminar Report Cyber Terrorism
Fraud on Internet:
This is a form of white collar crime whose growth may be as rapid and diverse as
growth of the internet itself. In 1997 1152 crimes were reported. But in 1998 they
skied up to 7500.
Types of Fraud
1. Online investment newsletters: These are major tools for advertising
the investments in stock market and growth of companies. But some of them are
found to be tools for fraud.
2.
Types of Viruses
1. File infectors 2. Boot sector virus 3.Macro VIRUS
www.seminarsTopics.com 13
Seminar Report Cyber Terrorism
If any system which is working with help of internet is hacked, it is obvious that
its source code will be modified and system falls in malfunctionality. Hence all
functions taking this system’s help will also fall in malfunctionality. If this
situation happened in banks, military control systems and etc the loss will be of
great amount. Hence Government of India passed some rules to counter Cyber
crimes.
www.seminarsTopics.com 14
Seminar Report Cyber Terrorism
www.seminarsTopics.com 15
Seminar Report Cyber Terrorism
HACKING
TYPES OF HACKING
www.seminarsTopics.com 16
Seminar Report Cyber Terrorism
ADVANTAGES:
Web business have recently found an old way to protect their new concepts
by making the patent application public on his site Mr.Tim Grey effectively put
copycats on notice.
Like Grey Natgoldhaber had fears about his company cybergold being
copied. He applied for a patent and after three years of waiting his site his one
www.seminarsTopics.com 17
Seminar Report Cyber Terrorism
of a handful of net business that can count a newly granted patent as one of its
assets.
Media misconceptions:
DISADVANTAGES:
VSN
L
PROXY
SERVE INTERNE
USER AOL,
LOGBOO
YAH
OO...
www.seminarsTopics.com 19
Seminar Report Cyber Terrorism
e-mail leaves behind a trace leading back to it’s point of origin in the form of an e-
mail header. To view the header all we need to do is press ‘options’ button and
then go to ‘preferences’. This will throw of two boxes where you can view your e-
mail ‘in full’, complete with IP addresses. The IP address, usually a number like
120.12.111,can be traced to VSNL. But only the police have authority to trace
back the route of message up to the doorstep of the offending subscriber.
www.seminarsTopics.com 20
Seminar Report Cyber Terrorism
www.seminarsTopics.com 21
Seminar Report Cyber Terrorism
Cyberterror In Practice:
Terrorists do use cyberspace to facilitate traditional forms of terrorism such as
bombings. They put up Web sites to spread their messages and recruit supporters,
and they use the Internet to communicate and coordinate action. However, there
are few indications that they are pursuing cyberterrorism, either alone or in
conjunction with acts of physical violence. It is believed that members of some
Islamic extremist organizations have been attempting to develop a 'hacker
network' to support their computer activities and even engage in offensive
information warfare attacks in the future. The members of the militant Indian
separatist group Harkat-ul-Ansar had tried to buy military software from hackers
who had stolen it from Department of Defense computers they had penetrated.
Cyberterror Capabilities:
There are three levels of cyberterror capability
Simple-Unstructured: The capability to conduct basic hacks against
individual systems using tools created by someone else. The organization
possesses little target analysis,command and control, or learning capability.
www.seminarsTopics.com 22
Seminar Report Cyber Terrorism
Drawbacks:
Systems are complex, so it may be harder to control an attack and
achieve a desired level of damage than using physical weapons.
Terrorists may be disinclined to try new methods unless they see
their old ones as inadequate, particularly when the new methods require
considerable knowledge and skill to use effectively.
Terrorists generally stick with tired and true methods.
Novelty and sophistication of attack may be much less important
than assurance that a mission will be operationally successful.
The risk of operational failure could be a deterrent to terrorists
The barrier to entry for anything beyond annoying hacks is quite
high, and that terrorists generally lack the wherewithal and human
capital needed to mount a meaningful operation.
www.seminarsTopics.com 23
Seminar Report Cyber Terrorism
Cyberterror In Future:
The next generation of terrorists will grow up in a digital world, with ever more
powerful and easy-to-use hacking tools at their disposal. They might see greater
potential for cyberterrorism than the terrorists of today, and their level of
knowledge and skill relating to hacking will be greater. Hackers and insiders might
be recruited by terrorists or become self-recruiting cyberterrorists. Some might be
moved to action by cyber policy issues, making cyberspace an attractive venue for
carrying out an attack. Cyberterrorism could also become more attractive as the
real and virtual worlds become more closely coupled, with a greater number of
physical devices attached to the Internet.
www.seminarsTopics.com 24
Seminar Report Cyber Terrorism
Conclusion
www.seminarsTopics.com 25
Seminar Report Cyber Terrorism
REFERENCES
www.cyberlawindia.com
www.seminarsonly.com
www.seminarsTopics.com 26