Pub Date : 2020-01-01DOI: 10.4018/IJHIOT.2018010104
C. Nobles
Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and number of cyber-attack attempts. The shortage of cyber talent is rampant in private entities as in public agencies, which highlights the resolve for entry standards into cybersecurity to enhance the professionalization. Researchers and practitioners provide countless recommendations for ameliorating the cybersecurity workforce by addressing the professionalization issue. Professional associations are the nexus of cybersecurity and possess the expertise, leadership, and sustenance to spearhead efforts to develop national-level strategies to resolve the talent gap and establish professionalization standards.
{"title":"The Cyber Talent Gap and Cybersecurity Professionalizing","authors":"C. Nobles","doi":"10.4018/IJHIOT.2018010104","DOIUrl":"https://doi.org/10.4018/IJHIOT.2018010104","url":null,"abstract":"Two significant issues loom throughout the cybersecurity domain. The first is the shortage of cybersecurity professionals and the second quandary is the lack of minimum entry standards in cybersecurity. Some organizations' cybersecurity operations are suffering due to the cybersecurity talent gap accompanied by the increasing sophistication and number of cyber-attack attempts. The shortage of cyber talent is rampant in private entities as in public agencies, which highlights the resolve for entry standards into cybersecurity to enhance the professionalization. Researchers and practitioners provide countless recommendations for ameliorating the cybersecurity workforce by addressing the professionalization issue. Professional associations are the nexus of cybersecurity and possess the expertise, leadership, and sustenance to spearhead efforts to develop national-level strategies to resolve the talent gap and establish professionalization standards.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"29 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80016652","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-1859-4.CH002
A. Jegede
The rapidity and efficient use of most communication technologies remain the driver of accelerated developments across the major societies of the world today. This is quite exciting when compared to what existed in the past. However, current happenings indicate that the contribution of these technologies to sporadic development of nations is fraught with recordable socio-economic risks whose effect is unprecedented and affecting the nature of trust required for social continuity in human environment. Consequently, this paper considers the nature of risks and vulnerabilities affecting e-connectivity from a modernist theoretical perspective and contextualized this in the double edged implication affecting the use of the Internet. The first section of this paper is devoted to review on the nature of affinity between the Internet and crime while the final section engages the empirical analysis of secondary data on the consequences of cyber-crime to the global economy.
{"title":"Modern Information Technology, Global Risk, and the Challenges of Crime in the Era of Late Modernity","authors":"A. Jegede","doi":"10.4018/978-1-5225-1859-4.CH002","DOIUrl":"https://doi.org/10.4018/978-1-5225-1859-4.CH002","url":null,"abstract":"The rapidity and efficient use of most communication technologies remain the driver of accelerated developments across the major societies of the world today. This is quite exciting when compared to what existed in the past. However, current happenings indicate that the contribution of these technologies to sporadic development of nations is fraught with recordable socio-economic risks whose effect is unprecedented and affecting the nature of trust required for social continuity in human environment. Consequently, this paper considers the nature of risks and vulnerabilities affecting e-connectivity from a modernist theoretical perspective and contextualized this in the double edged implication affecting the use of the Internet. The first section of this paper is devoted to review on the nature of affinity between the Internet and crime while the final section engages the empirical analysis of secondary data on the consequences of cyber-crime to the global economy.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"5 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89287875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-0582-2.CH001
M. Pant
The areas in and around India have always had a close association in building up of events which with time have attained historical and cultural prominence. In this study of cultural association the today's neighboring countries of Pakistan and Afghanistan have served as a passage of the influx of various cultures into the Indian subcontinent. The end of the Cold War highlighted the new threats which had emerged, not bound in the notions of safeguarding the integrity and sovereignty; they were way beyond territorial demarcations. These new threats were transnational in form with a much larger impact on the masses of the state. The rise and fall of Taliban in Afghanistan and the Anti India Islamic forces in Pakistan with the rise of India as a new regional power has led to new perspectives in concerns for the diplomatic and bilateral relations between these countries. What remains to be pointed is the level of porosity of borders and the ancient passes which have been routes for trade and inter cultural affiliations among these countries. The period of 2009-2015 was marked by various incidents which rocked the subcontinent bringing in strategic concerns to a new level. This article would study the historical linkages and cultural affiliations which binds the area of Afghanistan, Pakistan and India into a deeper relationship. Along with dwelling into the political scenario defined by bilateral and diplomatic ties which has taken up an important place in the times of changing perspectives of war and conflict.
{"title":"A Region of Association and Turbulence","authors":"M. Pant","doi":"10.4018/978-1-5225-0582-2.CH001","DOIUrl":"https://doi.org/10.4018/978-1-5225-0582-2.CH001","url":null,"abstract":"The areas in and around India have always had a close association in building up of events which with time have attained historical and cultural prominence. In this study of cultural association the today's neighboring countries of Pakistan and Afghanistan have served as a passage of the influx of various cultures into the Indian subcontinent. The end of the Cold War highlighted the new threats which had emerged, not bound in the notions of safeguarding the integrity and sovereignty; they were way beyond territorial demarcations. These new threats were transnational in form with a much larger impact on the masses of the state. The rise and fall of Taliban in Afghanistan and the Anti India Islamic forces in Pakistan with the rise of India as a new regional power has led to new perspectives in concerns for the diplomatic and bilateral relations between these countries. What remains to be pointed is the level of porosity of borders and the ancient passes which have been routes for trade and inter cultural affiliations among these countries. The period of 2009-2015 was marked by various incidents which rocked the subcontinent bringing in strategic concerns to a new level. This article would study the historical linkages and cultural affiliations which binds the area of Afghanistan, Pakistan and India into a deeper relationship. Along with dwelling into the political scenario defined by bilateral and diplomatic ties which has taken up an important place in the times of changing perspectives of war and conflict.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"75 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90586604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-1829-7.CH004
D. Rawat, Brycent Chatfield
The transformation of the traditional power grid into a cyber physical smart energy grid brings significant improvement in terms of reliability, performance, and manageability. Most importantly, existing communication infrastructures such as LTE represent the backbone of smart grid functionality. Consequently, connected smart grids inherit vulnerabilities associated with the networks including denial of service attack by means of synchronization signal jamming. This chapter presents cybersecurity in cyber-physical energy grid systems to mitigate synchronization signal jamming attacks in LTE based smart grid communications.
{"title":"Detecting Synchronization Signal Jamming Attacks for Cybersecurity in Cyber-Physical Energy Grid Systems","authors":"D. Rawat, Brycent Chatfield","doi":"10.4018/978-1-5225-1829-7.CH004","DOIUrl":"https://doi.org/10.4018/978-1-5225-1829-7.CH004","url":null,"abstract":"The transformation of the traditional power grid into a cyber physical smart energy grid brings significant improvement in terms of reliability, performance, and manageability. Most importantly, existing communication infrastructures such as LTE represent the backbone of smart grid functionality. Consequently, connected smart grids inherit vulnerabilities associated with the networks including denial of service attack by means of synchronization signal jamming. This chapter presents cybersecurity in cyber-physical energy grid systems to mitigate synchronization signal jamming attacks in LTE based smart grid communications.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"56 10 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79900194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-4100-4.CH010
S. Srivastava, S. Dube
This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and life-threatening devastations is ‘Cyberterrorism.' Contrasting to non-lethal terms such as ‘internet vandalism' and ‘hacktivism,' cyberterrorism encompasses a daunting reach to destruction to the fabric of our modern society. Because of its nature, despite its rapid growth, contrary to conventional terror attacks, cyberterrorism still seems distant from creating a direct threat to civilian life and society. Due to this distance, there is a lack of attention and focus on counter mechanisms against cyberterrorism. By applying effective techniques and keeping our eyes open, establishments can go a long way to avert cyberterror attacks and also recover quickly in the occurrence of an attack. The conclusion of this chapter is that additional research is needed to identify the areas in which personal and professional functions on the internet are still vulnerable.
{"title":"Cyberattacks, Cybercrime and Cyberterrorism","authors":"S. Srivastava, S. Dube","doi":"10.4018/978-1-5225-4100-4.CH010","DOIUrl":"https://doi.org/10.4018/978-1-5225-4100-4.CH010","url":null,"abstract":"This chapter describes how with growing reliance of modern society over internet and web-based services in every nook and corner of our daily lives, the threats of disruption and damage to these services has also evolved at a parallel rate. One of these threats having a potential of severe and life-threatening devastations is ‘Cyberterrorism.' Contrasting to non-lethal terms such as ‘internet vandalism' and ‘hacktivism,' cyberterrorism encompasses a daunting reach to destruction to the fabric of our modern society. Because of its nature, despite its rapid growth, contrary to conventional terror attacks, cyberterrorism still seems distant from creating a direct threat to civilian life and society. Due to this distance, there is a lack of attention and focus on counter mechanisms against cyberterrorism. By applying effective techniques and keeping our eyes open, establishments can go a long way to avert cyberterror attacks and also recover quickly in the occurrence of an attack. The conclusion of this chapter is that additional research is needed to identify the areas in which personal and professional functions on the internet are still vulnerable.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"11 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73664585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-5225-0773-4.CH015
A. Mehmood, Syed Hassan Ahmed, M. Sarkar
Like the other emerging technologies such as computer evolution and embedded machines, the Vehicular Ad Hoc Networks (VANETs) have also gained much attention from various manufactures and academia. Moreover, we have several on board sensors installed inside the vehicles, responsible for sensing different activities within the vehicle and surrounding such as temperature, intruder detection and so on. Recently, those sensors/actuator systems became responsive to the physical world by enabling real time control emanating from conventional embedded systems, thus emerging a new research paradigm named Cyber-Physical System (CPS). Likewise, other applications for CPS, we have Vehicular Cyber-Physical System (VCPS) that is not a new concept. For now, VCPS may refer to a wide range of transportation management system that is integrated strongly and should be highly accurate, real-time, and efficient. This chapter provides readers with the details of the term “VCPS” followed by the historical overview of this new emerging field including research challenges and future aspects of the VCPS.
{"title":"Cyber-Physical Systems in Vehicular Communications","authors":"A. Mehmood, Syed Hassan Ahmed, M. Sarkar","doi":"10.4018/978-1-5225-0773-4.CH015","DOIUrl":"https://doi.org/10.4018/978-1-5225-0773-4.CH015","url":null,"abstract":"Like the other emerging technologies such as computer evolution and embedded machines, the Vehicular Ad Hoc Networks (VANETs) have also gained much attention from various manufactures and academia. Moreover, we have several on board sensors installed inside the vehicles, responsible for sensing different activities within the vehicle and surrounding such as temperature, intruder detection and so on. Recently, those sensors/actuator systems became responsive to the physical world by enabling real time control emanating from conventional embedded systems, thus emerging a new research paradigm named Cyber-Physical System (CPS). Likewise, other applications for CPS, we have Vehicular Cyber-Physical System (VCPS) that is not a new concept. For now, VCPS may refer to a wide range of transportation management system that is integrated strongly and should be highly accurate, real-time, and efficient. This chapter provides readers with the details of the term “VCPS” followed by the historical overview of this new emerging field including research challenges and future aspects of the VCPS.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82342013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch073
P. Tarlow
A short time after the January 2015 Paris attacks, the city was quiet, perhaps too quiet. Associated press reporters noted that the tourists have simply gone. In a mid –January news article by Thomas Adamson perhaps summed up the situation best when it stated: “Among the tourists who were still braving visits, many took comfort in the extra security presences. With 10,000 troops deployed across the country including 6,000 in the Paris region alone, the security operation put in motion after the attacks is the most extensive in French soil in recent history The (Bryan Texas) Eagle, page A-3, January 19, 2015). The dearth of tourists however was short lived, as the French were able to assure the world that they had taken full control of the situation, employed some ten thousand troops to sensitive locales, and have given the impression that the terrorist attacks were an anomaly. The terrorism attacks in many parts of Europe remind us that terrorism is as much about purposeful negative marketing as it is about death and destruction.
{"title":"Tourism, Terrorism, Morality, and Marketing","authors":"P. Tarlow","doi":"10.4018/978-1-7998-2466-4.ch073","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch073","url":null,"abstract":"A short time after the January 2015 Paris attacks, the city was quiet, perhaps too quiet. Associated press reporters noted that the tourists have simply gone. In a mid –January news article by Thomas Adamson perhaps summed up the situation best when it stated: “Among the tourists who were still braving visits, many took comfort in the extra security presences. With 10,000 troops deployed across the country including 6,000 in the Paris region alone, the security operation put in motion after the attacks is the most extensive in French soil in recent history The (Bryan Texas) Eagle, page A-3, January 19, 2015). The dearth of tourists however was short lived, as the French were able to assure the world that they had taken full control of the situation, employed some ten thousand troops to sensitive locales, and have given the impression that the terrorist attacks were an anomaly. The terrorism attacks in many parts of Europe remind us that terrorism is as much about purposeful negative marketing as it is about death and destruction.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"33 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"75197102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch068
B. Gupta, Alisha Gupta
Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and protecting the real system. In this article, a recent survey on Honeypots is presented, its deployment in smartphone scenarios, its usage to curb Distributed Denial of Service attacks in variegated frameworks including Cloud environments, copious datasets and open source. Also described are the types Honeypots available, their various security problems, and existing solutions. Furthermore, there is light shed on disparate issues and the challenges in the existing solutions and scope of further research.
{"title":"Assessment of Honeypots","authors":"B. Gupta, Alisha Gupta","doi":"10.4018/978-1-7998-2466-4.ch068","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch068","url":null,"abstract":"Honeypots act as an easy target for attackers but it is actually a “decoy” in which attacker is trapped. It is a defensive technique which lures the attacker into performing some illicit operations on it and subsequently using it to trace the activities of attacker, generating signatures and protecting the real system. In this article, a recent survey on Honeypots is presented, its deployment in smartphone scenarios, its usage to curb Distributed Denial of Service attacks in variegated frameworks including Cloud environments, copious datasets and open source. Also described are the types Honeypots available, their various security problems, and existing solutions. Furthermore, there is light shed on disparate issues and the challenges in the existing solutions and scope of further research.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"30 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90975688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch002
M. Korstanje
The present essay review explores the problem of terrorism and security in tourism fields. Certainly, plans and policies provided by guide-books are not being followed in disaster-contests simply chaos and disorder are the nature of emergencies. Beyond any protocol, crises and security are not properly defined by scholars. In this essay-review, we will not pay attention to define what tourism security means, lest by the lens of three senior scholars, Sevil Somnez, Abraham Pizam and Peter Tarlow, who have accomplished this task. They have explored not only the roots of terrorism but security over 20 years. Despite the criticism, they deserve recognition for this legacy. Based on substantial point of divergence, these specialists are concerned by the financial dependency of societies respecting to mass-media and its coverage of terrorist attacks.
{"title":"Introduction to Tourism Security","authors":"M. Korstanje","doi":"10.4018/978-1-7998-2466-4.ch002","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch002","url":null,"abstract":"The present essay review explores the problem of terrorism and security in tourism fields. Certainly, plans and policies provided by guide-books are not being followed in disaster-contests simply chaos and disorder are the nature of emergencies. Beyond any protocol, crises and security are not properly defined by scholars. In this essay-review, we will not pay attention to define what tourism security means, lest by the lens of three senior scholars, Sevil Somnez, Abraham Pizam and Peter Tarlow, who have accomplished this task. They have explored not only the roots of terrorism but security over 20 years. Despite the criticism, they deserve recognition for this legacy. Based on substantial point of divergence, these specialists are concerned by the financial dependency of societies respecting to mass-media and its coverage of terrorist attacks.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"37 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84500337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-01-01DOI: 10.4018/978-1-7998-2466-4.ch061
M. Hotchkiss
The Cold-War era English-language promoters of Nostradamus (Orson Welles and Erika Cheetham) had strong Leftist-Marxist connections including ties to the Cambridge 5 spy ring. Nostradamus was the top search anomaly of Sept 11, 2001. Interest was driven by a surge in emails and text messages via the internet. This behavior is discussed in relation to known cyber threats from 2001. Similar spikes in Nostradamus searches (Google Trends) emanated from Poland (April 2010), Ukraine (March 2014), and in Hungary (August 2015). Nostradamus mirrors proven Russian disinformation operations, such as those that today implicate 9/11 as being an “inside job” by the US government, or that the CIA killed JFK, or that the CIA engineered the AIDS virus. Noting the use of Nostradamus by both the Allies and the Axis powers as a psychological warfare tool in World War 2, the case is made that it was the Russians carrying out an “information attack” on 9/11 that is consistent with Russian cyber warfare and active measures strategy and that they may have used similar techniques elsewhere since 2001.
{"title":"Russian Active Measures and September 11, 2001","authors":"M. Hotchkiss","doi":"10.4018/978-1-7998-2466-4.ch061","DOIUrl":"https://doi.org/10.4018/978-1-7998-2466-4.ch061","url":null,"abstract":"The Cold-War era English-language promoters of Nostradamus (Orson Welles and Erika Cheetham) had strong Leftist-Marxist connections including ties to the Cambridge 5 spy ring. Nostradamus was the top search anomaly of Sept 11, 2001. Interest was driven by a surge in emails and text messages via the internet. This behavior is discussed in relation to known cyber threats from 2001. Similar spikes in Nostradamus searches (Google Trends) emanated from Poland (April 2010), Ukraine (March 2014), and in Hungary (August 2015). Nostradamus mirrors proven Russian disinformation operations, such as those that today implicate 9/11 as being an “inside job” by the US government, or that the CIA killed JFK, or that the CIA engineered the AIDS virus. Noting the use of Nostradamus by both the Allies and the Axis powers as a psychological warfare tool in World War 2, the case is made that it was the Russians carrying out an “information attack” on 9/11 that is consistent with Russian cyber warfare and active measures strategy and that they may have used similar techniques elsewhere since 2001.","PeriodicalId":41462,"journal":{"name":"International Journal of Cyber Warfare and Terrorism","volume":"48 2 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84924166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}