Featured Research

from universities, journals, and other organizations

Today's threat: Computer network terrorism

Date:
January 20, 2010
Source:
University of Haifa
Summary:
"Carry out all my demands or the entire country's electricity will be cut off." Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? "Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom," says an expert in information war.

"Carry out all my demands or the entire country's electricity will be cut off." Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? "Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom," says Dr. Yaniv Levyatan, an expert in information war at the University of Haifa.

If someone still thinks that this is science fiction, Dr. Levyatan notes how just recently, in November 2009, Brazil's electricity was blacked out for more than an hour. "It is still not clear what happened, but one assumption is that it was a cyber -terror attack," he suggests, adding that in 2007 Estonia's computer infrastructures were attacked, most likely by Russian hackers, bringing the country to a near standstill for about 48 hours.

According to Dr. Levyatan, in today's world, the battlefield is not only comprised of tanks and planes, but also computer experts' and hackers' keyboards. "To date, most of the 'online fighting' has focused on attempts to vandalize and immobilize leading websites to impose a virtual presence and damage morale. For example, during the Second Lebanon War, Israeli and Hezbollah-supporting hackers were at "war" as each side attempted to damage and immobilize each other's websites. Likewise, during Operation Cast Lead in Gaza, many Israeli websites were attacked by Hamas-supporting hackers.

The next stage is the attempt to cause damage to systems that are operated by computer networks, such as financial systems, power stations, hospitals, television broadcasts, and satellites. "A fleet of fighter planes is not necessary to attack a power station; a keyboard is sufficient. And if you don't have the skills, there are enough mercenary hackers who can do it for you," says Dr. Yaniv Levyatan.


Story Source:

The above story is based on materials provided by University of Haifa. Note: Materials may be edited for content and length.


Cite This Page:

University of Haifa. "Today's threat: Computer network terrorism." ScienceDaily. ScienceDaily, 20 January 2010. <www.sciencedaily.com/releases/2010/01/100119092836.htm>.
University of Haifa. (2010, January 20). Today's threat: Computer network terrorism. ScienceDaily. Retrieved September 30, 2014 from www.sciencedaily.com/releases/2010/01/100119092836.htm
University of Haifa. "Today's threat: Computer network terrorism." ScienceDaily. www.sciencedaily.com/releases/2010/01/100119092836.htm (accessed September 30, 2014).

Share This



More Computers & Math News

Tuesday, September 30, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

Apple Releases 'Shellshock' Fix Despite Few Affected Users

Apple Releases 'Shellshock' Fix Despite Few Affected Users

Newsy (Sep. 29, 2014) Apple released a security fix for the "Shellshock" vulnerability Monday, though it says only "advanced UNIX users" of OS X need it. Video provided by Newsy
Powered by NewsLook.com
Do Video Games Trump Brain Training For Cognitive Boosts?

Do Video Games Trump Brain Training For Cognitive Boosts?

Newsy (Sep. 29, 2014) More and more studies are showing positive benefits to playing video games, but the jury is still out on brain training programs. Video provided by Newsy
Powered by NewsLook.com
New Facebook Ad Platform Goes Where You Go On The Web

New Facebook Ad Platform Goes Where You Go On The Web

Newsy (Sep. 29, 2014) Called Atlas, the platform allows advertisers to place ads based on Facebook info on sites outside of Facebook. Video provided by Newsy
Powered by NewsLook.com
Google Tightens Requirements For Android Manufacturers

Google Tightens Requirements For Android Manufacturers

Newsy (Sep. 27, 2014) Phonemakers who want to use Google’s software in their devices will have to stick to more stringent requirements. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins