Contents 1 Overview 1.1 Defining cyberterrorism 1.2 Types of cyberterror capability 1.3 Concerns 1.4 History 2 International attacks and response 2.1 Conventions 2.2 Motivations for cyberattacks 2.3 International institutions 2.4 U.S. military/protections against cyberterrorism 2.5 Estonia and NATO 2.6 Republic of Korea 2.7 China 2.8 Pakistan 2.9 Ukraine 3 Examples 3.1 Sabotage 3.2 Website defacement and denial of service 4 In fiction 5 See also 6 References 7 Further reading 8 External links 8.1 General 8.2 News

Overview[edit] Main article: Definitions of terrorism There is debate over the basic definition of the scope of cyberterrorism. There is variation in qualification by motivation, targets, methods, and centrality of computer use in the act. Depending on context, cyberterrorism may overlap considerably with cybercrime, cyberwar or ordinary terrorism.[6] Eugene Kaspersky, founder of Kaspersky Lab, now feels that "cyberterrorism" is a more accurate term than "cyberwar". He states that "with today's attacks, you are clueless about who did it or when they will strike again. It's not cyber-war, but cyberterrorism."[7] He also equates large-scale cyber weapons, such as the Flame Virus and NetTraveler Virus which his company discovered, to biological weapons, claiming that in an interconnected world, they have the potential to be equally destructive.[7][8] If cyberterrorism is treated similarly to traditional terrorism, then it only includes attacks that threaten property or lives, and can be defined as the leveraging of a target's computers and information, particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure. There are some who say that cyberterrorism does not exist and is really a matter of hacking or information warfare.[9] They disagree with labelling it terrorism because of the unlikelihood of the creation of fear, significant physical harm, or death in a population using electronic means, considering current attack and protective technologies. If a strict definition is assumed, then there have been no or almost no identifiable incidents of cyberterrorism, although there has been much public concern. However, there is an old saying that death or loss of property are the side products of terrorism, the main purpose of such incidents is to create terror in peoples mind. If any incident in the cyber world can create terror, it may be called cyberterrorism. Defining cyberterrorism[edit] Assigning a concrete definition to cyberterrorism can be hard, due to the difficulty of defining the term terrorism itself. Multiple organizations have created their own definitions, most of which are overly broad. There is also controversy concerning overuse of the term, hyperbole in the media, and by security vendors trying to sell "solutions".[10] One way of understanding cyberterrorism is the idea that terrorists could cause massive loss of life, worldwide economic chaos and environmental damage by hacking into critical infrastructure systems.[11] The nature of cyberterrorism is conducts involving computer or Internet technology that: is motivated by a political, religious or ideological cause is intended to intimidate a government or a section of the public to varying degrees seriously interferes with infrastructure.[12] The term can also be used in a variety of different ways, but is also limited on when it can be used. An attack on an Internet business can be labeled cyberterrorism, however when it is done for economic motivations rather than ideological it is typically regarded as cybercrime. Cyberterrorism is also limited to actions by individuals, independent groups, or organizations. Any form of cyber warfare conducted by governments and states would be regulated and punishable under international law.[13] Cyberterrorism is defined by the Technolytics Institute as "The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives."[14] The term appears first in defense literature, surfacing in reports by the U.S. Army War College as early as 1998.[15] The National Conference of State Legislatures, an organization of legislators created to help policymakers with issues such as economy and homeland security defines cyberterrorism as: [T]he use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made via electronic communication.[16] NATO defines cyberterrorism as, “ a cyberattack using or exploiting computer or communication networks to cause sufficient destruction or disruption to generate fear or to intimidate a society into an ideological goal”[17] The National Infrastructure Protection Center defines it as, “A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence, destruction, and/or disruption of services to create fear by causing confusion and certainty within a given population conform to a political, social, or ideological agent.”[17] Lastly, the FBI defines it as, “premeditated, politically motivated attack against information, computer systems, computer programs, and data which results in violence against non-combatant targets by subnational groups or clandestine agents”.[17] Across these definitions, they all share the view that cyberterrorism is politically and/or ideologically inclined. One area of debate is the difference between cyberterrorism and hacktivism. Hacktivism is,” the marriage of hacking with political activism”.[18] Both items are politically driven, and involve using computers, however cyberterrorism is primarily used to cause harm. It becomes an issue because acts of violence on the computer can be labeled either cyberterrorism or hacktivism. Types of cyberterror capability[edit] The following three levels of cyberterror capability is defined by Monterey group Simple-Unstructured: The capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command and control, or learning capability. Advanced-Structured: The capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis, command and control, and learning capability. Complex-Coordinated: The capability for a coordinated attack capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target analysis, command and control, and organization learning capability.[19] Concerns[edit] As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace to threaten citizens, specific groups (i.e. with membership based on ethnicity or belief), communities and entire countries, without the inherent threat of capture, injury, or death to the attacker that being physically present would bring. Many groups such as Anonymous, use tools such as denial-of-service attack to attack and censor groups who oppose them, creating many concerns for freedom and respect for differences of thought. Many believe that cyberterrorism is an extreme threat to countries' economies, and fear an attack could potentially lead to another Great Depression. Several leaders agree that cyberterrorism has the highest percentage of threat over other possible attacks on U.S. territory. Although natural disasters are considered a top threat and have proven to be devastating to people and land, there is ultimately little that can be done to prevent such events from happening. Thus, the expectation is to focus more on preventative measures that will make Internet attacks impossible for execution. As the Internet continues to expand, and computer systems continue to be assigned increased responsibility while becoming more complex and interdependent, sabotage or terrorism via the Internet may become a more serious threat and is possibly one of the top 10 events to "end the human race."[20] The Internet of Things promises to further merge the virtual and physical worlds, which some experts see as a powerful incentive for states to use terrorist proxies in furtherance of objectives.[21] Dependence on the internet is rapidly increasing on a worldwide scale, creating a platform for international cyber terror plots to be formulated and executed as a direct threat to national security.[13] For terrorists, cyber-based attacks have distinct advantages over physical attacks. They can be conducted remotely, anonymously, and relatively cheaply, and they do not require significant investment in weapons, explosive and personnel. The effects can be widespread and profound. Incidents of cyberterrorism are likely to increase. They will be conducted through denial of service attacks, malware, and other methods that are difficult to envision today.[22] In an article about cyber attacks by Iran and North Korea, the New York Times observes, "The appeal of digital weapons is similar to that of nuclear capability: it is a way for an outgunned, outfinanced nation to even the playing field. 'These countries are pursuing cyberweapons the same way they are pursuing nuclear weapons,' said James A. Lewis, a computer security expert at the Center for Strategic and International Studies in Washington. 'It's primitive; it's not top of the line, but it's good enough and they are committed to getting it.'"[23] History[edit] Public interest in cyberterrorism began in the late 1990s, when the term was coined by Barry C. Collin.[24] As 2000 approached, the fear and uncertainty about the millennium bug heightened, as did the potential for attacks by cyber terrorists. Although the millennium bug was by no means a terrorist attack or plot against the world or the United States, it did act as a catalyst in sparking the fears of a possibly large-scale devastating cyber-attack. Commentators noted that many of the facts of such incidents seemed to change, often with exaggerated media reports. The high-profile terrorist attacks in the United States on September 11, 2001 and the ensuing War on Terror by the US led to further media coverage of the potential threats of cyberterrorism in the years following. Mainstream media coverage often discusses the possibility of a large attack making use of computer networks to sabotage critical infrastructures with the aim of putting human lives in jeopardy or causing disruption on a national scale either directly or by disruption of the national economy.[25] Authors such as Winn Schwartau and John Arquilla are reported to have had considerable financial success selling books which described what were purported to be plausible scenarios of mayhem caused by cyberterrorism. Many critics claim that these books were unrealistic in their assessments of whether the attacks described (such as nuclear meltdowns and chemical plant explosions) were possible. A common thread throughout what critics perceive as cyberterror-hype is that of non-falsifiability; that is, when the predicted disasters fail to occur, it only goes to show how lucky we've been so far, rather than impugning the theory. In 2016, for the first time ever, the Department of Justice charged Ardit Ferizi with cyberterrorism. He is accused of allegedly hacking into a military website and stealing the names, addresses, and other personal information of government and military personnel and selling it to ISIS[26]

International attacks and response[edit] Conventions[edit] As of 2016 there have been seventeen conventions and major legal instruments that specifically deal with terrorist activities and can also be applied to terrorism. 1963: Convention on Offences and Certain Other Acts Committed on Board Aircraft 1970: Convention for the Suppression of Unlawful Seizure of Aircraft 1971: Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation 1973: Convention on the Prevention and Punishment of Crimes against Internationally Protected Persons 1979: International Convention against the Taking of Hostages 1980: Convention on the Physical Protection of Nuclear Material 1988: Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation 1988: Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf 1988: Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation 1989: Supplementary to the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation 1991: Convention on the Marking of Plastic Explosives for the Purpose of Detection 1997: International Convention for the Suppression of Terrorist Bombings 1999: International Convention for the Suppression of the Financing of Terrorism 2005: Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation 2005: International Convention for the Suppression of Acts of Nuclear Terrorism 2010: Protocol Supplementary to the Convention for the Suppression of Unlawful Seizure of Aircraft 2010: Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation Motivations for cyberattacks[edit] There are many different motives for cyberattacks, with the majority being for financial reasons. However, there is increasing evidence that hackers are becoming more politically motivated. Cyberterrorists are aware that governments are reliant on the internet and have exploited this as a result. For example, Mohammad Bin Ahmad As-Sālim's piece '39 Ways to Serve and Participate in Jihad' discusses how an electronic jihad could disrupt the West through targeted hacks of American websites, and other resources seen as anti-Jihad, modernist, or secular in orientation (Denning, 2010; Leyden, 2007).[27] International institutions[edit] As of 2016 the United Nations only has one agency that specializes in cyberterrorism, the International Telecommunications Union. U.S. military/protections against cyberterrorism[edit] The US Department of Defense (DoD) charged the United States Strategic Command with the duty of combating cyberterrorism. This is accomplished through the Joint Task Force-Global Network Operations, which is the operational component supporting USSTRATCOM in defense of the DoD's Global Information Grid. This is done by integrating GNO capabilities into the operations of all DoD computers, networks, and systems used by DoD combatant commands, services and agencies. On November 2, 2006, the Secretary of the Air Force announced the creation of the Air Force's newest MAJCOM, the Air Force Cyber Command, which would be tasked to monitor and defend American interest in cyberspace. The plan was however replaced by the creation of Twenty-Fourth Air Force which became active in August 2009 and would be a component of the planned United States Cyber Command.[28] On December 22, 2009, the White House named its head of computer security as Howard Schmidt to coordinate U.S Government, military and intelligence efforts to repel hackers. He left the position in May, 2012.[29] Michael Daniel was appointed to the position of White House Coordinator of Cyber Security the same week[30] and continues in the position during the second term of the Obama administration.[31] More recently, Obama signed an executive order to enable the US to impose sanctions on either individuals or entities that are suspected to be participating in cyber related acts. These acts were assessed to be possible threats to US national security, financial issues or foreign policy issues.[32] U.S. authorities indicted a man over 92 cyberterrorism hacks attacks on computers used by the Department of Defense.[33] A Nebraska-based consortium apprehended four million hacking attempts in the course of eight weeks.[34] In 2011 cyberterrorism attacks grew 20%.[35] Estonia and NATO[edit] Main article: 2007 cyberattacks on Estonia The Baltic state of Estonia was target to a massive denial-of-service attack that ultimately rendered the country offline and shut out from services dependent on Internet connectivity in April 2007. The infrastructure of Estonia including everything from online banking and mobile phone networks to government services and access to health care information was disabled for a time. The tech-dependent state experienced severe turmoil and there was a great deal of concern over the nature and intent of the attack. The cyber attack was a result of an Estonian-Russian dispute over the removal of a bronze statue depicting a World War II-era Soviet soldier from the center of the capital, Tallinn.[1] In the midst of the armed conflict with Russia, Georgia likewise was subject to sustanined and coordinated attacks on its electronic infrastructure in August 2008. In both of these cases, circumstantial evidence point to coordinated Russian attacks, but attribution of the attacks is difficult; though both the countries blame Moscow for contributing to the cyber attacks, proof establishing legal culpability is lacking. Estonia joined NATO in 2004, which prompted NATO to carefully monitor its member state's response to the attack. NATO also feared escalation and the possibility of cascading effects beyond Estonia's border to other NATO members. In 2008, directly as a result of the attacks, NATO opened a new center of excellence on cyberdefense to conduct research and training on cyber warfare in Tallinn.[36] The chaos resulting from the attacks in Estonia illustrated to the world the dependence countries had on information technology. This dependence then makes countries vulnerable to future cyber attacks and terrorism.[1] Republic of Korea[edit] According to 2016 Deloitte Asia-Pacific Defense Outlook,[37] South Korea's 'Cyber Risk Score' was 884 out of 1,000 and South Korea is found to be the most vulnerable country to cyber attacks in the Asia-Pacific region. Considering Korea's high speed internet and cutting edge technology, the infrastructure cyber security is relatively weak. In 2013, there was a 2013 South Korea cyberattack which had a huge damage on Korean economy. In 2017, there was a ransomware attack which harassed private companies and users who had to experience personal information leakage. Additionally, there were North Korea's cyber attacks which risked national security of South Korea.[38] In response to this, South Korean government's countermeasure is to protect the information security centres the National Intelligence Agency. Currently, 'cyber security' is one of the major cuties of NIS Korea.[39] Since 2013, South Korea had established policies related to National cyber security and trying to prevent cyber crises via sophisticated investigation on potential threats. Meanwhile, scholars emphasise on improving the national consciousness towards cyber attacks as South Korea had already entered the so-called 'hyper connected society'. China[edit] The Chinese Defense Ministry confirmed the existence of an online defense unit in May 2011. Composed of about thirty elite internet specialists, the so-called "Cyber Blue Team", or "Blue Army", is officially claimed to be engaged in cyber-defense operations, though there are fears the unit has been used to penetrate secure online systems of foreign governments.[40][41] Pakistan[edit] Pakistan Government has also taken steps to curb the menace of cyberterrorism and extremist propaganda. National Counter Terrorism Authority (Nacta) is working on joint programs with different NGOs and other cyber security organizations in Pakistan to combat this problem. Surf Safe Pakistan is one such example. Now people in Pakistan can report extremist and terrorist related content online on Surf Safe Pakistan portal. The National Counter Terrorism Authority (NACTA) provides the Federal Government's leadership for the Surf Safe Campaign. In March 2008 an al Qaeda forum posted a training website with six training modules to learn cyberterrorism techniques.[42] Ukraine[edit] A series of powerful cyber attacks began 27 June 2017 that swamped websites of Ukrainian organizations, including banks, ministries, newspapers and electricity firms.

Examples[edit] An operation can be done by anyone anywhere in the world, for it can be performed thousands of miles away from a target. An attack can cause serious damage to a critical infrastructure which may result in casualties.[43] Attacking an infrastructure can be power grids, monetary systems, dams, media, and personal information.[2] Some attacks are conducted in furtherance of political and social objectives, as the following examples illustrate: In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat, "you have yet to see true electronic terrorism. This is a promise." In 1998, Spanish protesters bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's users, and support lines were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and member accounts, clogged their Web page with bogus credit card orders, and threatened to employ the same tactics against organizations using IGC services. They demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a New York-based publication supporting Basque independence. Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group ETA, which claimed responsibility for assassinations of Spanish political and security officials, and attacks on military installations. IGC finally relented and pulled the site because of the "mail bombings." In 1998, ethnic Tamil guerrillas attempted to disrupt Sri Lankan embassies by sending large volumes of e-mail. The embassies received 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems.[44] During the Kosovo conflict in 1999, NATO computers were blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the NATO bombings. In addition, businesses, public organizations, and academic institutes received highly politicized virus-laden e-mails from a range of Eastern European countries, according to reports. Web defacements were also common. After the Chinese Embassy was accidentally bombed in Belgrade[citation needed], Chinese hacktivists posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites. Since December 1997, the Electronic Disturbance Theater (EDT) has been conducting Web sit-ins against various sites in support of the Mexican Zapatistas. At a designated time, thousands of protestors point their browsers to a target site using software that floods the target with rapid and repeated download requests. EDT's software has also been used by animal rights groups against organizations said to abuse animals. Electrohippies, another group of hacktivists, conducted Web sit-ins against the WTO when they met in Seattle in late 1999. These sit-ins all require mass participation to have much effect, and thus are more suited to use by activists than by terrorists.[19] In 2000, a Japanese Investigation revealed that the government was using software developed by computer companies affiliated with Aum Shinrikyo, the doomsday sect responsible for the sarin gas attack on the Tokyo subway system in 1995. "The government found 100 types of software programs used by at least 10 Japanese government agencies, including the Defense Ministry, and more than 80 major Japanese companies, including Nippon Telegraph and Telephone."[45] Following the discovery, the Japanese government suspended use of Aum-developed programs out of concern that Aum-related companies may have compromised security by breaching firewalls. gaining access to sensitive systems or information, allowing invasion by outsiders, planting viruses that could be set off later, or planting malicious code that could cripple computer systems and key data system.[46] In March 2013, the New York Times reported on a pattern of cyber attacks against U.S. financial institutions believed to be instigated by Iran as well as incidents affecting South Korean financial institutions that originate with the North Korean government.[23] In August 2013, media companies including the New York Times, Twitter and the Huffington Post lost control of some of their websites Tuesday after hackers supporting the Syrian government breached the Australian Internet company that manages many major site addresses. The Syrian Electronic Army, a hacker group that has previously attacked media organisations that it considers hostile to the regime of Syrian president Bashar al-Assad, claimed credit for the Twitter and Huffington Post hacks in a series of Twitter messages. Electronic records showed that, the only site with an hours-long outage, redirected visitors to a server controlled by the Syrian group before it went dark.[47] The website of Air Botswana, defaced by a group calling themselves the "Pakistan Cyber Army" Pakistani Cyber Army is the name taken by a group of hackers who are known for their defacement of websites, particularly Indian, Chinese, and Israeli companies and governmental organizations, claiming to represent Pakistani nationalist and Islamic interests.[48] The group is thought to have been active since at least 2008,[49] and maintains an active presence on social media, especially Facebook. Its members have claimed responsibility for the hijacking of websites belonging to Acer,[50] BSNL,[51] India's CBI, Central Bank, and the State Government of Kerala.[52][53] Sabotage[edit] Non-political acts of sabotage have caused financial and other damage. In 2000, disgruntled employee Vitek Boden caused the release of 800,000 litres of untreated sewage into waterways in Maroochy Shire, Australia.[54][55] More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn. The attack was a distributed denial-of-service attack in which selected sites were bombarded with traffic to force them offline; nearly all Estonian government ministry networks as well as two major Estonian bank networks were knocked offline; in addition, the political party website of Estonia's current Prime Minister Andrus Ansip featured a counterfeit letter of apology from Ansip for removing the memorial statue. Despite speculation that the attack had been coordinated by the Russian government, Estonia's defense minister admitted he had no conclusive evidence linking cyber attacks to Russian authorities. Russia called accusations of its involvement "unfounded", and neither NATO nor European Commission experts were able to find any conclusive proof of official Russian government participation.[56] In January 2008 a man from Estonia was convicted for launching the attacks against the Estonian Reform Party website and fined.[57][58] During the Russia-Georgia War, on 5 August 2008, three days before Georgia launched its invasion of South Ossetia, the websites for OSInform News Agency and OSRadio were hacked. The OSinform website at kept its header and logo, but its content was replaced by a feed to the Alania TV website content. Alania TV, a Georgian government supported television station aimed at audiences in South Ossetia, denied any involvement in the hacking of the websites. Dmitry Medoyev, at the time the South Ossetian envoy to Moscow, claimed that Georgia was attempting to cover up information on events which occurred in the lead up to the war.[59] One such cyber attack caused the Parliament of Georgia and Georgian Ministry of Foreign Affairs websites to be replaced by images comparing Georgian president Mikheil Saakashvili to Adolf Hitler.[60] Other attacks involved denials of service to numerous Georgian and Azerbaijani websites,[61] such as when Russian hackers allegedly disabled the servers of the Azerbaijani Day.Az news agency.[62] Website defacement and denial of service[edit] Even more recently, in October 2007, the website of Ukrainian president Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.[63][64] In 1999 hackers attacked NATO computers. The computers flooded them with email and hit them with a denial-of-service attack. The hackers were protesting against the NATO bombings of the Chinese embassy in Belgrade. Businesses, public organizations and academic institutions were bombarded with highly politicized emails containing viruses from other European countries.[65]

In fiction[edit] The Japanese cyberpunk manga, Ghost in the Shell (as well as its popular movie and TV adaptations) centers around an anti-cyberterrorism and cybercrime unit. In its mid-21st century Japan setting such attacks are made all the more threatening by an even more widespread use of technology including cybernetic enhancements to the human body allowing people themselves to be direct targets of cyberterrorist attacks. Dan Brown's Digital Fortress. Amy Eastlake's Private Lies. In the movie Live Free or Die Hard, John McClane (Bruce Willis) takes on a group of cyberterrorists intent on shutting down the entire computer network of the United States. The movie Eagle Eye involves a super computer controlling everything electrical and networked to accomplish the goal. The plots of 24 Day 4 and Day 7 include plans to breach the nation's nuclear plant grid and then to seize control of the entire critical infrastructure protocol. The Tom Clancy created series Netforce was about a FBI/Military team dedicated to combating cyberterrorists. Much of the plot of Mega Man Battle Network is centered around cyberterrorism. In the 2009 Japanese animated film Summer Wars, an artificial intelligence cyber-terrorist attempts to take control over the world's missiles in order to "win" against the main characters that attempted to keep it from manipulating the world's electronic devices. In the 2012 film Skyfall, part of the James Bond franchise, main villain Raoul Silva (Javier Bardem) is an expert cyberterrorist who is responsible for various cyberterrorist incidents in the past. Cyberterrorism plays a role in the 2012 video game Call of Duty: Black Ops II, first when main antagonist Raul Menendez cripples the Chinese economy with a cyberattack and frames the United States for it, starting a new Cold War between the two powers. Later, another cyberattack with a computer worm leads to Menendez seizing control of the entire U.S drone fleet. Finally, one of the game's endings leads to another attack similar to the latter, this time crippling the U.S' electrical and water distribution grids. An alternate ending depicts the cyberattack failing after it is stopped by one of the game's characters pivotal to the storyline. The plot of the 2013 video game Watch Dogs is heavily influenced by cyber-terrorism. In which players take control of the game's protagonist, Aiden Pierce, an accused murder suspect, who hacks into a ctOS (Central Operating System), giving him complete control of Chicago's mainframe in order to hunt down his accusers. The video game Metal Slug 4 focuses on Marco and Fio, joined by newcomers Nadia and Trevor, to battle a terrorist organization known as Amadeus that is threatening the world with a computer virus. The visual novel Baldr Force has the main character Tooru Souma joining a military organization to fight cyberterrorism to avenge the death of his friend. The Japanese manga and live action Bloody Monday is highly influenced by hacking and cracking. The main character Takagi Fujimaru is a Super Elite hacker which use his hacking knowledge to fight against his enemies. In the 2016 movie Death Note: Light Up the New World society is afflicted with cyber-terrorism.

See also[edit] Terrorism portal Computer science portal 2007 cyberattacks on Estonia 2008 cyberattacks during South Ossetia war Anonymous (group) Computer crime Cyber Operations Cyberwarfare Electrical disruptions caused by squirrels FBI Cyber Division Internet and terrorism Patriotic hacking United States Computer Emergency Readiness Team (US-CERT)

References[edit] ^ a b c d Hower, Sara; Uradnik, Kathleen (2011). Cyberterrorism (1st ed.). Santa Barbara, CA: Greenwood. pp. 140–149. Retrieved 4 December 2016.  ^ a b Matusitz, Jonathan (April 2005). "Cyberterrorism:". American Foreign Policy Interests. 2: 137–147.  ^ a b Laqueur, Walter; C., Smith; Spector, Michael (2002). Cyberterrorism. Facts on File. pp. 52–53. Retrieved 5 December 2016.  ^ "India Quarterly : a Journal of International Affairs". 42–43. Indian Council of World Affairs. 1986: 122. The difficulty of defining terrorism has led to the cliche that one man's terrorist is another man's freedom fighter  ^ Worth, Robert (June 25, 2016). "Terror on the Internet: The New Arena, The New Challenges". New York Times Book Review: 21. Retrieved 5 December 2016.  ^ "What is cyberterrorism? Even experts can't agree". Archived from the original on November 12, 2009. Retrieved 2009-11-05. CS1 maint: BOT: original-url status unknown (link) . Harvard Law Record. Victoria Baranetsky. November 5, 2009. ^ a b "Latest viruses could mean 'end of world as we know it,' says man who discovered Flame", The Times of Israel, June 6, 2012 ^ "Cyber espionage bug attacking Middle East, but Israel untouched — so far", The Times of Israel, June 4, 2013 ^ Harper, Jim. "There's no such thing as cyber terrorism". RT. Retrieved 5 November 2012.  ^ Anderson, Kent (October 13, 2010). "Virtual Hostage: Cyber terrorism and politically motivated computer crime". The Prague Post. Retrieved 2010-10-14.  ^ Hardy, Keiran, and George Williams. "What is 'cyberterrorism'? Computer and internet technology in legal definitions of terrorism." Cyberterrorism. Springer New York, 2014. 1-23. ^ Hardy, Keiran; Williams, George (18 November 2017). Cyberterrorism. Springer, New York, NY. pp. 1–23. doi:10.1007/978-1-4939-0962-9_1 – via  ^ a b Gable, Kelly A. "Cyber-Apocalypse Now: Securing the Internet against Cyberterrorism and Using Universal Jurisdiction as a Deterrent" Vanderbilt Journal of Transnational Law, Vol. 43, No. 1 ^ INTELLIGENCE, ARMY TRAINING AND DOCTRINE COMMAND FORTLEAVENWORTH KS DEPUTY CHIEF OF STAFF FOR (2005-08-15). "Cyber Operations and Cyber Terrorism, Handbook Number 1.02".  ^ White, Kenneth C. (1998). Cyber-terrorism: Modern mayhem. U.S. Army War College. Retrieved 13 March 2015.  ^ Cyberterrorism[permanent dead link] National Conference of State Legislatures. ^ a b c Center of Excellence Defence Against Terrorism. Responses to Cyber Terrorism. 2008.  ^ Conway, Maura. (2008). ""What is Cyberterrorism and How Real is the Threat?"". Cyber Behavior (2008):.: 217–245.  ^ a b Dorothy E. Denning (May 23, 2000). "Cyberterrorism". Archived from the original on March 10, 2014. Retrieved June 19, 2016.  ^ "Top 10 events that may end the human race". Yahoo News. Oct 27, 2010. Archived from the original on 2010-10-30. Retrieved 2010-11-01.  ^ Costigan, Sean (25 January 2015). "Cyber terrorism must be jointly tackled". Sunday Guardian. Retrieved 12 March 2015.  ^ Joel Brenner and Jon R. Lindsay, “Debating the Chinese Cyber Threat,” International Security, Vol. 40, No. 1, Summer 2015, pp. 191-195. ^ a b Perlroth, Nicole; Sanger, David E. (28 March 2013). "Corporate Cyberattacks, Possibly State-Backed, Now Seek to Destroy Data". The New York Times.  ^ [1], William L. Tafoya, Ph.D.,"Cyber Terror", FBI Law Enforcement Bulletin (, November 2011 ^ "White House shifts Y2K focus to states, CNN (Feb. 23, 1999)". CNN. 23 February 1999. Retrieved 25 September 2011. ^, The Washington Times. "Ardit Ferizi, hacker who aided Islamic State, sentenced for helping terror group with 'kill list'". The Washington Times. Retrieved 2017-03-01.  ^ Holt, Thomas J.; Freilich, Joshua D.; Chermak, Steven M. "Exploring the Subculture of Ideologically Motivated Cyber-Attackers". Journal of Contemporary Criminal Justice. 33 (3): 212–233. doi:10.1177/1043986217699100.  ^ Bruce M. DeBlois, et al., "Space Weapons: Crossing the U.S. Rubicon," International Security, Vol. 29, No. 2, Fall 2004, pp. 50-84. ^ Chabrow, Eric. Obama Cybersecurity Coordinator Resigns., May 17, 2012. Accessed: Feb. 11, 2014. ^ White House Names New Cybersecurity Chief. May 17, 2012. Accessed: Feb. 11, 2014. ^ McDonald, Ryan.White House Security Chief Warns. Baltimore Biz Journal. January 29, 2014. Access date: Feb. 11, 2014. ^ "FACT SHEET: Executive Order Blocking the Property of Certain Persons Engaging in Significant Malicious Cyber-Enabled Activities". 2015-04-01. Retrieved 2017-03-01.  ^ Marshall, Patrick (26 September 2003). "Cybersecurity". CQ Researcher. pp. 797–820.  ^ Begos, Kevin (November 11, 2016). "Protecting the power grid". CQ Researcher.  ^ Flamini, Roland (Feb 15, 2013). "Improving cybersecurity". CQ Researcher.  ^ Maryann Cusimano Love. (2011). Beyond Sovereignty: Issues for a Global Agenda. Wadsworth, Cengage Learning. ^ "한국, 아태지역 국가 중 사이버 테러 취약성 1위 - Deloitte Korea - Press Release". 딜로이트.  ^ A Study of countermeasure and stratege analysis on North Korean cyber terror, 신충근 and 이상진 ^ ^ Yu, Eileen (27 May 2011). "China dispatches online army". ZDNet Asia. Retrieved 3 June 2011. Geng Yansheng, spokesperson for China's Defense Ministry, was quoted to say that the PLA set up the cyberwar unit, or 'cyber blue team', to support its military training and upgrade the army's Internet security defense.  ^ "China Confirms Existence of Elite Cyber-Warfare Outfit the 'Blue Army'". Fox News. 26 May 2011. Retrieved 3 June 2011. China set up a specialized online 'Blue Army' unit that it claims will protect the People's Liberation Army from outside attacks, prompting fears that the crack team was being used to infiltrate foreign governments' systems.  ^ Mantel, Barbara (November 2009). "Terrorism and the Internet" (PDF).  ^ Ayers, Cynthia (September 2009). "The Worst is Yet To Come". Futurist: 49.  ^ Denning, Dorothy (Autumn 2000). "Cyberterrorism: The Logic Bomb versus the Truck Bomb". Global Dialogue. 2 (4). Archived from the original on 2013-06-27. Retrieved 20 August 2014.  ^ Maryann Cusimano Love, Public-Private Partnerships and Global Problems: Y2K and Cybercrime. Paper Presented at the International Studies Association, Hong Kong, July 2001. ^ Calvin Sims, "Japan Software Suppliers Linked to Sect," The New York Times (March 2, 2000): A6. ^ "New York Times, Twitter hacked by Syrian group". 28 August 2013.  ^ "Pakistan Cyber Army (PCA) – Hacking Indian Websites, Promoting Pakistani Interests In Cyber Space And Nurturing Pakistani Hackers | The Cyber & Jihad Lab". Retrieved 2016-05-28.  ^ "Debugging the Pakistan Cyber Army: From Pakbugs to Bitterbugs – ThreatConnect | Enterprise Threat Intelligence Platform". ThreatConnect | Enterprise Threat Intelligence Platform. 2014-10-06. Retrieved 2016-05-28.  ^ India; Censorship; China; Japan; Apple; Reg man says '拜拜' to Honkers, ponders Asia's future role in tech world; month, Acer founder Shih to step down for second time next; themselves, Script fools n00b hackers into hacking. "Pakistan Cyber Army declares war on Chinese, Bangladeshi sites". Retrieved 2016-05-28.  ^ Saxena, Anupam (2011-07-28). "BSNL Website Hacked By Pakistan Cyber Army: Report". MediaNama. Retrieved 2016-05-28.  ^ "Hacked by 'Pakistan cyber army', CBI website still not restored". Retrieved 2016-05-28.  ^ "'Indian websites are more vulnerable to cyber attacks from Pakistan-based hackers on major events' | Latest Tech News, Video & Photo Reviews at BGR India". Retrieved 2016-05-28.  ^ "Malicious Control System Cyber Security Attack Case Study–Maroochy Water Services, Australia" (PDf).  ^ "Hacker jailed for reverse sewage". The Register. October 31, 2001.  ^ Sputnik. "Estonia has no evidence of Kremlin involvement in cyber attacks".  ^ "Estonia fines man for 'cyber war'". BBC. 2008-01-25. Retrieved 2008-02-23.  ^ Leyden, John (2008-01-24). "Estonia fines man for DDoS attacks". The Register. Retrieved 2008-02-22.  ^ "S.Ossetian News Sites Hacked". Tbilisi: Civil Georgia. 5 August 2008. Retrieved 26 January 2009.  ^ Wentworth, Travis (12 August 2008). "You've Got Malice: Russian nationalists waged a cyber war against Georgia. Fighting back is virtually impossible". Newsweek. Retrieved 26 January 2009.  ^ Markoff, John (13 August 2008). "Before the Gunfire, Cyberattacks". The New York Times. Retrieved 26 January 2009.  ^ (11 August 2008). Russian intelligence services undertook large scale attack against Day.Az server ^ "Russian Nationalists Claim Responsibility For Attack On Yushchenko's Web Site".  ^ "Russian nationalists claim responsibility for attack on Yushchenko's Web site". International Herald Tribune. 2007-10-30. Archived from the original on 2008-02-19.  ^ "Hackers attack U.S. government Web sites in protest of Chinese embassy bombing". CNN. Retrieved 2010-04-30.  (See also Chinese embassy bombing)

Further reading[edit] Alexander, Yonah Swetman, Michael S. (2001). Cyber Terrorism and Information Warfare: Threats and Responses. Transnational Publishers Inc., U.S. ISBN 1-57105-225-9. CS1 maint: Multiple names: authors list (link) Bibi van Ginkel, "The Internet as Hiding Place of Jihadi Extremists" (International Centre for Counter-Terrorism – The Hague, 2012) Colarik, Andrew M. (2006). Cyber Terrorism: Political and Economic Implications. Idea Group, U.S. ISBN 1-59904-022-0.  Hansen, James V.; Benjamin Lowry, Paul; Meservy, Rayman; McDonald, Dan (2007). "Genetic programming for prevention of cyberterrorism through dynamic and evolving intrusion detection". Decision Support Systems. 43 (4): 1362–1374. doi:10.1016/j.dss.2006.04.004. SSRN 877981 .  Verton, Dan (2003). Black Ice: The Invisible Threat of Cyber-terrorism. Osborne/McGraw-Hill, U.S. ISBN 0-07-222787-7.  Weimann, Gabriel (2006). Terror on the Internet: The New Arena, the New Challenges. United States Institute of Peace, U.S. ISBN 1-929223-71-4.  Blau, John (November 2004). "The battle against cyberterror". NetworkWorld. Retrieved March 20, 2005.  Gross, Grant (Nov 2003). "Cyberterrorist attack would be more sophisticated that past worms, expert says". ComputerWorld. Retrieved March 17, 2005.  Poulsen, Kevin (August 2004). "South Pole 'cyberterrorist' hack wasn't the first". SecurityFocus News. Retrieved March 17, 2005.  Thevenet, Cédric (November 2005). "Cyberterrorisme, mythe ou réalité?" (PDF) (in French).  U.S. Army Cyber Operations and Cyber Terrorism Handbook 1.02 Rayamajhi, shreedeep (2009). "Research Paper -A Synopsis on Cyber Terrorism and Warfare". Scribd.  Jacqueline Ching (2010). Cyberterrorism. Rosen Pub Group. ISBN 1-4358-8532-5.  Rolón, Darío N., (2013) Control, vigilancia y respuesta penal en el ciberespacio, Latinamerican´s new security thinking, Clacso. Costigan, Sean (2012). Cyberspaces and Global Affairs. Ashgate. ISBN 978-1-4094-2754-4.  Record, Jeffery: Bounding the Global War on Terrorism, Strategic Studies Institute, US Army War College, Leavenworth, 2003 Schmid, Alex and Jongmans, Albert et al.: Political Terrorism: A new guide to Action, Authors, Concepts, Data Bases, Theories and Literature, Transaction Books, New Brunswick, 1988 COE DAT Cyber Terrorism Couse IV Mar 09 Hennessy, Joh L and others: Information Technology for Counterterrorism, National Academies Press, Washington DC, 2003 Hoffman,Bruce:InsideTerrorism,ColumbiaUniversityPress,NewYork,2006 Laqueur, Walter: The New Terrorism: Fanaticism and the Arms of Mass Destruction, Oxford University Press, New York, 1999 Sageman,Marc:UnderstandingTerrorNetworks,Penn,Philadelphia,2004 Wilkinson,Paul:TerrorismVersusDemocracy,Routledge,London,2006

External links[edit] General[edit] CRS Report for Congress – Computer Attack and Cyber Terrorism – 17/10/03 Cyber-Terrorism: Propaganda or Probability? How terrorists use the Internet ABC Australia interview with Professor Hsinchun Chen Department of Defense Cyber Crime Center RedShield Association- Cyber Defense Cyber Infrastructure Protection – Strategic Studies Institute Cyber-Terrorism and Freedom of Expression: Sultan Shahin Asks United Nations to Redesign Internet Governance New Age Islam Global response to cyberterrorism and cybercrime: A matrix for international cooperation and vulnerability assessment News[edit] Cyber Security Task Force Takes 'Whole Government' Approach FBI, October 20, 2014 BBC News – US warns of al-Qaeda cyber threat – 01/12/06 BBC News – Cyber terrorism 'overhyped' – 14/03/03 Calls for anti-cyber terrorism bill resurface in South Korea – NK News Authority control BNF: cb15061494m (data) Retrieved from "" Categories: CyberwarfareCybercrimeTerrorism by methodCyberattacksHidden categories: CS1 maint: BOT: original-url status unknownAll articles with dead external linksArticles with dead external links from August 2017Articles with permanently dead external linksAll articles with unsourced statementsArticles with unsourced statements from September 2012Pages using div col without cols and colwidth parametersCS1 maint: Multiple names: authors listCS1 French-language sources (fr)Wikipedia articles with BNF identifiers

Navigation menu Personal tools Not logged inTalkContributionsCreate accountLog in Namespaces ArticleTalk Variants Views ReadEditView history More Search Navigation Main pageContentsFeatured contentCurrent eventsRandom articleDonate to WikipediaWikipedia store Interaction HelpAbout WikipediaCommunity portalRecent changesContact page Tools What links hereRelated changesUpload fileSpecial pagesPermanent linkPage informationWikidata itemCite this page Print/export Create a bookDownload as PDFPrintable version Languages العربيةবাংলাBân-lâm-gúCatalàČeštinaDeutschEspañolفارسیFrançais한국어हिन्दीBahasa IndonesiaעבריתBahasa MelayuNederlands日本語PolskiPortuguêsРусскийSlovenščinaСрпски / srpskiTürkçeУкраїнська Edit links This page was last edited on 10 March 2018, at 22:33. Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization. Privacy policy About Wikipedia Disclaimers Contact Wikipedia Developers Cookie statement Mobile view (window.RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgPageParseReport":{"limitreport":{"cputime":"0.608","walltime":"0.697","ppvisitednodes":{"value":3122,"limit":1000000},"ppgeneratednodes":{"value":0,"limit":1500000},"postexpandincludesize":{"value":134100,"limit":2097152},"templateargumentsize":{"value":1374,"limit":2097152},"expansiondepth":{"value":12,"limit":40},"expensivefunctioncount":{"value":2,"limit":500},"unstrip-depth":{"value":0,"limit":20},"unstrip-size":{"value":61693,"limit":5000000},"entityaccesscount":{"value":1,"limit":400},"timingprofile":["100.00% 572.729 1 -total"," 52.97% 303.351 1 Template:Reflist"," 17.67% 101.214 27 Template:Cite_web"," 15.82% 90.606 11 Template:Cite_book"," 9.86% 56.471 1 Template:Terrorism"," 9.13% 52.307 12 Template:Cite_news"," 8.99% 51.513 1 Template:Sidebar_with_collapsible_lists"," 7.95% 45.537 9 Template:Cite_journal"," 7.93% 45.426 1 Template:Citation_needed"," 7.78% 44.542 2 Template:Fix"]},"scribunto":{"limitreport-timeusage":{"value":"0.323","limit":"10.000"},"limitreport-memusage":{"value":5633918,"limit":52428800}},"cachereport":{"origin":"mw1316","timestamp":"20180316142436","ttl":1900800,"transientcontent":false}}});});(window.RLQ=window.RLQ||[]).push(function(){mw.config.set({"wgBackendResponseTime":83,"wgHostname":"mw1333"});});

Cyberterrorism - Photos and All Basic Informations

Cyberterrorism More Links

TerrorismDefinitions Of TerrorismHistory Of TerrorismList Of Terrorist IncidentsIdeologyPropaganda Of The DeedCommunist TerrorismConservative TerrorismLeft-wing TerrorismNarcoterrorismNationalist TerrorismRight-wing TerrorismReligious TerrorismBuddhism And ViolenceChristian TerrorismMormonism And ViolenceSaffron TerrorIslamic TerrorismJewish Religious TerrorismSikh TerrorismSpecial-interest TerrorismAnti-abortion ViolenceEnvironmental TerrorismEthnic ViolenceMilitia Organizations In The United StatesResistance MovementTerrorism FinancingTerrorist Front OrganizationTerrorist Training CampDeath SquadClandestine Cell SystemLeaderless ResistanceTactics Of TerrorismAgro-terrorismAircraft HijackingList Of Aircraft HijackingsAnimal-borne Bomb AttacksBeheading In IslamBioterrorismCar BombList Of Mass Car BombingsDirty BombDry Run (terrorism)Explosive MaterialHostageImprovised Explosive DeviceIndividual TerrorInsurgencyKidnappingLetter BombLone Wolf (terrorism)Mass ShootingNuclear TerrorismPaper TerrorismPiracyPropaganda Of The DeedProxy BombSchool ShootingStabbing As A Terrorist TacticSuicide AttackCategory:Suicide Bombings By CountryTactics Of TerrorismVehicle-ramming AttackList Of Designated Terrorist GroupsList Of Charities Accused Of Ties To TerrorismViolent Non-state ActorState TerrorismTerrorism And Counter-terrorism In KazakhstanTerrorism In RussiaSri Lanka And State TerrorismUnited States And State TerrorismTerrorism In UzbekistanState-sponsored TerrorismIran And State-sponsored TerrorismIsrael And State-sponsored TerrorismPakistan And State-sponsored TerrorismQatar And State-sponsored TerrorismTerrorism In RussiaTerrorism And The Soviet UnionState-sponsored TerrorismTerrorism In SyriaUnited States And State-sponsored TerrorismCounter-terrorismInternational Conventions On TerrorismAnti-terrorism LegislationTerrorism InsuranceTemplate:TerrorismTemplate Talk:TerrorismInternetIntimidationTerrorismComputer VirusesComputer WormPhishingHack (computer Security)Criticism Of The War On TerrorismFederal Bureau Of InvestigationsCentral Intelligence AgencyCyber AttackAl-QaedaEstoniaDefinitions Of TerrorismCybercrimeCyberwarTerrorismEugene KasperskyKaspersky LabFlame (malware)Biological WeaponsTerrorismInternetHacker (computer Security)Information WarfareHyperboleCybercrimeU.S. Army War CollegeNational Conference Of State LegislaturesDenial-of-service AttackCyberspaceAnonymous (group)Denial-of-service AttackNew York TimesCenter For Strategic And International StudiesYear 2000 ProblemWar On TerrorWinn SchwartauJohn ArquillaFalsifiabilityInternational Telecommunication UnionUS Department Of DefenseUnited States Strategic CommandJoint Task Force-Global Network OperationsUSSTRATCOMGlobal Information GridJoint Task Force-Global Network OperationsMAJCOMAir Force Cyber Command (Provisional)Twenty-Fourth Air ForceUnited States Cyber CommandComputer SecurityHoward Schmidt2007 Cyberattacks On Estonia2013 South Korea CyberattackRansomware2017 Cyberattacks On UkraineWikipedia:Citation NeededAum ShinrikyoNew York TimesNew York TimesTwitterHuffington PostEnlargeAir BotswanaPakistanHacker (computer Security)IndiaChinaIsraelPakistani NationalismIslamAcer Inc.Bharat Sanchar Nigam LimitedCentral Bureau Of InvestigationCentral Bank Of IndiaKeralaSabotageMaroochy ShireEstoniaCyberattacks On Estonia 2007Denial-of-service AttackNATOEuropean CommissionEstonian Reform PartyRussia-Georgia WarOSInform News AgencyDmitry MedoyevEnvoy (title)MoscowParliament Of GeorgiaMinistry Of Foreign Affairs (Georgia)Mikheil SaakashviliAdolf HitlerDenial-of-service AttackViktor YushchenkoEurasian Youth UnionNATODenial-of-service AttackJapanese CultureCyberpunkMangaGhost In The ShellCybercrimeDan BrownDigital FortressPrivate LiesLive Free Or Die HardJohn McClaneBruce WillisEagle Eye24 (TV Series)NetforceMega Man Battle NetworkSummer WarsSkyfallJames Bond In FilmRaoul SilvaJavier BardemCall Of Duty: Black Ops IIWatch DogsChicago, ILMetal Slug 4Baldr ForceBloody Monday (manga)Death Note: Light Up The New WorldPortal:TerrorismPortal:Computer Science2007 Cyberattacks On EstoniaCyberattacks During The 2008 South Ossetia WarAnonymous (group)Computer CrimeCyber OperationsCyberwarfareElectrical Disruptions Caused By SquirrelsFBI Cyber DivisionPatriotic HackingUnited States Computer Emergency Readiness TeamCategory:CS1 Maint: BOT: Original-url Status UnknownDigital Object IdentifierWikipedia:Link RotDigital Object IdentifierZDNetFox NewsTbilisiCivil GeorgiaNewsweekToday.azChinese Embassy BombingInternational Standard Book NumberSpecial:BookSources/1-57105-225-9Category:CS1 Maint: Multiple Names: Authors ListInternational Standard Book NumberSpecial:BookSources/1-59904-022-0Digital Object IdentifierSocial Science Research NetworkInternational Standard Book NumberSpecial:BookSources/0-07-222787-7International Standard Book NumberSpecial:BookSources/1-929223-71-4International Standard Book NumberSpecial:BookSources/1-4358-8532-5International Standard Book NumberSpecial:BookSources/978-1-4094-2754-4Hsinchun ChenNew Age IslamFBINK NewsHelp:Authority ControlBibliothèque Nationale De FranceHelp:CategoryCategory:CyberwarfareCategory:CybercrimeCategory:Terrorism By MethodCategory:CyberattacksCategory:CS1 Maint: BOT: Original-url Status UnknownCategory:All Articles With Dead External LinksCategory:Articles With Dead External Links From August 2017Category:Articles With Permanently Dead External LinksCategory:All Articles With Unsourced StatementsCategory:Articles With Unsourced Statements From September 2012Category:Pages Using Div Col Without Cols And Colwidth ParametersCategory:CS1 Maint: Multiple Names: Authors ListCategory:CS1 French-language Sources (fr)Category:Wikipedia Articles With BNF IdentifiersDiscussion About Edits From This IP Address [n]A List Of Edits Made From This IP Address [y]View The Content Page [c]Discussion About The Content Page [t]Edit This Page [e]Visit The Main Page [z]Guides To Browsing WikipediaFeatured Content – The Best Of WikipediaFind Background Information On Current EventsLoad A Random Article [x]Guidance On How To Use And Edit WikipediaFind Out About WikipediaAbout The Project, What You Can Do, Where To Find ThingsA List Of Recent Changes In The Wiki [r]List Of All English Wikipedia Pages Containing Links To This Page [j]Recent Changes In Pages Linked From This Page [k]Upload Files [u]A List Of All Special Pages [q]Wikipedia:AboutWikipedia:General Disclaimer

view link view link view link view link view link