Tuesday, 20 March 2012

Cyberterrorism-Why?

Cyber terrorism has been around since the late 1980’s, however the number of internet terrorism have only increased since the September 11
attack on the United States. Some examples of cyber terrorism activities include email bombing, hacking into government portals, banking, water and hospital websites to either generate fear or endanger the lives of many.

Some of the earlier examples of cyber terrorism attack was in 1996 when a computer hacker who claimed to be linked with the White Supremacist movement had temporarily disabled and damaged a Massachusetts Internet Service Provider (ISP) while he sent out worldwide racist messages under the ISP's name.

While in 1999, during the Kosovo conflict, North Atlantic Treaty Organization (NATO) computers were blasted with e-mail bombs and hit with Denial-of-Service (DoS)  attacks by hackers protesting the NATO bombings.

More recently, in 2000, someone hacked into Maroochy Shire, Australia waste management control system and released millions of gallons of raw sewage on the town.

As there is an increase in knowledge of the usage of internet, the trend has shifted and terrorists are using cyberspace to facilitate the more traditional methods of terrorism such as bombings or spreading messages of hate. The web sites of terrorist groups in particular are used to present messages, coordinate members, and recruit young supporters. Some of these web sites are also set up as a source of financing their activities through sale of their merchandise.

Countries like the United States and in the European continent and powerful Asian countries like China and India have taken their own precautions in combating cyber terrorism.

(by Shandra)


For Further Reference, Click Here.

1 comment:

  1. Di s1288poker sendiri, Maintenance Rutin Poker Online selalu dilakukan setiap hari kamis pada pukul 10.00 wib dan akan selesai kurang lebih jam 11.00 wib tergantung adanya masalah pada sistem tersebut. Dan biasanya saat maintenance selesai akan diikuti dengan (Baca Selanjutnya Disini...)

    ReplyDelete