answersLogoWhite

0


Best Answer

An operation can be done by anyone anywhere in the world, for it can be preformed thousands of miles away from a target. An attack can cause serious damage to a critical infrastructure which may result in casualties.[14]Attacking an infrastructure can be power grids, monetary systems, dams, media, and personal information.[1]

Some attacks are conducted in furtherance of political and social objectives, as the following examples illustrate:

  • In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise."
  • In 1998, Spanish protestors bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's users, and support lines were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and member accounts, clogged their Web page with bogus credit card orders, and threatened to employ the same tactics against organizations using IGC services. They demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a New York-based publication supporting Basque independence. Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group ETA, which claimed responsibility for assassinations of Spanish political and security officials, and attacks on military installations. IGC finally relented and pulled the site because of the "mail bombings."
  • In 1998, ethnic Tamil guerrillas swamped Sri Lankan embassies with 800 e-mails a day over a two-week period. The messages read "We are the internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems.
  • During the Kosovo conflict in 1999, NATO computers were blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the NATO bombings. In addition, businesses, public organizations, and academic institutes received highly politicized virus-laden e-mails from a range of Eastern European countries, according to reports. Web defacements were also common. After the Chinese Embassy was accidentally bombed in Belgrade[citation needed], Chinese hacktivists posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites.
  • Since December 1997, the Electronic Disturbance Theater (EDT) has been conducting Web sit-ins against various sites in support of the Mexican Zapatistas. At a designated time, thousands of protestors point their browsers to a target site using software that floods the target with rapid and repeated download requests. EDT's software has also been used by animal rights groups against organizations said to abuse animals. Electrohippies, another group of hacktivists, conducted Web sit-ins against the WTO when they met in Seattle in late 1999. These sit-ins all require mass participation to have much effect, and thus are more suited to use by activists than by terrorists.
User Avatar

Wiki User

10y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: What are examples of cyberterrorism?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Is cyberterrorism a felony or misdemeanor?

Cyber terrorism is a felony.


What has the author George V Jacobson written?

George V. Jacobson has written: 'Cybersecurity, botnets, and cyberterrorism'


What has the author Gabriel Weimann written?

Gabriel Weimann has written: 'Www.terror.net' -- subject(s): Cyberterrorism, Terrorism, Terrorists, Prevention, Internet


What has the author Heather Harrison Dinniss written?

Heather Harrison Dinniss has written: 'Cyber warfare and the laws of war' -- subject(s): Cyberterrorism, War (International law), Information warfare (International law)


What has the author Ryan Russell written?

Ryan Russell has written: 'Stealing the network' -- subject(s): American Short stories, Computer hackers, Computer security, Cyberterrorism, Fiction, Short stories, American


What has the author Michael Calce written?

Michael Calce has written: 'Mafiaboy' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Investigation, Biography, Computer security, Security measures, Prevention


What has the author Richard W Aldrich written?

Richard W. Aldrich has written: 'Cyberterrorism and computer crimes' -- subject(s): Computer crimes, Computer networks, Computer security, Information warfare, International cooperation, Security measures


What has the author Lech Janczewski written?

Lech Janczewski has written: 'Managerial guide for handling cyber-terrorism and information warfare' -- subject(s): Computer crimes, Cyberterrorism, Information technology, Information warfare, Management 'Internet and Intranet Security Management'


What has the author Salvatore J Stolfo written?

Salvatore J. Stolfo has written: 'Insider attack and cyber security' -- subject(s): Cyberterrorism, Computer hackers, Computer networks, Computer crimes, Congresses, Computer security, Security measures, Prevention


Ano-anu ang ibat-ibang klase ng terorismo?

Domestic terrorism, International terrorism, State-sponsored terrorism, Narco-terrorism, Biological terrorism, at Cyberterrorism -source: Kasaysayan ng Daigdig: batayang Aklat sa Araling panlipunan Ikatlong taon


Is cyber terrorism illegal?

Cyberterrorism is a controversial term. Some authors choose a very narrow definition, relating to deployments, by known terrorist organizations, of disruption attacks against information systems for the primary purpose of creating alarm and panic. an assault on electronic communication networks. In the related links box below, I posted the wikipedia article on computer crime.


What are examples and non-examples for inflated?

The examples are tire ,ballon ,and beachball and the non-examples are shoe,chair,and bed