CyberTerrorism,Terrorist atrocities, Role of IT in terrorism
What is Cyber Terrorism? Definitions: Center for Strategic and International Studies (CSIS): “the use of computer network tools to shut down critical national infrastructures (e.g., energy, transportation, government operations) or to coerce or intimidate a government or civilian population.” William Tafoya, Professor of Criminal Justice at the Henry C. Lee College of Criminal Justice and Forensic Sciences: the intimidation of civilian enterprise through the use of high technology to bring about political, religious, or ideological aims, actions that result in disabling or deleting critical infrastructure data or information.” The term was coined in the 1980s by Barry Collin, a senior research fellow at the Institute for Security and Intelligence in California, who in 1997 was attributed for creation of the term "Cyberterrorism", defined cyber-terrorism as the convergence of cybernetics and terrorism. Cyber Terrorism Why cyber terrorism? - Cheaper than other methods - More difficult to get caught - Can be done from anywhere. - Can affect more people
Countries with most cyber terrorism as in 2002
- United States = 35.4% - South Korea = 12.8% - China = 6.2 % - Germany = 6.7 % - France = 4.0 % Terrorist Atrocities Terrorist Atrocities are the activities which include extreme violence or cruel act.
1. 9/11 attack: terrorist attacks by
the Islamic terrorist group al- Qaeda against the United States on the morning of Tuesday, September 11, 2001. The attacks resulted in 2,977 fatalities, over 25,000 injuries, and substantial long-term health consequences, in addition to at least $10 billion in infrastructure and property damage.
Four passenger airliners were hijacked .Two
planes crashed at north and south towers world trade centre at New York city.Third plane hit pentagon(headquarters of US defense) and fourth hit pennysylvania
Terrorist Atrocities 2. 2002 Bali bombings 3. 2003 Mumbai bombings Occurred on 12 October 2002 in the On 25 August twin car tourist district of Kuta on bombings done in the Indian the Indonesian island of Bali. The city of Mumbai that killed 54, attack killed 202 people (including and injured 244 people.One of 88 Australians, 38 Indonesians, the bomb explosions took 23 Britons, and people of more than place at the Gateway of India, 20 other nationalities).A further 209 which is a major tourist people were injured. attraction. The other bomb Jemaah Islamiyah, a went off in a jewellery violent Islamist group, were convicted in relation to the bombings, including market Zaveri Bazaar near three individuals who were sentenced the Mumba Devi temple in to death. The attack involved the central Mumbai. Both the detonation of three bombs: bombs were planted in a backpack-mounted device carried parked taxis and exploded by a suicide bomber; a large car during the lunch hour. bomb, both of which were detonated in or near popular nightclubs in Kuta. Terrorist Atrocities 4. SuperFerry14 2004 bombing on February 27, 2004, was a terrorist attack that resulted in the sinking of the ferry SuperFerry14 and the deaths of 116 people in the Philippines' deadliest terrorist attack and the world's deadliest terrorist attack at sea.
5. 2005 Bali bombings
On 1 October 2005, again in Bali, Indonesia. Bombs exploded at two sites in Jimbaran Beach Resort and in Kuta , both in south Bali. The terrorist attack claimed the lives of 20 people and injured more than 100 others. The three bombers also died in the attacks. Terrorist Atrocities 6. 2006 Mumbai train bombings 8. 2008 Ahemdabad Bombings Series of seven bomb blasts on 11 July on The 2008 Ahmedabad the Suburban Railway in Mumbai, the capital of bombings were a series of 21 bomb the Indian state of Maharashtra and the nation's financial capital. The bombs were set off blasts that hit Ahmedabad, India, on 26 in pressure cookers on trains plying on July 2008, within a span of 70 minutes. the Western Line Suburban Section of the Mumbai Fifty-six people were killed and over Division of Western Railway. The blasts killed 209 200 people were injured. Ahmedabad people and injured over 700 more. is the cultural and commercial heart of 7. 2007 Hyderabad bombings Gujarat state, and a large part Two bombs exploded almost simultaneously on 25 of western India August 2007 in Hyderabad, capital of the Indian state of Telangana. Warning of attacks through e-mail The first bomb exploded in Lumbini Amusement Several news agencies reported Park. The second bomb exploded five minutes later at receiving a 14-page e-mail five 19:50 in Gokul Chat Bhandar, a popular restaurant minutes before the explosions with the about 5 kilometres away. subject line: "Await 5 minutes for the revenge of Gujarat",apparently At least 42 people were reported to have died in referring to the 2002 Gujarat the two bombings.Two more bombs were defused in other parts of the city. According to initial reports, violence which took place after the banned Harkat-ul-Jihad-al-Islami militant outfit the Godhra train of Bangladesh is suspected for the serial blasts. burning incident. Role of IT in terrorism
The cyberspace is an environment without boundaries, a
privileged place where terrorists find resources, make propaganda activities and from which it is possible to launch the attacks against enemies everywhere in the world. Social media is an essential element of modern terrorism; these powerful platforms allow terrorists to communicate, to make propaganda and recruit new sympathizers. Every terrorist attack is similar to a dramatic representation, in which the Internet is the stage. Role of IT in terrorism The experts explained that in 1998 the number of websites containing terrorist material was 12, in 2003 he counted 2,650 websites and in September 2015 the total number has reached 9,800. Terrorist organizations are looking with increasing interest to the Internet Growing number of radical organizations are also exploiting darknets, a circumstance that greatly increases the number of sites currently operated by terrorist organizations. Role of IT in terrorism The resources of the Internet could offer anonymity to the user, a great advantage for a terrorist organization that wants to spread their message while remaining undetected The internet is cheap; a group of terrorists could arrange efficient propaganda campaigns without economic effort. Most of all makes the Internet a privileged instrument for terrorist groups is that it is interactive. Use the technology to make propaganda spread fear among wide audience worldwide. Each video is carefully prepared, and its programming is meticulous and aims to reach the largest number of individuals. Terrorists use the new social platforms like Facebook, Twitter and media services such as YouTube. Their language is direct, young, and it can reach a specific audience by using images with a high emotional impact. Terrorist spread messages through emails, messaging and mobile apps. A smartphone, a camera and a laptop and the free Internet network are the pillars of the new strategy of terrorism Role of IT in terrorism
Spreading fear by choregraphing to attract the attention of the
electronic media and the international press. Role of IT in terrorism Security experts have uncovered a number of websites offering pro-jihad content designed using a ‘comic-style’ and high impact Videos and Animations. On the Internet, it is also possible to find infographics and computer “games,” both media content types very popular among young people. Many web services could be used to obtain information related to a specific place that terrorists intend to attack. Google Maps could give attackers aerial photo of the location of the attack; these pictures could reveal the presence of supervisory staff, checkpoints, fence, entry points and much more.
Information gathering from google maps
Role of IT in terrorism Acquiring counterfeit documents that could be used by militants to move across the Europe. On the internet, and in particular in the cybercriminal underground, there are many black markets where it is possible to acquire any kind of illegal product and services, including fake documents.
Black market offering fake documents
Role of IT in terrorism Since 2007, Al-Qaeda groups have developed the encryption software Mujahideen Secrets used to protect online and cellular communications, but according to the report of the intelligence, the militants were using different new encryption tools and communication channels (New services like mobile, instant messaging).
Android App developed by terrorists
Cyber terrorist organizations all over the world
• Today there are more than 40 terrorist organizations
that maintain websites and use different languages. • Their websites provide with information about the organization. • Some of their purposes are to change public opinion, weaken public support for a governing regime, and even take them down. • From the Middle East - The Unix Security Guards (pro Islamic group) - The Popular Front for the Liberation of Palestine - The Anti - India Crew • From Europe - The Irish Republican Army - The Basque ETA movement • Israel and Pakistan groups fighting each other using cyber attacks. Source: https://resources.infosecinstitute.com/the-r ole-of-technology-in-modern-terrorism/# gref