Cyber Crime and Cyber Terrorism



Download 5,67 Mb.
Pdf ko'rish
bet173/283
Sana19.05.2022
Hajmi5,67 Mb.
#604880
1   ...   169   170   171   172   173   174   175   176   ...   283
Bog'liq
Cyber crime and cyber terrorism investigators handbook by Babak

168
CHAPTER 13
Cyber terrorism: Case studies
In April 2013, a group of Palestinian hackers named the Izz ad-Din al-Qassam 
Cyber Fighters, identified with the military section of Hamas, claimed responsibility 
for an attack on the website of American Express. The company’s website suffered 
an intensive DDoS attack continuing for two hours and disrupting the use of the com-
pany’s services by its customers. In contrast to typical DDoS attacks, such as those 
by Anonymous, which were based on a network of computers that were penetrated 
and combined into a botnet controlled by the attacker, the Izz ad-Din al-Qassam at-
tack used scripts operated on penetrated network servers, a capability allowing more 
bandwidth to be used in carrying out the attack. This event is part of an overall trend 
toward the strengthening of Hamas’s cyber capabilities, including through enhanc-
ing its system of intelligence collection against the IDF and the threat of a hostile 
takeover of the cellular devices of military personnel, with the devices being used to 
expose secrets (
Zook, 2013
).
In contrast to the recruitment of terrorist operatives in the physical world, in cy-
berspace it is possible to substantially enlarge the pool of participants in an activity, 
even if they are often deceived into acting as partners by terrorist organizations us-
ing the guise of an attack on the establishment. This phenomenon is illustrated by 
the attacks by hackers against Israeli targets on April 7, 2013, when some of the 
attackers received guidance concerning the methods and targets for the attack from 
camouflaged Internet sites. The exploitation of young people’s anti-establishment 
sentiments and general feelings against the West or Israel makes it possible to ex-
pand the pool of operatives substantially and creates a significant mass facilitating 
cyber-terror operations. For example, it has been asserted during Operation Pillar 
of Defense over one hundred million cyber-attacks against Israeli sites were docu-
mented (
Globes, 2013
) and it was speculated the campaign, was guided by Iran and 
its satellites (
Globes, 2013b
).

Download 5,67 Mb.

Do'stlaringiz bilan baham:
1   ...   169   170   171   172   173   174   175   176   ...   283




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish