Featured Research

from universities, journals, and other organizations

Today's threat: Computer network terrorism

Date:
January 20, 2010
Source:
University of Haifa
Summary:
"Carry out all my demands or the entire country's electricity will be cut off." Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? "Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom," says an expert in information war.

"Carry out all my demands or the entire country's electricity will be cut off." Is this another line from a suspense film, or is it a palpable threat made possible with a computer keyboard? "Today, there is a growing trend amongst hackers around the world to threaten national infrastructures for ransom," says Dr. Yaniv Levyatan, an expert in information war at the University of Haifa.

If someone still thinks that this is science fiction, Dr. Levyatan notes how just recently, in November 2009, Brazil's electricity was blacked out for more than an hour. "It is still not clear what happened, but one assumption is that it was a cyber -terror attack," he suggests, adding that in 2007 Estonia's computer infrastructures were attacked, most likely by Russian hackers, bringing the country to a near standstill for about 48 hours.

According to Dr. Levyatan, in today's world, the battlefield is not only comprised of tanks and planes, but also computer experts' and hackers' keyboards. "To date, most of the 'online fighting' has focused on attempts to vandalize and immobilize leading websites to impose a virtual presence and damage morale. For example, during the Second Lebanon War, Israeli and Hezbollah-supporting hackers were at "war" as each side attempted to damage and immobilize each other's websites. Likewise, during Operation Cast Lead in Gaza, many Israeli websites were attacked by Hamas-supporting hackers.

The next stage is the attempt to cause damage to systems that are operated by computer networks, such as financial systems, power stations, hospitals, television broadcasts, and satellites. "A fleet of fighter planes is not necessary to attack a power station; a keyboard is sufficient. And if you don't have the skills, there are enough mercenary hackers who can do it for you," says Dr. Yaniv Levyatan.


Story Source:

The above story is based on materials provided by University of Haifa. Note: Materials may be edited for content and length.


Cite This Page:

University of Haifa. "Today's threat: Computer network terrorism." ScienceDaily. ScienceDaily, 20 January 2010. <www.sciencedaily.com/releases/2010/01/100119092836.htm>.
University of Haifa. (2010, January 20). Today's threat: Computer network terrorism. ScienceDaily. Retrieved September 21, 2014 from www.sciencedaily.com/releases/2010/01/100119092836.htm
University of Haifa. "Today's threat: Computer network terrorism." ScienceDaily. www.sciencedaily.com/releases/2010/01/100119092836.htm (accessed September 21, 2014).

Share This



More Computers & Math News

Sunday, September 21, 2014

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

What This MIT Sensor Could Mean For The Future Of Robotics

What This MIT Sensor Could Mean For The Future Of Robotics

Newsy (Sep. 20, 2014) MIT researchers developed a light-based sensor that gives robots 100 times the sensitivity of a human finger, allowing for "unprecedented dexterity." Video provided by Newsy
Powered by NewsLook.com
Oculus Reveals New Virtual Reality Headset Prototype

Oculus Reveals New Virtual Reality Headset Prototype

Newsy (Sep. 20, 2014) Oculus announced a new virtual reality headset prototype Saturday, saying the product is close to being ready for consumers. Video provided by Newsy
Powered by NewsLook.com
How To Protect Your Data In The Still-Vulnerable iOS 8

How To Protect Your Data In The Still-Vulnerable iOS 8

Newsy (Sep. 20, 2014) One security researcher says despite Apple's efforts to increase security in iOS 8, it's still vulnerable to law enforcement data-transfer techniques. Video provided by Newsy
Powered by NewsLook.com
How Much Privacy Protection Will Google's Android L Provide?

How Much Privacy Protection Will Google's Android L Provide?

Newsy (Sep. 19, 2014) Google's local encryption will make it harder for law enforcement or malicious actors to access the contents of devices running Android L. Video provided by Newsy
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:
from the past week

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins