Daily News Online
 

Monday, 27 July 2009

News Bar »

News: New bridge over Mahaweli ...        Political: Singer Saman de Silva joins UPFA ...       Business: Under Stage I: Govt to spend Rs. 1 billion on Northern roads ...        Sports: NCC fight-back to beat Saracens ...

Home

 | SHARE MARKET  | EXCHANGE RATE  | TRADING  | SUPPLEMENTS  | PICTURE GALLERY  | ARCHIVES | 

dailynews
 ONLINE


OTHER PUBLICATIONS


OTHER LINKS

Marriage Proposals
Classified
Government Gazette

Defining cyber terrorism

Cyber-terrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic.

By this narrow definition, it is difficult to identify any instances of cyber-terrorism. Cyber-terrorism can also be defined much more generally, for example, as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.” This broad definition was created by Kevin G. Coleman of the Technolytics Institute. The term was coined by Barry C. Collin.

Cyber-terrorism


Cyber-terror -Use of information technology by terrorist groups and individuals. Watblog.com

As the Internet becomes more pervasive in all areas of human endeavour, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring.

As the Internet continues to expand, and computer systems continue to be assigned more responsibility while becoming more and more complex and interdependent, sabotage or terrorism via cyberspace may become a more serious threat.

One more probability would be the ‘buying’ of a Computer Programer working inside by the Terrorists to ‘enter’ the local area network by duplicating a password.

The basic definition of Cyber-terrorism

Cyber-terrorism is the leveraging of a target’s computers and information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.

Cyber-terrorism is defined as “The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives.”

This definition was created by Kevin G. Coleman of the Technolytics Institute. “..subsumed over time to encompass such things as simply defacing a web site or server, or attacking non-critical systems, resulting in the term becoming less useful...”

There are some that say Cyber-terrorism does not exist and is really a matter of hacking or information warfare. They disagree with labelling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies.

The National Conference of State Legislatures (NCSL), a bipartisan organization of legislators and their staff created to help policymakers of all 50 states address vital issues such as those affecting the economy or homeland security by providing them with a forum for exchanging ideas, sharing research and obtaining technical assistance defines Cyber-terrorism as follows:

The use of information technology by terrorist groups and individuals to further their agenda.

This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attacks, or terrorist threats made via electronic communication.

Examples of Cyber-terrorism

One example of Cyber-terrorists at work was when terrorists in Romania illegally gained access to the computers controlling the life support systems at an Antarctic research station, endangering the 58 scientists involved. However, the culprits were stopped before damage actually occurred.

Mostly non-political acts of sabotage have caused financial and other damage, as in a case where a disgruntled employee caused the release of untreated sewage into water in Maroochy Shire, Australia. Computer viruses have degraded or shut down some non-essential systems in nuclear power plants, but this is not believed to have been a deliberate attack.

More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Talinn.

The attack was a distributed denial of service attack in which selected sites were bombarded with traffic in order to force them offline; nearly all Estonian Government Ministry networks as well as two major Estonian bank networks were knocked offline; in addition, the political party website of Estonia’s current Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue.

Despite speculation that the attack had been coordinated by the Russian Government, Estonia’s Defence Minister admitted he had no evidence linking cyber attacks to Russian authorities. Russia called accusations of its involvement ‘unfounded,’ and neither NATO nor European Commission experts were able to find any proof of official Russian Government participation.

In January 2008, a man from Estonia was convicted for launching the attacks against the Estonian Reform Party website and fined. Even more recently, in October 2007, the website of Ukrainian President Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.

Since the world of computers is ever-growing and still largely unexplored, countries new to the cyber-world produce young computer scientists usually interested in ‘having fun’. Countries like China, Greece, India, Israel and South Korea have all been in the spotlight before by the U.S. media for attacks on information systems related to the CIA and NSA.

Though these attacks are usually the result of curious young computer programmers, the United States has more than legitimate concerns about national security when such critical information systems fall under attack.

In the past five years, the United States has taken a larger interest in protecting its critical information systems. It has issued contracts for high-leveled research in electronic security to nations such as Greece and Israel, to help protect against more serious and dangerous attacks.

In 1999 hackers attacked NATO computers. The computers flooded them with email and hit them with a denial of service (DoS).

The hackers were protesting against the NATO bombings in Kosovo. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries.

EMAIL |   PRINTABLE VIEW | FEEDBACK

www.lanka.info
www.evolve-sl.com
St. Michaels Laxury Apartments
www.army.lk
www.news.lk
www.defence.lk
Donate Now | defence.lk
www.apiwenuwenapi.co.uk
LANKAPUVATH - National News Agency of Sri Lanka
www.peaceinsrilanka.org

| News | Editorial | Business | Features | Political | Security | Sport | World | Letters | Obituaries |

Produced by Lake House Copyright © 2009 The Associated Newspapers of Ceylon Ltd.

Comments and suggestions to : Web Editor