23
1. Approximately what time did the first plane hit the World trade Center? 8:45 a.m Approximately how long after the first plane hit did the second tower collapse? 1Hour 42 minutes How fast were the planes traveling when they hit the buildings? 470 and 590 mph, buildings capable of taking a hit at 190 mph How many people died in the attacks? 2,973: 2,643 in the towers 125 in the Pentagon 246 on 4 planes 343 firefighters, 60 cops, 658 Cantor Fitzgerald employees; 24 missing How many people escaped the towers from above the floors where the planes hit? 16, all from the South tower Who was the reported mastermind of the 9/11 attacks? Mohammad Atah What group was behind the attacks? Al Qeada How many people have been charged with in U.S. in terrorism -related investigations since 2001? 456, 91% of cases there has been no prosecution September 11th Quiz Answers Monday, September 26, 11

September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

1. Approximately what time did the first plane hit the World trade Center? 8:45 a.m

• Approximately how long after the first plane hit did the second tower collapse? 1Hour 42 minutes

• How fast were the planes traveling when they hit the buildings?

470 and 590 mph, buildings capable of taking a hit at 190 mph

• How many people died in the attacks?

2,973: 2,643 in the towers 125 in the Pentagon 246 on 4 planes

343 firefighters, 60 cops, 658 Cantor Fitzgerald employees; 24 missing

• How many people escaped the towers from above the floors where the planes hit? 16, all from the South tower

Who was the reported mastermind of the 9/11 attacks? Mohammad Atah

• What group was behind the attacks? Al Qeada

• How many people have been charged with in U.S. in terrorism -related investigations since 2001? 456, 91% of cases there has been no prosecution

September 11th Quiz Answers

Monday, September 26, 11

Page 2: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Lecture 3: Introduction to Cyber Terrorism

Monday, September 26, 11

Page 3: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

. . . attaining one hundred victories in one hundred battles is not the pinnacle of excellence. Subjugating the enemy's army without fighting is the true pinnacle of excellence.” Sun Tzu, The Art of War

Monday, September 26, 11

Page 4: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Lecture Outline

1. Defining Cyber Terrorism

2. Similarities differences to Cyberwar, hacking, cybercrime, and conventional terrorism

3. Main categories of Cyber Terrorism

Disruptive:

Instrumental:

4. Assignment

Monday, September 26, 11

Page 5: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Monday, September 26, 11

Page 6: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Monday, September 26, 11

Page 7: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Defining Cyber TerrorismWhat is cyber terrorism?

Using computers to attack secure networks through the internet?

Videos of violence?

Cyber crime used to fund terrorism?

Websites providing information about terrorist groups?

E-mail for communication between members/groups?

Using the Internet to gather information about potential targets?

Recruiting members through chat rooms and discussion boards?

Posting training manuals and how to videos on bomb making?

Physical attacks on critical infrastructure?

Monday, September 26, 11

Page 8: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Defining Cyber TerrorismWhat is cyber terrorism?Using computers to attack through the internet?

Videos of violence?

Cyber crime used to fund terrorism?

Websites providing information about terrorist groups?

E-mail for communication between members/groups?

Using the Internet to gather information about potential targets?

Recruiting members through chat rooms and discussion boards?

Posting training manuals and how to videos on bomb making?

All of the above or only some of the above depending on who you ask

Monday, September 26, 11

Page 9: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Monday, September 26, 11

Page 10: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Defining Cyber Terrorism

Many define cyber terrorism as involving only attacks, ignoring the propaganda, communication, training, recruiting, fundraising, and targeting aspects that terrorist have used the internet for.

Definition 1: The leveraging of a target's computers and information technology, particularly via the Internet, to cause physical, real-world harm or severe disruption with the aim of advancing the attacker's own political or religious goals.

Monday, September 26, 11

Page 11: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Defining Cyber TerrorismDefinition 2: The use of computer networks to sabotage critical

national infrastructures.

Definition 3: The convergence of cyberspace and terrorism. It refers to unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives. Further, to qualify as cyber terrorism, an attack should result in violence against persons or property, or at least cause enough harm to generate fear. Serious attacks against critical infrastructures could be acts of cyber terrorism, but those that disrupt non-essential services or are a costly nuisance are not.

Monday, September 26, 11

Page 12: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Defining Cyber TerrorismClass Definition: Cyber terrorism involves the communicative,

instrumental and destructive use of computers in furtherance of political or social objectives.

Cyber Attacks: The unlawful attacks and threats of attacks against computers, networks and the information stored therein when done to intimidate or coerce a government or its people in furtherance of political or social objectives.

This also includes physical attacks on critical infrastructure and computers.

Instrumental and Communicative: The use of computers and the Internet to communicate, recruit, train, disperse propaganda, raise funds, or gather target information in the furtherance of political or social objectives.

Monday, September 26, 11

Page 13: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Defining Cyber Terrorism

How is this different from information warfare?

Hacking?

Cybercrime?

Conventional Terrorism?

Monday, September 26, 11

Page 14: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Information Warfare

Definition: The offensive and defensive use of informationand information systems to deny, exploit, corrupt, or destroy, an adversary's information, information-based processes, information systems, and computer-based networks while protecting one's own. Such actions are designed to achieve advantages over military, political or business adversaries.

Difference: The main difference revolves around those involved. Information warfare is usually carried out by States against each other.

Moreover, while cyber terrorism can involve many of the same aspects of information warfare, it encompasses far more.

Monday, September 26, 11

Page 15: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

HackingDefinition: Using computers to “work around” legal barriers to

accomplishing something. Goal of hacking is often to prove that something can be accomplished.

Example: Cracking DVD DRM has been done not for profit but for all to enjoy.

Difference: Focus of hacking is not necessarily on anything nefarious, criminal, violent or revolutionary as in cyber terrorism.

Many of the “hacks” created and done by hackers are legal and for the benefit of society not the detriment.

Monday, September 26, 11

Page 16: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Cyber CrimeDefinition: The use of computers to commit crime. The

difference between this and hacking in general is one of motivation not skills or tools.

Cyber criminals are all hackers, but not all hackers are cyber criminals.

Difference: Focus of cyber crime is pure profit and illegal gain, whereas cyber terrorism is about politics and social objectives.

While the actions and outcome of the two may be identical, the difference lies mainly with the intent of those carrying out the actions.

Monday, September 26, 11

Page 17: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Conventional TerrorismDefinition: Premeditated, politically motivated violence

perpetrated against noncombatant targets by subnational groups or clandestine agents, usually intended to influence an audience. (U.S. State Department)

Difference: There is no real difference.

Rather, cyber terrorism is simply an evolution of terrorism to take advantage of new tools and new political realities of society.

Cyber terrorism could be described as terrorism 2.0

Terrorist who are not making use of computers and the Internet are those who are dinosaurs of the past.

Monday, September 26, 11

Page 18: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Instrumental Cyber TerrorismDefinition: The use of technology for information transmission

and information gathering purposes.

Propaganda

Recruiting

Communication

Targeting

Training

Fundraising

Monday, September 26, 11

Page 19: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Disruptive Cyber Terrorism

Monday, September 26, 11

Page 20: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Disruptive Cyber TerrorismDefinition: The use of technology as an attack method, with

the goal of disrupting or destroying critical systems or infrastructure.

Cyber attack: Pure cyber attack, via computer system on a computer system.

Cyber tail: Physical terrorist attack that has an impact on technology/cyber realm.

Critical Infrastructure: Physical, cyber or blended Terrorist attack on critical infrastructure.

Monday, September 26, 11

Page 21: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Assignment

Find an article about Cyber terrorism and provide a write-up on the article. In your write-up provide your assessment of what Cyber terrorism really is and what type of threat it is to the United States. In particular, what if any part of Cyber terrorism, is the biggest threat to the United States.

The article CAN NOT be a simple newspaper article, but must be a legitimate article on cyber terrorism. The article must be turned in with your write-up and must be e-mailed to me.

Due Date: Monday October 3rd by 5:00 p.m.

Monday, September 26, 11

Page 22: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

Discussion on Google +

If you haven’t yet added me to your Google + circle you need to do so today or tomorrow, as we will be doing a chat this week.

Students need to regularly check their Google + account, as I put a extra credit assignment up last week and only had 5 people respond.

We will be having regular discussions about articles and news reports for the rest of the semester.

First discussion topic will be posted sometime Wednesday September 28th.

Monday, September 26, 11

Page 23: September 11th Quiz Answers - criminalbehavior.com 3 Intro to... · September 11th Quiz Answers Monday, September 26, 11. Lecture 3: Introduction to Cyber Terrorism Monday, September

End Lecture 3

Monday, September 26, 11