Anti-Terrorism Level II. Cyber “Terrorism” The Future of Modern Terrorism? . References. Rand Corporation Operation Cyber Sweep DOJ U.S. Attorneys Office of Legal Education. OVERVIEW. Definitions The Cyber Terrorist Defined Goals and Objectives of a Cyber Terrorist
Related searches for Anti-Terrorism Level II
The Future of Modern Terrorism?
lack of authorization to access a computer or computer system
use of a computer to perpetuate the fraud
use of e-mail or electronic means of communicating language threatening to inflict harm to persons or property, or for the purpose of extorting money or property
Starting point, weak passwords with internet and e-mail use (Social Engineering)
The goal of remote administration
Process that supports the knowledge of acquisition
Uses FOUR Modes:
Transmission, Connection, Aggregation, Retrieval
- High Energy Radio Frequency Guns
- Electro Magnetic Pulse Bombs
Handle: Dark Dante
Claim to fame: In 1990 Poulsen took over all telephone lines going into Los Angeles area radio station KIIS-FM, assuring that he would be the 102nd caller. Poulsen won a Porsche 944 S2 for his efforts.
First encountered a computer: When his parents
bought him a TRS-80 (better known as a "Trash-80").
Unusual tools: A set of locksmith tools he used to break into phone company trailers. He was caught after a friend commemorated the break-ins with snapshots of Poulsen picking locks.
Little-known fact: Admitted breaking into computers to get the names of undercover businesses operated by the FBI.
Current status: Thanks to an episode of Unsolved Mysteries, Kevin Poulsen was arrested and spent three years in prison. He was then forbidden to touch a computer for another three years. Poulsen is now a self-proclaimed "reformed and penitent" journalist, and serves as editorial director for Security Focus.