Occurrences of Cyberterrorism
Expansion of Term - Cyberterrorism (5 use examples)
No includes performing activities with the Internet to further terrorist activities.
(possible) attacks to bring about physical attack, but more likely:
- covert communication
- intelligence gathering
- training and recruiting
- stealing money to fund terrorism (now surpasses international drug trafficking as terrorist financing source)
Examples of Funding Terrorism (2)
Ibrahim Samudra
Younis Tsoul (Terrorist 007)
Money Mules
Propaganda & Recruitment
Japanese Hackers
Means of Covert Communications
Syberian Post Office
Syberian Post Office
Post messages to popular bulletin boards, but use cross-site request forgery exploit.
In current Japanese case, the virus called iesys.exe is used to post messages to the sites through infected computers.
Mumbai Attacks (Basic Details)
11/26-29/2008
Mumbai Attacks (Use of Tech)
Mumbai Attacks (outside coordination)
Lashkar-e-Toiba (LeT) had used Voice-over Internet Protocol (VoIP) software to communicate with the 26/11 attackers on the ground and direct the large scale operation on a real-time basis.
- handlers monitored on tv and media and warned attackers
Mumbai Attacks (witness reporting)
- photos to Flickr