[iwar] Statics On Cyber-terrorism.htm


From: Ozair
To: Info War
From: ozair_rasheed@geocities.com
To: iwar@egroups.com

Thu, 28 Dec 2000 22:16:35 +0500


fc  Thu Dec 28 09:21:07 2000
Received: from 207.222.214.225
	by localhost with POP3 (fetchmail-5.1.0)
	for fc@localhost (single-drop); Thu, 28 Dec 2000 09:21:07 -0800 (PST)
Received: by multi33.netcomi.com for fc
 (with Netcom Interactive pop3d (v1.21.1 1998/05/07) Thu Dec 28 17:16:54 2000)
X-From_: ozair_rasheed@geocities.com  Thu Dec 28 11:16:00 2000
Received: from jj.egroups.com (jj.egroups.com [208.50.144.82]) by multi33.netcomi.com (8.8.5/8.7.4) with SMTP id LAA30300 for ; Thu, 28 Dec 2000 11:15:56 -0600
X-eGroups-Return: sentto-279987-846-978023999-fc=all.net@returns.onelist.com
Received: from [10.1.4.53] by jj.egroups.com with NNFMP; 28 Dec 2000 17:20:06 -0000
X-Sender: ozair_rasheed@geocities.com
X-Apparently-To: iwar@egroups.com
Received: (EGP: mail-6_3_1_3); 28 Dec 2000 17:19:58 -0000
Received: (qmail 4781 invoked from network); 28 Dec 2000 17:19:58 -0000
Received: from unknown (10.1.10.27) by l7.egroups.com with QMQP; 28 Dec 2000 17:19:58 -0000
Received: from unknown (HELO mail.isd.wol.net.pk) (208.242.129.253) by mta2 with SMTP; 28 Dec 2000 17:17:16 -0000
Received: from ozair (host-64-110-87-34.interpacket.net [64.110.87.34]) by mail.isd.wol.net.pk (8.9.0/8.9.0) with SMTP id WAA10025 for ; Thu, 28 Dec 2000 22:16:57 +0500 (PKT)
To: "Info War" 
Message-ID: 
X-Priority: 3 (Normal)
X-MSMail-Priority: Normal
X-Mailer: Microsoft Outlook IMO, Build 9.0.2416 (9.0.2910.0)
X-MimeOLE: Produced By Microsoft MimeOLE V5.50.4133.2400
Importance: Normal
From: "Ozair" 
MIME-Version: 1.0
Mailing-List: list iwar@egroups.com; contact iwar-owner@egroups.com
Delivered-To: mailing list iwar@egroups.com
Precedence: bulk
List-Unsubscribe: 
Date: Thu, 28 Dec 2000 22:16:35 +0500
Reply-To: iwar@egroups.com
Subject: [iwar] Statics On Cyber-terrorism.htm
Content-Type: text/plain; charset=US-ASCII
Content-Transfer-Encoding: 7bit

http://www-cs.etsu.edu/gotterbarn/stdntppr/stats.htm
Statics On Cyber-terrorism


----------------------------------------------------------------------------
----

Who is at risk of an attack?
Most feel that military installations, power plants, air traffic control
centers, banks and telecommunication networks themselves are the most likely
targets. Other targets include police, medical, fire and rescue systems,
which could be hurt, along with Wall Street, water systems, etc.

Who are the terrorists?
The graphic below shows that amateur hackers are by far the biggest threat
on the Internet at the current time. They are responsible for about 90% of
all hacking activity.






Cyber terrorism does not have to come from the average hacker or even online
terrorists. The Govt. carried out a series of its own attacks on itself, in
order to test its own defenses against online-based attacks. The Defense
Information Security Agency (DISA) found that 88% of the 3000 defense
computer systems that were attacked were "easily penetrable". Of the systems
that were illegally entered, 96% of the entries were not detected. Of the 4%
that were detected, only 5% of them were reported or investigated.

How common is unauthorized system entry?
A survey conducted by the Science Applications International Corp. in 1996
found that 40 major corporations reported losing over $800 million to
computer break-ins. An FBI survey of 428 government, corporate and
university sites found that over 40% reported having been broken into at
least once in the last year. One third said that they had been broken into
over the Internet. Another survey found that the Pentagon's systems that
contain sensitive, but unclassified information, had been accessed via
networks illegally 250,000 times and only 150 of the intrusions were
detected. The FBI estimates that U.S. businesses loose $138 million every
year to hackers. According to the CIA in the past three years government
systems have been illegally entered 250,000.


Costs of cyber-terrorism
According to a source in Great Britain, terrorists have gained at least up
to 400 million pounds from 1993 to 1995 by threatening institutions. Over
the three years, there were 40 reported threats made to banks in the U.S.
and Britain. In January of 1993, three separate incidents took place in
London. During the sixth, a brokerage house paid out 10 million pounds after
receiving a threat and one of their machines crashed. On the fourteenth
incident, a blue-chip bank paid blackmailers 12.5 million pounds after
receiving threats. Another brokerage house paid out 10 million pounds on the
twenty-ninth incident. Some terrorists just take money, rather than
resorting to blackmail. A Russian hacker, for example, tapped into
Citibank's funds transfer system and took $10 million.




      Case Studies Links to Other Sites Home Resources Used for this Site



[Non-text portions of this message have been removed]


-------------------------- eGroups Sponsor -------------------------~-~>
eLerts
It's Easy. It's Fun. Best of All, it's Free!
http://click.egroups.com/1/9699/1/_/595019/_/978023999/
---------------------------------------------------------------------_->

------------------
http://all.net/