Chapter 2 Digital Terrorism.

Slides:



Advertisements
Similar presentations
Al- Qaeda Done by, Olivia Mulhern Responsible for the attack on September 11 th, The fund “Al- Qaeda” was founded by Osama bin Laden. Al- Qaeda is.
Advertisements

Topic 10 Intro to IO Enabling Objectives 10.1 STATE the definition of Information Operations (IO) LIST five (5) Core Information Operations capabilities.
Copyright © Allyn & Bacon 2010 Global Social Problems: War and Terrorism This multimedia product and its contents are protected under copyright law. The.
Lecture 6: Terrorism and Asymmetric Warfare  Rupal Mehta POL 12.
Introduction to Information Operations Attaché Corps- SEP 09
AP Human Geography Project: Terrorism
Information Warfare and Internet Resources. Andrianova Maria Igorevna Saratov State University, Sociology Department, 4 year student.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Bell Ringer. US-U9-L5 SSUSH25 G. Analyze the response of President George W. Bush to the attacks of September 11, 2001, on the United States, the war.
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
Cyberterrorism. Critical Infrastructure Vulnerability.
Computer Security Fundamentals
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
Lecture 1: Overview modified from slides of Lawrie Brown.
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Network Security of The United States of America By: Jeffery T. Pelletier.
Terrorism and Globalization
The Fight Against Terrorism
A Brief History of Terrorist Attacks on the U.S.A. Terrorism: "The unlawful use of — or threatened use of — force or violence against individuals or property.
Terrorism Mr. Craddock. What is Terrorism  US: premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups.
Al-Qaeda & Twin Towers Al-Qaeda is a global militant Islamist organization founded by Osama bin Laden, and several other militants The radical Islamist.
The 21 st Century Begins Present Chapter 32.
Bin Laden from “hero” to terrorist! What happen to Osama Bin Laden after the Soviet- Afghanistan War in 1989?
Terrorism. Definitions of Fundamentalism Fundamentalism: strict adherence to any set of basic ideas and/or principles. Fundamentalism: strict adherence.
 What is the role of the media and the Internet in facilitating terrorist radicalization?
1 Terrorism in the Modern World Vocabulary terms.
9 Terrorism as Organized Crime.
10 th American History Unit III- U.S. Foreign Policy World War II - Today Nixon-Bush #9 George Bush’s Foreign Policy.
EMERGING THREATS TO HUMAN SECURITY IN AFRICA
Terrorism.
Chapter 1 Introduction to Cybercrime and Cyberterror Copyright © 2015 Carolina Academic Press. All rights reserved.
 The Modern World Terrorism and Globalization. Journal #51  How did Gorbachev’s actions help end the Cold War and contribute to the downfall of the.
TERRORISM. DEFINITION  The unlawful use of – or threatened use of – force of violence against individuals or property to coerce or intimidate governments.
11-Basic Cryptography Dr. John P. Abraham Professor UTPA.
10 th Military Police Company,10th Mountain Division, Fort Drum, NY 10 th MILITARY POLICE COMPANY FORCE PROTECTION.
Homeland Security. Hey, It’s Me! I’m Tek – your i-SAFE guide. I’m a part of i-SAFE America. i-SAFE is concerned with teaching you how to be safe online.
Copyright 2006 Prentice Hall Prentice Hall PoliticalScienceInteractive Magleby et al. Government by the People Chapter 20 Special Topic The War on Terrorism.
Chapter Six: Types of Modern Terrorism. Cyberterrorism.
CJ 499 Unit 9. International Crime and What is it ?
Terrorism key word - TERROR The use of violence by groups against innocent civilians to achieve a political goal.
USSR invades Afghanistan In 1980, the USSR invades Afghanistan US supports Afghanistan Osama Bin Laden comes from Saudi Arabia to help out Starts an army.
IT in Business Issues in Information Technology Lecture – 13.
Understanding the Threats of and Defenses Against Cyber Warfare.
1 The Broader Picture Laws Governing Hacking and Other Computer Crimes Consumer Privacy Employee Workplace Monitoring Government Surveillance Cyberwar.
TEMPEST AND ECHELON BY – Y.SRUTHI.  TEMPEST and ECHELON are the method of spying in a sophisticated manner.  Both technologies are a part of secret.
THE TERRORIST CHALLENGE September 11. The terrible events of September 11, 2001, “changed everything.”
Terrorism. The use of violence to create fear in a population to achieve a political, social, religious, or geographic goal.
Chapter 17: Foreign Policy and National Defense Section 2.
Terrorist use of Internet : the virtual battlefields ? Contents and evolution of the use of Internet by extremist networks.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
BY: AUSTIN NEIGH. WHAT IS CYBER WARFARE? Hacking that is politically motivated to conduct sabotage or espionage Form of information warfare Typically.
Today’s Issues: The US and Canada Ch. 8 Intro to Geography.
Global Acts of Terror. Terrorism Defined Terrorism is the use of violence and threats to intimidate and coerce (force action) for political reasons. Terrorism.
Firewalls and Tunneling Firewalls –Acts as a barrier against unwanted network traffic –Blocks many communication channels –Can change the design space.
Chapter 16 Terrorism and National Security.
International Terrorism: Defined
COSC 316 Final Presentation
Middle East Relations And Terrorism
Computer Crime CJ 520 / CJ October 27, 2010.
Notes # 1 Terrorism/ Al Qaeda
Terrorism.
DO NOW – Reading Quiz How does the U.S. State department define terrorism? Politically motivated violence directed at governments Religiously motivated.
“Today’s Issues” The United States and Canada
Chapter 13 Globalization and Terrorism: Our Small World
Why Has Terrorism Increased?
Internet Vulnerabilities & Criminal Activity
Terrorism.
Terrorism.
Criminal Investigations
Presentation transcript:

Chapter 2 Digital Terrorism

Buzzwords: Information Warfare and Cyberterrorism Information warfare is the gathering or use of information to gain an advantage over another party. Those actions intended to protect, exploit, corrupt, deny or destroy information or information resources in order to achieve a significant advantage, objective or victory over an adversary.

Components of Information Warfare Information warfare consists of six components: Psychological operations Electronic warfare Military deception Physical destruction Security measures Information attacks Electronic warfare is the denial of information or accurate information to an adversary.

Physical Information Warfare Physical information warfare involves a physical attack on an information system Terrorism is the actual or threatened use of violence by an individual or group motivated by ideological or political objectives. The goal of terrorism is to intimidate or coerce a government or its people. Cyberterrorism cannot be as concretely defined.

Cyberterrorism Terrorism is defined by the nature of the act, not by the identity of the perpetrators or the nature of their cause. Cyberterrorism is specifically a premeditated, politically or ideologically motivated attack or threat of attack against information, computer systems, computer programs, and data that can result in violence against civilian targets.

There are four categories of attacks: Infrastructure attacks Attacks designed to destroy a system that includes critical data Information attacks Attacks focused on demolishing or altering the content of electronic files or computer systems Technological facilitation Use of cyber communication to distribute and coordinate plans for a terrorist attack, incite an attack or assist in the facilitation of terrorism Promotion Fundraising, solicitation and recruitment

Information infrastructure is composed of five essential components: Communications networks Phones, satellites and cable networks Equipment used for the provision of information TV's, radios, computers and phones Information resources Educational or medical programs or databases Applications Electronic commerce or digital libraries People

Facilitation of Attack Technology has allowed for reduced transmission time in communication, so that members of an organization all over the globe may coordinate their tasks. Information technology has also reduced the cost of communication.

Data Hiding Data Hiding means that the information is hidden or imbedded in other apparently innocent data. Post September 11, 2001, reports surfaced that revealed that al Qaeda had been transmitting hidden data over the internet.

Data Hiding - Cryptography An encryption program scrambles information in a controlled manner through the use of a cryptographic key. Ramzi Yousef, convicted of the 1993 World Trade Center bombing, had encrypted plans to destroy 11 American airliners. This was only discovered after FBI agents spent over a year decoding files found in Yousef’s Manila apartment in 1995.

Propaganda and Promotion Terrorist organizations and adversarial nations have also used the internet for purposes of propaganda and recruitment. www.palestine-info.net/hamas/ www.hizbollah.org

Examples from Al-Qaeda Sheikh Omar Bakri Muhammad, an Islamic cleric with proven ties to bin Laden, posted information to the internet that al Qaeda was actively planning a “cyber jihad,” or holy war, against the United States and its allies.

China and Information Warfare Cyber warfare has been almost totally incorporated into the military lexicon, Military and academic training, and Political organization in China.