Search Box


Advanced search

cyber, terrorism, hackers, CIA, web, denial of service, attackPast incidents of cyber "terrorism"cyber, terrorism, hackers, CIA, web, denial of service, attack

To my cites     Back to Big brother      Cyberterrorism

1 2 3 4

During the Pakistan-India conflict Indian internet sites where defaced. The sites include involved in information dissemination. Examples include an Indian government site, television network, newspaper, science agency and an atomic research facility. In a later incident a hacker downloaded possibly sensitive nuclear research information. One pro-Pakistan hacker group has targeted US sites and defaced sites belonging to the Department of Energy and US Air Force (8 ).

In India the Easter Railway website was hacked the text on it said "Cyber war has been declared on Indian cyberspace by Whackerz-Pakistan". It is believe that this is in relation for India violating Pakistan air space (9 ).

The Israel-Palestinian Conflict, Palestinian cyber attackers did significant defacements, engineered a distributed denial-of-service attack, system penetration that used worms and Trojan horses. They also retaliated against pro Israeli hackers taking down sites that belong to the Israeli government and financial organization (10 ).

Israeli students formed to fight Hamas hackers. The most recent victim of these hackers was the DEBKAfile website. Their method of combat is to hack any sites that support Hamas (11 ).

Hamas's web presence was hacked, visitors to their site were diverted to a hard core porno site called Hot Motel Horny Sex Sluts. Sheikh Ahmad Yassin believed Israeli intelligence was behind the attack (12 ).

Cyber attacks have allegedly come from China, the sites attacked are sensitive government sites in Britain, France, Germany and the United States. The sites that were attacked are Pentagon and the French defense ministry. China denies the allegations but officials from Virginia-based Terrorism Research Center(founded by former CIA officials) said "You can detect patterns, coming from the same country, the same network, with the same type of techniques," and also said "That gives you a sense that it's probably coming from the Chinese, based on what I've seen. The Chinese government either is doing it, or is looking the other way as Chinese citizens are doing it."(13 ).

Back Next


cyber, terrorism, hackers, CIA, web, denial of service, attack