. 24/7 Space News .
CYBER WARS
Weaponizing the internet for terrorism
by Staff Writers
Geneva, Switzerland (SPX) May 17, 2017


The researchers warn that research shows we are not too far away from a new wave of insurgency and terrorism that may gradually overtake the internet and many organizational network infrastructures around the world.

Terrorism is a fact of life as are the collectives and networks to which counter-terrorism organizations and the media have given various labels and names. These networks are well versed in exploiting modern information technology through social media awareness, marketing and recruitment campaigns.

However, there is the more insidious use by terrorists groups of online networks and exploits in the creation of so-called bots (computers that have been compromised through the implementation of malware and control over which has been assumed by a third party, or more likely a third party control a lot array of such bots in a botnet.

Writing in the International Journal of Collaborative Intelligence, Emmanuel Ogu of the Department of Computer Science, at Babcock University, in Ilishan-Remo, Ogun State, Nigeria, and colleagues suggest that the problems caused by botnets in terms of interfering with infrastructure, healthcare services, transport, power supply and other critical parts of the modern world are not very different to those caused by the more familiar notion of terrorist attacks involving explosives and weapons.

Events across the globe in mid-May 2017 saw the rapid and devastating spread of ransomware to hospitals, companies, organizations, and individuals. Whether or not this was a specific attack by a particular group is irrelevant the impact was enormous on those waiting for healthcare attention, for instance.

A similar "attack" on an even bigger scale might see power supply outages brought about by malware-toting botnets operated by those with malicious intent where there is no simple financial extortion, rather crippling and even destruction of infrastructure is the aim of the perpetrators.

"Fighting bots and keeping them away from network infrastructures has gradually become the nightmare of every network security professional," the team says.

Fundamentally, this is because although individual computers may be wiped of malware and systems patches or a botnet disabled, the distributed and infectious nature of the computer viruses, worms and other malware that propagate the controls with which the "botmaster" will rally the compromised computers are always being modified to counteract antivirus software.

The researchers warn that research shows we are not too far away from a new wave of insurgency and terrorism that may gradually overtake the internet and many organizational network infrastructures around the world.

"Just as the secret to dismantling terrorist networks have been proven to lie in destroying the ability of the terror group to recruit, train, control and coordinate their activities (essentially by completely taking out their command and control infrastructure), the secret to ridding the internet of botnets, perhaps, also depends on similar means," the team suggests.

"Intelligence reports are useless if they do not lead to informed decisions and actions," they add.

Warnings of out of date operating systems, web browsers and email programs, unpatched computers, and the non-implementation of firewalls and antivirus software seem to be unheeded in too many cases. If those warnings are left unheeded by the users of infrastructure critical computers in healthcare, transportation, industry, power supply other areas, then the inherent vulnerabilities might be exploited by those with malicious intent repeatedly whether for financial gain, terrorist propaganda and control or both.

Ogu, E.C., Ogu, M.I. and Ogu, C. (2016) 'Insights from terrorism intelligence and eradication efforts - Al-Qaeda, ISIS, Boko Haram - for more pragmatic botnet countermeasures', Int. J. Collaborative Intelligence, Vol. 1, No. 4, pp.258-274.

CYBER WARS
WikiLeaks source Chelsea Manning set to be released
Fort Leavenworth, United States (AFP) May 17, 2017
Chelsea Manning, the transgender army private jailed for one of the largest leaks of classified documents in US history, is set to walk out of a military prison Wednesday after seven years behind bars. In July 2010, Manning - then a male soldier known as Bradley - was arrested over the release of a huge trove of more than 700,000 classified military and diplomatic documents via WikiLeaks. ... read more

Related Links
Inderscience Publishers
Cyberwar - Internet Security News - Systems and Policy Issues


Thanks for being here;
We need your help. The SpaceDaily news network continues to grow but revenues have never been harder to maintain.

With the rise of Ad Blockers, and Facebook - our traditional revenue sources via quality network advertising continues to decline. And unlike so many other news sites, we don't have a paywall - with those annoying usernames and passwords.

Our news coverage takes time and effort to publish 365 days a year.

If you find our news sites informative and useful then please consider becoming a regular supporter or for now make a one off contribution.
SpaceDaily Contributor
$5 Billed Once


credit card or paypal
SpaceDaily Monthly Supporter
$5 Billed Monthly


paypal only


Comment using your Disqus, Facebook, Google or Twitter login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle

CYBER WARS
Older Americans warm to new technology: survey

Six-legged livestock - sustainable food production

'Awesomesauce,' proclaims US astronaut on historic spacewalk

External commercial ISS platform starts second mission

CYBER WARS
Sky Skimmer: Rocket Lab Sets Date for Lightweight Spacecraft Test Launch

Washington Still Has No Engine to Replace Russian-Made RD-180

Airbus Safran Launchers to Become ArianeGroup

Mining the moon for rocket fuel to get us to Mars

CYBER WARS
Mars Rover Opportunity Begins Study of Valley's Origin

Opportunity Reaches 'Perseverance Valley'

Ancient Mars impacts created tornado-like winds that scoured surface

Seasonal Flows in Valles Marineris

CYBER WARS
A cabin on the moon? China hones the lunar lifestyle

China tests 'Lunar Palace' as it eyes moon mission

China to conduct several manned space flights around 2020

Reach for the Stars: China Plans to Ramp Up Space Flight Activity

CYBER WARS
Allied Minds' portfolio company BridgeSat raises $6 million in Series A financing

AIA report outlines policies needed to boost the US Space Industry competitiveness

Blue Sky Network Targets Key Markets For Iridium SATCOM Solutions

How Outsourcing Your Satellite Related Services Saves You Time and Money

CYBER WARS
HP Enterprise unveils computer 'for era of Big Data'

3D-printed maritime propeller on way

Adhesive behavior of self-constructive materials measured for first time

Unfolding the folding mechanism of ladybug wings

CYBER WARS
Metabolism, not RNA, jump-started life's molecular beginnings

Primitive Atmosphere Found Around 'Warm Neptune'

New 'styrofoam' planet provides tools in search for habitable planets

Variable Winds on Hot Giant Exoplanet Help Study of Magnetic Field

CYBER WARS
Waves of lava seen in Io's largest volcanic crater

Not So Great Anymore: Jupiter's Red Spot Shrinks to Smallest Size Ever

The PI's Perspective: No Sleeping Back on Earth!

ALMA investigates 'DeeDee,' a distant, dim member of our solar system









The content herein, unless otherwise known to be public domain, are Copyright 1995-2024 - Space Media Network. All websites are published in Australia and are solely subject to Australian law and governed by Fair Use principals for news reporting and research purposes. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA news reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. All articles labeled "by Staff Writers" include reports supplied to Space Media Network by industry news wires, PR agencies, corporate press officers and the like. Such articles are individually curated and edited by Space Media Network staff on the basis of the report's information value to our industry and professional readership. Advertising does not imply endorsement, agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. General Data Protection Regulation (GDPR) Statement Our advertisers use various cookies and the like to deliver the best ad banner available at one time. All network advertising suppliers have GDPR policies (Legitimate Interest) that conform with EU regulations for data collection. By using our websites you consent to cookie based advertising. If you do not agree with this then you must stop using the websites from May 25, 2018. Privacy Statement. Additional information can be found here at About Us.