Beruflich Dokumente
Kultur Dokumente
1. INTRODUCTION
Only after 9/11 has governmental and public interest really been focussed on
terrorists and the internet shown by the large number of articles examining the issue in the media
which primarily occurred due to evidence recovered from Al Qaeda computers in Afghanistan,
that indicate the Internet was being used to collect intelligence and send encrypted messages.
The definition of terrorism used in this document is that of the new academic
consensus definition: that terrorism is “a politically motivated tactic involving the threat or use of
force or violence in which the pursuit of publicity plays a significant role”.
DEPARTMENT OF ECE 1
ANURAG ENGINEERING COLLEGE
2. TERRORISM
"Terror" comes from the Latin verb terrere meaning "to frighten". The terror
cimbricus was a panic and state of emergency in Rome in response to the approach of warriors of
the Cimbri tribe in 105 BC. The Jacobins cited this precedent when imposing a Reign of Terror
during the French Revolution. After the Jacobins lost power, the word "terrorist" became a term
of abuse. Although the Reign of Terror was imposed by a government, in modern times
"terrorism" usually refers to the killing of innocent people by a private group in such a way as to
create a media spectacle.
Unlike a nuisance virus or computer attack that results in a denial of service, a cyberterrorist
attack is designed to cause physical violence or extreme financial harm. According to the U.S.
Commission of Critical Infrastructure Protection, possible cyberterrorist targets include the
banking industry, military installations, power plants, air traffic control centers, and water
systems.
The early 1970s was when the first modern day internet was created and was
centralized. It was later decentralized because of the fear of the Soviet Union during the Cold
War. After about 20 years of researching, the internet was open to private and public users alike
during the late 1980’s. This meant that anyone with internet access could gain information from
all over the world where there was a connection. The following is a list that shows the flexibility
of the internet and why it is easy for terrorists as well as their organizations to gain access it to
spread violence and fear and plan and make attacks. Weimann (2004,) said that the internet has,
� easy access;
� little or no regulation, censorship, or other forms of government control;
DEPARTMENT OF ECE 2
ANURAG ENGINEERING COLLEGE
DEPARTMENT OF ECE 3
ANURAG ENGINEERING COLLEGE
DEPARTMENT OF ECE 4
ANURAG ENGINEERING COLLEGE
As of October 2007, there are over a billion internet users, some of which are not
friends. Since
September 11th, 2001 there has been a tenfold increase in the number of terrorists online. There
were 70-80 terrorist sites and now there are around 7,000-8,000. What these websites are doing
is spreading militant propaganda to give advice so that others might join. This is one of the most
effective ways of spreading violence around the world.
A man by the name of Hsinchun Chen has created Dark Web, a database, which
holds names of extremists around the world. This database is posted in many languages, can host
as many as20,000 members and half a million postings. Before Dark Web, Chan began his first
project in1997. It was a website used for tracking social change such as crime and terrorism
being themain focus. He had the help of the Tucson, Arizona Police department as well as the
NationalScience Foundation to help develop CopLink. This was a way that Law enforcement
officialscould link files and consolidate data. CopLink is responsible for helping catch the
BeltwaySnipers in Washington DC in late 2002. This as well as other successes led the NSF to
ask Chen if he would build another system similar to CopLink to help fight terrorism. Despite a
few
setbacks, Dark Web was a success. Chen says that if Dark Web had been online before the Iraq
war, there might have been a good chance that the supposed links between Al Qaeda and
Saddam Hussein could have been proved fact or fiction. (Kotler, 2007)
There are some that are not convinced that Dark Web is a tool for freedom. Marc Rotenburg,
Executive Director of the Electronic Privacy Information Center says that this tool could be used
to track political opponents. Mike German, ACLU’s policy counsel on national security,
immigration and privacy claims that just because people say they are advocating violence,
doesn’t mean they will actually do it. He says it is “a great waste of critical resources.” (Kotler,
2007)
Kotler (2007) Also says,
I know this from my time spent undercover, infiltrating exactly these kinds of organizations:
Every terrorist training manual makes it clear that a huge separation should be kept between the
bomb-makers and the propagandists; between the action wing and the political wing. This
means, by design, Dark Web is chasing the wrong people. (¶ 29)
Chen disagrees, saying that it is the Job of the NSA to track the secret member communications
DEPARTMENT OF ECE 5
ANURAG ENGINEERING COLLEGE
which are encrypted and moved offline. The goal of Dark Web is to look into the propagandists
of the jihad movement. Despite criticism, Dark Web has shown results. Access to training
manuals to build explosives has been found as well as the location of where they are
downloaded. This has led to countermeasures that are keeping Military units and civilians alike
safer.
NATO, which is the European-US defense force, has a contract that started in
2005 with Telindus, which is a company that offers ICT solutions. NATO’s networks cover their
26 members as well as other operational infrastructures such as Afghanistan and the Balkans.
These networks include coverage for telephone, computer, and video conferencing
communications.
Non-military operations such as disaster relief and protection of critical national
infrastructureare also covered.
After the September 11th, 2001 attacks and the May 2007 DDos attack on Estonia,
NATO has become more attentive to cyber defense because they themselves are vulnerable to
attack since they are out in the open just like other organizations that are on the web. Telindus’s
biggest component is the intrusion detection system (IDS). This allows attacks to be identified
as well as location of their origin and what attackers will do in response to the defensive or
restorative action.
A video was released that shows a simulated hacker attack where a crucial part of the
US electrical grid is seized. An industrial turbine spins out of control until it shuts down and in
turn shutting down power. The video was produced for Homeland Security and it shows how
commands to control can be quietly executed by hackers.
According to Press (2007),
They've taken a theoretical attack and they've shown in a very demonstrable way the
impact youcan have using cyber means and cyber techniques against this type of infrastructure,"
said AmitYoran, former U.S. Cyber Security Chief for the Bush administration. Yoran is chief
DEPARTMENT OF ECE 6
ANURAG ENGINEERING COLLEGE
executivefor NetWitness Corp., which sells sophisticated network monitoring software. "It's so
graphic,"Yoran said. "Talking about bits and bytes doesn't have the same impact as seeing
somethingcatch fire.
Although the attack never happened, there was a vulnerability found in US utility
companiesknown as supervisory control and data acquisition systems. This flaw was fixed and
utilitymakers urged utilities to take precaution. Robert Jamison of the Homeland Security
Departmentsaid that companies are working to limit these attacks. President Bush’s top
telecommunicationsadvisors concluded years ago that this attack is possible and with a high
degree of anonymity.
The problem is that these affected systems were not designed with security in mind.
What keeps your lights on are some very, very old technology, said Joe Weiss, a security expert
who has testified before Congress about such threats. If you can get access to these systems, you
can conceptually cause them to do whatever it is you want them to do.
Homeland Security has been working with industries, especially electrical and nuclear to
enhance their security. The nuclear industry has implemented their security and the electrical
company is still working on their internal plans. In July the Federal Regulatory Commission
proposed a plan to help protect the majority of the country’s power supply system from cyber
attacks.
2.5 U.S. Government Efforts
Cyber Crimes
DEPARTMENT OF ECE 7
ANURAG ENGINEERING COLLEGE
enforcement agencies from around the world because the exploitation of children is a matter of
global importance
C3 brings the full range of ICE computer and forensic assets together in a single location to
combat such Internet-related crimes as:
C3 consists of four sections, three of which provide cyber technical and investigative services,
the Cyber Crimes Section (CCS), the Child Exploitation Section (CES), and the Digital Forensic
Section (DFS). The fourth section, the Information Technology and Administrative Section
(ITAS), provides the technical and *operational infrastructure services necessary to support the
other three C3 sections. The center is a co-location of special agents, intelligence research
specialists, administrative support, and contractors, all of which are instrumental in operational
and technical continuity. Within each section, there are various program managers assigned to
certain programmatic areas. These program managers are responsible for supporting ICE Internet
investigations through the generation and the dissemination of viable leads. Program managers
are available to provide guidance and training to field agents as well as to other law enforcement
(foreign and domestic) upon request.[13]
DEPARTMENT OF ECE 8
ANURAG ENGINEERING COLLEGE
websites, chat rooms, newsgroups and peer-to-peer trading. The CES also conducts clandestine
operations throughout the world to identify and apprehend violators. The CES assists the field
offices and routinely coordinates major investigations. The CES works closely with law
enforcement agencies from around the world because the exploitation of children is a matter of
global importance.
DEPARTMENT OF ECE 9
ANURAG ENGINEERING COLLEGE
• Operations Apothecary – The CCS, the ICE Commercial Fraud Office and the National
Intellectual Property Rights (IPR) Coordination Center have partnered together and
launched a comprehensive Internet pharmaceutical initiative designed to target, arrest and
prosecute individuals and organizations that are involved in the smuggling of counterfeit
pharmaceuticals of a controlled and non-controlled nature as well as scheduled narcotics
via the Internet. The focus is also on the affiliates of the rogue pharmacies that are
typically operated by criminal enterprises whose sole purpose is to generate large sums of
money, with no regard to the health and welfare of the public.
• Intellectual Property Rights - The CCS has encountered thousands of web sites based in
the United States, as well as foreign that are engaged in the sale of counterfeit
merchandise (including music and software) via the Internet. The CCS continues to work
closely with the National IPR Coordination Center, the Computer Crimes and Intellectual
Property Section (CCIPS) at the DOJ, and industry representatives to identify web sites
responsible for the sale of the counterfeit items.
• Arms and Strategic Technology - The CCS supports ICE’s mission to prevent proliferate
countries, terrorists, trans-national criminals from obtaining strategic materials, funds and
DEPARTMENT OF ECE 10
ANURAG ENGINEERING COLLEGE
support and to protect the American public from the introduction weapons of mass
destruction and other instruments of terror from entering the United States.
• Identify Fraud Initiative - The availability and use of fraudulent identification documents
has always been a concern to the law enforcement community. While traditionally
available from street sources, fraudulent identification and travel documents, of all types,
are also readily available for sale via the Internet. In the post 9-11 world, fraudulent
identity and travel documents are of an even greater concern to ICE because of the
alarming threat they pose to ICE's primary mission of protecting the United States, and its
citizens, from threats arising from the movement of people and goods into and out of the
country. With addressing these documents and their threat in mind, the CCS has sought to
identify sources for fraudulent identity and immigration documents on the Internet.
• October 14, 2006, ICE removed Sayed Malike to Afghanistan. Malike came to the
attention of ICE via the FBI because he attempted to purchase C4 explosives, night vision
goggles, bullet proof vests, and drugs from an undercover FBI agent. He was charged in
the Eastern District of New York with the crime of lying to a federal law enforcement
officer. Malike pled guilty to this offense on November 2, 2005. ICE placed him in
removal proceedings based on this conviction. On June 1, 2006, an immigration judge
ordered the removal of Malike from the United States.
DEPARTMENT OF ECE 11
ANURAG ENGINEERING COLLEGE
• October 16, 2006, ICE successfully removed Jasvir Singh to India. An immigration judge
ordered Singh’s removal on May 15, 2006 after ICE presented evidence that Singh
attempted to purchase large quantities of weapons, including surface to air missiles, from
undercover FBI agents. Singh told the agents that he was a member of Babbar Khalsa, a
terrorist group in India, and that the weapons were to be used against the government of
India.
• January 23, 2007, ICE removed Majid Al Massari to Saudi Arabia. Al Massari entered
the United States on a student visa in 1993. On July 22, 2004, ICE arrested Al Massari
after he had been convicted of a drug related offense. ICE charged Al Massari with being
a visa overstay and placed him in removal proceedings. The ICE investigation revealed
that he had been soliciting funds for a group called the Committee for the Defense of
Legitimate Rights (CDLR). He also helped to run the group’s website. The CDLR is a
front group for Al Qaeda. The CDLR is also publicly dedicated to the overthrow of the
Saudi Arabian government and the installation of an Islamist government in its place. On
June 27, 2005, an immigration judge ordered the removal of Al Massari from the United
States.
• March 6, 2007, ICE removed Muhammed Abdi Afrid to Pakistan. Afrid was paroled into
the United States on March 5, 2003 to face federal criminal charges in California. The
United States Attorney’s Office for the Southern District of California charged Afrid with
conspiracy to distribute hashish and heroin and conspiracy to provide material support to
a terrorist group based on an incident in China on September 16, 2002 wherein Afrid
attempted to purchase stinger missiles from an undercover U.S. agent in exchange for
five tons of hashish and 600 kilograms of heroin. Afrid planned to sell the missiles to the
Taliban. On April 3, 2006, Afrid received a five year sentence to federal prison for these
offenses. ICE placed Afrid in removal proceedings and charged him with being
removable on account of his criminal conviction. An immigration judge ordered his
removal on December 14, 2006.
• On September 12, 2008, ICE successfully removed Sarafat Mohamed to Egypt.
Mohamed was an Imam for the Hoda Islamic Center in Gainesville, Florida. Mohamed
entered the United States on October 26, 1999 on a non - immigrant religious worker
visa. He later obtained a special immigrant religious worker visa. He applied to become a
DEPARTMENT OF ECE 12
ANURAG ENGINEERING COLLEGE
lawful permanent resident in 2001. The FBI interviewed Mohamed in 2005. Mohamed
confessed to the FBI that he was a founding member of Takfir wal-Hijra (TWH). TWH
was an Egyptian based terrorist organization responsible for the 1977 kidnapping and
murder of the Egyptian Minister of Islamic Endowment, Mohamed Hussain Al Zahabi.
TWH was notable because, unlike many other radical Islamic groups, it did not refrain
from murdering other Muslims. Though Mohamed denied any role in the murder, he
admitted to being a recruiter for TWH. He also admitted that he served as the religious
leader for TWH. After the murder, Egyptian authorities arrested many members of TWH,
including Mohamed. He was convicted for his membership in the organization and
served a 20 year prison sentence. Mohamed failed to include his arrest and conviction in
his application to become a lawful permanent resident of the United States. United States
Citizenship and Immigration Services denied Mohamed’s residency application and
placed him in removal proceedings, charging him with lying in order to gain an
immigration benefit. ICE vigorously sought a removal order in immigration court. Over
the strong objections of ICE, an immigration judge in Miami granted Mohamed’s request
to become a lawful permanent resident. ICE successfully appealed this decision to the
Board of Immigration Appeals. The Board agreed with ICE and reversed the ruling of the
immigration judge. The Board ordered the removal of Mohamed on July 30, 2008.
• June 3, 2009, ICE removed Finnish white supremacist Henrik Holappa to Finland.
Holappa had sought political asylum in the United States, but was arrested for a visa
violation on March 9, 2009. Holappa associated closely with David Duke and John de
Nugent. Holappa spent 87 days in the ICE custody in the ICE Detention Center in
Batavia, New York.
DEPARTMENT OF ECE 13
ANURAG ENGINEERING COLLEGE
laundering conspiracy, and false statements. From 2002 to 2003, Hanna allegedly
received $9.5 million in proceeds to supply telecommunications and other equipment to
Iraq in violation of the U.S. embargo that existed prior to the invasion by coalition forces
in 2003.
• Military Accelerometers to China – On September 26, 2008, Qing Li was sentenced in
the Southern District of California to 12 months and one day in custody, followed by
three years of supervised released, and ordered to pay a fine for conspiracy to smuggle
military-grade accelerometers from the United States to the People’s Republic of China
(PRC). Li pleaded guilty on June 9, 2008, to violating Title 18 USC Section 554. She was
indicted for the offense on October 18, 2007. Li conspired with an individual in China to
locate and procure as many as 30 Endevco 7270A-200K accelerometers for what her co-
conspirator described as a “special” scientific agency in China. This accelerometer has
military applications in “smart” bombs and missile development and in calibrating the g-
forces of nuclear and chemical explosions.
• Rifle Scopes to Russia – On September 11, 2008, a Grand Jury in the Middle District of
Pennsylvania indicted Boris Gavrilov, D&B Compas Ltd, and Kiflet Arm on charges of
illegally exporting military-grade and dual-use rifle scopes to Russia without the required
U.S. government licenses. Gavrilov is believed to be a resident of Israel. D&B Compas is
located in Israel, while Kiflet Arm is located in Humboldt, Texas. Extradition
proceedings for Gavrilov have commenced.
• Fighter Jet Components to Iran – On September 5, 2008, George Frank Myles, Jr.
pleaded guilty to conspiring to illegally export military aviation parts without obtaining
the permission of the U.S. Department of State, in violation of the Arms Export Control
Act. Myles was indicted for this offense on September 6, 2007, in the Southern District of
New York, and the case was transferred to the Southern District of Florida pursuant to
Rule 21. Sentencing is set for October 30, 2008. During the conspiracy, which spanned
from April 2005 to March 2007, Myles supplied a number of military aviation parts,
including F-14 parts, to an Iranian national, who allegedly picked up the parts in Dubai,
United Arab Emirates and Bangkok, Thailand.
• Surface-to-Air Missiles, Night Vision Devices, Firearms to Foreign Terrorists – On July
10, 2008, Erik Wotulo, a retired Indonesian Marine Corps general, was sentenced in the
DEPARTMENT OF ECE 14
ANURAG ENGINEERING COLLEGE
• Sex Trafficking/San Antonio—On June 1, 2007, a San Antonio woman and her two
daughters were ordered detained without bond for engaging in sex trafficking of children.
The woman, age 59, and her daughters, ages 32 and 29, were arrested and charged with
sex trafficking of children by force, fraud or coercion. Based on the ongoing investigation
and the victims’ statements, it is alleged that the defendants traveled to Nuevo Laredo,
DEPARTMENT OF ECE 15
ANURAG ENGINEERING COLLEGE
Mexico, to recruit young girls to work as prostitutes in the San Antonio area. The victims
in this case were 15, 17 and 22 years old. After arriving in the United States, the victims
were told they would have to work as prostitutes for five years to repay the money the
defendants had spent. Allegedly the money was spent on smuggling and other expenses
they incurred to prepare the young women to be prostitutes. The victims told ICE agents
that they were scared to leave because a male associate of the Ochoa’s had threatened
them with a gun; he also stated that he could find them and their families back in Mexico,
and he would have them killed. The female violators in this case received sentences of
time served to 18 months in prison for their convictions for harboring and transporting
aliens for financial gain. One of the male defendants was sentenced to 120 months in
prison for conspiracy to transport aliens for financial gain and for aiding and abetting sex
trafficking of a child. One remaining defendant is scheduled for jury trial in February
2009.
• Involuntary Servitude/Michigan—On May 31, 2007, a couple from Cameroon was
sentenced for involuntary servitude and related charges. Joseph Djoumessi, 49, was found
guilty of conspiracy, involuntary servitude and harboring for financial gain. He was
sentenced to 17 years in prison, to run concurrent with a 9-to-15-year sentence he is
currently serving for a Michigan state conviction related to the same crime. A jury also
convicted Djoumessi's wife, Evelyn Djoumessi, 42, of conspiracy and involuntary
servitude. She was sentenced to five years in prison. The couple was also ordered to pay
$100,000 in restitution to the victim. ICE agents in Detroit began an investigation in 2000
after receiving information regarding a young girl who was possibly being held against
her will. A 17-year-old girl from Cameroon was discovered in the Djoumessi home,
living under a false identity and in questionable circumstances. The girl had been brought
into the United States illegally when she was 14 years old. During the time the girl lived
at the couple's home, she was forced "by beating and threats," according to court
documents, to care for their children and perform household chores without pay. They
also limited her contact with the outside world and did not permit her to attend school.
• Labor Trafficking/Long Island, N.Y.—On May 13, 2007, Nassau County Police
Department (NCPD) officers encountered a female subject disoriented and wandering
around a residential neighborhood. The NCPD identified her as a possible trafficking
DEPARTMENT OF ECE 16
ANURAG ENGINEERING COLLEGE
victim and contacted ICE agents assigned to the Human Trafficking Task Force who
interviewed the victim at the Nassau University Medical Center (NUMC). The victim
indicated that she had escaped from a residence in Muttontown, N.Y., where she was
forced to stay and work under horrific conditions. Doctors diagnosed the victim with
extensive bruising, burns and lacerations, allegedly inflicted by her employer, Varsha
Sabhnani. On the evening of May 13, 2007, ICE agents executed a federal search warrant
at the residence in Muttontown and found another female domestic worker hiding in the
basement. The second victim denied physical abuse, but witnessed the physical abuse
inflicted upon the other victim. Both victims claimed that Sabhnani and her husband
verbally abused them and restricted their movements at all times. On May 14, 2007, ICE
agents arrested Mahender and Varsha Sabhnani who were subsequently indicted. On
December 18, 2007, they were found guilty by jury of forced labor, peonage, document
servitude, harboring aliens and conspiracy. In June 2008, Varsha Sabhnani was sentenced
to 11 years imprisonment and her husband was sentenced to 3 years. The jury ordered
that their residence, valued at $1.5 million, be criminally forfeited. Proceeds from the sale
of the residence will be used to pay restitution to the victims.
• Sex Trafficking/New York—The Flores-Carreto family sex-trafficking ring operated
between Tenancingo, Tlaxcala, Mexico, and Queens, New York, from 1991 to 2004 and
involved brothels in the New York metropolitan area. ICE began its investigation in
December 2003 after the mother of a trafficking victim reported to the U.S. Embassy in
Mexico City that her daughter had been kidnapped and was being held against her will in
New York. ICE discovered that male members of the Flores-Carreto family romantically
lured young Mexican women to the United States, where they were forced into
prostitution through beatings and threats against their children, who were residing with
the traffickers' mother in México. Victims who became pregnant were forced to have
abortions. In April 2005, Josue Flores-Carreto, Gerardo Flores-Carreto and Daniel Perez
Alfonso, a brothel manager, were sentenced to 50, 50, and 25 years imprisonment
respectively, for multiple offenses related to forced prostitution. In January 2007, Mexico
extradited Consuelo Caretto Valencia, the mother of the Carreto brothers, to the United
States, where she was charged with conspiring on sex trafficking and related offenses. On
July 22, 2008, she pled guilty to sex trafficking and is pending sentencing for that crime.
DEPARTMENT OF ECE 17
ANURAG ENGINEERING COLLEGE
The prosecution has been one of the largest sex trafficking cases brought under the
provisions of the Trafficking Victims Protection Act of 2000. The sentences in this case
are some of the longest to date.
Intellectual Property
Seizure notice
In November, 2010, DHS ICE seized several dozen domain names, replacing the sites with a
logo and warning message. [16][17]
Immigration and Nationality Act Section 287(g) allows ICE to establish increased cooperation
and communication with state, and local law enforcement agencies. Section 287(g) authorizes
the Secretary of Homeland Security to enter into agreements with state and local law
enforcement agencies, permitting designated officers to perform immigration law enforcement
functions, pursuant to a Memorandum of Agreement (MOA), provided that the local law
enforcement officers receive appropriate training and function under the supervision of sworn
U.S. Immigration and Customs Enforcement officers. Under 287(g), ICE provides state and local
law enforcement with the training and subsequent authorization to identify, process, and when
appropriate, detain immigration offenders they encounter during their regular, daily law-
enforcement activity.[18]
The 287(g) program is extremely controversial; it has been widely criticized for increasing racial
profiling by police and undermining community safety because immigrant communities are no
DEPARTMENT OF ECE 18
ANURAG ENGINEERING COLLEGE
ICE has played a key role in investigating and arresting citizens suspected of possessing and
distributing child pornography.[21] Because a vast majority of child pornography is produced in
foreign countries, ICE special agents utilize their authority to investigate persons and groups that
traffic in this type of contraband, the importation of which via traditional mail or internet
channels constitute violations of customs laws
Detention centers
ICE operates detention centers throughout the United States that detain illegal aliens who are
apprehended and placed into removal proceedings. About 31,000 aliens are held in immigration
detention on any given day in over 200 detention centers, jails, and prisons nationwide.
In 2006, the T. Don Hutto Residential Center opened specifically to house non-criminal families.
Other significant facilities are located in Lumpkin, Georgia, Austin, Texas (at the Travis County
Courthouse); Elizabeth, New Jersey; Oakdale, Louisiana; Florence, Arizona; Miami, Florida;
Seattle; York, Pennsylvania; Batavia, New York; Aguadilla, Puerto Rico, and all along the
Texas–Mexico border.
A December 2009 article by The Nation alleges that the ICE maintains 186 unlisted and
unmarked subfield offices, which are not subject to ICE Detention Standards, and amount to
secret detention. The article quotes James Pendergraph, formerly the executive director of ICE's
Office of State and Local Coordination, as stating "If you don't have enough evidence to charge
someone criminally but you think he's illegal, we can make him disappear."
Deaths in detention
ICE has counted 107 deaths in detention since October 2003. The New York Times and the
American Civil Liberties Union recently obtained documents detailing the circumstances of
DEPARTMENT OF ECE 19
ANURAG ENGINEERING COLLEGE
these deaths, under the Freedom of Information Act. "The documents show how officials —
some still in key positions — used their role as overseers to cover up evidence of mistreatment,
deflect scrutiny by the news media or prepare exculpatory public statements after gathering facts
that pointed to substandard care or abuse," the New York Times reported.[24] The deaths in
detention included the following cases:
• Boubacar Bah, a 52-year old tailor from Guinea, was left in an isolation cell for more
than 13 hours after falling and suffering a head fracture before an ambulance was called.
His family was not notified for five days of his injury. A video shows Bah in the medical
unit, before medical personnel sent him to the isolation cell. In the tape, his hands are
handcuffed behind his back, he is face down, and he calls out repeatedly in his native
language, Fulani: “Help, they are killing me!” Telephone and email records show that ten
agency managers based in Newark and Washington discussed how to avoid the cost of
his care and unwanted media attention. They considered sending Bah back to Guinea and
reviewing his canceled work permit to see if it would be possible to get Medicaid or
disability benefits. Eventually, they decided to release him to cousins in New York who
objected that they had no way to care for Bah; however, days before this release was
planned, Bah died.
• Nery Romero was a 22 year old Salvadoran immigrant with no previous history of mental
illness who committed suicide in his cell in the Bergen County Jail in New Jersey. At the
time of his detention, he was recovering from surgery in which metal pins had been
placed in his leg, seriously broken in a motorcycle accident, and was taking strong
prescription painkillers. According to Romero's cellmates and family, authorities failed to
provide Romero with painkillers despite his repeated requests. In a letter written to his
mother shortly before his death, Romero stated: "I'm in hell. They don't give me nothing
for my pain."
• Sandra Kenley of Barbados, who did not receive treatment for a uterine fibroid tumor,
died at the Hampton Roads Regional Jail in Portsmouth, Va in December 2006.
• Abdoulai Sali died of an untreated kidney ailment in the Piedmont Regional Jail in
Virginia.
DEPARTMENT OF ECE 20
ANURAG ENGINEERING COLLEGE
• Young Sook Kim died at the New Mexico Regional Jail in Albuquerque of pancreatic
cancer in September 2006. She had asked for weeks to receive medical care, and died the
day after she was taken to a hospital.
Corporate contracts
Engineering and construction firm Kellogg, Brown and Root (KBR) released a press
statement on January 24, 2006 that the company had been awarded a no-bid contingency contract
from the Department of Homeland Security to support its ICE facilities in the event of an
emergency. The maximum total value of the contract is $385 million and consists of a 1-year
base period with four 1-year options. KBR held the previous ICE contract from 2000 through
2005. The contract provides for establishing temporary detention and processing capabilities to
expand existing ICE Detention and Removal Operations Program facilities in the event of an
emergency influx of immigrants into the U.S., or to support the rapid development of new
programs. The contract may also provide migrant detention support to other government
organizations in the event of an immigration emergency, the company said.
2.12 Equipment
DEPARTMENT OF ECE 21
ANURAG ENGINEERING COLLEGE
An Air and Marine Operations (AMO) UH-60 Black Hawk supporting an ICE
operation ICE HSI Special Agents and ERO officers carry the SIG-Sauer P229R pistol with the
DAK trigger chambered in .40 S&W, the Heckler & Koch P2000SK sub-compact with LEM
trigger in .40 S&W, or the Glock 26 pistol chambered in 9x19 mm, or the Smith & Wesson .38
Special snubnosed revolver. All ICE officers and HSI Special Agents carry the Sig Sauer P229R-
DAK as their primary sidearm. The Glock 26, Heckler & Koch P2000 compact, or and S&W .38
Special are designated as Secondary sidearms. They also may be assigned the Remington Model
870 shotgun, the Steyr AUG rifle, or the Colt M4 carbine. Agents and officers assigned to a
Special Response Team (SRT) are specifically assigned the Colt M4 carbine while some
operators may also carry the Heckler & Koch MP5 submachine gun, although these are being
replaced by the Heckler & Koch UMP in .40 S&W .[11]
ICE San Diego Special Response Team (SRT) operators aiding the rescue efforts
during Hurricane Katrina.
ICE operates the only nation-wide radio communication system in the federal law
enforcement community. The system, known as the National Law Enforcement Communications
Center (NLECC) is Motorola-based and employs a technology specifically designed for ICE
known as COTHEN (Customs Over The Horizon Network). Consequently, ICE agents, officers,
and authorized subcribers are able to communicate with one another across the nation using
NLECC's strategically placed repeaters and high-speed data lines. The center, commonly
referred to internally as Sector, is based in Orlando, Florida.
DEPARTMENT OF ECE 22
ANURAG ENGINEERING COLLEGE
The CRS report for congress talks about the capabilities for cyber attack by terrorists.
Many ofthe departments and agencies of the U.S. government have programs that address cyber
security.Some view that the level of federal effort makes cyber-security a national priority while
otherssee it as unnecessarily redundant. It is seen as the nation lacking a strategy for cyber
terrorism.
Despite criticism, there are many programs that are promising.
Department of Homeland Security (DHS)
Some DHS experts are concerned with the cyber security efforts. While terrorists are
gainingmore expertise and experience, the DHS has not progressed in their efforts to fight cyber
terrorism. Others cite that the lack of progress is due to the difficulty in discovering the
intentions, origination, and groups behind cyber intrusions and attacks. In February 2006, the
DHS participated in an exercise called Cyber Storm which tested the U.S. government,
international partners, and the private sector’s ability to respond to a large scale cyber attack.
According to Homeland Security (2006),
Analysis of the exercise produced eight major findings to better position the United
States to “enhance the nation’s cyber preparedness and response capabilities.” The eight
cyber-security enhancement findings addressed: Interagency Coordination, Contingency
Planning, Risk Assessment and Roles and Responsibilities, Correlation of Multiple
Incidents between Public and Private Sectors, Exercise Program, Coordination between
Entities of Cyber Incidents, Common Framework for Response to Information Access,
Strategic Communications and Public Relations, and Improvement of Process, Tools and
Technology. (P.1)
Department of Defense
In August 2005, DOD Directive 3020.40, the “Defense Critical Infrastructure Program,”
requiredthe DOD to coordinate with public and private sectors to help protect defense critical
infrastructures from terrorist attacks and cyber attack. DOD also formed the Joint Functional
Component Command for Network Warfare (JFCCNW). Its purpose is to defend all DOD
computer systems. Lasker (2005) said the expertise and tools used in this mission are for both
offensive and defensive operations.
Federal Bureau of Investigation (FBI)
DEPARTMENT OF ECE 23
ANURAG ENGINEERING COLLEGE
DEPARTMENT OF ECE 24
ANURAG ENGINEERING COLLEGE
is a terrorist, foreign government, or a bored teenager? It also questioned whether or not the
government would be able to detect the early stages of an attack without the help of third party
technologycompanies.
Inter-Agency Forums
The Office of Management and Budget (OMB) created a taskforce to investigate how
agencies can better training, incident response, disaster recovery, and contingency planning. Also
reports said The U.S. Department of Homeland Security has also created a new National Cyber
Security Division that will focus on reducing vulnerabilities in the government’s computing
networks, and in the private sector to help protect the critical infrastructure.
PRO-U.S. HACKERS
Beginning on September 11, patriot hackers and hacking groups on Internet Relay
Chat (IRC) and newsgroups called for attacks on Pakistani and Afghani web sites. They
promoted active retaliation for the terrorist attacks on the World Trade Center and Pentagon. A
web site
dealing with Afghan dogs was reportedly the first victim of pro-U.S. cyber protesters. On
September 12, the official web site of the Government of Pakistan was defaced. Other web
sites defaced were those belonging to the Afghan News Network, Afghan Politics,
Taleban.com, and Talibanonline.com.
Spam (unwanted mass e-mails) was also used to encourage hackers to join together in
attacking web sites of Islamic fundamentalism and those supporting terrorism. Recipients were
encouraged to further disseminate the message to persuade others to join the fight in any way
they can, be it active hacking or in a support role such as information gathering. Denial-ofservice
(DoS) attacks were also used by hackers. E-mail bombing is a popular form of a DoS
attack. Massive amounts of e-mail or web traffic are directed against a specific site, overloading
it and causing it to crash. On September 12, the official web site of the Presidential Palace of
Afghanistan was affected by a DoS attack that rendered it inaccessible. Usenet newsgroups
dealing with Islam have also experienced DoS attacks. The newsgroup soc.religion.islam was
email
bombed by hackers and subsequently crashed.
DEPARTMENT OF ECE 25
ANURAG ENGINEERING COLLEGE
The call to hackers to join forces has been successful. A group calling itself the
Dispatchers has taken up the task of striking out against Palestinian and Afghani web sites. Lead
by a hacker named The Rev, who has defaced several sites since February, the group vowed to
target those responsible for the September 11 terrorist attacks. Their first known defacement,
committed on September 16, was the Iranian Ministry of the Interior. They stated their
intentions to continue defacing and crashing sites in retaliation of the terrorist attacks and they
have successfully done so, although they have not been heard from since late September.
A prominent pro-U.S. hacking group formed in late September. Founded by the
wealthy, German hacker Kim Schmitz, Young Intelligent Hackers Against Terror (YIHAT) has
as its goal to gather information on terrorists and give that information to the proper U.S.
authorities. They claim to have hacked into a Sudanese bank and found records linking bank
accounts to Al-Qaida and Osama bin Laden. They have also created a web site at www.kill.net
for recruiting purposes which has suffered DoS attacks from opposing hackers and hacking
groups supporting anti-U.S. sentiments, including Fluffi Bunni, a well-known hacker in the
community. Subsequently, this has forced YIHAT to move its activities “underground” and
operate covertly to protect their members. They have apparently discontinued use of the kill.net
web site. Although YIHAT denounces web defacements there have been numerous
defacements committed in its name. This appears to be a fringe element of the group, an
outsider wishing to be accepted into the group, or someone wanting to discredit the
organization. YIHAT also announced plans to seek state sponsorship from a nation that would
legalize their hacking activities in their effort to fight terrorism. They also plan to open a hacking
training center to better train their members. The group’s expanding size has been listed at 800
registered members, although press accounts have placed the number at 25 to 35 active
members.
ANTI-U.S. HACKERS
On September 14, Fluffi Bunni defaced web sites numbering in the thousands by
compromising an ISP domain name server and redirecting those sites to a page created by
himself. The message was “Fluffi Bunni Goes Jihad.” This is believed to be the largest single
defacement act regarding the terrorist protests. This event only lasted an hour but the number of
sites affected was many. Also on September 14, the LifeStages computer virus was renamed to
DEPARTMENT OF ECE 26
ANURAG ENGINEERING COLLEGE
WTC.txt.vbs in order to infect computer users who were curious about the World Trade
Center. The resulting effect on computer systems was minimal.
September 15 saw the e-commerce web site belonging to First Responder Supplies
hacked by a group claiming to be the Brazilian hacking group Illegal Crew. It is common for
hacker groups not associated with a particular event or cause to take up arms in the cyber
protests. Brazilian hackers have been involved in protests against the United States for a couple
of years. The Pakistan Hackerz Club (PHC), including Doctor Nuker, and GForce Pakistan
have also been active in hacking U.S. web sites. GForce Pakistan is a Pakistani hacker group,
which formed in February 2000 and is primarily known for web page defacements of Israeli,
Indian, and U.S. government web sites. The primary stated motive for their cyber activity to
date is in protest of alleged violence and human rights violations against Muslims in Israel and
Kashmir. On October 17 the National Oceanic and Atmospheric Administration’s web server
was hacked in the name of GForce Pakistan which threatened to attack other U.S. and British
military web sites unless the demands posted on the defacement are met. Days later, on
October 20, GForce allegedly defaced a U.S. Department of Defense (DoD) web site
belonging to the Defense Test and Evaluation Processional Institute. This low-level web page
defacement illustrates the ability of the hackers to compromise servers but it is unlikely any
highlevel
DoD web servers will be successfully hacked. Other well known hackers have indicated
they will join the attacks on U.S. web sites.
Web servers and other computer systems in foreign nations are vulnerable as well as
those in the United States. An incident occurred on October 1, in Hungary, when hackers
compromised the Hungarian National Security Office’s web site and defaced a page with anti-
U.S. propaganda. This indicates the hackers’ willingness to go after those nations not directly
involved in the current war on terrorism.
3.SUMMARY
In today’s society it is apparent that cyber crime is a problem especially since it can be
difficult to determine if an attack is from a hacker or from a hacker that is a terrorist or terrorist
group.Looking at the history of cyber crime it has been shown that there is definitely a need for
more protection. Knowing that cyber terrorism exists is the first step to a solution. Hsinchun
Chen, the creator of “Dark Web” went from helping out local law enforcement to helping with
terrorism on the internet. NATO has taken steps to protect its organization with the help of a
DEPARTMENT OF ECE 27
ANURAG ENGINEERING COLLEGE
third party specializing in security solutions. Also the United States government departments
have jointly and separately created programs to fight terrorism as well as programs to educate
others.
4.CONCLUSION
Groups of Pakistani hackers have declared cyber jihad on the United States and are
calling on all hackers of Muslim faith to participate. GForce Pakistan has taken on a large role in
building a coalition to fight the United States as military operations are taking place. Their main
targets are U.S. sites but they are also attacking Indian sites and foreign sites supporting the
United States. They have stated that they will continue to target military sites and web sites that
support critical infrastructure.
There has been a spillover effect of the protests. Several misdirected hacks have taken
place including the defacements on September 16 of Aon Corporation, a Chicago-based
insurance provider, because they have “terrorism” in the URLs. Aon lost approximately 200
employees in their World Trade Center office. A group calling itself “The Dispatchers”
apologized for the mistake. Foreign nations are being affected as well. An Australian web site
was compromised on September 27 by anti-U.S. hackers because it had “tradecenter” in its
URL. This is a common occurrence in that hackers haphazardly target sites without investigating
the company’s background. Some sites are being attacked merely because their names sound
vaguely Arabic. Pro-U.S. hackers will continue to respond to the conflict in cyberspace. There
may be more misdirected action against U.S. web sites, those of U.S. allies, or those not
involved in the military response to the terrorist attacks.
In the week following the terrorist attacks, web page defacements were well publicized.
However, the overall number and sophistication remained rather low. Many of the sites that
were defaced by pro-U.S. protesters had pictures of Osama bin Laden inserted in various
poses, some with him burning in flames or with a gun to his head. Many of the sites defaced by
anti-U.S. protesters had pictures of dead or dying Arab children with statements alleging the
hypocrisy of the actions of the United States.
DEPARTMENT OF ECE 28
ANURAG ENGINEERING COLLEGE
5.REFERENCES
DEPARTMENT OF ECE 29
ANURAG ENGINEERING COLLEGE
*Lourdeau, K. (2004, February 24). FBI Deputy Assistant Director. (J. S. U.S Senate,
Interviewer)
*Mueller, R. (2007, January 11). FBI Director. (S. C. Senate, Interviewer)
NSA. (2007, October). Center of Academic Excellence. Retrieved October 14, 2007, from
National Security Agency: http://www.nsa.gov/ia/academia/caeiae.cfm
Press, T. A. (2007, September 26). U.S. video shows simulated hacker attack on power plant.
Retrieved October 13, 2007, from Silconvalley.com:
http://www.siliconvalley.com/sectors/ci_7010139
*Rollins, J., & Wilson, C. (2007). Terrorist Capabilities for Cyberattack: Overview and Policy
Issues. Library of Congress, Foreign Affairs, Defense and Trade Division. Washington
DC: US Government.
Weimann, G. (2004, March). www.terror.net: How Modern Terrorism Uses the Internet.
Retrieved October 14, 2007, from United States Institute of Peace:
http://www.usip.org/pubs/specialreports/sr116.html
DEPARTMENT OF ECE 30