CyberTerrorism

Автор работы: Пользователь скрыл имя, 10 Декабря 2012 в 15:06, курс лекций

Краткое описание

However, along with the obvious advantage of the latest computer systems, they have the significant disadvantage: humanity enters the growing dependence on them. This increases the risk of the emergence of previously unknown sources of danger to society. Disruption of global computer networks can lead to serious consequences-of hovering computers and financial losses to the environmental and technological disasters and massive loss of life.

Содержимое работы - 1 файл

CyberTerrorism - копия.docx

— 42.69 Кб (Скачать файл)

Bloodless but brutal cyber-warfare flared up between Azerbaijan and Armenia, conflicting over Nagorno-Karabakh. It began in 2000, when two of the group the Azeri, Armenian hacked servers. In response, the Armenian group "Liazor" attacked 25 Azerbaijani sites.

Researchers believe that an act of terrorism against the United States September 11, 2001 was accompanied by a cyber-attack against the Airport navigation systems in New York. The reason for the unsuccessful American terrorist Osama bin Laden specialists associated with the presence of a special computer programm "ProMIS" to penetrate government networks United States and monitor the American secret services.

According to the American Group risk control in 2001, the threat of cyber-terrorism, were: Afghanistan, Burundi, Congo, Liberia, Somalia, Sudan, Sierra Leone, Sri Lanka, Eritrea, Ethiopia and Chad. Risk group also includes and cyber-terrorism, which is associated with the Chechen terrorists.

In November 2001, the Pakistani band "Dzifors Pakistan" cracked Server United States national authority on Oceanic and atmospheric research and posted on the website of this organization announcement containing threats of terrorist attacks against the armed forces of the United States and Great Britain. Pakistani cyber-terrorists demanded that the United States and Britain to stop the fighting in Afghanistan and the withdrawal of foreign bases from Saudi Arabia.

In mid-June 2004, the electronic resources of the Government of South Korea came under massive attack virus-infected dozens of computers, in particular the Ministry of defence of South Korea, the Agency for the development of means of protection, the Institute of atomic energy. Out of order was withdrawn several governmental websites, portals maritime Ministry and the marine police.

One of the manifestations of the presence of terrorists in cyberspace was a virtual terror during the Palestinian intifada 90-ies of the 20th century, Then in practice included use of computer technology for the purpose of causing harm to the State of Israel and its citizens.

 

 

 

 

 

 

 

 

 

 

 

 

 

COMPUTER TERRORISM XXI.

The attractiveness of the use of cyberspace for today's terrorists is that in order to carry out cyber-attack not need big financial costs-requires only a personal computer connected to the Internet, as well as special programs, and viruses. Cyber-terrorism are more anonymous than "traditional" terrorism. At cyber-terrorism there is a possibility to make terrorist acts while away from the scene of the crime. Internet terrorists use network aliases or access sites through the guest login, which makes their identification. It is anonymous and no borders make the Internet an effective weapon in the hands of attackers.

Terrorism is a global network of computers is growing rapidly: websites appear suddenly, often change the format, and then your email address. If in 1998, about half of thirty terrorist groups made United States in the list of "foreign terrorist organizations" have their sites, today almost all terrorist groups are present on the Internet. Among them are Peruvian terrorists organization Sendero Luminoso and Tupac Amaru fighters of the Afghan Taliban, the Georgian nationalists from group for free Georgia "," Tamil resistance movement "and many other terrorist structures operating at different organizational and ideological basis. "Al Qaeda, Hezbollah, Hamas," Abu Nidal "," Black Tigers "(associated with the Liberation Tigers of Tamil Eelam) not only use cyberspace to spread their views, but also as a weapon to strike targets of the national infrastructure, to attack foreign sites and servers.

American k. Staten, Executive Director of the Institute for the study and development of emergency response in Chicago, said in a speech to the United States Senators that even small terrorist groups now use the Internet to transmit their message and misinform the public simultaneously in many countries. Staten provided the Senators copies of messages that contain anti-American and anti-Israeli propaganda and threats, including a call to the beginning of the "holy war" against America and Velikobritanii44.

The FBI considers computer terrorism as a real and growing with each passing day threat to national security, United States. If the secret services and law enforcement agencies of different countries are limited in their ability to use the international computer network, then the terrorists the propagation of his ideas, polemics with public institutions, exchange of information and technology between them almost without restrictions.

Sites of terrorist organizations contain information on the history and actions of these groups, biographies of their leaders and "Heroes" (photos and real names are generally published in respect of the deceased members of the Organization). Reports are published on the Internet about the most "successful", photographs of victims of criminal acts, explosions, and even videos of the attacks. Terrorist websites contain threats against enemies, praising their work. Sites usually have versions in several languages, including English.

The Internet audience terrorist sites is used to enhance the potential and effective supporters of terrorists; to influence international public opinion, was not directly involved in the conflict; to demoralize "enemy"-citizens, organizations and States are fighting terrorists.

An important objective of terrorists is to influence public opinion; they do not use our own word "terrorists", calling themselves "freedom fighters", "resistance" fighters "guerrillas". When describing terrorist operations uses the terms "resistance", "armed struggle", "fair wages". Terrorist acts are morally, religiously and politically "justified" the struggle for peace, for the sake of "true faith", "freedom" and "justice".

As a rule, the terrorists did not immediately report their transactions and losses. Exceptions are the terrorist organizations Hamas and Hezbollah, which post statistical data on their operations, indicating how many deaths of "martyrs" and punished "Renegades." All this is accompanied by calls to stand on the side of the "champions of faith" and avenge the death of companions.

Satellite Internet connection provided to terrorists the opportunity to establish contacts, find like-minded people and recruit supporters, to purchase weapons, money transfers, without leaving their dislocation. The terrorists forced their unsuspecting network partners-for example, computer hackers who don't know what the ultimate goal will lead their actions.

American researcher j. Verton believes that many terrorist organizations have established Internet intelligence database used in the attacks. In Afghanistan, was found in the instruction "Al Qaeda", in which it was reported that in open sources contain up to 80% of the information necessary for the preparation of teraktov45.

In order to sow fear, panic and a sense of helplessness, terrorists are spreading through the Internet horror documentary footage, such as videotaped murder of American journalist d. Perla persons holding him prisoner in 2002.

Terrorists are placed on the their sites request help Jihad, sacrifice on a "Holy struggle" to communicate to the bank account numbers where you can transfer money.

The Internet can be used not only for attracting donations, but also to recruit new members. Terrorists carry out monitoring of "users" of their sites. Those who seem most interested or qualified to run the job, terrorists come in contact.

According to the American Research Center "site Institute", from 2001 to 2003. thousands of American Muslims have received letters from the representatives of "Al Qaeda" appeals to join the Jihad against the United States. In the letters contained links to sites which have detailed instructions on how to join terrorists, information on the manufacture of explosive devices, etc. There are sites where Islamist terrorists trained to hacker attacks. After the outbreak of war in Iraq, many European Muslims have received messages, calling to come to Iraq and take part in the "liberation war" against the SŠA46.

Analysis of the sites indicates that terrorists for criminal purposes information on someone else's throw provocative page. An improved information technology expands opportunities for propaganda of ideas of terrorism through electronic media, registered against false IDs.

The Internet is used by radical groups and as a means of communication, in particular, for transmission through encrypted email instructions, maps, schemas, passwords, etc., experts say the establishment of an international Islamist organization, a new type that is not a clear organizational communications, and unified information environment.

Wireless access to the World Wide Web enables terrorists to coordinate the actions of its cells. Terrorists negotiated among themselves through the network and on the eve of the bombings of American embassies in Kenya and Tanzania in August 1998, and on the eve of the air attacks on the United States in September 2001, during the taking of hostages at the Japanese Embassy in Peru (1996) terrorists from Nestor Group also supported the exchange of information with the outside world via the Internet.

Hamas activists used the chats and email to plan operations and coordinate actions that interfere with the Israeli security forces to track their messages and decrypt their contents. On the Hamas website hosting manual "Guide to poisons", written by Abdel-Azizomv, 1996.

Raises serious concerns and the fact that terrorists may take advantage of Internet technology for the manufacture of bacteriological, chemical and even nuclear weapons, information on the schemes of underground utilities, transport infrastructure, etc., criminals have access to personal data of many people, contained in the electronic media.

Cyber-terrorist can act on behalf of the countries adopting a hostile attitude towards each other. "Cyber-jihad" are against each other computer terrorists from Pakistan and India-hacking Web sites of State

agencies, distribute viruses. Cyber-conflict rages among hackers in mainland China and Taiwan.

 

 

 

 

 

INTERNATIONAL COOPERATION IN THE FIGHT AGAINST CYBER TERRORISM

Discussion of possible actions to counter cyber-terrorism occurs at the national and international forums at different levels, from consulting expertise to the meetings of Heads of State. Signed in the course of these discussions, documents create the preconditions for active action aimed at countering terrorism.

With a view to harmonizing national legislation in September 13, 1989 at a meeting of the Committee of Ministers of the European Council has drawn up a list of offences, recommended by the countries of the European Union to develop a unified criminal strategy when developing legislation related to computer crimes.

The Russian Federation became the first country in the Commonwealth of independent States (CIS), which changed its penal legislation and made provisions to criminalize computer crimes. Chapter 28 of the Criminal Code of the Russian Federation, adopted June 13, 1996 (N 63-F3) and entered into force on January 1, 1997, deals with cyber-crimes.

February 17, 1996 at VII plenary meeting of the Interparliamentary Assembly of CIS Member States was adopted by the Model Criminal Code, which is separately responsible for computer crimes.

In December 1998, the UN General Assembly adopted resolution N 53/70 concerning cybercrime, cyber-terrorism and cyber-wars. The document calls on the Member States to inform the Secretary-General of their views and assessments on the issues of information security, the definition of basic notions related to information security and development of international principles to improve the global information space and telecommunications and to help combat information terrorism and criminality.

The Government of the Russian Federation in 1999, budgetary funds were allocated to law enforcement agencies to combat crime within the federal program "for strengthening the fight against cyber-crimes and offences related to the use of electronic computing machines, systems and networks".

July 23, 2000 in Okinawa (Japan) at the meeting of Heads of State and Government of the G8 adopted the Charter of the global information society. It notes that the international community's efforts to develop a global information society, should be accompanied by concerted actions to create a safe and free from crime of cyberspace.

June 1, 2001 in Minsk was signed agreement on cooperation among CIS STATES in combating cyber-crime.

November 23, 2001 in Strasbourg by the Council of Europe adopted the Convention on cybercrime. This is the first international agreement on legal and procedural aspects of the investigation and criminal prosecution of offences committed through computer networks. The Convention provides for coordinated action by States at the national and international levels aimed at preventing unauthorized interference in computer systems, illegal interception of data.

Countries which have signed the document, would be laws against unauthorized access to computer networks, data interception, Internet fraud, child pornography and computer piracy. Also provided for the establishment of a special national focal points of interaction.

Six weeks after the terrorist attacks on New York and Washington, United States Congress passed the so-called "Patriot Act" ("the Act of 2001, the uniting and strengthening America and implementation activities required to prevent the threat of terrorism"). This document introduces a statutory concept of "cyber-terrorism" and classified the various qualified forms of hacking and damage to a protected computer networks of citizens, legal persons and State agencies, including the damage caused by the computer system used by the public agency to the national defence or national security.

In 2003, the United States for the first time in its list of foreign terrorist organizations, several Internet sites. U.S law has declared these resources outside the law and prohibited any material support to these sites, their employees are prohibited from entering the territory of the United States, and American banks are required to freeze their accounts.

In August 2004, Vietnam was formed police unit tasked with investigation of network crime and surveillance for the dissemination of objectionable publications in cyberspace.

At the eleventh UNITED NATIONS Congress on crime prevention and criminal justice, held in Bangkok from April 25, 2005, focused on computer-related crime. It was noted that "to address the problems of cybercrime must be broad-based, integrated approaches that go beyond the criminal and criminal procedure legislation, as well as law enforcement. In addition to the need to prevent computer-related crime, and prosecution of a global task-the creation of a global culture of cyber-security, which take into account the needs of all countries, including developing countries, information technology structures which are in the process of formation and is still very vulnerable. " The result of the activities of the XI Congress of the UNITED NATIONS was the Bangkok Declaration on combating cybercrime.

In the program adopted at the World Summit on the information society (16-November 18, 2005, Tunisia), underlines the importance of countering terrorism in all its forms and manifestations on the Internet along with respect for human rights and in compliance with other obligations under international law.

In a speech commemorating the adoption of a document entitled "Uniting against terrorism: recommendations for a global counter-terrorism strategy" May 2, 2006, UN Secretary-General Kofi Annan noted that "those who wants to use cyberspace for terrorist purposes can do so from virtually anywhere in the world. Terrorists take advantage of differences in the national response. If they do not operate in the same State, they may simply move to another. Thus the Web can become a virtual haven, defies national borders. "

May 5, 2006 in Malaysia was founded the international organization to combat cyber terrorism "IMPACT". This organization, which brings together representatives from the public and commercial sectors to find and implement the most effective ways to counter cyber-terrorism, is the first in the history of the world structure opposed to terrorist activity in information-sharing environment. It is assumed that the "IMPACT" will focus its activities on three main areas-education, certification, security systems and research activities. An important part of the "IMPACT" will become the international emergency response center that is designed to provide operational assistance to countries under threat of cyber-terrorism or affected by it.

The Internet is not free from censorship on the part of States. According to the international organization "Reporters without borders, 45 countries to restrict the access of its citizens to the Internet, forcing them to use the services of the State-controlled service provider (Windows Explorer).

The authorities of the people's Republic of China blocking access to Web sites that are considered "anti-Government", in particular to information on foreign political opposition and some religious movements. The authorities of the Islamic States to explain the need for restrictions on moral principles and norms resulting from the prescriptions of the Quran. A number of European countries block access to pornography on the Internet.

Analysis of the legislation of different countries to determine the basic approaches to solving the problem of cyber-terrorism. In the first group of countries (Norway, Singapore, Slovakia, the Philippines, South Korea, Russia) criminal declared unauthorized access to protected computer systems, viruses and wrongful use of computer systems and information. The second group of States (Denmark, Sweden, Switzerland, France, Japan) to computer crime as only those acts which relate to damage to property and electronic information processing. The third group as criminal acts are related not only to property damage, but also a violation of individual rights and a threat to national security (United States, United Kingdom, Germany, Netherlands).

Note that the unification of law would create a single system for combating cybercrime and monitoring of computer-related crime, as well as a framework for better cooperation between national law enforcement agencies and special services.

 

 

 

 

Conclusion

I tried to show you in my work that what is cyber-terrorism, than he is dangerous and what can we expect from it. Who owns the information - he owns the world. This definition is old as the hills. Cyber-terrorism provides bandits and terrorists methods for capturing information, and the damage they can cause determined by the price of this information.

 

 


Информация о работе CyberTerrorism