. Military Space News .
CYBER WARS
Weaponizing the internet for terrorism
by Staff Writers
Geneva, Switzerland (SPX) May 17, 2017


The researchers warn that research shows we are not too far away from a new wave of insurgency and terrorism that may gradually overtake the internet and many organizational network infrastructures around the world.

Terrorism is a fact of life as are the collectives and networks to which counter-terrorism organizations and the media have given various labels and names. These networks are well versed in exploiting modern information technology through social media awareness, marketing and recruitment campaigns.

However, there is the more insidious use by terrorists groups of online networks and exploits in the creation of so-called bots (computers that have been compromised through the implementation of malware and control over which has been assumed by a third party, or more likely a third party control a lot array of such bots in a botnet.

Writing in the International Journal of Collaborative Intelligence, Emmanuel Ogu of the Department of Computer Science, at Babcock University, in Ilishan-Remo, Ogun State, Nigeria, and colleagues suggest that the problems caused by botnets in terms of interfering with infrastructure, healthcare services, transport, power supply and other critical parts of the modern world are not very different to those caused by the more familiar notion of terrorist attacks involving explosives and weapons.

Events across the globe in mid-May 2017 saw the rapid and devastating spread of ransomware to hospitals, companies, organizations, and individuals. Whether or not this was a specific attack by a particular group is irrelevant the impact was enormous on those waiting for healthcare attention, for instance.

A similar "attack" on an even bigger scale might see power supply outages brought about by malware-toting botnets operated by those with malicious intent where there is no simple financial extortion, rather crippling and even destruction of infrastructure is the aim of the perpetrators.

"Fighting bots and keeping them away from network infrastructures has gradually become the nightmare of every network security professional," the team says.

Fundamentally, this is because although individual computers may be wiped of malware and systems patches or a botnet disabled, the distributed and infectious nature of the computer viruses, worms and other malware that propagate the controls with which the "botmaster" will rally the compromised computers are always being modified to counteract antivirus software.

The researchers warn that research shows we are not too far away from a new wave of insurgency and terrorism that may gradually overtake the internet and many organizational network infrastructures around the world.

"Just as the secret to dismantling terrorist networks have been proven to lie in destroying the ability of the terror group to recruit, train, control and coordinate their activities (essentially by completely taking out their command and control infrastructure), the secret to ridding the internet of botnets, perhaps, also depends on similar means," the team suggests.

"Intelligence reports are useless if they do not lead to informed decisions and actions," they add.

Warnings of out of date operating systems, web browsers and email programs, unpatched computers, and the non-implementation of firewalls and antivirus software seem to be unheeded in too many cases. If those warnings are left unheeded by the users of infrastructure critical computers in healthcare, transportation, industry, power supply other areas, then the inherent vulnerabilities might be exploited by those with malicious intent repeatedly whether for financial gain, terrorist propaganda and control or both.

Ogu, E.C., Ogu, M.I. and Ogu, C. (2016) 'Insights from terrorism intelligence and eradication efforts - Al-Qaeda, ISIS, Boko Haram - for more pragmatic botnet countermeasures', Int. J. Collaborative Intelligence, Vol. 1, No. 4, pp.258-274.

CYBER WARS
WikiLeaks source Chelsea Manning set to be released
Fort Leavenworth, United States (AFP) May 17, 2017
Chelsea Manning, the transgender army private jailed for one of the largest leaks of classified documents in US history, is set to walk out of a military prison Wednesday after seven years behind bars. In July 2010, Manning - then a male soldier known as Bradley - was arrested over the release of a huge trove of more than 700,000 classified military and diplomatic documents via WikiLeaks. ... read more

Related Links
Inderscience Publishers
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Yemen rebel missile shot down near Saudi capital

Lockheed Martin receives new THAAD contract

Lockheed Martin contract for AEGIS system development

Lockheed Martin receives Patriot missile contract for Qatar

CYBER WARS
Israeli missile ship receives new radar

Raytheon contracted for support of the MK-31 Rolling Airframe Missile

China says it tested new missile in northeastern sea

Purchase of S-400 From Russia 'Might Signal Turkey's Estrangement From NATO'

CYBER WARS
Drone to replace Israeli manned maritime patrol aircraft

General Atomics receives MQ-9 contract

UK prison moves to stop drone deliveries of contraband

Latvian daredevil in 'drone-diving' world first

CYBER WARS
Radio communications have surprising influence on Earth's near-space environment

Navy receiving data terminal sets from Leonardo DRS

European country orders Harris tactical radios

Israel orders satellite-on-the-go for military vehicles

CYBER WARS
Development of Textron's Fury glide munition completed

Orbital ATK producing 120mm training rounds for Army

U.S. Army testing Saab camouflage

Elbit introduces upgraded vehicle mortar system

CYBER WARS
US admiral gets 18 months in 'Fat Leonard' case

Israel signs $630-mln defence deal with India

Northrop Grumman Australia invests in new facility; Final Nulka decoy delivered

Dutch court jails Charles Taylor arms-supplier for 19 years

CYBER WARS
'No disruption' in ally relationships: Mattis

Turkey says will 'not beg' Germany to stay at NATO base

EU's Mogherini sees military HQ 'within days'

Beijing's new weapon in economic war: Chinese tourists

CYBER WARS
Scientists print nanoscale imaging probe onto tip of optical fiber

Scientists set record resolution for drawing at the one-nanometer length scale

X-ray microscope optics resolve 50-nm features while eliminating chromatic aberrations

Self-assembled nanostructures can be selectively controlled









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.