CYBERTERRORISTS

Article made by Senovilla, if you like visit his blog JFS thoughts

This time I'm going to tell you a little about CYBERTERRORISTS, which are the most feared on the Net, the most desired and unfortunately for all those who can do the most damage.

Keep in mind that we are all dependent on electronic and computer systems, we are easy prey for any cyber attack. Let's think that a simple attack on Networks of information, could generate millionaire losses to any institution, company or country, and also psychological consequences.

Terrorism exists in our real world, and with all the technological advances it was logical that they would soon use virtual media to generate their terrorist attacks. They start with the uptake of Cybercriminals, checking their visits to certain types of websites, tracking the participation of certain forums and if all this convinces them to pursue certain similar ideals, are captured to belong to their group of cyberterrorists.

They communicate with each other using the STEGANOGRAPHY, which is a method that allows hiding audio, video, text and graphics files, camouflaging them from the well-known monitoring of Cyberspies, and they are used in emails, in chat and in encrypted mobile phones and video conferences.

Their economic financing, they get it with the extortion of large companies or entities, with the threats of an attack or disclosure of customer data or business secrets, thus obtaining succulent subsidies that are often camouflaged through charities to launder money, both by the one who gives it and the one who receives it.

How are they advertised?, because they appropriate several websites, especially business to publish their attacks, and in a few seconds their terrorist messages are spread all over the planet.

Its objectives they are paralyzing the military capacity and public service of a country. They can start with attacks on financial markets, to continue with an attack on government computer systems.

Your modus operandi starts with the EXPLOITATION whose objective is to obtain information and resources from the recipient. They continue with him CHEATED which consists of manipulating that information obtained but allowing the recipient to operate. And it ends with the DESTRUCTION, which is when they leave the recipient inoperative, destroying all their systems; although sometimes, this inoperation is temporary to take advantage of its resources.

There is a great movie "The Jungle 4.0", where he narrates how a cyberterrorist attack is carried out and violates all the infrastructures of a country.

Cyberterrorists

An example of advertising we have it with AL QAEDA , which wisely combines multimedia propaganda and the highest communication technology so that this psychological warfare cause panic and fear in the population of a country.

We have to comment that countries develop tools to be able to attack the government systems of other states, but at the same time they have to know how to protect themselves from an attack, not only from another country but also from Cyberterrorists.

This is why another type of Cyber ​​emerges, the Cyber ​​warriors are engineers with computer arsenals, and they are in charge of fighting the Cyber ​​villains in a virtual stage with the highest technology.

We saw an example of these attacks in Estonia, on April 27, 2.007, the official pages of the government and the party in power were paralyzed, the systems of some banks and newspapers were inoperative for several hours, and all this after Russia put pressure on Estonia publicly.

Given all this that I am telling you, there is no doubt that we are in a CYBER COLD WAR, where the protagonists are now virtual: Cyber-spies, Cyber-soldiers, Cyber-terrorists… The leader is CHINA, which is responsible for 4 out of 5 cyber-terrorist attacks.

The virtual fight is fierce, where all fundamental rights are lost and programs such as the CARNIVORE, with which they can read the hard disk of any user or the DARK WEB, which uses spiders in link and content analysis. Tools such as WRITEPRINT which extracts thousands of multilingual, structural and semantic characteristics to find the anonymous online.

And with all this we cannot do much more, nor can the most developed countries create new tools that are not surpassed by cyberterrorists, which is why we will soon see the birth of INTERNET 2, where the States will control the Network, but that is another story for another POST.

Article made by Senovilla, if you liked it visit his blog JFS thoughts

PD: You can also collaborate in Vinagre Asesino


Leave a Comment

Your email address will not be published. Required fields are marked with *

*

*

  1. Responsible for the data: Miguel Ángel Gatón
  2. Purpose of the data: Control SPAM, comment management.
  3. Legitimation: Your consent
  4. Communication of the data: The data will not be communicated to third parties except by legal obligation.
  5. Data storage: Database hosted by Occentus Networks (EU)
  6. Rights: At any time you can limit, recover and delete your information.

  1.   Senovilla said

    You have just been booked by the FBI, the bad thing is that me too. :).

    A few Cyberterrorists are trying to get our attention. :) :)

    We will see the positive side and that is that we will count them as visits :).

    It has been a pleasure to carry out this CIBERS triology on your Blog.

    Greetings friend.

  2.   Javier said

    Full control of the subject.
    How do you know so much beauty? Could it be the influence of Fernando Rueda?
    Vinegar, you have succeeded with this excellent collaborator.
    All the best

  3.   Sergio Salazar said

    This article left me stunned, would Internet 2 be the solution? If we men cannot control our freedom, is it true about Big Brother?

  4.   trocol said

    Very interesting, anyway I think that cyber espionage abounds more than cyberterrorism, since the people who dedicate themselves to it are "ELITE", and are hired by governments or even multinationals to steal information rather than to cause chaos , Jungle 4.0 is very good at special effects but it is "freaked out" too much. XD
    I take advantage of the fact that it deals with the topic of "psychological warfare ... panic and fear in the population of a country ..." to recommend a documentary that, although not related to the title of the post, is related to the manipulation of society and the use of terror as a political weapon to restrict the rights and privacy of the population ...

    It is titled Zeitgeist is in English and subtitled in Spanish, it is divided into three parts, I leave you the link to googlevideo of the first, the other two appear there.

    http://video.google.es/videoplay?docid=8971123609530146514

    You may or may not agree with the content, but it gives a lot to think about.

    Greetings.

  5.   Senovilla said

    Good contribution TROCOLO, I have an interesting documentary that I will watch.

    However, on the fact that you do not think that there are many CYBER-TERRORISTS, I do not agree with you very much, since everything points to yes and that they are more than we would like and also they usually work for a government (where they eat a lot of rice) and yes not that I ask the English.

    Of course, the film is pure fantasy, but based on something that became known on the Internet as CHAOS.

    Greetings to all and thanks for what touches me.

  6.   Senovilla said

    I like to expand the articles with related news, and with vinegar's permission, I put one that has appeared in the press these days, for those who still have doubts about this type of crime:

    LOS ANGELES (USA) .- A 26-year-old American has been found guilty in Los Angeles of having 'hacked' "hundreds of thousands of computers" in the United States to steal confidential information and is exposed to 60 years in prison, according to the Fiscal Ministery.

    Juan Schiefer, computer security consultant, admitted in front of a judge "having illegally taken control of hundreds of thousands of computers in the United States, which he later managed remotely through servers", without his users knowing it, according to the office of the federal prosecutor.

    "Once these computers were controlled, Schiefer used automatic programs - 'botnets' - to look for security flaws in other computers, intercept electronic communications and steal personal data", in order to obtain economic benefits.

    Schiefer was found guilty of illegal interception of electronic communications, as well as bank fraud and wire transfers.

    The Public Prosecutor affirmed that the defendant, who acknowledged his guilt and can be directly convicted, "is the first person in the United States to plead guilty to interception of data using 'botnets'."
    Juan Schiefer, known in the 'hackers' community with the nickname of 'acidstorm', will know the sentence on August 20. In addition to the possibility of 60 years in jail, you may also have to pay a fine of $ 1,75 million.

  7.   jenaro said

    Well my dear netizens, this type of crime was born with the internet, as the French national police was born and was formed in the first instance of criminals.
    But just like cybercriminals, they carry out their misdeeds, and we know how they do it, in the end, the networks of police investigators fall, sooner or later.
    In this game, the law always wins, although sometimes a little late we are in this so that this delay is shortened, and they are stopped, in an elegant, light, and classy way, or not.