internet, DDOS, attacks, cyber, infrastructure, cyberspace, Botnets, malware

internet, DDOS, attacks, cyber, infrastructure, cyberspace, Botnets, malware War in Cyberspace, a look at tactics and "threats"

Search Box

To my cites     Back to Big brother

1 2 3 4 5 6 7 8 9

Vulnerabilities/Lack of privacy security

Without personal privacy and rights respected, no anti terrorism measure can be effective

A report from Dartmouth College on September 22 2001 provided evidence that cyber-terrorists now pose a significant threat. The report said that politically motivated cyberattacks had increased around the world. Before the attacks were fairly benign, now the attacks were more focused on vital communications and critical infrastructure systems(4 ).

The director of national intelligence Mike McConnell, said "With weapons of mass destruction that could result in the death of many, many people-chemical, biological, and nuclear weapons-we assess the likelihood of each," he also said "The likelihood of nuclear attack is less but is not eliminated.", but warned "The cyber threat is the soft underbelly of the United States," and noted "The United States depends on the cyber infrastructure more than any other on Earth."(5 ).

Ill wishers don't need technical experience A professional hacker could be hired for $25,000.00 and the chance is remote the hacker could ever be traced (6 ).

The internet is changing the world, and some of the changes are detrimental to current countries like UK, USA, and Germany. For these countries the internet also has a threat. Among the countries that pose a threat Russia, China, Japan, Pakistan, India and Southeast Asian. Up to 120 countries are looking to use the internet as a weapon to penetrate the fore mentioned countries networks and or use it for DDOS attacks. The targets of the attacks are financial markets, government computer systems and utilities. During 1991 Dutch hackers stole information about the US troop movements from Pentagon computers. Also groups like, al Qaeda has known connections to the extremist groups in Pakistan and Middle East countries that have contacts with hacker groups (7).

At least 20 "foreign " intelligence services are operating against the interest of Europe and the USA. The attacks from Chinese and Russian interest are of greatest concern. The attacks from China are believe to be coming from China's Peoples Liberation Army (PLA) (8 ).


Back Next