You are on page 1of 20

SeminarSTopics.

com

CYBER and SOCIAL


TERRORISM
IN
WORLD

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

CONTENT
Title page No

Abstract 2

1. Interdiction 3

2. What is Cyber & Social Terrorism? 3-4

3. What & how they do? 4-6

4. Why they so attracted cyber and social media? 6-7

5. Examples of Cyber and Social attacks 7-9

6. Types of Cyber and Social Crimes 10-15

 Hacking
 Types of hacking
 Fraud on internet
 Malicious software
 Child pornography
 E-mail spam

7. Category of cyber crimes 16

 Individual
 Property
 Government

8. How to Tackle cyber crime 17

 DO
 DONT’S

9. Cyber & social terror in future 18

10. Advantage & Disadvantage 19

11. Conclusion 20

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

ABSTRACT

Cyber and Social terrorism is a new different type of technic that makes use of information
systems or digital technology, especially the Internet, the internet is now the basic need of each
and every people so it is an instrument of target. The Internet becomes more a way of life with
us, it is becoming easier for its users to become targets of the cyber terrorists. All we know
that cyber crime has been one of the common practices made by the computer experts.

Cyber terrorism is the act of internet terrorism in terrorist activities, including acts of


Deliberate , large-scale disruption of computer networks, especially of personal computers
attached to the Internet, by the means of tools such as computer viruses. They also hacked
social ID , bank account and website also send fake messages for creating fear to others
They creat  cyber crime, cyber war or ordinary terrorism .

There are some who say that cyber terrorism does not exist and is really a matter
of hacking or information warfare They disagree with labelling it terrorism because of the
unlikelihood of the creation of fear, significant physical harm, or death in a population using
electronic means, considering current attack and protective technologies.

Many believe that cyber terrorism is an extreme threat to countries' economies, and fear an
attack could potentially lead to another Great Depression. Several leaders agree that cyber
terrorism has the highest percentage of threat over other possible attacks on INDIA
territory. They also target civilians, civilian interests and civilian installations. As previously
stated cyber terrorists attack persons or property and cause enough harm to generate fear.

We, as the Information Technology people of tomorrow need to study and understand the
weaknesses of existing systems, and figure out ways of ensuring the world's safety from cyber
and social terrorists. A number of issues here are ethical, in the sense that computing
technology is now available to the whole world, but if this gift is used wrongly, the good things
could be disastrous. It is important that we understand and mitigate cyber terrorism for the
benefit of society, try to curtail its growth, so that we can heal the present, and live the
future...

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Introduction

The world is a very large place, but it is getting smaller, thanks to the advent of computers
and Information Technology. However, the progress that we've made in these fields also has a
dark side, in that a new terrorist tactic, commonly called Cyber and social terrorism has
developed. Cyber and social terrorism is any act of terrorism that uses information systems or
digital technology (computers or computer networks) as either an instrument or a target.
Cyber and social terrorism can either be "international", "domestic" or "political",
according to the nature of the act, but it is always an act involving a combination of the
terrorist and the computer.

Cyber and social terrorism involves two primary elements: cyberspace and terrorism, and can
be defined as the use of information technology by terrorist groups with intentions of personal
gain and widespread damage. Many time some computer exports do whit the help of internet
and personal computer .They do this work anywhere and anytime because now the day the
technology is very first and they do over internet (help of computer and computer network).

In whatever forms it is, directly or indirectly, always affects the society. In today’s world,
there is immense increase in the use of Internet in every field of the society and due to this
increase in usage of Internet, a number of new crimes have evolved Such crimes where use of
computers coupled with the use of internet is involved and broadly termed as cyber and social
terrorism.

 What is Cyber & Social Terrorism.....?

Cyber & Social terrorism are basically national and non-national group. They attack against
information, computer system, computer program, data and official website .They do there
crime and terrorism with the help of internet, computer and computer network. They mostly
good programmers and computer hackers .They perform illegal activates such as online
database hacking, bank account hacking, spreading computer various , online bullying and
TRIDENT ACADEMY OF TECHNOLOGY
SeminarSTopics.com

create Unauthorised electronic fund transfer. Mostly Social Terrorism is committed through
the help of Internet. Some Social Terrorism is carried out using Mobile Phones via SMS and
online Social Network and also helps of Social Application.

The growth of Information Technology has led to the development of this dangerous web of
terror. They weak the database and website in few seconds by apply their high technology.
Banks are the most likely places to receive threats. As the internet becomes more pervasive in
all areas of human endeavour , individuals or groups can use the anonymity afforded by
cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or
belief), communities and entire countries, without the inherent threat of capture, injury, or
death to the attacker that being physically present would bring . The effect harms socially,
ideologically, relationally, politically.

 What & how they do?

Before the Internet, criminals had to dig through people's trash or intercept their mail to steal
their personal information. Now that all of this information is available online, criminals also
use the Internet to steal people's identities, hack into their accounts, trick them into revealing
the information, or infect their devices with malware. Now the day all company and the
central governments vital information and database are available in website it helps to access
easily through internet. It helps the cyber terrorists to get the information from website. They
use different type of technique to get vital information. Manly they hack the website using
different type of hacking tools and get the data and information easily. They also spread
different type of various for creating problem.

They create problem in government website because the government website are not highly
secure “chaleta he attitude”. Many times they halt (not working) the website for few hours .It
affects the economy of the country and create problem for days. Most attacks these days are
financially motivated, which means cybercriminals are trying to get at either your data or
your computer’s processing power to make money by spewing spam on your behalf or
by stealing your identity. They're after the names and numbers in your address book and
want to access your social networking sites and steal your personal data (social security or
credit card numbers, bank account information, etc).They target personal bank account to get
the bank account information after the that they login the bank account and transfer all the
money to the groups account. Now the day the big problem is online bank transaction.

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

When you use the third party for bank transaction or any application to do transaction . They
create this type of application or link (web page) in which you come for the transaction after
that all the amount goes there account.

Now the day all people around the world use internet for online shopping, online hotel
booking , online money transfer, online chatting (via message ) using social network like face
book, WhatsApp, Twitter, LinkedIn etc. The cyber and social criminals are get more
facilitated. In India 70% people make online shopping. So they create fake E-COMMERCS
website .when someone visit the site and select some item and buy it and make payment after
that he/she know the site is fake .many time its happen same case in hotel booking also when u
book a hotel and after payment you know the website is fake .

In all over the world and manly in India 70% people use internet and social application

5 Series 3
Series 2
4
Series 1
3

0
2012 2013 2014 2016

(The growing table of user in internet and social media)

The people use social media for communication, conversation, storing personal information
and data so You might be surprised to know your social networking login details can often be
worth more to cybercriminals than your financial information, because there are many
protections for consumers against financial fraud but next to none for online accounts like

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

email and social networking. Your social information gives hackers access to your friends on
those networks, who then become susceptible to cybercriminal attacks as well .

Manly they send you an Email in the Mail they put a program .When you open your Email
Account and click to open that particular message after that your Email Account is under
control by them. Whatever they want they do in your Mail Account. They send fake message
to anyone and it effect by you. They also block your Account permanently. Now the day it is
possible that to hack any mobile phone and they send any message to other without your
knowing and make call to any number from your mobile. Also deduct balance from your
Account.

 Why they so attracted cyber and social media?

Terrorist groups have been using computer technology to secure many of their goals. They
have been exploiting existing modern technology to accomplish the same goals that they have
been working towards in the past. However, the key differences between their old tactics and
their newer methods lie in the ease with which their operations can be performed, as well as
increased anonymity. It is extremely difficult to detect such clandestine operations, and
needless to say, even more difficult to counter such acts. Terrorist groups take advantage of
computer technology to create support structures that serve to strengthen their tactical and
strategic plans and goals. These are achieved by:

• Political propaganda

• Recruitment

• Financing

• Intra and inter-group communication and coordination

• Information and intelligence gathering

• Ease of operations that are cost-effective, both in terms of resources used, and ability to
strike worldwide.

Specific examples of the facilitation of terrorism through the use of computer technology
illustrate the appeal this technology has for terrorist groups interested in advancing their
particular agendas. The use of the Internet for propaganda and disinformation purposes is an
especially popular one. Many exiled political opposition groups from such states as Iran, Iraq,

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Mexico, Northern Ireland and Saudi Arabia have used the World Wide Web for just such
purposes.

The nature of modern computer technology is such that it also lends itself to the
communication and intelligence activities of terrorist groups. The attractiveness of this feature
for groups eager to expand their activities can be explained as follows:

Information Technology gives individuals and groups a reach and influence that was
previously reserved for well-organized, state-funded terrorist organizations. Physical distance
and national borders that once separated terrorists from their co-conspirators, their audience
and their targets cease to exist in the world of modern telecommunications and the Internet.

Organizations such as the Islamic fundamentalist groups that follow Osama Bin Laden rely
on computers to coordinate their activity. The Revolutionary Armed Forces of Colombia, for
example, is known to respond to press inquiries via e-mail. In the case of the intelligence
gathering activities of terrorist groups, computer networks and access to the World Wide
Web are equally important. Modern computer technology has not only enhanced much of the
above activity, but it has done so in such a fashion that the terrorist groups that utilize it are
now able to operate beyond the range of traditional counter terrorist approaches. The
terrorist ability to engage in "growth activity" such as recruitment, communication and
especially financing without the knowledge of state authorities may inevitably lead to stronger
and hence, more resilient terrorist groups. In turn, the potential for terrorist groups to engage
in activity that focuses less on threats and more on actions that can be seen and felt is
significantly heightened. Modern terrorist groups that are able to develop undetected may
become stronger, more elusive and deadlier than their earlier counterparts.

They fully utilise the facility of the modern technology and they control the activity any where
the world. The modern technology is for improvement our day to day life requirement in a
different way but the terrorist group use it for doing the illegal activity.

 Examples of Cyber and Social attacks...........


TRIDENT ACADEMY OF TECHNOLOGY
SeminarSTopics.com

Jonathan James was known as “c0mrade” on the Internet. In 2007 hacked into NASA’s
network and downloaded enough source code to learn how the International Space Station
worked. The total value of the downloaded assets equalled $1.7 million. To add insult to
injury, NASA had to shut down their network for three whole weeks while they investigated
the breach, which cost them $41,000.

Kevin Mantic most wanted computer criminal in U.S. history. In 2004 Kevin access to
unclassified White House systems. He accessed the President's schedule and emails that
revealed personnel moves and policy database.

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Albert Gonzalez is a hacker of Cuba. He collected over 170 million credit card and ATM card
numbers over a period of 2 years. Yep. That’s equal to a little over the half population of the
United States.

In 2014 one of the cyber terrorist group of India named as Godzilla hacked While the rest of
the world was engaged in cyber security and privacy, an Indian hacker targeted 43 major
Pakistani Government official websites, including ‘President of Pakistan’, ‘Government of
Pakistan’, 'Ministry of Defence’, and whole Ministry of Pakistan.

In 2013 ISIL group hacked Google then Google down for 5 minutes. After that global internet
traffic dropped by 40%.

In 2012 “Boko Haram” Group attacked RBI (Reserve Bank of India) official website and at
that time the security of RBI is not high so it not working for 2 hours.

Terrorism can also come in the form of disinformation. Terrorists can many times say what
they please without fear of action from authorities or of accountability for what they say.
Recently, the rumour that a group of people was stealing people's kidneys and putting them
for sale was spread via the Internet. The rumour caused thousands of people to panic, and the
number of people affected was unlimited.

Minor attacks come in the form of "data diddling", where information in the computer is
changed. This may involve changing medical or financial records or stealing of passwords.
Hackers may even prevent users who should have access from gaining access to the machine.
Ethical issues in this case include things like invasion of privacy and ownership conflicts. It
could be even more serious if, for instance, the person who needed access to the machine was
trying to save someone's life in a hospital and couldn't access the machine. The patient could
die waiting for help because the computer wouldn't allow the necessary access for the doctor
to save his or her life.

 Types of Cyber and Social Crimes..................

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Hacker:
Definition of Hacker the term is used to describe a person who is highly skilled in computer
and programming. Depending on the field of computing knowledge and security systems they
break the computer security and highly secured websites. The purpose of unauthorized access
to data, stealing or destroying data. They illegally access the computer network and transmit
computer viruses for corrupting valuable information.

Hacking may be:


1 Code hackers – They know computers inside out. They can make the computer do nearly

anything they want it to.

2 Cyber pumps – They are masters of cryptography.

3 Cracking –

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Two common methods of attacks through internet:

Network pocket sniffers: -

It is package softer which uses a network adaptor card in promiscuous made to capture all
network pockets that are sent across a local area network this provide user with meaningful
and often sensitive information such as accounts and passwords. Attacker uses pocket sniffers
to get passwords accounts etc.

IP spoofing: -

An IP (Internet Protocol) Spoofing attack occurs when an attacker outside the network
enters, pretending as if he is inside network and takes all information from network or
destroy information. Password attacks, Distribution of sensitive internal information to
external sources.

 Man – in – the – middle attacks(MITM)

In cryptography and computer security a man-in-the-middle attack is an attack where the


attacker secretly relays and possibly alters the communication between two parties who
believe they are directly communicating with each other.

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

 Man – in – the – between attacks(MITB)

ARP stands for Address Resolution Protocol. ARP acts as a layer over the Internet
Protocol address (IP) and converts it into a Media Access Control address (MAC
address) or Ethernet Hardware Address (EHA). Understanding the concept of ARP is
very important for a hacker because, a potential hacker will be able to poison the
network and steal the information running between two servers. Hence he can execute a
‘Man-In-The-Middle’ attack using a simple ARP poisoning tool such as Cain & Abel. The
function of Cain & Abel is similar to a packet sniffer.

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Hacking:

Original term referred to learn programming languages and computer systems; associated
with the process of bypassing the security systems on a computer system or network.

 TYPES OF HACKING:

 CYBER MURDERS:
A hacker breaks into hospital medical records and maliciously alters prescriptions. Say,
if a patient is allergic to penicillin, the hacker adds 500 mg of penicillin to his usual dose
of medication. The nurse administers the drug causing immediate death.
 EFFECT ON US GOVERNMENT SITES:
US government sites were hacked by ‘mujihadeen’. Two US government sites were
hacked late last week by a group calling themselves ‘mujihadeen’. The pages were
defaced with the flag of Saudi Arabia and a message in Urdu, which translates as
“Allah is the greatest of all, Americans be prepared to die”. The hackers called
themselves ‘mujihadeen’ threatened further cyber terrorism.
 MANIPULATING STOCK MARKETS:
A hacker can somehow go to the stock markets web site and manipulate various shares
they by giving some companies great losses and some great profits.
 TRANSMISSION OF VIRUS:
In hacking a hacker can paralyze the systems by transmitting virus they by affecting
the whole data be it of any company.
 CRASHING OF SITES:
Sometimes a mischievous hacker tries to crash down site by sending millions of email
like the tempest site.

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Fraud on Internet:

 Online investment newsletters:

These are major tools for advertising the investments in stock market and growth of
companies. But some of them are found to be tools for fraud.
 Theft: 

This crime occurs when a person violates copyrights and downloads music, movies, games
and software. There are even peer sharing websites which encourage software piracy and
many of these websites are now being targeted by the FBI. Today, the justice system is
addressing this cyber crime and there are laws that prevent people from illegal
downloading.

 Identity Theft:

This has become a major problem with people using the Internet for cash transactions and
banking services. In this cyber crime, a criminal accesses data about a person’s bank
account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses
for the victim and even spoil the victim’s credit history.

 Cyber Stalking:

Cyber stalking is the use of the Internet or other electronic means to stalk or harass an


individual, a group, or an organization .Using e-mail or instant messaging (IM), or messages
posted to a Web site or a discussion group. A cyber stalker relies upon the anonymity afforded
by the Internet to allow them to stalk their victim without being detected.

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Malicious Software: 

These are Internet-based software or programs that are used to disrupt a network. The
software is used to gain access to a system to steal sensitive information or data or causing
damage to software present in the system.

EX-1.VIRUS, 2.Trojan horses, 3. Worms 4. Logic bombs

Types of Viruses:
1. File infectors 2. Boot sector virus 3.Macro VIRUS

Child Pornography: 

This is now the major crime in India and other country. The cyber criminals solicit minors
via chat rooms for the purpose of child pornography. Children under age 18 engaged in
sexual behaviour. is illegal in the United States, the European Union, and many other
countries. The FBI has been spending a lot of time monitoring chat rooms frequented by
children with the hopes of reducing and preventing child pornography.

E-mail online Spam:

Many time some links are coming to mail and when you click the mail open the link
may virus attack to your computer and may the defiles are hacked.

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

 Categories of Cyber Crime

Cyber crimes are broadly categorized into three categories, namely crime against

1. Individual
2. Property
3. Government

Each category can use a variety of methods and the methods used vary from one criminal to another.

Individual: 
This type of cyber crime can be in the form of cyber stalking, distributing pornography,
trafficking and “grooming”. Today, law enforcement agencies are taking this category of
cyber crime very seriously and are joining forces internationally to reach and arrest the
perpetrators.

Property: 
Just like in the real world where a criminal can steal and rob, even in the cyber world
criminals resort to stealing and robbing. In this case, they can steal a person’s bank details
and siphon off money; misuse the credit card to make numerous purchases online; run a scam
to get naïve people to part with their hard earned money; use malicious software to gain
access to an organization’s website or disrupt the systems of the organization. The malicious
software can also damage software and hardware, just like vandals damage property in the
offline world.

Government: 
Although not as common as the other two categories, crimes against a government are referred to as
cyber terrorism. If successful, this category can wreak havoc and cause panic amongst the civilian
population. In this category, criminals hack government websites, military websites or circulate
propaganda. The perpetrators can be terrorist outfits or unfriendly governments of other nations.

How to Tackle Cyber Crime:

DO:

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

 Make your login password of any account strong using 12-15 (mixing of lower case,
special symbols, Number)
 Change your login password in between every 15 day.
 Use antivirus in mobile tablet and pc for virus protection.
 Always put password in your pc.
 Put password in your WIFI.
 Before use online service read the private policy.
 Regularly update the antivirus.
 Change the OS of your pc between 6months & update it.
 Use different mail Account for payment.
 Use Ad Block for pop-up the adv.
 Use OTP for every Account verification and for payment mode.
 Only shop online on secure sites.
 Clear all the cache and cookies after use any cyber cafe.
 Use virtual keyboard.

DONT’S:

 While online payments do not use any third party.


 Do not login any of your account in cyber cafe.
 Do not accept any unknown request in social media invitations (like Facebook , Linked
in, Instagram, Twitter ) just say no.
 Do not use single E-mail Account.
 Do not use same password for login in every Account.
Don't store your card details on websites

Cyber & Social Terror In Future:

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

Cyber and social terrorism means premeditated, politically motivated attacks by sub national
groups or clandestine agents, or individuals against information and computer systems,
computer programmes, and data that result in violence against non-combatant targets, The
next generation of terrorists will grow up in a digital world, with ever more powerful and
easy-to-use hacking tools at their disposal. They might see greater potential for cyber & social
terrorism than the terrorists of today, and their level of knowledge and skill relating to
hacking will be greater. Hackers and insiders might be recruited by terrorists or become self-
recruiting cyber terrorists. Some might be moved to action by cyber policy issues, making
cyberspace an attractive venue for carrying out an attack. Cyber & social terrorism could also
become more attractive as the real and virtual worlds become more closely coupled, with a
greater number of physical devices attached to the Internet.

Conclusion:

TRIDENT ACADEMY OF TECHNOLOGY


SeminarSTopics.com

This article is not meant to give amateur hackers a crash-course in cyber and social terrorism,
but to provide insights on the dangers of cyber and social terrorism. Computer professionals
the world over need to be aware of the problem areas of information systems that may be
susceptible to terrorist attacks, to be able to attempt putting an end to such activity. There are
a large number of ethical issues to be taken into consideration, as well. For example, there are
sites on the Internet that deal with methods of making bombs, and sites from which these
materials can be purchased. This information is available to everybody. However, if an
individual acted on this information, and made a bomb with evil intentions, then one could not
blame technology, but society, for producing such a person. Technology must be used for the
betterment of mankind, not with the intent of destroying what He created.

Doomsday and other haunting scenarios involving weapons of mass destruction existed long
before the advent of cyber and social terrorism and will continue to do so as long as political
actors, security firms and others who can benefit from them can exploit the basic myths
surrounding terrorism for their own purposes. Cyber and social terrorists have been giving
the entire computing profession a bad reputation, but we, as part of the IT world need to
realize that one of our immediate concerns must be to promote the good name of the
profession we call our own. It is extremely important that we try to understand and mitigate
cyber and social terrorism for the benefit of society as a whole, and try to curtail its growth, so
that we can heal the present, and live the future...

TRIDENT ACADEMY OF TECHNOLOGY

You might also like