SlideShare una empresa de Scribd logo
1 de 3
SEA (SyrianElectronicArmy)
The SEA (Syrian Electronic Army) is an organized group of Syrian computer hackers aligned
with the actual regime, using cyber attacks (DDoS, spam and straight hacking) targeting
political opposition and Western websites(1).
Although not directly related to the Syrian government, they share similar agendas. The SEA
has a strong political orientation, its main objective being “to fight those who use the Internet
and especially Facebook to “spread hatred” and “destabilize the security” in Syria (2).
Terrorist attacks of special interest
-

AP Hack (23 April 2013): The SEA hijacked the Associated Press Twitter account and
falsely claimed the White House had been bombed and President Barack Obama
injured. This caused a temporary $136 billion in Dow Jones stock market index (3).

-

15 August 2013: Advertising serviceOutbrain was hacked by the SEA. This allowed
them to place posts into the websites of The Washington Post, Time, and CNN (4).

Terrorist nature and context
We first need to try to define what terrorism and cyberterrorism is. If we search Oxford
Dictionary :
Terrorism –“the unofficial or unauthorized use of violence and intimidation in the pursuit of
political aims” (5).
Cyberterrorism –“the politically motivated use of computers and information technology to
cause severe disruption or widespread fear” (6).
As we can see, terrorism and cyberterrorism are quite similar in essence, both focusing in
spreading fear with a political aim. Using the revised consensus academic definition on
terrorism made by Schmid (7), we see further relations between terrorism and cyberterrorism:
fear generating intention, propagandistic agitation by non-state actors in zones of conflict,
threat based communication processes, the targeting of civilians, political use and being part
of an organized campaign of acts.
Cyberterrorism does not intent to cause direct deaths (although one of the main concerns of
technical experts is the chance of a cyberterrorist group to successfully attack critical
infrastructures of a country like dams, power grids or nuclear plants), but nevertheless is
violent in its nature.
Its violence is mainly psychological: Through attacks to mass media (like those mentioned
above) and a massive use of social networks like Facebook and Twitter, the SEA spreads its
propaganda in order to influence public opinion, with the main objective being to force foreign
states to accept Al-Assad regime and crushing online the opposition.
The SEA has publicly taken credit for these attacks in its own website (solving one of the
greatest issues of cyberterrorism, the attribution), and are with no doubt an organized group
(divided as they say into battalions). If we refer to the EU Common Position 2001/931/CFSP
(8), Article 3 defines what can be considered as a terrorist act, while Article 2 defines a
terrorist group.
According to Article 3 (iii)(d): “seriously destabilizing or destroying the fundamental political,
constitutional, economic or social structures of acountry or an international
organization:causing extensive destruction to a Government orpublic facility, a transport
system, an infrastructurefacility, including an information system, a fixed platform located on
the continental shelf, a public place or private property, likely to endanger human life orresult
in major economic loss”.
The SEA activities fall perfectly into this article. Several international organizations have
watched SEA’s rising with concern, and FBI has put them on a watch list (9), and UK
government has several SEA membersassets freezed under finantial sanctions (10)
Conclusion
Cyberterrorism has several differences with terrorism but its essence is the same: use violence
with political intent. And cyberterrorism is a rising tide, with an onerous risk of a successful
attack to a critical infrastructure which causes severe human loss, so it just can’t be left aside.
The Syrian Electronic Army is a dedicated group that uses cyber attacks to influence public
opinion and politicians, following to the letter the"Terrorists want a lot of people watching, not
a lot of people dead" cited by Jenkins (11).
Although SEA has not commited extremely severe attacks, its potential to cause damage is
clear. This is the main reason the EU should mark it as a terrorist group, being the first entity to
officially list cyberterrorism as a critical menace and giving its due relevance.
Sources
(1) Syrian Electronic Army - Homepage
http://sea.sy/index/en
(2)The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East:
The Case of the Syrian Electronic Army
https://opennet.net/emergence-open-and-organized-pro-government-cyber-attacks-middleeast-case-syrian-electronic-army
(3) Washinton Post – Associated Press Hack
http://www.washingtonpost.com/blogs/worldviews/wp/2013/04/23/syrian-hackers-claim-aphack-that-tipped-stock-market-by-136-billion-is-it-terrorism/
(4) BBC – Washington Post, CNN and Time websites hit by pro-Assad hackers
http://www.bbc.co.uk/news/technology-23712007
(5) Oxford Dictionaries: Definition of terrorism
http://oxforddictionaries.com/definition/english/terrorism
(6) Oxford dictionaries - Cyberterrorism
http://oxforddictionaries.com/definition/english/cyberterrorism
(7) Schmid, Alex P. - The Revised Academic Consensus Definition of Terrorism, Perspectives on
Terrorism, Vol 6 No 2 (2012)
(8)COUNCIL COMMON POSITIONof 27 December 2001on the application of specific measures
to combat terrorism
http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2001:344:0093:0096:EN:PDF
(9) FBI Advisory list- SEA
http://publicintelligence.net/fbi-sea/
(10) Consolidated list of financial sanctions targets in the UK
https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/227452/00_
syria.pdf
(11) Brian Michael Jenkins.Unconquerable Nation: Knowing Our Enemy, Strengthening
Ourselves

Más contenido relacionado

Similar a SEA - Syrian Electronic Army - Cyberterrorism

P A R T VCyber Terrorism The New”Face of Terrorism.docx
P A R T  VCyber Terrorism The New”Face of Terrorism.docxP A R T  VCyber Terrorism The New”Face of Terrorism.docx
P A R T VCyber Terrorism The New”Face of Terrorism.docx
gerardkortney
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
oreo10
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
Nicole Fields
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
OllieShoresna
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
dorishigh
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
Benjamin Morley
 

Similar a SEA - Syrian Electronic Army - Cyberterrorism (8)

P A R T VCyber Terrorism The New”Face of Terrorism.docx
P A R T  VCyber Terrorism The New”Face of Terrorism.docxP A R T  VCyber Terrorism The New”Face of Terrorism.docx
P A R T VCyber Terrorism The New”Face of Terrorism.docx
 
The psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docxThe psychological effects of cyber terrorismMichael L. Gross.docx
The psychological effects of cyber terrorismMichael L. Gross.docx
 
The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816The Patriot Act Title Vii Section 814 And 816
The Patriot Act Title Vii Section 814 And 816
 
Cyber Weapons Proliferation
Cyber Weapons Proliferation                                 Cyber Weapons Proliferation
Cyber Weapons Proliferation
 
Essay On Terrorism In World
Essay On Terrorism In WorldEssay On Terrorism In World
Essay On Terrorism In World
 
Cyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docxCyber terrorism, by definition, is the politically motivated use.docx
Cyber terrorism, by definition, is the politically motivated use.docx
 
Cyberterrorism Research Paper
Cyberterrorism Research PaperCyberterrorism Research Paper
Cyberterrorism Research Paper
 
Cyber Security in the Age of Globalization
Cyber Security in the Age of GlobalizationCyber Security in the Age of Globalization
Cyber Security in the Age of Globalization
 

Más de Antonio Sanz Alcober

Capacidades de China para la ciberguerra
Capacidades de China para la ciberguerraCapacidades de China para la ciberguerra
Capacidades de China para la ciberguerra
Antonio Sanz Alcober
 

Más de Antonio Sanz Alcober (20)

Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?Ciberamenazas - ¿A qué nos enfrentamos?
Ciberamenazas - ¿A qué nos enfrentamos?
 
Zen y el arte de pescar APT
Zen y el arte de pescar APTZen y el arte de pescar APT
Zen y el arte de pescar APT
 
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
China y el ciberespionaje: Sun Tzu, APT1 y los tiempos interesantes.
 
Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?Cyberthreats: Are we screwed ?
Cyberthreats: Are we screwed ?
 
Computer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hideComputer Forensics: You can run but you can't hide
Computer Forensics: You can run but you can't hide
 
Sex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadminSex lies and queues: Confessions of an HPC sysadmin
Sex lies and queues: Confessions of an HPC sysadmin
 
Cómo comprar seguro en internet
Cómo comprar seguro en internetCómo comprar seguro en internet
Cómo comprar seguro en internet
 
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
Apple compra Microsoft : Respuesta ante incidentes de seguridad en redes soci...
 
Harry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en WordpressHarry el Sucio te enseña Seguridad en Wordpress
Harry el Sucio te enseña Seguridad en Wordpress
 
Sex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadminSex, lies and magnetic tapes: Confessions of a sysadmin
Sex, lies and magnetic tapes: Confessions of a sysadmin
 
Cibercrimen qué hace tu dinero cuando no lo miras
Cibercrimen   qué hace tu dinero cuando no lo mirasCibercrimen   qué hace tu dinero cuando no lo miras
Cibercrimen qué hace tu dinero cuando no lo miras
 
Administracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadanoAdministracion electronica: Tecnologías al servicio del ciudadano
Administracion electronica: Tecnologías al servicio del ciudadano
 
Solving Big problems with Condor - II HPC Sysadmins Meeting
Solving Big problems with Condor - II HPC Sysadmins MeetingSolving Big problems with Condor - II HPC Sysadmins Meeting
Solving Big problems with Condor - II HPC Sysadmins Meeting
 
Supercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañanaSupercomputación: Haciendo HOY la ciencia del mañana
Supercomputación: Haciendo HOY la ciencia del mañana
 
Historia de la inteligencia china
Historia de la inteligencia chinaHistoria de la inteligencia china
Historia de la inteligencia china
 
Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...Análisis de la capacidad científica, tecnológica e innovadora de la república...
Análisis de la capacidad científica, tecnológica e innovadora de la república...
 
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)Por qué un Pecha Kucha es mejor  que un Iphone (y casi tanto como el chocolate)
Por qué un Pecha Kucha es mejor que un Iphone (y casi tanto como el chocolate)
 
Seguridad en redes sociales
Seguridad en redes socialesSeguridad en redes sociales
Seguridad en redes sociales
 
Capacidades de China para la ciberguerra
Capacidades de China para la ciberguerraCapacidades de China para la ciberguerra
Capacidades de China para la ciberguerra
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 

Último

Último (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

SEA - Syrian Electronic Army - Cyberterrorism

  • 1. SEA (SyrianElectronicArmy) The SEA (Syrian Electronic Army) is an organized group of Syrian computer hackers aligned with the actual regime, using cyber attacks (DDoS, spam and straight hacking) targeting political opposition and Western websites(1). Although not directly related to the Syrian government, they share similar agendas. The SEA has a strong political orientation, its main objective being “to fight those who use the Internet and especially Facebook to “spread hatred” and “destabilize the security” in Syria (2). Terrorist attacks of special interest - AP Hack (23 April 2013): The SEA hijacked the Associated Press Twitter account and falsely claimed the White House had been bombed and President Barack Obama injured. This caused a temporary $136 billion in Dow Jones stock market index (3). - 15 August 2013: Advertising serviceOutbrain was hacked by the SEA. This allowed them to place posts into the websites of The Washington Post, Time, and CNN (4). Terrorist nature and context We first need to try to define what terrorism and cyberterrorism is. If we search Oxford Dictionary : Terrorism –“the unofficial or unauthorized use of violence and intimidation in the pursuit of political aims” (5). Cyberterrorism –“the politically motivated use of computers and information technology to cause severe disruption or widespread fear” (6). As we can see, terrorism and cyberterrorism are quite similar in essence, both focusing in spreading fear with a political aim. Using the revised consensus academic definition on terrorism made by Schmid (7), we see further relations between terrorism and cyberterrorism: fear generating intention, propagandistic agitation by non-state actors in zones of conflict, threat based communication processes, the targeting of civilians, political use and being part of an organized campaign of acts. Cyberterrorism does not intent to cause direct deaths (although one of the main concerns of technical experts is the chance of a cyberterrorist group to successfully attack critical infrastructures of a country like dams, power grids or nuclear plants), but nevertheless is violent in its nature. Its violence is mainly psychological: Through attacks to mass media (like those mentioned above) and a massive use of social networks like Facebook and Twitter, the SEA spreads its propaganda in order to influence public opinion, with the main objective being to force foreign states to accept Al-Assad regime and crushing online the opposition. The SEA has publicly taken credit for these attacks in its own website (solving one of the greatest issues of cyberterrorism, the attribution), and are with no doubt an organized group
  • 2. (divided as they say into battalions). If we refer to the EU Common Position 2001/931/CFSP (8), Article 3 defines what can be considered as a terrorist act, while Article 2 defines a terrorist group. According to Article 3 (iii)(d): “seriously destabilizing or destroying the fundamental political, constitutional, economic or social structures of acountry or an international organization:causing extensive destruction to a Government orpublic facility, a transport system, an infrastructurefacility, including an information system, a fixed platform located on the continental shelf, a public place or private property, likely to endanger human life orresult in major economic loss”. The SEA activities fall perfectly into this article. Several international organizations have watched SEA’s rising with concern, and FBI has put them on a watch list (9), and UK government has several SEA membersassets freezed under finantial sanctions (10) Conclusion Cyberterrorism has several differences with terrorism but its essence is the same: use violence with political intent. And cyberterrorism is a rising tide, with an onerous risk of a successful attack to a critical infrastructure which causes severe human loss, so it just can’t be left aside. The Syrian Electronic Army is a dedicated group that uses cyber attacks to influence public opinion and politicians, following to the letter the"Terrorists want a lot of people watching, not a lot of people dead" cited by Jenkins (11). Although SEA has not commited extremely severe attacks, its potential to cause damage is clear. This is the main reason the EU should mark it as a terrorist group, being the first entity to officially list cyberterrorism as a critical menace and giving its due relevance.
  • 3. Sources (1) Syrian Electronic Army - Homepage http://sea.sy/index/en (2)The Emergence of Open and Organized Pro-Government Cyber Attacks in the Middle East: The Case of the Syrian Electronic Army https://opennet.net/emergence-open-and-organized-pro-government-cyber-attacks-middleeast-case-syrian-electronic-army (3) Washinton Post – Associated Press Hack http://www.washingtonpost.com/blogs/worldviews/wp/2013/04/23/syrian-hackers-claim-aphack-that-tipped-stock-market-by-136-billion-is-it-terrorism/ (4) BBC – Washington Post, CNN and Time websites hit by pro-Assad hackers http://www.bbc.co.uk/news/technology-23712007 (5) Oxford Dictionaries: Definition of terrorism http://oxforddictionaries.com/definition/english/terrorism (6) Oxford dictionaries - Cyberterrorism http://oxforddictionaries.com/definition/english/cyberterrorism (7) Schmid, Alex P. - The Revised Academic Consensus Definition of Terrorism, Perspectives on Terrorism, Vol 6 No 2 (2012) (8)COUNCIL COMMON POSITIONof 27 December 2001on the application of specific measures to combat terrorism http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2001:344:0093:0096:EN:PDF (9) FBI Advisory list- SEA http://publicintelligence.net/fbi-sea/ (10) Consolidated list of financial sanctions targets in the UK https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/227452/00_ syria.pdf (11) Brian Michael Jenkins.Unconquerable Nation: Knowing Our Enemy, Strengthening Ourselves