Sie sind auf Seite 1von 30

ANURAG ENGINEERING COLLEGE

1. INTRODUCTION

This paper is an up-to-date companion to the information on cyber protests and


hacktivism presented in the paper “Cyber Protests: The Threat to the U.S. Information
Infrastructure” located at www.nipc.gov. This paper focuses on the events that occurred since
the September 11 terrorist attacks and the resulting rise in threats to the U.S. information
infrastructure, to include the potential for distributed denial-of-service (DDoS) attacks.
Since the terrorist attacks on September 11, 2001 the speculation of the potential for
cyber attacks has varied, from low-level nuisances to an all out “cyber war.” What has been
seen thus far is on the low side of the threat spectrum. Both pro-U.S. protesters and anti-U.S.
protesters have been active. However, the effects of their actions have not been particularly
damaging. In reviewing these events, trend analysis indicates the continuing remote cyber threat
to U.S. networks and web sites remains low. However, the threat is higher than before September
11.

The presence of terrorist groups on the internet is a relatively new phenomenon,


the growth of which has exploded in the past decade. Accurate estimates on the number of active
terrorist group’s websites vary due to difficulties measuring but, there is a general consensus that
in 1996 there was just under 100 websites and to well over 5000 websites today. It is also widely
accepted that all Foreign Terrorist Organisation’s listed by the U.S. Department of State website
have established an online presence of some form.

Only after 9/11 has governmental and public interest really been focussed on
terrorists and the internet shown by the large number of articles examining the issue in the media
which primarily occurred due to evidence recovered from Al Qaeda computers in Afghanistan,
that indicate the Internet was being used to collect intelligence and send encrypted messages.

The definition of terrorism used in this document is that of the new academic
consensus definition: that terrorism is “a politically motivated tactic involving the threat or use of
force or violence in which the pursuit of publicity plays a significant role”.
DEPARTMENT OF ECE 1
ANURAG ENGINEERING COLLEGE

2. TERRORISM

"Terror" comes from the Latin verb terrere meaning "to frighten". The terror
cimbricus was a panic and state of emergency in Rome in response to the approach of warriors of
the Cimbri tribe in 105 BC. The Jacobins cited this precedent when imposing a Reign of Terror
during the French Revolution. After the Jacobins lost power, the word "terrorist" became a term
of abuse. Although the Reign of Terror was imposed by a government, in modern times
"terrorism" usually refers to the killing of innocent people by a private group in such a way as to
create a media spectacle.

According to the U.S. Federal Bureau of Investigation, cyberterrorism is any


"premeditated, politically motivated attack against information, computer systems, computer
programs, and data which results in violence against non-combatant targets by sub-national
groups or clandestine agents."

Unlike a nuisance virus or computer attack that results in a denial of service, a cyberterrorist
attack is designed to cause physical violence or extreme financial harm. According to the U.S.
Commission of Critical Infrastructure Protection, possible cyberterrorist targets include the
banking industry, military installations, power plants, air traffic control centers, and water
systems.

2.1 Cyber Terrorism Background

The early 1970s was when the first modern day internet was created and was
centralized. It was later decentralized because of the fear of the Soviet Union during the Cold
War. After about 20 years of researching, the internet was open to private and public users alike
during the late 1980’s. This meant that anyone with internet access could gain information from
all over the world where there was a connection. The following is a list that shows the flexibility
of the internet and why it is easy for terrorists as well as their organizations to gain access it to
spread violence and fear and plan and make attacks. Weimann (2004,) said that the internet has,
� easy access;
� little or no regulation, censorship, or other forms of government control;

DEPARTMENT OF ECE 2
ANURAG ENGINEERING COLLEGE

� potentially huge audiences spread throughout the world;


� anonymity of communication;
� fast flow of information;
� inexpensive development and maintenance of a web presence;
� a multimedia environment (the ability to combine text, graphics, audio, and video and to
allow users to download films, songs, books, posters, and so forth); and
� the ability to shape coverage in the traditional mass media, which increasingly use the
Internet as a source for stories.
Cyber Terrorism is the same as physical terrorism, except that they use computers to
make attacks. An example of cyber terrorism would be hacking into the CIA or FBI to intimidate
or coerce the American people. Another example would be hacking into hospital databases and
changing patient information in a way that would cause patients to die due to false medication
dosage or allergies to foods or medicines. In 2003, the projected ecommerce dollar amount forthe
year said that “if the internet went down there would be a disruption of nearly $6.5 billion in
world transactions.” There are two views that exist for defining cyber terrorism; effects-based
and internet-based. In an effects-based situation cyber terrorism exists when computer attacks
result in a situation where fear is generated which is similar to a traditional terrorist attack. In an
internet-based situation attacks are done to cause harm or severe economic damage. “The
objective of a cyber attack includes four areas: Loss of integrity, loss of availability, loss of
confidentiality, and physical destruction.” (Army, 2005, P. II-1 and II-3).
Terrorist use of the internet and other telecommunication devices is growing. Physical
and border security may be encouraging terrorists and extremists to use the internet and other
weapons to attack the United States. Due to the vulnerabilities in security on the internet and
computers, this could be encouraging terrorists to enhance their computer skills as well as
develop alliances with criminal organizations. In doing so, they would organize a cyber terrorist
attack. In recent terrorist events credit card fraud has been used as means of funding; raising
funds via collection of money is another means which is used.
Rollins & Wilson (2007) found the following:
Reports indicate that terrorists and extremists in the Middle East and South Asia may be
increasingly collaborating with cybercriminals for the international movement of money,
and for the smuggling of arms and illegal drugs. These links with hackers and

DEPARTMENT OF ECE 3
ANURAG ENGINEERING COLLEGE

cybercriminals may be examples of the terrorists’ desire to continue to refine their


computer skills, and the relationships forged through collaborative drug trafficking
efforts may also provide terrorists with access to highly skilled computer programmers.
The July 2005 subway and bus bombings in England also indicate that extremists and
their sympathizers may already be embedded in societies with a large information
technology workforce. (P.1)
Sometimes, however it is difficult to tell the difference between a terrorist cyber attack and a
cyber criminal whom is a hacker. The problem is that even though terrorists look for
vulnerabilities to plan for future attacks, cyber criminals do the same but do it to obtain
information that will lead to financial gain. Fortunately the FBI has reported that the cyber
attacks by terrorists have been largely limited to email bombing and defacing of websites.
However due to their increased knowledge, the ability to attack networks is becoming a higher
risk. Lourdeau (2004) said, “The FBI has predicted that terrorists will either develop or hire
hackers for the purpose of complimenting large conventional attacks with cyber attacks.” (P.1)
Also Mueller (2007) discovered “Recently, during the Annual Threat Assessment, FBI Director
Mueller observed that “terrorists increasingly use the internet to communicate, conduct
operational planning, proselytize, recruit, and train and to obtain logistical and financial support.
That is a growing and increasing concern for us.” (P.1)
In 2005, IBM reported that computer security attacks by criminals have increased 50% with
government agencies and industries in the United States being targeted more frequently (IBM,
2005, ). Since cyber crime has become such a major activity it has become increasingly
difficult to distinguish between cyber crimes and suspected terrorist attacks.
The United States and the international community are taking steps to establish laws to prevent
cyber crime. As of now trends are showing that computer attacks will become more numerous,
faster, and more sophisticated. A report by the Government Accountability office says that if
these trends continue, government agencies will not have time to respond to attacks.

2.2 What is Being Done to Help Prevent Attacks

DEPARTMENT OF ECE 4
ANURAG ENGINEERING COLLEGE

As of October 2007, there are over a billion internet users, some of which are not
friends. Since
September 11th, 2001 there has been a tenfold increase in the number of terrorists online. There
were 70-80 terrorist sites and now there are around 7,000-8,000. What these websites are doing
is spreading militant propaganda to give advice so that others might join. This is one of the most
effective ways of spreading violence around the world.
A man by the name of Hsinchun Chen has created Dark Web, a database, which
holds names of extremists around the world. This database is posted in many languages, can host
as many as20,000 members and half a million postings. Before Dark Web, Chan began his first
project in1997. It was a website used for tracking social change such as crime and terrorism
being themain focus. He had the help of the Tucson, Arizona Police department as well as the
NationalScience Foundation to help develop CopLink. This was a way that Law enforcement
officialscould link files and consolidate data. CopLink is responsible for helping catch the
BeltwaySnipers in Washington DC in late 2002. This as well as other successes led the NSF to
ask Chen if he would build another system similar to CopLink to help fight terrorism. Despite a
few
setbacks, Dark Web was a success. Chen says that if Dark Web had been online before the Iraq
war, there might have been a good chance that the supposed links between Al Qaeda and
Saddam Hussein could have been proved fact or fiction. (Kotler, 2007)
There are some that are not convinced that Dark Web is a tool for freedom. Marc Rotenburg,
Executive Director of the Electronic Privacy Information Center says that this tool could be used
to track political opponents. Mike German, ACLU’s policy counsel on national security,
immigration and privacy claims that just because people say they are advocating violence,
doesn’t mean they will actually do it. He says it is “a great waste of critical resources.” (Kotler,
2007)
Kotler (2007) Also says,
I know this from my time spent undercover, infiltrating exactly these kinds of organizations:
Every terrorist training manual makes it clear that a huge separation should be kept between the
bomb-makers and the propagandists; between the action wing and the political wing. This
means, by design, Dark Web is chasing the wrong people. (¶ 29)
Chen disagrees, saying that it is the Job of the NSA to track the secret member communications

DEPARTMENT OF ECE 5
ANURAG ENGINEERING COLLEGE

which are encrypted and moved offline. The goal of Dark Web is to look into the propagandists
of the jihad movement. Despite criticism, Dark Web has shown results. Access to training
manuals to build explosives has been found as well as the location of where they are
downloaded. This has led to countermeasures that are keeping Military units and civilians alike
safer.

2.3 North Atlantic Treaty Organization

NATO, which is the European-US defense force, has a contract that started in
2005 with Telindus, which is a company that offers ICT solutions. NATO’s networks cover their
26 members as well as other operational infrastructures such as Afghanistan and the Balkans.
These networks include coverage for telephone, computer, and video conferencing
communications.
Non-military operations such as disaster relief and protection of critical national
infrastructureare also covered.
After the September 11th, 2001 attacks and the May 2007 DDos attack on Estonia,
NATO has become more attentive to cyber defense because they themselves are vulnerable to
attack since they are out in the open just like other organizations that are on the web. Telindus’s
biggest component is the intrusion detection system (IDS). This allows attacks to be identified
as well as location of their origin and what attackers will do in response to the defensive or
restorative action.

2.4 Simulated Hacker Attack

A video was released that shows a simulated hacker attack where a crucial part of the
US electrical grid is seized. An industrial turbine spins out of control until it shuts down and in
turn shutting down power. The video was produced for Homeland Security and it shows how
commands to control can be quietly executed by hackers.
According to Press (2007),
They've taken a theoretical attack and they've shown in a very demonstrable way the
impact youcan have using cyber means and cyber techniques against this type of infrastructure,"
said AmitYoran, former U.S. Cyber Security Chief for the Bush administration. Yoran is chief

DEPARTMENT OF ECE 6
ANURAG ENGINEERING COLLEGE

executivefor NetWitness Corp., which sells sophisticated network monitoring software. "It's so
graphic,"Yoran said. "Talking about bits and bytes doesn't have the same impact as seeing
somethingcatch fire.
Although the attack never happened, there was a vulnerability found in US utility
companiesknown as supervisory control and data acquisition systems. This flaw was fixed and
utilitymakers urged utilities to take precaution. Robert Jamison of the Homeland Security
Departmentsaid that companies are working to limit these attacks. President Bush’s top
telecommunicationsadvisors concluded years ago that this attack is possible and with a high
degree of anonymity.
The problem is that these affected systems were not designed with security in mind.
What keeps your lights on are some very, very old technology, said Joe Weiss, a security expert
who has testified before Congress about such threats. If you can get access to these systems, you
can conceptually cause them to do whatever it is you want them to do.
Homeland Security has been working with industries, especially electrical and nuclear to
enhance their security. The nuclear industry has implemented their security and the electrical
company is still working on their internal plans. In July the Federal Regulatory Commission
proposed a plan to help protect the majority of the country’s power supply system from cyber
attacks.
2.5 U.S. Government Efforts

Cyber Crimes

The Cyber Crimes Center (C3) Child Exploitation Section (CES)


investigates the trans-border dimension of large-scale producers and distributors of images of
child abuse, as well as individuals who travel in foreign commerce for the purpose of engaging
in sex with minors. The CES employs the latest technology to collect evidence and track the
activities of individuals and organized groups who sexually exploit children through the use of
websites, chat rooms, newsgroups, and peer-to-peer trading. These investigative activities are
organized under Operation Predator, a program managed by the CES. The CES also conducts
clandestine operations throughout the world to identify and apprehend violators. The CES assists
the field offices and routinely coordinates major investigations. The CES works closely with law

DEPARTMENT OF ECE 7
ANURAG ENGINEERING COLLEGE

enforcement agencies from around the world because the exploitation of children is a matter of
global importance

C3 brings the full range of ICE computer and forensic assets together in a single location to
combat such Internet-related crimes as:

• Possession, manufacture and distribution of images of child abuse.


• International money laundering and illegal cyber-banking.
• Illegal arms trafficking and illegal export of strategic/controlled commodities.
• Drug trafficking (including prohibited pharmaceuticals).
• General Smuggling (including the trafficking in stolen art and antiquities; violations of
the Endangered Species Act etc.)
• Intellectual property rights violations (including music and software).
• Immigration violations; identity and benefit fraud

C3 consists of four sections, three of which provide cyber technical and investigative services,
the Cyber Crimes Section (CCS), the Child Exploitation Section (CES), and the Digital Forensic
Section (DFS). The fourth section, the Information Technology and Administrative Section
(ITAS), provides the technical and *operational infrastructure services necessary to support the
other three C3 sections. The center is a co-location of special agents, intelligence research
specialists, administrative support, and contractors, all of which are instrumental in operational
and technical continuity. Within each section, there are various program managers assigned to
certain programmatic areas. These program managers are responsible for supporting ICE Internet
investigations through the generation and the dissemination of viable leads. Program managers
are available to provide guidance and training to field agents as well as to other law enforcement
(foreign and domestic) upon request.[13]

2.6 Child Exploitation

The C3 CES investigates large-scale producers and distributors of images of


child abuse as well as individuals who travel in foreign commerce for the purpose of engaging in
sex with minors. The CES employs the latest technology to collect evidence and track the
activities of individuals and organized groups who sexually exploit children through the use of

DEPARTMENT OF ECE 8
ANURAG ENGINEERING COLLEGE

websites, chat rooms, newsgroups and peer-to-peer trading. The CES also conducts clandestine
operations throughout the world to identify and apprehend violators. The CES assists the field
offices and routinely coordinates major investigations. The CES works closely with law
enforcement agencies from around the world because the exploitation of children is a matter of
global importance.

• Operation Falcon — A joint international images of child abuse investigation initiated by


ICE that identified 39 websites distributing child pornography. Further investigation led
to the arrest of 1,200 international downloader’s and more than 300 U.S. customers. Nine
individuals from the United States and Belarus were identified and charged as the
principals in this investigation. All principals were convicted on various charges related
to money laundering, structuring and the production and distribution of images of child
abuse.
• Operation Mango — An extensive investigation that closed down an American-owned
beachside resort in Acapulco, Mexico, which offered children to sexual predators. The
resort was a haven for pedophiles that traveled to the facility for the sole purpose of
engaging in sex with minors. The proprietor of the business was convicted. As a result of
this investigation and others, the government of Mexico recently created a Federal task
force to address crimes against children in its country.
• Operation Save Our Children[14] inadvertently shut down 84,000 licit and legal websites
due to a technical snafu which they have yet to acknowledge.[15]
• Internet Crimes Against Children (ICAC) Task Force — Department of Justice (DOJ)
Office of Juvenile Justice Programs, ICAC Task Force comprises 45 task forces. The task
forces were created in cooperation with the DOJ ICAC to provide reporting, a means to
provide a virtual pointer system for Child Exploitation and images of child abuse cases
and secure collaboration for various Federal, State, and Local law enforcement
organizations, task forces, and affiliated groups around the world. DHS/ICE strongly
supports the efforts of the ICAC task forces as demonstrated by ICE special agents being
active members of the ICACs throughout the United States. The Northern Virginia/Metro
DC ICAC is housed at the DHS/ICE C3.

DEPARTMENT OF ECE 9
ANURAG ENGINEERING COLLEGE

2.7 Cyber Crimes Section

The Cyber Crimes Section (CCS) is responsible for developing and


coordinating investigations of Immigration and Customs violations where the Internet is used to
facilitate the criminal act. The CCS investigative responsibilities include fraud, theft of
intellectual property rights, money laundering, identity and benefit fraud, the sale and
distribution of narcotics and other controlled substances, illegal arms trafficking and the illegal
export of strategic/controlled commodities and the smuggling and sale of other prohibited items
such as art and cultural property. The CCS is involved in the development of Internet undercover
law enforcement investigative methodology, and new laws and regulations to strengthen U.S.
Cyber-Border Security. C3 supports the ICE Office of Investigation’s (OI) domestic field offices,
along with ICE foreign attachés offices with cyber technical, and covert online investigative
support.

• Operations Apothecary – The CCS, the ICE Commercial Fraud Office and the National
Intellectual Property Rights (IPR) Coordination Center have partnered together and
launched a comprehensive Internet pharmaceutical initiative designed to target, arrest and
prosecute individuals and organizations that are involved in the smuggling of counterfeit
pharmaceuticals of a controlled and non-controlled nature as well as scheduled narcotics
via the Internet. The focus is also on the affiliates of the rogue pharmacies that are
typically operated by criminal enterprises whose sole purpose is to generate large sums of
money, with no regard to the health and welfare of the public.
• Intellectual Property Rights - The CCS has encountered thousands of web sites based in
the United States, as well as foreign that are engaged in the sale of counterfeit
merchandise (including music and software) via the Internet. The CCS continues to work
closely with the National IPR Coordination Center, the Computer Crimes and Intellectual
Property Section (CCIPS) at the DOJ, and industry representatives to identify web sites
responsible for the sale of the counterfeit items.
• Arms and Strategic Technology - The CCS supports ICE’s mission to prevent proliferate
countries, terrorists, trans-national criminals from obtaining strategic materials, funds and

DEPARTMENT OF ECE 10
ANURAG ENGINEERING COLLEGE

support and to protect the American public from the introduction weapons of mass
destruction and other instruments of terror from entering the United States.
• Identify Fraud Initiative - The availability and use of fraudulent identification documents
has always been a concern to the law enforcement community. While traditionally
available from street sources, fraudulent identification and travel documents, of all types,
are also readily available for sale via the Internet. In the post 9-11 world, fraudulent
identity and travel documents are of an even greater concern to ICE because of the
alarming threat they pose to ICE's primary mission of protecting the United States, and its
citizens, from threats arising from the movement of people and goods into and out of the
country. With addressing these documents and their threat in mind, the CCS has sought to
identify sources for fraudulent identity and immigration documents on the Internet.

Notable ICE Cases

ICE Special Agents prepare for an arrest

2.8 High Profile Deportations

• October 14, 2006, ICE removed Sayed Malike to Afghanistan. Malike came to the
attention of ICE via the FBI because he attempted to purchase C4 explosives, night vision
goggles, bullet proof vests, and drugs from an undercover FBI agent. He was charged in
the Eastern District of New York with the crime of lying to a federal law enforcement
officer. Malike pled guilty to this offense on November 2, 2005. ICE placed him in
removal proceedings based on this conviction. On June 1, 2006, an immigration judge
ordered the removal of Malike from the United States.

DEPARTMENT OF ECE 11
ANURAG ENGINEERING COLLEGE

• October 16, 2006, ICE successfully removed Jasvir Singh to India. An immigration judge
ordered Singh’s removal on May 15, 2006 after ICE presented evidence that Singh
attempted to purchase large quantities of weapons, including surface to air missiles, from
undercover FBI agents. Singh told the agents that he was a member of Babbar Khalsa, a
terrorist group in India, and that the weapons were to be used against the government of
India.
• January 23, 2007, ICE removed Majid Al Massari to Saudi Arabia. Al Massari entered
the United States on a student visa in 1993. On July 22, 2004, ICE arrested Al Massari
after he had been convicted of a drug related offense. ICE charged Al Massari with being
a visa overstay and placed him in removal proceedings. The ICE investigation revealed
that he had been soliciting funds for a group called the Committee for the Defense of
Legitimate Rights (CDLR). He also helped to run the group’s website. The CDLR is a
front group for Al Qaeda. The CDLR is also publicly dedicated to the overthrow of the
Saudi Arabian government and the installation of an Islamist government in its place. On
June 27, 2005, an immigration judge ordered the removal of Al Massari from the United
States.
• March 6, 2007, ICE removed Muhammed Abdi Afrid to Pakistan. Afrid was paroled into
the United States on March 5, 2003 to face federal criminal charges in California. The
United States Attorney’s Office for the Southern District of California charged Afrid with
conspiracy to distribute hashish and heroin and conspiracy to provide material support to
a terrorist group based on an incident in China on September 16, 2002 wherein Afrid
attempted to purchase stinger missiles from an undercover U.S. agent in exchange for
five tons of hashish and 600 kilograms of heroin. Afrid planned to sell the missiles to the
Taliban. On April 3, 2006, Afrid received a five year sentence to federal prison for these
offenses. ICE placed Afrid in removal proceedings and charged him with being
removable on account of his criminal conviction. An immigration judge ordered his
removal on December 14, 2006.
• On September 12, 2008, ICE successfully removed Sarafat Mohamed to Egypt.
Mohamed was an Imam for the Hoda Islamic Center in Gainesville, Florida. Mohamed
entered the United States on October 26, 1999 on a non - immigrant religious worker
visa. He later obtained a special immigrant religious worker visa. He applied to become a

DEPARTMENT OF ECE 12
ANURAG ENGINEERING COLLEGE

lawful permanent resident in 2001. The FBI interviewed Mohamed in 2005. Mohamed
confessed to the FBI that he was a founding member of Takfir wal-Hijra (TWH). TWH
was an Egyptian based terrorist organization responsible for the 1977 kidnapping and
murder of the Egyptian Minister of Islamic Endowment, Mohamed Hussain Al Zahabi.
TWH was notable because, unlike many other radical Islamic groups, it did not refrain
from murdering other Muslims. Though Mohamed denied any role in the murder, he
admitted to being a recruiter for TWH. He also admitted that he served as the religious
leader for TWH. After the murder, Egyptian authorities arrested many members of TWH,
including Mohamed. He was convicted for his membership in the organization and
served a 20 year prison sentence. Mohamed failed to include his arrest and conviction in
his application to become a lawful permanent resident of the United States. United States
Citizenship and Immigration Services denied Mohamed’s residency application and
placed him in removal proceedings, charging him with lying in order to gain an
immigration benefit. ICE vigorously sought a removal order in immigration court. Over
the strong objections of ICE, an immigration judge in Miami granted Mohamed’s request
to become a lawful permanent resident. ICE successfully appealed this decision to the
Board of Immigration Appeals. The Board agreed with ICE and reversed the ruling of the
immigration judge. The Board ordered the removal of Mohamed on July 30, 2008.
• June 3, 2009, ICE removed Finnish white supremacist Henrik Holappa to Finland.
Holappa had sought political asylum in the United States, but was arrested for a visa
violation on March 9, 2009. Holappa associated closely with David Duke and John de
Nugent. Holappa spent 87 days in the ICE custody in the ICE Detention Center in
Batavia, New York.

2.9 Counter-Proliferation Investigations

• Telecommunications Equipment to Iraq – On October 2, 2008, Dawn Hanna was


convicted by a jury in the Eastern District of Michigan on eight counts of an indictment
charging her with illegally exporting telecommunications and other equipment with
potential military applications to Iraq during the administration of Saddam Hussein and
during the embargo on that country. On July 19, 2007, Hanna was indicted on charges of
conspiracy, violating the International Emergency Economic Powers Act, money

DEPARTMENT OF ECE 13
ANURAG ENGINEERING COLLEGE

laundering conspiracy, and false statements. From 2002 to 2003, Hanna allegedly
received $9.5 million in proceeds to supply telecommunications and other equipment to
Iraq in violation of the U.S. embargo that existed prior to the invasion by coalition forces
in 2003.
• Military Accelerometers to China – On September 26, 2008, Qing Li was sentenced in
the Southern District of California to 12 months and one day in custody, followed by
three years of supervised released, and ordered to pay a fine for conspiracy to smuggle
military-grade accelerometers from the United States to the People’s Republic of China
(PRC). Li pleaded guilty on June 9, 2008, to violating Title 18 USC Section 554. She was
indicted for the offense on October 18, 2007. Li conspired with an individual in China to
locate and procure as many as 30 Endevco 7270A-200K accelerometers for what her co-
conspirator described as a “special” scientific agency in China. This accelerometer has
military applications in “smart” bombs and missile development and in calibrating the g-
forces of nuclear and chemical explosions.
• Rifle Scopes to Russia – On September 11, 2008, a Grand Jury in the Middle District of
Pennsylvania indicted Boris Gavrilov, D&B Compas Ltd, and Kiflet Arm on charges of
illegally exporting military-grade and dual-use rifle scopes to Russia without the required
U.S. government licenses. Gavrilov is believed to be a resident of Israel. D&B Compas is
located in Israel, while Kiflet Arm is located in Humboldt, Texas. Extradition
proceedings for Gavrilov have commenced.
• Fighter Jet Components to Iran – On September 5, 2008, George Frank Myles, Jr.
pleaded guilty to conspiring to illegally export military aviation parts without obtaining
the permission of the U.S. Department of State, in violation of the Arms Export Control
Act. Myles was indicted for this offense on September 6, 2007, in the Southern District of
New York, and the case was transferred to the Southern District of Florida pursuant to
Rule 21. Sentencing is set for October 30, 2008. During the conspiracy, which spanned
from April 2005 to March 2007, Myles supplied a number of military aviation parts,
including F-14 parts, to an Iranian national, who allegedly picked up the parts in Dubai,
United Arab Emirates and Bangkok, Thailand.
• Surface-to-Air Missiles, Night Vision Devices, Firearms to Foreign Terrorists – On July
10, 2008, Erik Wotulo, a retired Indonesian Marine Corps general, was sentenced in the

DEPARTMENT OF ECE 14
ANURAG ENGINEERING COLLEGE

District of Maryland to 30 months in prison for conspiracy to provide material support to


the Liberation Tigers of Tamil Eelam, a designated terrorist organization, and money
laundering. Beginning in April 2006, Wotulo conspired with Haji Subandi, Haniffa Bin
Osman and Thirunavukarasu Varatharasa to export state-of-the-art firearms, machine
guns and ammunition, surface to air missiles, night vision goggles and other military
weapons to the Tamil Tigers operating in Sri Lanka, to be used to fight against Sri
Lankan government forces. The conspirators contacted an undercover business located in
Maryland about the sale of military weapons. In September 2006, the defendants arrived
in Guam, where they met with undercover officers to inspect and take possession of the
weapons, and were eventually arrested. On January 3, 2008, Varatharasa was sentenced
to 57 months in prison. Subandi was sentenced to 37 months in prison on December 14,
2007, while Osman is scheduled to be sentenced in August 2008. Two additional
defendants, Rinehard Rusli and Helmi Soedirdja, pleaded guilty to export and money
laundering violations on January 30, 2007, as part of a related plot to provide military
night vision devices to the Indonesian military.

2.10 Anti-Human Trafficking

ICE Immigration Enforcement Agents transporting suspects after a raid

• Sex Trafficking/San Antonio—On June 1, 2007, a San Antonio woman and her two
daughters were ordered detained without bond for engaging in sex trafficking of children.
The woman, age 59, and her daughters, ages 32 and 29, were arrested and charged with
sex trafficking of children by force, fraud or coercion. Based on the ongoing investigation
and the victims’ statements, it is alleged that the defendants traveled to Nuevo Laredo,

DEPARTMENT OF ECE 15
ANURAG ENGINEERING COLLEGE

Mexico, to recruit young girls to work as prostitutes in the San Antonio area. The victims
in this case were 15, 17 and 22 years old. After arriving in the United States, the victims
were told they would have to work as prostitutes for five years to repay the money the
defendants had spent. Allegedly the money was spent on smuggling and other expenses
they incurred to prepare the young women to be prostitutes. The victims told ICE agents
that they were scared to leave because a male associate of the Ochoa’s had threatened
them with a gun; he also stated that he could find them and their families back in Mexico,
and he would have them killed. The female violators in this case received sentences of
time served to 18 months in prison for their convictions for harboring and transporting
aliens for financial gain. One of the male defendants was sentenced to 120 months in
prison for conspiracy to transport aliens for financial gain and for aiding and abetting sex
trafficking of a child. One remaining defendant is scheduled for jury trial in February
2009.
• Involuntary Servitude/Michigan—On May 31, 2007, a couple from Cameroon was
sentenced for involuntary servitude and related charges. Joseph Djoumessi, 49, was found
guilty of conspiracy, involuntary servitude and harboring for financial gain. He was
sentenced to 17 years in prison, to run concurrent with a 9-to-15-year sentence he is
currently serving for a Michigan state conviction related to the same crime. A jury also
convicted Djoumessi's wife, Evelyn Djoumessi, 42, of conspiracy and involuntary
servitude. She was sentenced to five years in prison. The couple was also ordered to pay
$100,000 in restitution to the victim. ICE agents in Detroit began an investigation in 2000
after receiving information regarding a young girl who was possibly being held against
her will. A 17-year-old girl from Cameroon was discovered in the Djoumessi home,
living under a false identity and in questionable circumstances. The girl had been brought
into the United States illegally when she was 14 years old. During the time the girl lived
at the couple's home, she was forced "by beating and threats," according to court
documents, to care for their children and perform household chores without pay. They
also limited her contact with the outside world and did not permit her to attend school.
• Labor Trafficking/Long Island, N.Y.—On May 13, 2007, Nassau County Police
Department (NCPD) officers encountered a female subject disoriented and wandering
around a residential neighborhood. The NCPD identified her as a possible trafficking

DEPARTMENT OF ECE 16
ANURAG ENGINEERING COLLEGE

victim and contacted ICE agents assigned to the Human Trafficking Task Force who
interviewed the victim at the Nassau University Medical Center (NUMC). The victim
indicated that she had escaped from a residence in Muttontown, N.Y., where she was
forced to stay and work under horrific conditions. Doctors diagnosed the victim with
extensive bruising, burns and lacerations, allegedly inflicted by her employer, Varsha
Sabhnani. On the evening of May 13, 2007, ICE agents executed a federal search warrant
at the residence in Muttontown and found another female domestic worker hiding in the
basement. The second victim denied physical abuse, but witnessed the physical abuse
inflicted upon the other victim. Both victims claimed that Sabhnani and her husband
verbally abused them and restricted their movements at all times. On May 14, 2007, ICE
agents arrested Mahender and Varsha Sabhnani who were subsequently indicted. On
December 18, 2007, they were found guilty by jury of forced labor, peonage, document
servitude, harboring aliens and conspiracy. In June 2008, Varsha Sabhnani was sentenced
to 11 years imprisonment and her husband was sentenced to 3 years. The jury ordered
that their residence, valued at $1.5 million, be criminally forfeited. Proceeds from the sale
of the residence will be used to pay restitution to the victims.
• Sex Trafficking/New York—The Flores-Carreto family sex-trafficking ring operated
between Tenancingo, Tlaxcala, Mexico, and Queens, New York, from 1991 to 2004 and
involved brothels in the New York metropolitan area. ICE began its investigation in
December 2003 after the mother of a trafficking victim reported to the U.S. Embassy in
Mexico City that her daughter had been kidnapped and was being held against her will in
New York. ICE discovered that male members of the Flores-Carreto family romantically
lured young Mexican women to the United States, where they were forced into
prostitution through beatings and threats against their children, who were residing with
the traffickers' mother in México. Victims who became pregnant were forced to have
abortions. In April 2005, Josue Flores-Carreto, Gerardo Flores-Carreto and Daniel Perez
Alfonso, a brothel manager, were sentenced to 50, 50, and 25 years imprisonment
respectively, for multiple offenses related to forced prostitution. In January 2007, Mexico
extradited Consuelo Caretto Valencia, the mother of the Carreto brothers, to the United
States, where she was charged with conspiring on sex trafficking and related offenses. On
July 22, 2008, she pled guilty to sex trafficking and is pending sentencing for that crime.

DEPARTMENT OF ECE 17
ANURAG ENGINEERING COLLEGE

The prosecution has been one of the largest sex trafficking cases brought under the
provisions of the Trafficking Victims Protection Act of 2000. The sentences in this case
are some of the longest to date.

Intellectual Property

Seizure notice

In November, 2010, DHS ICE seized several dozen domain names, replacing the sites with a
logo and warning message. [16][17]

2.11 ICE and immigration law

Immigration and Nationality Act Section 287(g) allows ICE to establish increased cooperation
and communication with state, and local law enforcement agencies. Section 287(g) authorizes
the Secretary of Homeland Security to enter into agreements with state and local law
enforcement agencies, permitting designated officers to perform immigration law enforcement
functions, pursuant to a Memorandum of Agreement (MOA), provided that the local law
enforcement officers receive appropriate training and function under the supervision of sworn
U.S. Immigration and Customs Enforcement officers. Under 287(g), ICE provides state and local
law enforcement with the training and subsequent authorization to identify, process, and when
appropriate, detain immigration offenders they encounter during their regular, daily law-
enforcement activity.[18]
The 287(g) program is extremely controversial; it has been widely criticized for increasing racial
profiling by police and undermining community safety because immigrant communities are no

DEPARTMENT OF ECE 18
ANURAG ENGINEERING COLLEGE

longer willing to report crimes or talk to law enforcement.[19]


The 287(g) program is one of several ICE ACCESS (ICE “Agreements of Cooperation in
Communities to Enhance Safety and Security”) programs that increase collaboration between
local law enforcement and immigration enforcement agents.[20]

ICE has played a key role in investigating and arresting citizens suspected of possessing and
distributing child pornography.[21] Because a vast majority of child pornography is produced in
foreign countries, ICE special agents utilize their authority to investigate persons and groups that
traffic in this type of contraband, the importation of which via traditional mail or internet
channels constitute violations of customs laws

Detention centers

ICE operates detention centers throughout the United States that detain illegal aliens who are
apprehended and placed into removal proceedings. About 31,000 aliens are held in immigration
detention on any given day in over 200 detention centers, jails, and prisons nationwide.

In 2006, the T. Don Hutto Residential Center opened specifically to house non-criminal families.
Other significant facilities are located in Lumpkin, Georgia, Austin, Texas (at the Travis County
Courthouse); Elizabeth, New Jersey; Oakdale, Louisiana; Florence, Arizona; Miami, Florida;
Seattle; York, Pennsylvania; Batavia, New York; Aguadilla, Puerto Rico, and all along the
Texas–Mexico border.

A December 2009 article by The Nation alleges that the ICE maintains 186 unlisted and
unmarked subfield offices, which are not subject to ICE Detention Standards, and amount to
secret detention. The article quotes James Pendergraph, formerly the executive director of ICE's
Office of State and Local Coordination, as stating "If you don't have enough evidence to charge
someone criminally but you think he's illegal, we can make him disappear."

Deaths in detention

ICE has counted 107 deaths in detention since October 2003. The New York Times and the
American Civil Liberties Union recently obtained documents detailing the circumstances of

DEPARTMENT OF ECE 19
ANURAG ENGINEERING COLLEGE

these deaths, under the Freedom of Information Act. "The documents show how officials —
some still in key positions — used their role as overseers to cover up evidence of mistreatment,
deflect scrutiny by the news media or prepare exculpatory public statements after gathering facts
that pointed to substandard care or abuse," the New York Times reported.[24] The deaths in
detention included the following cases:

• Boubacar Bah, a 52-year old tailor from Guinea, was left in an isolation cell for more
than 13 hours after falling and suffering a head fracture before an ambulance was called.
His family was not notified for five days of his injury. A video shows Bah in the medical
unit, before medical personnel sent him to the isolation cell. In the tape, his hands are
handcuffed behind his back, he is face down, and he calls out repeatedly in his native
language, Fulani: “Help, they are killing me!” Telephone and email records show that ten
agency managers based in Newark and Washington discussed how to avoid the cost of
his care and unwanted media attention. They considered sending Bah back to Guinea and
reviewing his canceled work permit to see if it would be possible to get Medicaid or
disability benefits. Eventually, they decided to release him to cousins in New York who
objected that they had no way to care for Bah; however, days before this release was
planned, Bah died.
• Nery Romero was a 22 year old Salvadoran immigrant with no previous history of mental
illness who committed suicide in his cell in the Bergen County Jail in New Jersey. At the
time of his detention, he was recovering from surgery in which metal pins had been
placed in his leg, seriously broken in a motorcycle accident, and was taking strong
prescription painkillers. According to Romero's cellmates and family, authorities failed to
provide Romero with painkillers despite his repeated requests. In a letter written to his
mother shortly before his death, Romero stated: "I'm in hell. They don't give me nothing
for my pain."
• Sandra Kenley of Barbados, who did not receive treatment for a uterine fibroid tumor,
died at the Hampton Roads Regional Jail in Portsmouth, Va in December 2006.
• Abdoulai Sali died of an untreated kidney ailment in the Piedmont Regional Jail in
Virginia.

DEPARTMENT OF ECE 20
ANURAG ENGINEERING COLLEGE

• Young Sook Kim died at the New Mexico Regional Jail in Albuquerque of pancreatic
cancer in September 2006. She had asked for weeks to receive medical care, and died the
day after she was taken to a hospital.

Corporate contracts

Engineering and construction firm Kellogg, Brown and Root (KBR) released a press
statement on January 24, 2006 that the company had been awarded a no-bid contingency contract
from the Department of Homeland Security to support its ICE facilities in the event of an
emergency. The maximum total value of the contract is $385 million and consists of a 1-year
base period with four 1-year options. KBR held the previous ICE contract from 2000 through
2005. The contract provides for establishing temporary detention and processing capabilities to
expand existing ICE Detention and Removal Operations Program facilities in the event of an
emergency influx of immigrants into the U.S., or to support the rapid development of new
programs. The contract may also provide migrant detention support to other government
organizations in the event of an immigration emergency, the company said.

2.12 Equipment

DEPARTMENT OF ECE 21
ANURAG ENGINEERING COLLEGE

An Air and Marine Operations (AMO) UH-60 Black Hawk supporting an ICE
operation ICE HSI Special Agents and ERO officers carry the SIG-Sauer P229R pistol with the
DAK trigger chambered in .40 S&W, the Heckler & Koch P2000SK sub-compact with LEM
trigger in .40 S&W, or the Glock 26 pistol chambered in 9x19 mm, or the Smith & Wesson .38
Special snubnosed revolver. All ICE officers and HSI Special Agents carry the Sig Sauer P229R-
DAK as their primary sidearm. The Glock 26, Heckler & Koch P2000 compact, or and S&W .38
Special are designated as Secondary sidearms. They also may be assigned the Remington Model
870 shotgun, the Steyr AUG rifle, or the Colt M4 carbine. Agents and officers assigned to a
Special Response Team (SRT) are specifically assigned the Colt M4 carbine while some
operators may also carry the Heckler & Koch MP5 submachine gun, although these are being
replaced by the Heckler & Koch UMP in .40 S&W .[11]

ICE San Diego Special Response Team (SRT) operators aiding the rescue efforts
during Hurricane Katrina.

ICE operates the only nation-wide radio communication system in the federal law
enforcement community. The system, known as the National Law Enforcement Communications
Center (NLECC) is Motorola-based and employs a technology specifically designed for ICE
known as COTHEN (Customs Over The Horizon Network). Consequently, ICE agents, officers,
and authorized subcribers are able to communicate with one another across the nation using
NLECC's strategically placed repeaters and high-speed data lines. The center, commonly
referred to internally as Sector, is based in Orlando, Florida.

Congressional Research Services Report

DEPARTMENT OF ECE 22
ANURAG ENGINEERING COLLEGE

The CRS report for congress talks about the capabilities for cyber attack by terrorists.
Many ofthe departments and agencies of the U.S. government have programs that address cyber
security.Some view that the level of federal effort makes cyber-security a national priority while
otherssee it as unnecessarily redundant. It is seen as the nation lacking a strategy for cyber
terrorism.
Despite criticism, there are many programs that are promising.
Department of Homeland Security (DHS)
Some DHS experts are concerned with the cyber security efforts. While terrorists are
gainingmore expertise and experience, the DHS has not progressed in their efforts to fight cyber
terrorism. Others cite that the lack of progress is due to the difficulty in discovering the
intentions, origination, and groups behind cyber intrusions and attacks. In February 2006, the
DHS participated in an exercise called Cyber Storm which tested the U.S. government,
international partners, and the private sector’s ability to respond to a large scale cyber attack.
According to Homeland Security (2006),
Analysis of the exercise produced eight major findings to better position the United
States to “enhance the nation’s cyber preparedness and response capabilities.” The eight
cyber-security enhancement findings addressed: Interagency Coordination, Contingency
Planning, Risk Assessment and Roles and Responsibilities, Correlation of Multiple
Incidents between Public and Private Sectors, Exercise Program, Coordination between
Entities of Cyber Incidents, Common Framework for Response to Information Access,
Strategic Communications and Public Relations, and Improvement of Process, Tools and
Technology. (P.1)
Department of Defense
In August 2005, DOD Directive 3020.40, the “Defense Critical Infrastructure Program,”
requiredthe DOD to coordinate with public and private sectors to help protect defense critical
infrastructures from terrorist attacks and cyber attack. DOD also formed the Joint Functional
Component Command for Network Warfare (JFCCNW). Its purpose is to defend all DOD
computer systems. Lasker (2005) said the expertise and tools used in this mission are for both
offensive and defensive operations.
Federal Bureau of Investigation (FBI)

DEPARTMENT OF ECE 23
ANURAG ENGINEERING COLLEGE

The FBI Computer Intrusion program was developed to provide administrative,


operational support and guidance to those investigating computer intrusions. According to
Lourdeau (2004),“A Special Technologies and Applications program supports FBI
counterterrorism computer intrusion investigations, and the FBI Cyber International Investigative
program co international investigations through coordination with FBI Headquarters Office of
International
Operations and foreign law enforcement agencies.” (P.1)
National Security Agency (NSA)
To reduce vulnerability of national information infrastructure, the NSA has promoted
higher education by creating the National Centers of Academic Excellence in Information
Assurance Education (CAEIAE). The program is intended to create more professionals with
information assurance (IA) experience. To support the President’s National Strategy to Secure
Cyberspace which was established in 2003, the NSA and DHS joined to sponsor the program.
This program allows four-year colleges and graduate-level universities to apply to be designated
as National Center of Academic Excellence in Information Assurance Education. According to
sources,
students attending CAEIAE schools are eligible to apply for scholarships and grants through the
Department of Defense Information Assurance Scholarship Program and the Federal Cyber
Service Scholarship for Service Program (SFS). (NSA 2007, ¶ 3)
Central Intelligence Agency (CIA):
The CIA Information Operations Center evaluates threats to U.S. computer systems
from foreign governments, criminal organizations and hackers. In 2005 a cyber security test was
conducted called “Silent Horizon.” Its goal was to see how government and industry could react
to Internet based attacks. One of the problems the CIA wanted to figure out was who was in
charge of dealing with a major cyber attack? The government is in charge but in practice the
defenses are controlled by numerous civilian telecommunications firms. According to sources,
the simulated cyber attacks were set five years into the future. The stated premise of the exercise
was that cyberspace would see the same level of devastation as the 9/11 hijackings. (Bridis 2005,
¶ 3)
“Livewire” was an earlier exercise performed similar to “Silent Horizon” that had
concerns for the government’s role during a cyber attack. What happens if the identified culprit

DEPARTMENT OF ECE 24
ANURAG ENGINEERING COLLEGE

is a terrorist, foreign government, or a bored teenager? It also questioned whether or not the
government would be able to detect the early stages of an attack without the help of third party
technologycompanies.
Inter-Agency Forums
The Office of Management and Budget (OMB) created a taskforce to investigate how
agencies can better training, incident response, disaster recovery, and contingency planning. Also
reports said The U.S. Department of Homeland Security has also created a new National Cyber
Security Division that will focus on reducing vulnerabilities in the government’s computing
networks, and in the private sector to help protect the critical infrastructure.

PRO-U.S. HACKERS
Beginning on September 11, patriot hackers and hacking groups on Internet Relay
Chat (IRC) and newsgroups called for attacks on Pakistani and Afghani web sites. They
promoted active retaliation for the terrorist attacks on the World Trade Center and Pentagon. A
web site
dealing with Afghan dogs was reportedly the first victim of pro-U.S. cyber protesters. On
September 12, the official web site of the Government of Pakistan was defaced. Other web
sites defaced were those belonging to the Afghan News Network, Afghan Politics,
Taleban.com, and Talibanonline.com.
Spam (unwanted mass e-mails) was also used to encourage hackers to join together in
attacking web sites of Islamic fundamentalism and those supporting terrorism. Recipients were
encouraged to further disseminate the message to persuade others to join the fight in any way
they can, be it active hacking or in a support role such as information gathering. Denial-ofservice
(DoS) attacks were also used by hackers. E-mail bombing is a popular form of a DoS
attack. Massive amounts of e-mail or web traffic are directed against a specific site, overloading
it and causing it to crash. On September 12, the official web site of the Presidential Palace of
Afghanistan was affected by a DoS attack that rendered it inaccessible. Usenet newsgroups
dealing with Islam have also experienced DoS attacks. The newsgroup soc.religion.islam was
email
bombed by hackers and subsequently crashed.

DEPARTMENT OF ECE 25
ANURAG ENGINEERING COLLEGE

The call to hackers to join forces has been successful. A group calling itself the
Dispatchers has taken up the task of striking out against Palestinian and Afghani web sites. Lead
by a hacker named The Rev, who has defaced several sites since February, the group vowed to
target those responsible for the September 11 terrorist attacks. Their first known defacement,
committed on September 16, was the Iranian Ministry of the Interior. They stated their
intentions to continue defacing and crashing sites in retaliation of the terrorist attacks and they
have successfully done so, although they have not been heard from since late September.
A prominent pro-U.S. hacking group formed in late September. Founded by the
wealthy, German hacker Kim Schmitz, Young Intelligent Hackers Against Terror (YIHAT) has
as its goal to gather information on terrorists and give that information to the proper U.S.
authorities. They claim to have hacked into a Sudanese bank and found records linking bank
accounts to Al-Qaida and Osama bin Laden. They have also created a web site at www.kill.net
for recruiting purposes which has suffered DoS attacks from opposing hackers and hacking
groups supporting anti-U.S. sentiments, including Fluffi Bunni, a well-known hacker in the
community. Subsequently, this has forced YIHAT to move its activities “underground” and
operate covertly to protect their members. They have apparently discontinued use of the kill.net
web site. Although YIHAT denounces web defacements there have been numerous
defacements committed in its name. This appears to be a fringe element of the group, an
outsider wishing to be accepted into the group, or someone wanting to discredit the
organization. YIHAT also announced plans to seek state sponsorship from a nation that would
legalize their hacking activities in their effort to fight terrorism. They also plan to open a hacking
training center to better train their members. The group’s expanding size has been listed at 800
registered members, although press accounts have placed the number at 25 to 35 active
members.

ANTI-U.S. HACKERS
On September 14, Fluffi Bunni defaced web sites numbering in the thousands by
compromising an ISP domain name server and redirecting those sites to a page created by
himself. The message was “Fluffi Bunni Goes Jihad.” This is believed to be the largest single
defacement act regarding the terrorist protests. This event only lasted an hour but the number of
sites affected was many. Also on September 14, the LifeStages computer virus was renamed to

DEPARTMENT OF ECE 26
ANURAG ENGINEERING COLLEGE

WTC.txt.vbs in order to infect computer users who were curious about the World Trade
Center. The resulting effect on computer systems was minimal.
September 15 saw the e-commerce web site belonging to First Responder Supplies
hacked by a group claiming to be the Brazilian hacking group Illegal Crew. It is common for
hacker groups not associated with a particular event or cause to take up arms in the cyber
protests. Brazilian hackers have been involved in protests against the United States for a couple
of years. The Pakistan Hackerz Club (PHC), including Doctor Nuker, and GForce Pakistan
have also been active in hacking U.S. web sites. GForce Pakistan is a Pakistani hacker group,
which formed in February 2000 and is primarily known for web page defacements of Israeli,
Indian, and U.S. government web sites. The primary stated motive for their cyber activity to
date is in protest of alleged violence and human rights violations against Muslims in Israel and
Kashmir. On October 17 the National Oceanic and Atmospheric Administration’s web server
was hacked in the name of GForce Pakistan which threatened to attack other U.S. and British
military web sites unless the demands posted on the defacement are met. Days later, on
October 20, GForce allegedly defaced a U.S. Department of Defense (DoD) web site
belonging to the Defense Test and Evaluation Processional Institute. This low-level web page
defacement illustrates the ability of the hackers to compromise servers but it is unlikely any
highlevel
DoD web servers will be successfully hacked. Other well known hackers have indicated
they will join the attacks on U.S. web sites.
Web servers and other computer systems in foreign nations are vulnerable as well as
those in the United States. An incident occurred on October 1, in Hungary, when hackers
compromised the Hungarian National Security Office’s web site and defaced a page with anti-
U.S. propaganda. This indicates the hackers’ willingness to go after those nations not directly
involved in the current war on terrorism.

3.SUMMARY

In today’s society it is apparent that cyber crime is a problem especially since it can be
difficult to determine if an attack is from a hacker or from a hacker that is a terrorist or terrorist
group.Looking at the history of cyber crime it has been shown that there is definitely a need for
more protection. Knowing that cyber terrorism exists is the first step to a solution. Hsinchun
Chen, the creator of “Dark Web” went from helping out local law enforcement to helping with
terrorism on the internet. NATO has taken steps to protect its organization with the help of a

DEPARTMENT OF ECE 27
ANURAG ENGINEERING COLLEGE

third party specializing in security solutions. Also the United States government departments
have jointly and separately created programs to fight terrorism as well as programs to educate
others.

3.1CALLS FOR AN END TO HACKING


Not all hacker groups have been supportive in the efforts to attack the United States.
On September 14, a group of German hackers, the Chaos Computer Club, called for an end to
the protests and for all computer enthusiasts to stop vigilante actions. They called for global
communication to resolve the conflict. Their peaceful efforts were publicized but largely
unheeded by the hacker community as indicated by the continuing defacements on both sides of
the issue. Cyber Angels, a well-known group of hackers promoting responsible behavior, have
also spoken against the hacking conflict. They sponsored television ads urging hackers not to
get caught up in the over zealous fervor, rather, urging these same hackers to help gather
intelligence and information on the criminals who are participating in this hacktivism.

4.CONCLUSION
Groups of Pakistani hackers have declared cyber jihad on the United States and are
calling on all hackers of Muslim faith to participate. GForce Pakistan has taken on a large role in
building a coalition to fight the United States as military operations are taking place. Their main
targets are U.S. sites but they are also attacking Indian sites and foreign sites supporting the
United States. They have stated that they will continue to target military sites and web sites that
support critical infrastructure.
There has been a spillover effect of the protests. Several misdirected hacks have taken
place including the defacements on September 16 of Aon Corporation, a Chicago-based
insurance provider, because they have “terrorism” in the URLs. Aon lost approximately 200
employees in their World Trade Center office. A group calling itself “The Dispatchers”
apologized for the mistake. Foreign nations are being affected as well. An Australian web site
was compromised on September 27 by anti-U.S. hackers because it had “tradecenter” in its
URL. This is a common occurrence in that hackers haphazardly target sites without investigating
the company’s background. Some sites are being attacked merely because their names sound
vaguely Arabic. Pro-U.S. hackers will continue to respond to the conflict in cyberspace. There
may be more misdirected action against U.S. web sites, those of U.S. allies, or those not
involved in the military response to the terrorist attacks.
In the week following the terrorist attacks, web page defacements were well publicized.
However, the overall number and sophistication remained rather low. Many of the sites that
were defaced by pro-U.S. protesters had pictures of Osama bin Laden inserted in various
poses, some with him burning in flames or with a gun to his head. Many of the sites defaced by
anti-U.S. protesters had pictures of dead or dying Arab children with statements alleging the
hypocrisy of the actions of the United States.

DEPARTMENT OF ECE 28
ANURAG ENGINEERING COLLEGE

As many expert Information Technology security organizations have intoned since


September 11, the potential for more serious cyber attacks does exist; however, they
do not appear to be imminent. It is believed that the cyber protests, hacktivism, and on-line
defacements will continue and may escalate as the United States continues military involvement.
The potential for future DDoS attacks remains high. The protesters have indicated they are
targeting web sites of DoD and organizations that support the critical infrastructure of the United
States, but many businesses and other organizations-some completely unrelated to the
eventshave
been victims. As such, infrastructure-related organizations should maintain a heightened
defensive stance in regards to their web servers and networks connected to the Internet.

5.REFERENCES

*Army, U. (2005). Cyber Operations and Cyber Terrorism. In U. Army, U.S.


Army Training
Doctrine Command, Handbook No. 1.02
Bridis, T. (2005, May 26). USA Today. Retrieved October 14, 2007, from "Silent Horizon" war
games wrap up for The CIA:
http://www.usatoday.com/tech/news/techpolicy/2005-05-26-cia-wargames_x.htm
Coleman, K. (2003, October 10 ). Cyber Terrorism. Retrieved October 13th, 2007, from Cyber
Terrorism Article: http://www.directionsmag.com/article.php?article_id=432&trv=1
Grant, I. (2007, October 9). Nato locks door to cyber terrorism. Retrieved October 13, 2007,
from ComputerWeekly.com:
http://www.computerweekly.com/Articles/2007/10/09/227331/nato-locks-door-to-
cyberterrorism.
htm
Gross, G. (2003, June 9). Homeland Security to Oversee Cybersecurity. Retrieved October 14,
2007, from PCWorld: http://www.pcworld.com/article/id,111066-page,1/article.html
*Homeland Security, T. D. (2006). DHS Releases Cyber Storm Public Excercise Report. DHS.
IBM, P. R. (2005, August 2). Government, financial services and manufacturing sectors top
targets of security attacks in first half of 2005. Retrieved October 13, 2007, from IBM
News: http://www.ibm.com/news/ie/en/2005/08/ie_en_news_20050804.html
Kotler, S. (2007, October 12). 'Dark Web' Project Takes On Cyber-Terrorism. Retrieved October
13th, 2007, from FOx News: http://www.foxnews.com/story/0,2933,300956,00.html
Lasker, J. (2005, April 18). U.S. Military's Elite Hacker Crew. Retrieved October 13, 2007, from
Wired News: http://www.wired.com/politics/security/news/2005/04/67223

DEPARTMENT OF ECE 29
ANURAG ENGINEERING COLLEGE

*Lourdeau, K. (2004, February 24). FBI Deputy Assistant Director. (J. S. U.S Senate,
Interviewer)
*Mueller, R. (2007, January 11). FBI Director. (S. C. Senate, Interviewer)
NSA. (2007, October). Center of Academic Excellence. Retrieved October 14, 2007, from
National Security Agency: http://www.nsa.gov/ia/academia/caeiae.cfm
Press, T. A. (2007, September 26). U.S. video shows simulated hacker attack on power plant.
Retrieved October 13, 2007, from Silconvalley.com:
http://www.siliconvalley.com/sectors/ci_7010139
*Rollins, J., & Wilson, C. (2007). Terrorist Capabilities for Cyberattack: Overview and Policy
Issues. Library of Congress, Foreign Affairs, Defense and Trade Division. Washington
DC: US Government.
Weimann, G. (2004, March). www.terror.net: How Modern Terrorism Uses the Internet.
Retrieved October 14, 2007, from United States Institute of Peace:
http://www.usip.org/pubs/specialreports/sr116.html

DEPARTMENT OF ECE 30

Das könnte Ihnen auch gefallen