代写范文

留学资讯

写作技巧

论文代写专题

服务承诺

资金托管
原创保证
实力保障
24小时客服
使命必达

51Due提供Essay,Paper,Report,Assignment等学科作业的代写与辅导,同时涵盖Personal Statement,转学申请等留学文书代写。

51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标
51Due将让你达成学业目标

私人订制你的未来职场 世界名企,高端行业岗位等 在新的起点上实现更高水平的发展

积累工作经验
多元化文化交流
专业实操技能
建立人际资源圈

Terrorism

2013-11-13 来源: 类别: 更多范文

WAR99024 CYBER-TERRORISM – THE POLITICAL EVOLUTION OF THE COMPUTER HACKER M.J.Warren† and S.M.Furnell‡ Page 2 Australian Institute of Computer Ethics Conference, July, 1999, Lilidale Abstract The computer hacker already represents a well-known threat in the context of the global information society and is held responsible for a significant degree of disruption and damage to information systems. However, evidence suggests that hacking skills are now being applied for distinctly political purposes. The consequence is that information technology is increasingly seen as potential tool for terrorist organisations. This is leading to the emergence ‘cyber terrorists’, who attack technological infrastructures such as the Internet in order to help further their cause. The paper considers the potential problems, presents some evidence to highlight known examples (particularly in the context of the Balkans crisis) and discusses the responses necessary to preserve the future security of our society. Keywords Cyber Terrorism, Hackers, Internet, Security. 1) Introduction Many aspects of our modern society now have either a direct or implicit dependence upon information technology (IT). As such, a compromise of the availability or integrity in relation to these systems (which may encompass such diverse domains as banking, government, healthcare and law enforcement) could have dramatic consequences from a societal perspective. In many modern business environments, even the short-term, temporary interruption of Internet / e-mail connectivity can have a significantly disruptive effect, forcing people to revert to other forms of communication that are now viewed as less convenient. Imagine, then, the effect if the denial of service was over the longer term and also affected the IT infrastructure in general. Many governments are now coming to this realisation. This paper sets out to consider the scenario in which technology infrastructures or services are targeted deliberately, examining the issue in relation to two categories of computer abuser: ‘hackers’ and ‘cyber terrorists’. 2) The Computer Hacker The definition of the ‘computer hacker’ has been the subject of much debate in computing circles. Caelli et al (1989) provide two definitions of the term: 1. In programming, a computing enthusiast. The term is normally applied to people who take a delight in experimenting with system hardware (the electronics), software (computer programs) and communication systems (telephone lines, in most cases). 2. In data (information) security, an unauthorised user who tries to gain entry into a computer, or computer network, by defeating the computers access (and/or security) controls. Australian Institute of Computer Ethics Conference, July, 1999, Lilidale Page 3 In mass media terms, the latter interpretation is by far the more common (although persons belonging to the former category of hacker would seek to more accurately define the latter group, particularly those with a malicious intent, as ‘crackers’). Hackers are by no means a new threat and have routinely featured in news stories during the last two decades. Indeed, they have become the traditional ‘target’ of the media, with the standard approach being to present the image of either a “teenage whizzkid” or an insidious threat. In reality, it can be argued that there are different degrees of the problem. Some hackers are malicious, whilst others are merely naïve and, hence, do not appreciate that their activities may be doing any real harm. Furthermore, when viewed as a general population, hackers may be seen to have numerous motivations for their actions (including financial gain, revenge, ideology or just plain mischief making). However, in many cases it can be argued that this is immaterial as, no matter what the reason, the end result is some form of adverse impact upon another party. Table 1 illustrates the extent of the hacking problem, based upon figures taken from a series of surveys conducted by the UK Audit Commission (Audit Commission 1990, 1994, 1998). These surveys consider the general problem of computer abuse, encompassing various types of incident (including hacking, viruses, fraud, sabotage and theft) across a number of industries / sectors (including government, healthcare, banking, retail and education). The table indicates the consequences of the incidents in terms of financial losses (which may have occurred directly or indirectly as a result of the incidents). However, it is likely that other, less measurable consequences may also have occurred as a result (e.g. disruption to operations, breaches of personal privacy or commercial confidentiality etc.). 1990 1994 1998 Total abuse incidents reported 180 537 510 No. hacking incidents 26 15 56 Hacking as % of total 14% 3% 11% Resulting loss (£) £31,500 £16,220 £360,860 Table 1 : Reported incidents of computer hacking As an aside, it is worth noting that the significant increases in the ‘total incidents’ figures in the 1994 and 1998 surveys are largely accounted for by the widespread emergence of the virus problem. It should also be noted that these figures only refer to the reported incidents – it is frequently speculated that the true figures may be much higher than this, but organisations are choosing to remain silent in order to avoid adverse publicity and the like (Nycum and Parker 1990). The list below highlights a small variety of the activities that hackers have been known to engage in. In many cases there have been reported incidents of hackers not only gaining unauthorised access (i.e. potentially breaching confidentiality), but also altering data or service provision (i.e. affecting integrity and/or availability): · Modfication of medical records (Audit Commission 1994); Page 4 Australian Institute of Computer Ethics Conference, July, 1999, Lilidale · Breach of Military systems (Niccolai 1998); · Monitoring and alteration of telecommunications services (Littman 1997). As can be seen, breaches in all of the above categories of system offer significant opportunities to inflict damage (to both organisations and individuals) and, therefore, illustrate the nature of the hacker threat. Incidents such as those referenced indicate that many of our systems are vulnerable and that if someone has the inclination, and is willing to put in the effort, then existing security can often be breached. Furthermore, the evidence suggests that it is possible to breach systems that we would instinctively expect to be more secure (e.g. military sites). The fact that such attacks are successful leaves systems vulnerable to more insidious threats than straightforward hacking, in which information systems become the target in a more sinister way. 3) Enter the Cyber Terrorist Recent years have witnessed the widespread use of information technology by terrorist-type organisations. This has led to the emergence of a new class of threat, which has been termed Cyber Terrorism. This can be viewed as distinct from ‘traditional’ terrorism since physical terror does not occur and efforts are instead focused upon attacking information systems / resources. When viewed from the perspective of skills and techniques, there is little to distinguish cyber terrorists from the general classification of hackers. Both groups require and utilise an arsenal of techniques in order to breach the security of target systems. From a motivational perspective, however, cyber terrorists are clearly different, operating with a specific political or ideological agenda to support their actions. This in turn may result in more focused / determined efforts to achieve their objectives and more considered selection of suitable targets for attack. However, the difference does not necessarily end there and other factors should be considered. Firstly, the fact that cyber terrorists are part of an organised group could mean that they have funding available to support their activities. This in turn would mean that individual hackers could be hired to carry out attacks on behalf of a terrorist organisation (effectively sub-contracting the necessary technical expertise). In this situation, the hackers themselves may not believe in the terrorist’s ‘cause’, but will undertake the work for financial gain. Established terrorist groups (or related organisations) are currently using the Internet for a number of purposes, as described below. · Propaganda/Publicity Terrorist/resistance groups have traditionally had difficulty in relaying their political messages to the general public without being censored. However, they can now use the Internet for this purpose. Examples of where this is already the case include the Irish Republican Information Service (http://joyce.iol.ie/~saoirse/) and the Zapatista Movement (http://www.ezln.org/). · Fundraising Australian Institute of Computer Ethics Conference, July, 1999, Lilidale Page 5 Some terrorist/resistance groups linked to political parties are now using the Internet for funding raising purposes. In the future this may mean that smaller terrorist/resistance groups may be able to receive the majority of their funding through credit card donations. · Information Dissemination It is also possible that groups may publish sensitive information about a particular country. For example, Sinn Fein supporters at the University of Texas made details about British Army establishments within Northern Ireland publicly available on the Internet (Tendler 1996). · Secure Communications Terrorist use of more advanced encryption methods (Malik 1996) and improved anonymous electronic re-mailers will result in a command system that is difficult to break and allows for the control of groups anywhere in the world. This causes a problem for the security services, as it means that they will have to spend more time and resources on trying to decrypt electronic messages. Whilst all of the above might give cause for concern, they merely illustrate how existing activities may be simplified via new technology. The real threat in the ‘cyber’ context is when the Internet (or the more general technology infrastructure) becomes the medium in which a terrorist-type attack is conducted. In this sense, it is somewhat ironic that the Internet (which was originally conceived as a means of ensuring continued communications in the event of a nuclear war destroying the conventional telecommunications infrastructure) should now itself represent a medium through which widespread damage can be caused to the new information society. It is possible to view technology as some kind of “great equaliser” between major countries / governments and smaller groups. This is a battlefield where success relies upon intellectual skills and software creativity as opposed to sheer volume and physical resources. In short, the individuals or small groups may, in theory, have as much chance of succeeding as a superpower. To see the potential for damage, you only have to look at the results of actions from individuals who have acted without a war motive and without government / official backing. Consider the impact that computer hacking and virus incidents have had upon businesses in recent years. In purely financial terms, the impact can be seen to be significant, as shown by the earlier figures from table 1. A separate survey, published by the UK National Computing Centre in 1996, revealed that the average cost of a hacking incident was around £14,460, whilst viruses typically resulted in a financial cost of £4,190 (NCC 1996). Imagine what would be possible if a more determined/concentrated effort was made to co-ordinate these attacks. The most significant threats come from the integrity and availability aspects. Security breaches in these respects have the potential to do the most direct damage (e.g. by making systems unavailable or having them operate on the basis of incorrect data). Breaches of confidentiality could, however, have an indirect value in a terrorism or warfare context. Page 6 Australian Institute of Computer Ethics Conference, July, 1999, Lilidale They could, for example, be used to provide a distraction or destabilising effect to an established power (e.g. consider last year’s media preoccupation with the Clinton / Lewinsky affair and the extent to which it served to distract public attention from other national or world events). The potential for direct damage, however, comes from other activities. The term Information Warfare has been used to describe the ways in which terrorist organisations could use technology to attack the IT infrastructure of a country or a particular company (Schwartau 1994). Common scenarios include Denial of Service and Direct Attacks, as described below. A denial-of-service attack results when access to a computer or network resource is intentionally blocked or degraded as a result of malicious action taken by another user. These attacks do not necessarily cause direct or permanent damage to data, but they intentionally compromise the availability of the resources (Howard 1997). This type of attack tends to affect the availability of computer systems for legitimate usage and the form of the activity can include methods such as e-mail bombs - sending thousands of emails to a particular computer system until that system crashes. The software required to carry out denial of service attacks is widely available on the Internet. The first recorded cyber terrorist denial of service attack was carried out the by Tamil Tigers against Sri Lankan embassies around the world (Associated Press 1998). A direct attack would take the form of hacking into a computer system and rewriting or stealing information. Examples of this are given in the next section, in relation to the crisis in the Balkans. An indication of the scale of the problem can be obtained by considering particular highprofile targets. For example, the US Department of Defense (DoD) claims that its WWW sites experience around 60 attacks each week. In 1995 alone, the DoD claimed to have been attacked 250,000 times (McKay 1998). The nature of these ‘attacks’ may well vary, and some will certainly be less significant than others, but the overall figure nevertheless illustrates the interest that unauthorised parties have taken in the military systems. As an aside, the US military has now begun to rethink its attitude towards the use of the Internet and has undertaken a review of the material that is published on its web sites in order to prevent sensitive information from being made available inadvertently (Booth 1998). Another observation is that cyber attacks offer the capability for terrorist activities with wider-reaching impacts. With traditional terrorist activities, such as bombings, the impacts are isolated within specific physical locations and communities. In this context, the wider populous act only as observers and are not directly affected by the actions. Furthermore, acts of violence are not necessarily the most effective ways of making a political or ideological point – the media / public attention is more likely to focus upon the destruction of property and / or loss of life than whatever ‘cause’ the activity was intended to promote. The ability of cyber terrorism activities to affect a wider population may give the groups involved greater leverage in terms of achieving their objectives, whilst at the same time ensuring that no immediate long-term damage is caused which could cloud the issue. For example, in a denial of service scenario, if the threatened party was to accede to the terrorist demands, then the situation could (ostensibly at least) be returned to that which existed prior Australian Institute of Computer Ethics Conference, July, 1999, Lilidale Page 7 to the attack (i.e. with service resumed). This is not the case in a ‘physical’ incident when death or destruction has occurred. A final point to note is that cyber terrorist activity could also be used in conjunction with or to support more traditional attacks. For example, hacking techniques could be employed to obtain intelligence information from systems, which could then be used as the basis for a physical attack. 4) The Balkans – cyber warfare in action The recent escalation of violence in the Balkans has also resulted in the development of a new front to the war – the cyber front. Both sides have used the Internet as a means of putting their point of view forward. Both sides in the conflict are using the Internet to report the news from their own perspective, as illustrated in figures 1 and 2. Figure 1: Official NATO web-Site Page 8 Australian Institute of Computer Ethics Conference, July, 1999, Lilidale Figure 2: News from the Serbian Ministry of Information In addition to such passive cyber-propaganda, the different party’s supporters are also hacking into web pages in order to leave messages detailing their support. Examples are shown in figures 3 and 4 below. The reason for attacks is that, for many individuals, it is the only way in which they can attack what they see as being the enemy. Many of the attacks have caused only minor inconivance. Figure 3: Anti NATO hacking Message Australian Institute of Computer Ethics Conference, July, 1999, Lilidale Page 9 Figure 4: Pro NATO hacking Message However, some of the attacks have been focused more directly at the parties involved. The official NATO website has been victims to denial of service attacks, at it height 2,000 emails a day were being sent from Yugoslavia, these messages also included macro viruses which for a time affect the NATO e-mail systems (BBC 1999). The aim of the type of attack is to bring down the web-site by sheer numbers of e-mails and disrupt e-mail communication via viruses. The attack was only partly successful. Whilst these incidents are notable, they are not representative of the more significant damage that cyber terrorism could incur (e.g. the fundamental disruption of society, as referred to at the beginning of this paper). However, the fact that these type of attacks have occurred, and in high numbers, illustrates the actions that can be carried out relatively easily by a small body of highly motivated people using IT as a medium. 5) Responding to the threats The hacker problem is now widely recognised and many countries already have some form of associated legislation. An example of this is the Computer Misuse Act in the United Kingdom, which specifies offences ranging from unauthorised system access to unauthorised modifications to programs or data (HMSO 1990). However, the mere presence of legislation is not sufficient – law enforcement and the judiciary must be suitably prepared to administer it. Some previously documented cases of hacker / computer abuse investigations have indicated that this may not be the case and the criminals often have a significant upper hand in terms of their understanding of technology. A good example of this is provided by Stoll (1991) in his recounting of the experiences of law enforcement whilst tracking the socalled ‘wily hacker’. Page 10 Australian Institute of Computer Ethics Conference, July, 1999, Lilidale It is difficult to predict precisely how terrorists groups may use the Internet in the future. However, it is considered that cyber terrorism will become more attractive to terrorist groups. The principal reasons for this are as follows (Warren 1998): · the risk of capture is reduced since attacks can occur remotely; · it is possible to inflict grave financial damage without any loss of life; · the expertise for these attacks can be hired; · a successful attack would result in world wide publicity and failure would go unnoticed; · terrorist groups can attract supporters from all over the world; · they can use the Internet as a method of generating funds for their cause world wide; · the Internet offers the ideal propaganda tool for a terrorist group, one that operates on a global basis and that individual governments cannot control or censor; · the capability to mount an attack can be developed both quickly and cheaply. The seriousness with which the issue is taken can be illustrated by recent activities by national governments. In the United States, for example, concern over IT related threats has led to the establishment of the National Infrastructure Protection Centre (NIPC). This is a $64 million facility, employing some 500 staff across the country, with representatives taken from existing agencies such as the Secret Service, the CIA, NASA, the National Security Agency, the Department of Defense and several others. The role of NIPC is to “detect, deter, assess, warn of, respond to, and investigate computer intrusions and unlawful acts” that threaten or target US critical infrastructures such as telecommunications, energy, banking and finance, water systems, government operations and emergency services (NIPC 1998). Whilst the threats are undoubtedly serious, we must be careful to ensure that our methods of response are not taken too far. Without appropriate control, it is possible that measures could be introduced that are harmful to society in a different way. For example, the complete regulation or monitoring of our use of IT systems could lead to the emergence (some would say extension) of a “surveillance society” in which technology is used to erode individual rights and freedoms in the name of the wider public good (Davies 1996). It can already be seen that the activities of both hackers and cyber terrorists ultimately have the effect of restricting freedoms for the rest of us. For example, despite some concessions, the United States continues to maintain a relatively restrictive policy on the use of cryptographic technologies. One of the stated reasons for control is to prevent unregulated use of strong encryption techniques by terrorist organisations (FBI 1998). 6) Conclusion The title of this paper referred to the political evolution of the hacker and, indeed, the existence of cyber terrorism lends some weight to the assertion that IT skills can now be employed in active support of a political cause. The discussion has provided some examples of this, in respect of the activities in Kosovo. At the same time, however, we Australian Institute of Computer Ethics Conference, July, 1999, Lilidale Page 11 should not automatically class all hackers within the same mindset. A significant proportion of them are not engaging in their activities for political purposes (which is not to say that their actions should not be policed in some way). However, in the same way that the existence of traditional hackers increases the seriousness with which general computer security is applied, the emergence of the cyber terrorist will mean that stricter controls may need to be considered as standard. Modern society is significantly dependent upon IT and evidence suggests that this is hardly likely to change in the years ahead. In view of this, it is vital that we are aware of threats such as those highlighted by this paper and take appropriate steps to protect the infrastructure upon which we are reliant. References Associated Press. 1998. “First cyber terrorist action reported”, May 6th, USA. Audit Commission. 1990. Survey of Computer Fraud & Abuse. Audit Commission. 1994. Opportunity Makes a Thief: An Analysis of Computer Abuse, National Report, London, HMSO. Audit Commission. 1998. Ghost in the Machine – An Analysis of IT Fraud and Abuse. Audit Commission Publications, UK. February 1998. ISBN 1-86240-056-3. BBC, 1999. “Kosovo Info Warfare Spreads”, Science/Technology News, BBC web news, 1 April, 1999. Booth, N. 1998. “Pentagon gets tough in war of the Web”, The Times, Interface Supplement, 7 October 1998: 2. Caelli, W., Longley, D. and Shain, M. 1989. Information Security for Managers, Stockton Press, New York, USA. Davies, S. 1996. Big Brother – Britain’s web of surveillance and the new technological order. Pan Book Ltd, London. ISBN 0-330-34931-7. FBI. 1998. Encryption: Impact on law Enforcement. Information Resources Division, Federal Bureau of Investigation, Virginia, US. 8 July 1998. HMSO. 1990. Computer Misuse Act 1990. Her Majesty’s Stationary Office, UK. ISBN 0-10- 541890-0. Howard, J. 1997. An Analysis Of Security Incidents On The Internet. PhD thesis, Carnegie Mellon University, USA. Littman, J. 1997. The Watchman – The Twisted Life and Crimes of Serial Hacker Kevin Poulsen. Little, Brown & Company Limited. ISBN 0-316-52857-9. Malik, I. 1996. Computer Hacking: detection and protection. Sigma Press, UK, ISBN 1-85058-38- 5. McKay, N. 1998. “Cyber Terror Arsenal Grows”, Wired News, 16 October 1998. http://www.wired.com/news. NCC. 1996. The Information Security Breaches Survey 1996. National Computing Centre, Oxford Road, Manchester, UK. Niccolai, J. 1998. “Israeli Arrested for Hacking U.S. Military Computers”. IDG News Service, March 19, 1998. See http://www.infowar.com/. NIPC. 1998. Mission Statement, National Infrastructure Protection Centre. http://www.fbi.gov/nipc/nipc.htm Nycum, S.H. and Parker, D.B. 1990. “Prosecutorial experience with state computer crime laws in the United States”, in Security and Protection in Information Systems, A.Grissonnanche (Ed.), Elsevier Science Publishers B.V., North-Holland: 307-319. Schwartau, W. 1994. Information Warfare: Chaos on the Electronic Superhighway. Thunder's Mouth Press, New York. Stoll, C. 1991. The Cuckoo’s Egg. Pan Books Ltd, London, UK. ISBN 0-330-31742-3. Tendler, S. 1996. “Ulster security details posed on the Internet”, The Times, 25 March 1996, UK. Page 12 Australian Institute of Computer Ethics Conference, July, 1999, Lilidale Warren, M. 1998. “Cyber Terrorism”, Proceedings of SEC-98 - IFIP World Congress, Budapest, Hungary, August 1998.
上一篇:The_Anthology_of_Unconditional 下一篇:Take_It