We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byJohana Gothard
Modified about 1 year ago
Slide 1 © CSIR Countermeasures to consider in the Combat against Cyberterrorism Namosha Veerasamy and Dr. Marthie Grobler Council for Scientific and Industrial Research Pretoria, South Africa
Slide 2 © CSIR Modern Urban Battles The US and Iraq Middle East unrest Georgia and Russia Zimbabwe India and Pakistan China and Tibet
Slide 3 © CSIR Known Terrorist Groups Al Qaeda – Afghanistan Basque Fatherland and Liberty (ETA), aka Euzkadi Ta Askatasuna- Spain HAMAS (Islamic Resistance Movement) Hezbollah aka Islamic Jihad-Liberation of Palestine Irish Republican Army (IRA)- Ireland Kurdistan Workers Party (PKK) – Turkey Liberation Tigers of Tamil Eelam (LTTE)-Sri Lanka Revolutionary United Front (RUF) – Sierra Leone
Slide 4 © CSIR Introduction Convergance of fear-causing world of terrorism with abstract realm of cyberspace Use technical security exploits Stem from social, political and religious views High-level view of countermeasures in the fight against terrorism
Slide 5 © CSIR Other definitions: Pollitt “Cyberterrorism is the premeditated, politically motivated attack against information, computer systems, computer programs, and data which result in violence against noncombatant targets by sub national groups or clandestine agents “ Malicious use of Information, Communication and Technology (ICT) Infrastructure Cause harm and distress
Slide 6 © CSIR Most cited definition from Denning: “Cyberterrorism is the convergence of terrorism and cyberspace. …unlawful attacks and threats of attack against computers, networks, and the information stored …done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify a cyberterrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Attacks that lead to death or bodily injury, explosions, plane crashes, water contamination, or severe economic loss would be examples. Serious attacks against critical infrastructures could be acts of cyberterrorism, depending on their impact. Attacks that disrupt nonessential services or that are mainly a costly nuisance would not.”
Slide 7 © CSIR 2006
Slide 8 © CSIR 2006
Slide 9 © CSIR Types of Terrorism Motivation: religious, political and social Religious- theological beliefs New Age- usually focus on one issue (eg animals) Ethnonationalist separatist: establish new political order based on ethnic dominance Revolutionary (Terrorism to the left): seize political power Far-right extremist (Right- wing): certain people are inferior “Cyberterror: Prospects and Implications,” published in August 1999 by the Center for the Study of Terrorism and Irregular Warfare at the Naval Postgraduate School (NPS) in Monterey, California (2004)
Slide 10 © CSIR Types of Terrorists (Cont…) Religious/Theological beliefs Strong quasi-religious fanatical elements for only total certainty of belief (or total moral relativism) provides justification for taking lives ¹ Certainly of belief that justifies the taking of lives Fastest growing type Unfocussed and target the masses Sacrifice one’s life Simple unstructured does not cause mass destruction Advanced - structured offer rewards and comply with ideology 1. Laqueur, W. (1996), "Postmodern Terrorism", Foreign Affairs, Vol. 75, pp. 24.
Slide 11 © CSIR Types of Terrorists (Cont…) Etho-nationalist Fighting to establish a new political order based on ethnic dominance/homogeneity. ² Public recognition Have shown violent tendencies but more targets of symbol of state like public facilities, government representatives Rely on sympathy from community Cyberterror attacks that cause interruptions: DoD Use ICT for propaganda and gathering support 2. Post, J.M. (2005), "The New Face of Terrorism: Socio-Cultural Foundations of Contemporary Terrorism", Behavioral Sciences & the Law, Vol. 23, No. 4, pp
Slide 12 © CSIR Types of Terrorists (Cont…) Social-revolutionary Terrorism of the left Seek to overthrow the capitalist economic and social order 3 Change structures and rules Focussed attacks on governments and corporations to protest against commercial and capitalist regimes 3. Post, J.M. (2005), "The New Face of Terrorism: Socio-Cultural Foundations of Contemporary Terrorism", Behavioral Sciences & the Law, Vol. 23, No. 4, pp
Slide 13 © CSIR Types of Terrorists (Cont…) New Age The vulnerability of modern societies to unconventional attacks 4 Use violence when traditional forms of campaigning to not yield results sufficiently fast Examples animal rights groups targeting pharmaceutical companies using arson and sabotage Anti-abortion and environmental groups Disrupt e-commerce and web-based advertising 4. Gearson, J. (2002), "The Nature of Modern Terrorism", The Political Quarterly, Vol. 73, No. s1, pp
Slide 14 © CSIR Types of Terrorists (Cont…) Right Wing Outsider” (eg. foreigners, ethnic and religious minorities) is targeted as well as state itself, as they are seen as ineffective or worse under the sway of the outsiders 5 Can be racist Violence is acceptable form of demonstration ICT for propaganda and disruption, selling survivalist gear or distribution of material Strong psychological roots of superiority 5. Michael, G. 2003, Confronting Right Wing Extremism and Terrorism in the USA, Routledge
Slide 15 © CSIR Considerations Gangs, tribes, religious and ethnic groups yield power Blurred lines between civilian and military boundaries Consider at a high-level how people’s opinions are shaped Help show growth of insurgency in groups Cyberterrorism merge of terrorism and technology Countermeasures: psychological and technical perspectives
Slide 16 © CSIR 2006
Slide 17 © CSIR Legal and Political Major focus should be law enforcement and military response 1 Treaties, protocols, regulations and acts can ensures fair conduct of relations between nations Laws can help promote acceptable forms of protest and consistent way of dealing with political and religious fanaticism 1 A.K. Cronin, "The diplomacy of counterterrorism lessons learned, ignored and disputed," International Research Group on Political Violence (IRGPV), pp. 1-8, 2002.
Slide 18 © CSIR Legal and political International presence eg. Interpol and Council of European Convention on Cyber Crime combating cyberterrorism Military force to retaliate against attacks can also cause group to hide and conduct underground operations No longer simple task to target hierarchical groups- geographically dispersed
Slide 19 © CSIR Fusion Centres Intelligence cultural specialists security personnel linguists political military specialists engineers psychological operations media relations economic advisors
Slide 20 © CSIR Humanitarian and peace-keeping Assistance to people suffering from famine, repressions, natural disasters and violence can help with conflict resolution Favourable response from the provision of money, food, medicine, education, fuel and employment Charity and education shows the effort to uplift the community
Slide 21 © CSIR Analysis Patterns Links Forensics Cultural Tribal Religious Communications linguistics Intelligence gathering from fusion and cultural centres
Slide 22 © CSIR Technical Countermeasures Protective, detective and reactive CSIRTs Intrusion prevention Network monitoring Interception and blockage Disaster Recovery Forensics
Slide 23 © CSIR CSIRTs Computer Security Incident Response teams Proactive: assistance with info to prepare and protect systems, technology watch Detective: Identify attack patterns, audits Reactive: Service announcements, incident handling
Slide 24 © CSIR Network monitoring Detective Jan 2008, Bush signed directive to monitor Internet traffic on federal computers in response to large no. of attacks Detection of suspicious behaviour: block web site, IP address or port
Slide 25 © CSIR Disaster Recovery Plan Contact information for appropriate people Critical devices Procedures Chain-of-command
Slide 26 © CSIR Forensics Cyberterrorism First Responders Reactive to handle incident
Slide 27 © CSIR Conclusion… Cyberspace potential means through which terrorists could cause chaos Affect psyche of communities Underlying political, social, religious reasoning for violent and extremist behaviour Summary of political, religious, legal, economic, social and technical issues to combat Include countermeasures like laws, fusion centres, education, treaties, network monitoring and CSIRTs
Slide 28 © CSIR Discussion…
EMERGING THREATS TO HUMAN SECURITY IN AFRICA Terrorism in historical perspective: definition, types causes and effects. By MR. JOHN DENSEN TIKIGBOMENI.
Terrorism Mr. Craddock. What is Terrorism US: premeditated, politically motivated violence perpetrated against noncombatant targets by subnational groups.
DoD and Cyber-Terrorism Eric Fritch CPSC 620. What is cyber-terrorism? "The premeditated, politically motivated attack against information, computer systems,
Department of Criminal Justice California State University - Bakersfield CRJU 477 Terrorism Dr. Abu-Lughod, Reem Ali The Nature of the Beast.
© 2014 wheresjenny.com Terrorism TERRORISM. © 2014 wheresjenny.com Terrorism Organisations:... the unlawful use of force and violence against persons.
Threats to World Security Chapter 33 Section 3.
IAFS 1000 Terrorism. Dinner See evite Paper Presentations Dec min. talk, 6 min. Q&A Clearly and concisely summarize: –Argument –Evidence (analysis.
War Guerrilla war Terrorism Coups d’état Assassination Economic/property damage Sabotage Riot Continuum 1.
Geopolitics of Terrorism INR 456 Political Geography.
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
© 2011 Delmar, Cengage Learning Part I The Nature and Setting of Police Administration Chapter 3 Police Administration and Homeland Security.
Chapter 2 Digital Terrorism. Buzzwords: Information Warfare and Cyberterrorism Information warfare is the gathering or use of information to gain an advantage.
Terrorism New trends. What is terrorism? It’s the deliberate use of violence against civilians for political (old) or religious (new) ends. premeditated.
Chapter FALLOUT SHELTER Definition of terrorism The use of violence, especially against civilians, by groups of extremists (sometimes sponsored.
Harker Heights High School AIM: What is Terrorism? Terrorism.
Chapter Eleven Political Crime and Terrorism. Political Crime Since 9/11 political crime and terrorism have become important areas of criminological inquiry.
Homeland Security CJ355 Week 8 Police Tactical Preparation and Citizen’s Role in Homeland Security.
GO131: International Relations Professor Walter Hatch Colby College Closing Thoughts.
INTERNATIONAL SECURITY AND PEACE WAR FOR THE NEW WORLD ORDER AND WAR ON TERRORISM Arifah Raja Falency (I34014)
CYBER TERRORISM BY: ASHLEIGH AUSTIN AND HUNTER BURKETT.
IAFS 1000 Terrorism. Today’s Outline Ancient roots Definitions Key characteristics.
Bronx Engineering & Technology Academy AIM: What is Terrorism? Do Now: Define Terrorism Terrorism.
AJ 001 Introduction to AJ. New threats are evolving in both complexity and seriousness. At the same time the system must continue its efforts to control.
GISE April, 2014 Tran, Thi Thuy Vuong I35028.
Navy Doctrine for ATFP NWP HM1 (SW/AW) Alburg.
1 Unit 8: The World Today Global History II Review.
Internet Vulnerabilities & Criminal Activity Cyber Terrorism and Cyber Warfare November 14, 2011 Cyber Terrorism and Cyber Warfare November 14, 2011.
Confidence Building Measures Anatoly A.Streltsov D.Tech., D.J., prof. deputy director of the IPII MSU named by M.V.Lomonosov.
Old and New Terrorism- patterns of terrorist activity Definition: "the calculated use of unlawful violence or threat of unlawful violence to inculcate.
IR 203 Current issues in international relations (7) Bezen Balamir Coskun office: 417
Intro to Terrorism. Definitions Many Ambiguous Are terrorists “freedom fighters”? Matter of perception? What is the relationship between.
International Terrorism. Three important UN resolutions (1368, 1373 and 1377) after 9/11 attacks: affirmed the right of self-defense, found terrorism.
1 Book Cover Here Chapter 23 TERRORISM AND URBAN DISORDER Criminal Investigation: A Method for Reconstructing the Past, 7 th Edition Copyright © 2014,
Lesson 5. Essential Questions: What are the main sources of social change? What factors lead people to resist social change? Define: Ideology, social.
Cyberterrorism Dorothy Denning. Defined Cyberterrorism is terrorism in cyberspace Generally understood to mean: unlawful attacks and threats of attack.
United Nations: International organization aimed at keeping peace in the world and providing assistance to nations in need General Assembly: - has.
MODERN WORLD. Economic interdependence and Global Trade – One major effect of global trade is increased economic interdependence – Interdependence = a.
Force Protection. What is Force Protection? Force protection (FP) is a term used by the US military to describe preventive measures taken to mitigate.
Terrorism defined… The calculated use of violence to instill fear, intended to intimidate governments or societies in the pursuit of a goal.
Copyright © 2012 Pearson Education, Inc. All rights reserved. Violence, War, and Terrorism Chapter 15 Violence, War, and Terrorism This multimedia product.
US Army TRADOC TRISA TSP 159-T-0001 A Military Guide to Terrorism in the Twenty-First Century (Version 5.0) 1 Training Support Package 159-T March.
Cybersecurity and the Department of Justice Vincent A. Citro, Assistant United States Attorney July 9-10, 2014 Unclassified – For Public Use.
Copyright © Allyn & Bacon 2010 Global Social Problems: War and Terrorism This multimedia product and its contents are protected under copyright law. The.
(16) CULTURE- The student understands how the components of culture affect the way people live and shape the characteristics of regions. Describe distinctive.
Terrorism Citizen Corps Citizen Corps Areas of Emphasis: Crime Natural disasters Terrorism.
September 11 th, Global Terrorism and War on Terrorism.
The 21 st Century Begins Present Chapter 32.
Terrorism and Globalization Presented by: I34051 ZUO XINSHUANG.
Civil Liability and Policing Challenges. Any questions about anything before we begin? Unit 7: Seminar, Discussion, Quiz, and Unit 7 Project Chapters.
Cyberspace and the Police Mamoru TAKAHASHI Head of Computer Forensic Center, Hi-tech Crime Technology Division National Police Agency, Japan.
© 2017 SlidePlayer.com Inc. All rights reserved.