A View of Cyberterrorism Five Years Later

نویسنده

  • Dorothy E. Denning
چکیده

A few weeks after the September 11 terrorist attacks, the Pakistani Muslim hacking group GForce Pakistan announced the formation of the “Al-Qaeda Alliance Online” on a U.S. government website it had just defaced. Declaring that “Osama bin Laden is a holy fighter, and whatever he says makes sense,” the group posted a list of demands and warned that it planned to hit major U.S. military and British websites. Another GForce defacement contained similar messages along with heart-wrenching images of badly mutilated children said to have been killed by Israeli soldiers. A subsequent message from the group announced that two other Pakistani hacking groups had joined the alliance: the Pakistan Hackerz Club and Anti India Crew. Collectively, the groups had defaced hundreds of websites, often with political messages.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chapter 2 Terrorism and the Internet : New Threats Posed by Cyberterrorism and Terrorist Use of the Internet

Although it is known that terrorists already routinely use the Internet for purposes such as spreading propaganda or conducting internal communication, the threat that results from this use is heavily debated. Especially the question whether a cyber terrorist attack is imminent or if it is only a purely fictitious scenario is subject to many discussions. One reason for these differences in opin...

متن کامل

Logic Tester for the Classification of Cyberterrorism Attacks

The merging of terrorism with the cyber domain introduces the potential for using computers and networked technologies in cyberspace to carry out extremist activities. Despite the current debate on whether cyberterrorism can be regarded as a real threat, this research will propose a method for classifying incidents as either cyberterrorism or cyber-attacks. Although there have been no reported ...

متن کامل

Reality Bytes: Cyberterrorism and Terrorist 'Use' of the Internet

This paper examines the concept of cyberterrorism. Fringe activity on the Internet ranges from nonviolent ‘Use’ at one end to ‘Cyberterrorism’ at the other. Rejecting the idea that cyberterrorism is widespread, the focus here is on terrorist groups’ ‘use’ of the Internet, in particular the content of their websites, and their ‘misuse’ of the medium, as in hacking wars, for example. Terrorist gr...

متن کامل

Toward Cognitive Immunization of Potential Criminals against Cyberterrorism

Most research into preventing cyberterrorism, whether by foreign or domestic individuals, has focused on technical measures to detect or prevent the attacks. Such efforts presume that individuals are already radicalized and that events are inevitable. Our investigations look further back; we seek to understand and influence the events which occur long before the cyberterrorism attacks are formu...

متن کامل

Cyberterrorism How Real Is the Threat?

SPECIAL REPORT 119 December 2004 ABOUT THE REPORT The threat posed by cyberterrorism has grabbed headlines and the attention of politicians, security experts, and the public. But just how real is the threat? Could terrorists cripple critical military, financial, and service computer systems? This report charts the rise of cyberangst and examines the evidence cited by those who predict imminent ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007