Results 1 to 4 of 4

Thread Information

Users Browsing this Thread

There are currently 1 users browsing this thread. (0 members and 1 guests)

  1. #1
    Senior Member BetsyRoss's Avatar
    Join Date
    Aug 2006
    Posts
    5,262

    Cyberterrorism: By Whatever Name, It's On The Increase

    Cyberterrorism: By Whatever Name, It's On The Increase
    Experts say U.S. companies need to take the increasing use of cyberwarfare tactics and tools very seriously.

    By Larry Greenemeier
    InformationWeek
    Jul 7, 2007 12:00 AM (From the July 9, 2007 issue)


    Security Pros are hesitant to label Web attacks as "cyberterrorism" because of the volatile connotations of that phrase. But recent events in England and Russia point to an increased use of the Web to coordinate or launch such attacks aimed at cultural and political subversion.

    A British court last week handed down prison sentences of up to 10 years to three Muslim men it called "cyber-jihadis" and convicted of using the Internet to urge Muslims to wage holy war on non-Muslims. And the U.S. Computer Emergency Readiness Team reported politically motivated cyberattacks in Russia. The Web site for Russia's United Civil Front, which is run by former chess champ turned political activist Garry Kasparov, experienced problems staying online, and malicious hackers tried to break into the main site of the Center for Journalism in Extreme Situations, says director Oleg Panfilo. He added that the sites of several organizations "engaged in the protection of human rights" also were exposed to hacker attacks.

    This type of cyberwarfare has been going on for months. The Web sites of Kommersant, a Russian newspaper, and the Echo of Moscow, a radio station, suffered significant denial-of-service attacks in early May for what the editor in chief of Kommersant's Web site speculated might be retaliation for the publication of a police interview with the expatriate billionaire Boris Berezovsky. Estonia's cyberinfrastructure was the target of extended DOS attacks in late April and early May.




    These "cyber-jihadis" were convicted of inciting terrorists.

    Electronic Jihad
    Even the generally neutral Swiss government has found itself in the middle of the emerging struggle against cyberterrorism. Late last month, Swiss prosecutors charged a husband-and-wife team with running Web sites that supported terrorists by providing them with information on how to make bombs.

    Similarly, the "Electronic Jihad Program," available via the jihadi Web site Al-jinan.org, is an application that users can install and use to target specific IP addresses for DOS attacks. The application includes a Windows-like interface that lets users choose from a list of target Web sites provided via the Al-jinan site, select an attack speed (weak, medium, or strong), and then click on the "attack" button.

    The site was down late last week, but Al-jinan has been registered for about 4-1/2 years. Its domain name server registration features a number of contradictions that make tracing its origins difficult. Al-jinan's domain name server is being hosted by Ibtekarat, a Web hosting company based in Beirut. The site's registration information cites an address with a Los Angeles postal code, while listing the Egyptian city of Al Esmaeiliya as its "registrant city" and Iraq as its "registrant country."

    Electronic jihad hasn't yet caused any major Web site disruptions, but the potential is there. "Jihadists are interested in taking down Web sites and disrupting economies that they don't like," says Dorothy Denning, a professor in the Department of Defense Analysis at the Naval Postgraduate School. "It's something to be taken seriously."

    U.S. businesses would be greatly affected by large-scale cyberattacks because most of the country's critical infrastructure is run by companies in the private sector. The government and the U.S. business community "are one-in-the-same target," says Andrew Colarik, an information security consultant. Even businesses that don't run critical infrastructure elements would be affected because "there's a cascading effect if you attack the infrastructure," Colarik says.

    While companies that operate critical infrastructure must be especially wary of Internet-based attacks, "everyone has to pay attention to security," Denning says. "There may be some businesses that say, 'No one will target us.' But electronic jihad will target anyone if it creates economic disruption. Whoever's vulnerable gets attacked."

    http://www.informationweek.com/news/sho ... =200900812
    Join our efforts to Secure America's Borders and End Illegal Immigration by Joining ALIPAC's E-Mail Alerts network (CLICK HERE)

  2. #2
    saveourcountry's Avatar
    Join Date
    Jan 1970
    Location
    Georgia
    Posts
    770
    I know that this sounds crazy, but they (illuminati) are staging these attacks. Next, you'll hear that it's a threat to our government. Next you'll hear that they must monitor the net more. Finally, all internet freedom will be gone. At least that is their goal. I read it on http://www.infowars.com

  3. #3
    Senior Member redbadger's Avatar
    Join Date
    Aug 2006
    Location
    The United States Of Invasion
    Posts
    3,005
    (illuminati) they are now illuminated...When they call the Texas Governor to their meeting in Turkey pronto...we had better learn to see the light
    Never look at another flag. Remember, that behind Government, there is your country, and that you belong to her as you do belong to your own mother. Stand by her as you would stand by your own mother

  4. #4
    Banned
    Join Date
    Jan 2007
    Location
    South Western Ohio
    Posts
    5,278
    FBI Congressional Testimony

    Testimony of Keith Lourdeau, Deputy Assistant Director, Cyber Division, FBI




    As our nation's economy becomes more dependent on computers, and the Internet becomes an increasingly more integral part of our society, new digital vulnerabilities make U.S. networked systems potential targets to an increasing number of individuals including terrorists. The Director of the FBI has established new priorities protecting the U.S. from terrorist attack as its #1 priority and protecting the U.S. against cyber-based attacks and high-technology crimes as its #3 priority. The FBI’s Cyber Division’s #1 priority is designated Counterterrorism related computer intrusions.

    Within the past several years, the U.S. has been the target of increasingly lethal terrorist attacks which highlight the potential vulnerability of our networked systems. These attacks were carried out by terrorists wanting to harm U.S. interests in order to forward their individual cause. Our networked systems make inviting targets for terrorists due to the potential for large scale impact to the nation. The vulnerabilities to our networked systems arise from a number of sources, such as: easy accessibility to those systems via the Internet; harmful tools that are widely available to anyone with a point-and-click ability; the globalization of our nation's infrastructures increases their exposure to potential harm; and the interdependencies of networked systems make attack consequences harder to predict and perhaps more severe.

    It is also crucial to understand the interrelationship between physical and cyber security in the current technological environment. Coordinated attacks on multiple regions could achieve a national effect. The most elaborate boundary control program of firewalls, intrusion detection, and virus filtering will be of little help if an intruder is able to gain physical access to servers, networks, or sensitive information.

    Terrorist groups are increasingly adopting the power of modern communications technology for planning, recruiting, propaganda purposes, enhancing communications, command and control, fund raising and funds transfer, information gathering, and the like. However, mere terrorist use of information technology is not regarded as cyberterrorism. The true threat of “Cyberterrorismâ€

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •