Cyberterrorism is the use of the Internet
 to conduct violent acts that result in, or threaten, loss of life or 
significant bodily harm, in order to achieve political or ideological 
gains through threat or intimidation. It is also sometimes considered an act of Internet terrorism where terrorist
 activities, including acts of deliberate, large-scale disruption of 
computer networks, especially of personal computers attached to the 
Internet by means of tools such as computer viruses, computer worms, phishing, and other malicious software and hardware methods and programming scripts.
Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.
Cyberterrorism can be also defined as the intentional use of computers, networks, and public internet to cause destruction and harm for personal objectives. Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive damage to government systems, hospital records, and national security programs, which might leave a country, community or organization in turmoil and in fear of further attacks. The objectives of such terrorists may be political or ideological since this can be considered a form of terror.
There is much concern from government and media sources about potential damage that could be caused by cyberterrorism, and this has prompted efforts by government agencies such as the Federal Bureau of Investigations (FBI) and the Central Intelligence Agency (CIA) to put an end to cyber attacks and cyberterrorism.
There have been several major and minor instances of cyberterrorism. Al-Qaeda utilized the internet to communicate with supporters and even to recruit new members.[5] Estonia, a Baltic country which is constantly evolving in terms of technology, became a battleground for cyberterror in April, 2007 after disputes regarding the removal of a WWII soviet statue located in Estonia's capital Tallinn.
Cyberterrorism is a controversial term. Some authors opt for a very narrow definition, relating to deployment by known terrorist organizations of disruption attacks against information systems for the primary purpose of creating alarm, panic, or physical disruption. Other authors prefer a broader definition, which includes cybercrime. Participating in a cyberattack affects the terror threat perception, even if it isn't done with a violent approach. By some definitions, it might be difficult to distinguish which instances of online activities are cyberterrorism or cybercrime.
Cyberterrorism can be also defined as the intentional use of computers, networks, and public internet to cause destruction and harm for personal objectives. Experienced cyberterrorists, who are very skilled in terms of hacking can cause massive damage to government systems, hospital records, and national security programs, which might leave a country, community or organization in turmoil and in fear of further attacks. The objectives of such terrorists may be political or ideological since this can be considered a form of terror.
There is much concern from government and media sources about potential damage that could be caused by cyberterrorism, and this has prompted efforts by government agencies such as the Federal Bureau of Investigations (FBI) and the Central Intelligence Agency (CIA) to put an end to cyber attacks and cyberterrorism.
There have been several major and minor instances of cyberterrorism. Al-Qaeda utilized the internet to communicate with supporters and even to recruit new members.[5] Estonia, a Baltic country which is constantly evolving in terms of technology, became a battleground for cyberterror in April, 2007 after disputes regarding the removal of a WWII soviet statue located in Estonia's capital Tallinn.
Overview
There is debate over the basic definition of the scope of 
cyberterrorism. These definitions can be narrow such as the use of 
Internet to attack other systems in the Internet that result to violence
 against persons or property.
 They can also be broad, those that include any form  of Internetusage 
by terrorists ro conventional attacks on information technology 
infrastructures.
 There is variation in qualification by motivation, targets, methods, 
and centrality of computer use in the act. U.S. government agencies also
 use varying definitions and that none of these have so far attempted to
 introduce a standard that is binding outside of their sphere of 
influence.
Depending on context, cyberterrorism may overlap considerably with cybercrime, cyberwar or ordinary terrorism. Eugene Kaspersky, founder of Kaspersky Lab, now feels that "cyberterrorism" is a more accurate term than "cyberwar".
 He states that "with today's attacks, you are clueless about who did it
 or when they will strike again. It's not cyber-war, but 
cyberterrorism." He also equates large-scale cyber weapons, such as the Flame Virus and NetTraveler Virus which his company discovered, to biological weapons, claiming that in an interconnected world, they have the potential to be equally destructive.
If cyberterrorism is treated similarly to traditional terrorism,
 then it only includes attacks that threaten property or lives, and can 
be defined as the leveraging of a target's computers and information, 
particularly via the Internet, to cause physical, real-world harm or severe disruption of infrastructure.
Many academics and researchers who specialize in terrorism 
studies suggest that cyberterrorism does not exist and is really a 
matter of hacking or information warfare.
  They disagree with labeling it as terrorism because of the 
unlikelihood of the creation of fear, significant physical harm, or 
death in a population using electronic means, considering current attack
 and protective technologies.
If death or physical damage that could cause human harm is 
considered a necessary part of the cyberterrorism definition, then there
 have been few identifiable incidents of cyberterrorism, although there 
has been much policy research and public concern. Modern terrorism and 
political violence is not easily defined, however, and some scholars 
assert that it is now "unbounded" and not exclusively concerned with 
physical damage 
There is an old saying that death or loss of property are the 
side products of terrorism, the main purpose of such incidents is to create terror in peoples' minds and harm bystanders. If any incident in cyberspace can create terror, it may be rightly called cyberterrorism. For those affected by such acts, the fears of cyberterrorism are quite real.
As with cybercrime
 in general, the threshold of required knowledge and skills to 
perpetrate acts of cyberterror has been steadily diminishing thanks to 
freely available hacking suites and online courses.
  Additionally, the physical and virtual worlds are merging at an 
accelerated rate, making for many more targets of opportunity which is 
evidenced by such notable cyber attacks as Stuxnet, the Saudi petrochemical sabotage attempt in 2018 and others.
Defining cyberterrorism
Assigning
 a concrete definition to cyberterrorism can be hard, due to the 
difficulty of defining the term terrorism itself. Multiple organizations
 have created their own definitions, most of which are overly broad. There is also controversy concerning overuse of the term, hyperbole in the media and by security vendors trying to sell "solutions".
One way of understanding cyberterrorism involves the idea that 
terrorists could cause massive loss of life, worldwide economic chaos 
and environmental damage by hacking into critical infrastructure 
systems. The nature of cyberterrorism covers conduct involving computer or Internet technology that:
- is motivated by a political, religious or ideological cause
 - is intended to intimidate a government or a section of the public to varying degrees
 - seriously interferes with infrastructure
 
The term "cyberterrorism" can be used in a variety of different ways, but there are limits to its use. An attack on an Internet business can be labeled cyberterrorism, however when it is done for economic motivations rather than ideological it is typically regarded as cybercrime. Convention also limits the label "cyberterrorism" to actions by individuals, independent groups, or organizations. Any form of cyberwarfare conducted by governments and states would be regulated and punishable under international law.
The Technolytics Institute defines cyberterrorism as 
"[t]he premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives. Or to intimidate any person in furtherance of such objectives."
 The term appears first in defense literature, surfacing (as "cyber-terrorism") in reports by the U.S. Army War College as early as 1998.
The National Conference of State Legislatures, an organization of legislators created to help policymakers in the United States of America with issues such as economy and homeland security defines cyberterrorism as:
[T]he use of information technology by terrorist groups and individuals to further their agenda. This can include use of information technology to organize and execute attacks against networks, computer systems and telecommunications infrastructures, or for exchanging information or making threats electronically. Examples are hacking into computer systems, introducing viruses to vulnerable networks, web site defacing, Denial-of-service attacks, or terroristic threats made via electronic communication.
NATO 
defines cyberterrorism as "[a] cyberattack using or exploiting computer 
or communication networks to cause sufficient destruction or disruption 
to generate fear or to intimidate a society into an ideological goal".
The United States National Infrastructure Protection Center defined cyberterrorism as: 
A criminal act perpetrated by the use of computers and telecommunications capabilities resulting in violence, destruction, and/or disruption of services to create fear by causing confusion and uncertainty within a given population, with the goal of influencing a government or population to conform to a political, social, or ideological agenda.
The FBI, another United States agency, defines "cyber terrorism" as 
“premeditated, politically motivated attack against information, 
computer systems, computer programs, and data which results in violence 
against non-combatant targets by subnational groups or clandestine 
agents”.
These definitions tend to share the view of cyberterrorism as 
politically and/or ideologically inclined.  One area of debate is the 
difference between cyberterrorism and hacktivism. Hacktivism is ”the marriage of hacking with political activism”.
 Both actions are politically driven and involve using computers, 
however cyberterrorism is primarily used to cause harm. It becomes an 
issue because acts of violence on the computer can be labeled either cyberterrorism or hacktivism.
Types of cyberterror capability
The following three levels of cyberterror capability are defined by Monterey group
- Simple-Unstructured: The capability to conduct basic hacks against individual systems using tools created by someone else. The organization possesses little target analysis, command, and control, or learning capability.
 - Advanced-Structured: The capability to conduct more sophisticated attacks against multiple systems or networks and possibly, to modify or create basic hacking tools. The organization possesses an elementary target analysis, command and control, and learning capability.
 - Complex-Coordinated: The capability for a coordinated attack capable of causing mass-disruption against integrated, heterogeneous defenses (including cryptography). Ability to create sophisticated hacking tools. Highly capable target analysis, command, and control, and organization learning capability.
 
Concerns
Cyberterrorism is becoming more and more prominent on social media today. As the Internet becomes more pervasive in all areas of human endeavor, individuals or groups can use the anonymity afforded by cyberspace
 to threaten citizens, specific groups (i.e. with membership based on 
ethnicity or belief), communities and entire countries, without the 
inherent threat of capture, injury, or death to the attacker that being 
physically present would bring.
Many groups such as Anonymous, use tools such as denial-of-service attack to attack and censor groups who oppose them, creating many concerns for freedom and respect for differences of thought. 
Many believe that cyberterrorism is an extreme threat to 
countries' economies, and fear an attack could potentially lead to 
another Great Depression. Several leaders agree that cyberterrorism has 
the highest percentage of threat over other possible attacks on U.S. 
territory. Although natural disasters are considered a top threat and 
have proven to be devastating to people and land, there is ultimately 
little that can be done to prevent such events from happening. Thus, the
 expectation is to focus more on preventative measures that will make 
Internet attacks impossible for execution.
As the Internet continues to expand, and computer systems 
continue to be assigned increased responsibility while becoming more 
complex and interdependent, sabotage or terrorism via the Internet may 
become a more serious threat and is possibly one of the top 10 events to
 "end the human race."
 People have much easier access to illegal involvement within the 
cyberspace by the ability to access a part of the internet known as the 
Dark Web.
 The Internet of Things promises to further merge the virtual and 
physical worlds, which some experts see as a powerful incentive for 
states to use terrorist proxies in furtherance of objectives.
Dependence on the internet is rapidly increasing on a worldwide 
scale, creating a platform for international cyber terror plots to be 
formulated and executed as a direct threat to national security.
 For terrorists, cyber-based attacks have distinct advantages over 
physical attacks. They can be conducted remotely, anonymously, and 
relatively cheaply, and they do not require significant investment in 
weapons, explosive and personnel. The effects can be widespread and 
profound. Incidents of cyberterrorism are likely to increase. They will 
be conducted through denial of service attacks, malware, and other 
methods that are difficult to envision today.
 One example involves the deaths involving the Islamic State and the 
online social networks Twitter, Google, and Facebook lead to legal 
action being taken against them, that ultimately resulted in them being 
sued.
In an article about cyber attacks by Iran and North Korea, The New York Times
 observes, "The appeal of digital weapons is similar to that of nuclear 
capability: it is a way for an outgunned, outfinanced nation to even the
 playing field. 'These countries are pursuing cyberweapons the same way 
they are pursuing nuclear weapons,' said James A. Lewis, a computer 
security expert at the Center for Strategic and International Studies in Washington. 'It's primitive; it's not top of the line, but it's good enough and they are committed to getting it.'"
History
Public interest in cyberterrorism began in the late 1990s, when the term was coined by Barry C. Collin.[35] As 2000 approached, the fear and uncertainty about the millennium bug
 heightened, as did the potential for attacks by cyber terrorists. 
Although the millennium bug was by no means a terrorist attack or plot 
against the world or the United States, it did act as a catalyst in 
sparking the fears of a possibly large-scale devastating cyber-attack. 
Commentators noted that many of the facts of such incidents seemed to 
change, often with exaggerated media reports.
The high-profile terrorist attacks in the United States on September 11, 2001 and the ensuing War on Terror
 by the US led to further media coverage of the potential threats of 
cyberterrorism in the years following. Mainstream media coverage often 
discusses the possibility of a large attack making use of computer 
networks to sabotage critical infrastructures with the aim of putting 
human lives in jeopardy or causing disruption on a national scale either
 directly or by disruption of the national economy.
Authors such as Winn Schwartau and John Arquilla
 are reported to have had considerable financial success selling books 
which described what were purported to be plausible scenarios of mayhem 
caused by cyberterrorism. Many critics claim that these books were 
unrealistic in their assessments of whether the attacks described (such 
as nuclear meltdowns and chemical plant explosions) were possible. A 
common thread throughout what critics perceive as cyberterror-hype is 
that of non-falsifiability;
 that is, when the predicted disasters fail to occur, it only goes to 
show how lucky we've been so far, rather than impugning the theory. 
In 2016, for the first time ever, the Department of Justice 
charged Ardit Ferizi with cyberterrorism. He is accused of allegedly 
hacking into a military website and stealing the names, addresses, and 
other personal information of government and military personnel and 
selling it to ISIS.
On the other hand, it is also argued that, despite substantial 
studies on cyberterrorism, the body of literature is still unable to 
present a realistic estimate of the actual threat.
 For instance, in the case of a cyberterrorist attack on a public 
infrastructure such as a power plant or air traffic control through 
hacking, there is uncertainty as to its success because data concerning 
such phenomena are limited.
International attacks and response
Conventions
As
 of 2016 there have been seventeen conventions and major legal 
instruments that specifically deal with terrorist activities and can 
also be applied to cyber terrorism. 
- 1963: Convention on Offences and Certain Other Acts Committed on Board Aircraft
 - 1970: Convention for the Suppression of Unlawful Seizure of Aircraft
 - 1971: Convention for the Suppression of Unlawful Acts Against the Safety of Civil Aviation
 - 1973: Convention on the Prevention and Punishment of Crimes against Internationally Protected Persons
 - 1979: International Convention against the Taking of Hostages
 - 1980: Convention on the Physical Protection of Nuclear Material
 - 1988: Protocol for the Suppression of Unlawful Acts of Violence at Airports Serving International Civil Aviation
 - 1988: Protocol for the Suppression of Unlawful Acts against the Safety of Fixed Platforms Located on the Continental Shelf
 - 1988: Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation
 - 1989: Supplementary to the Convention for the Suppression of Unlawful Acts against the Safety of Civil Aviation
 - 1991: Convention on the Marking of Plastic Explosives for the Purpose of Detection
 - 1997: International Convention for the Suppression of Terrorist Bombings
 - 1999: International Convention for the Suppression of the Financing of Terrorism
 - 2005: Protocol to the Convention for the Suppression of Unlawful Acts against the Safety of Maritime Navigation
 - 2005: International Convention for the Suppression of Acts of Nuclear Terrorism
 - 2010: Protocol Supplementary to the Convention for the Suppression of Unlawful Seizure of Aircraft
 - 2010: Convention on the Suppression of Unlawful Acts Relating to International Civil Aviation
 
Motivations for cyberattacks
There
 are many different motives for cyberattacks, with the majority being 
for financial reasons. However, there is increasing evidence that 
hackers are becoming more politically motivated. Cyberterrorists are 
aware that governments are reliant on the internet and have exploited 
this as a result. For example, Mohammad Bin Ahmad As-Sālim's piece '39 
Ways to Serve and Participate in Jihad' discusses how an electronic 
jihad could disrupt the West through targeted hacks of American 
websites, and other resources seen as anti-Jihad, modernist, or secular 
in orientation (Denning, 2010; Leyden, 2007).
International institutions
As of 2016 the United Nations only has one agency that specializes in cyberterrorism, the International Telecommunications Union.
U.S. military/protections against cyberterrorism
The US Department of Defense (DoD) charged the United States Strategic Command with the duty of combating cyberterrorism. This is accomplished through the Joint Task Force-Global Network Operations, which is the operational component supporting USSTRATCOM in defense of the DoD's Global Information Grid. This is done by integrating GNO
 capabilities into the operations of all DoD computers, networks, and 
systems used by DoD combatant commands, services and agencies.
On November 2, 2006, the Secretary of the Air Force announced the creation of the Air Force's newest MAJCOM, the Air Force Cyber Command, which would be tasked to monitor and defend American interest in cyberspace. The plan was however replaced by the creation of Twenty-Fourth Air Force which became active in August 2009 and would be a component of the planned United States Cyber Command.
On December 22, 2009, the White House named its head of computer security as Howard Schmidt to coordinate U.S Government, military and intelligence efforts to repel hackers. He left the position in May, 2012. Michael Daniel was appointed to the position of White House Coordinator of Cyber Security the same week and continues in the position during the second term of the Obama administration.
More recently, Obama signed an executive order to enable the US 
to impose sanctions on either individuals or entities that are suspected
 to be participating in cyber related acts. These acts were assessed to 
be possible threats to US national security, financial issues or foreign
 policy issues. U.S. authorities indicted a man over 92 cyberterrorism hacks attacks on computers used by the Department of Defense. A Nebraska-based consortium apprehended four million hacking attempts in the course of eight weeks. In 2011 cyberterrorism attacks grew 20%.
Estonia and NATO
The Baltic state of Estonia was the target of a massive denial-of-service
 attack that ultimately rendered the country offline and shut out from 
services dependent on Internet connectivity in April 2007. The 
infrastructure of Estonia including everything from online banking and 
mobile phone networks to government services and access to health care 
information was disabled for a time. The tech-dependent state 
experienced severe turmoil and there was a great deal of concern over 
the nature and intent of the attack. 
The cyber attack was a result of an Estonian-Russian dispute over
 the removal of a bronze statue depicting a World War II-era Soviet 
soldier from the center of the capital, Tallinn.
 In the midst of the armed conflict with Russia, Georgia likewise was 
subject to sustained and coordinated attacks on its electronic 
infrastructure in August 2008. In both of these cases, circumstantial 
evidence point to coordinated Russian attacks, but attribution of the 
attacks is difficult; though both the countries blame Moscow for 
contributing to the cyber attacks, proof establishing legal culpability 
is lacking. 
Estonia joined NATO in 2004, which prompted NATO to carefully 
monitor its member state's response to the attack. NATO also feared 
escalation and the possibility of cascading effects beyond Estonia's 
border to other NATO members. In 2008, directly as a result of the 
attacks, NATO opened a new center of excellence on cyberdefense to 
conduct research and training on cyber warfare in Tallinn.
The chaos resulting from the attacks in Estonia illustrated to 
the world the dependence countries had on information technology. This 
dependence then makes countries vulnerable to future cyber attacks and 
terrorism.
Republic of Korea
According to 2016 Deloitte Asia-Pacific Defense Outlook,
 South Korea's 'Cyber Risk Score' was 884 out of 1,000 and South Korea 
is found to be the most vulnerable country to cyber attacks in the 
Asia-Pacific region. Considering South Korea's high speed internet and 
cutting edge technology, its cyber security infrastructure is relatively
 weak. The 2013 South Korea cyberattack significantly damaged the Korean economy. In 2017, a ransomware
 attack harassed private companies and users, who experienced personal 
information leakage. Additionally, there were North Korea's cyber 
attacks which risked national security of South Korea.
In response to this, South Korean government's countermeasure is 
to protect the information security centres the National Intelligence 
Agency. Currently, 'cyber security' is one of the major goals of NIS 
Korea.
 Since 2013, South Korea had established policies related to National 
cyber security and trying to prevent cyber crises via sophisticated 
investigation on potential threats. Meanwhile, scholars emphasise on 
improving the national consciousness towards cyber attacks as South 
Korea had already entered the so-called 'hyper connected society'.
China
The Chinese
 Defense Ministry confirmed the existence of an online defense unit in 
May 2011. Composed of about thirty elite internet specialists, the 
so-called "Cyber Blue Team", or "Blue Army", is officially claimed to be
 engaged in cyber-defense operations, though there are fears the unit 
has been used to penetrate secure online systems of foreign governments.
Pakistan
Pakistani Government has also taken steps to curb the menace of cyberterrorism and extremist propaganda. National Counter Terrorism Authority (Nacta) is working on joint programs with different NGOs and other cyber security organizations in Pakistan to combat this problem. Surf Safe Pakistan
 is one such example. Now people in Pakistan can report extremist and 
terrorist related content online on Surf Safe Pakistan portal. The 
National Counter Terrorism Authority (NACTA) provides the Federal 
Government's leadership for the Surf Safe Campaign. In March 2008 an al 
Qaeda forum posted a training website with six training modules to learn
 cyberterrorism techniques.
Ukraine
A series of powerful cyber attacks
 began 27 June 2017 that swamped websites of Ukrainian organizations, 
including banks, ministries, newspapers and electricity firms.
Examples
An 
operation can be done by anyone anywhere in the world, for it can be 
performed thousands of miles away from a target. An attack can cause 
serious damage to a critical infrastructure which may result in 
casualties.
Some attacks are conducted in furtherance of political and social objectives, as the following examples illustrate:
- In 1996, a computer hacker allegedly associated with the White Supremacist movement temporarily disabled a Massachusetts ISP and damaged part of the ISP's record keeping system. The ISP had attempted to stop the hacker from sending out worldwide racist messages under the ISP's name. The hacker signed off with the threat: "you have yet to see true electronic terrorism. This is a promise."
 - In 1998, Spanish protesters bombarded the Institute for Global Communications (IGC) with thousands of bogus e-mail messages. E-mail was tied up and undeliverable to the ISP's users, and support lines were tied up with people who couldn't get their mail. The protestors also spammed IGC staff and member accounts, clogged their Web page with bogus credit card orders, and threatened to employ the same tactics against organizations using IGC services. They demanded that IGC stop hosting the Web site for the Euskal Herria Journal, a New York-based publication supporting Basque independence. Protestors said IGC supported terrorism because a section on the Web pages contained materials on the terrorist group ETA, which claimed responsibility for assassinations of Spanish political and security officials, and attacks on military installations. IGC finally relented and pulled the site because of the "mail bombings."
 - In 1998, ethnic Tamil guerrillas attempted to disrupt Sri Lankan embassies by sending large volumes of e-mail. The embassies received 800 e-mails a day over a two-week period. The messages read "We are the Internet Black Tigers and we're doing this to disrupt your communications." Intelligence authorities characterized it as the first known attack by terrorists against a country's computer systems.
 - During the Kosovo conflict in 1999, NATO computers were blasted with e-mail bombs and hit with denial-of-service attacks by hacktivists protesting the NATO bombings. In addition, businesses, public organizations and academic institutes received highly politicized virus-laden e-mails from a range of Eastern European countries, according to reports. Web defacements were also common. After the Chinese Embassy was accidentally bombed in Belgrade, Chinese hacktivists posted messages such as "We won't stop attacking until the war stops!" on U.S. government Web sites.
 - Since December 1997, the Electronic Disturbance Theater (EDT) has been conducting Web sit-ins against various sites in support of the Mexican Zapatistas. At a designated time, thousands of protestors point their browsers to a target site using software that floods the target with rapid and repeated download requests. EDT's software has also been used by animal rights groups against organizations said to abuse animals. Electrohippies, another group of hacktivists, conducted Web sit-ins against the WTO when they met in Seattle in late 1999. These sit-ins all require mass participation to have much effect, and thus are more suited to use by activists than by terrorists.
 - In 2000, a Japanese investigation revealed that the government was using software developed by computer companies affiliated with Aum Shinrikyo, the doomsday sect responsible for the sarin gas attack on the Tokyo subway system in 1995. "The government found 100 types of software programs used by at least 10 Japanese government agencies, including the Defense Ministry, and more than 80 major Japanese companies, including Nippon Telegraph and Telephone." Following the discovery, the Japanese government suspended use of Aum-developed programs out of concern that Aum-related companies may have compromised security by breaching firewalls. gaining access to sensitive systems or information, allowing invasion by outsiders, planting viruses that could be set off later, or planting malicious code that could cripple computer systems and key data system.
 - In March 2013, The New York Times reported on a pattern of cyber attacks against U.S. financial institutions believed to be instigated by Iran as well as incidents affecting South Korean financial institutions that originate with the North Korean government.
 - In August 2013, media companies including The New York Times, Twitter and the Huffington Post lost control of some of their websites after hackers supporting the Syrian
 government breached the Australian Internet company that manages many 
major site addresses. The Syrian Electronic Army, a hacker group that 
has previously attacked media organisations that it considers hostile to
 the regime of Syrian president Bashar al-Assad, claimed credit for the 
Twitter and Huffington Post hacks in a series of Twitter messages. 
Electronic records showed that NYTimes.com, the only site with an 
hours-long outage, redirected visitors to a server controlled by the 
Syrian group before it went dark.
 
- The website of Air Botswana, defaced by a group calling themselves the "Pakistan Cyber Army"
 - Pakistani Cyber Army is the name taken by a group of hackers who are known for their defacement of websites, particularly Indian, Chinese, and Israeli companies and governmental organizations, claiming to represent Pakistani nationalist and Islamic interests. The group is thought to have been active since at least 2008, and maintains an active presence on social media, especially Facebook. Its members have claimed responsibility for the hijacking of websites belonging to Acer, BSNL, India's CBI, Central Bank, and the State Government of Kerala.
 - British hacker Kane Gamble, sentenced to 2 years in youth detention, posed as CIA chief to access highly sensitive information. He also "cyber-terrorized" high-profile U.S. intelligence officials such as then CIA chief John Brennan or Director of National Intelligence James Clapper. The judge said Gamble engaged in "politically motivated cyber terrorism."
 
Sabotage
Non-political acts of sabotage
 have caused financial and other damage. In 2000, disgruntled employee 
Vitek Boden caused the release of 800,000 litres of untreated sewage 
into waterways in Maroochy Shire, Australia.
More recently, in May 2007 Estonia was subjected to a mass cyber-attack in the wake of the removal of a Russian World War II war memorial from downtown Tallinn. The attack was a distributed denial-of-service attack
 in which selected sites were bombarded with traffic to force them 
offline; nearly all Estonian government ministry networks as well as two
 major Estonian bank networks were knocked offline; in addition, the 
political party website of Estonia's Prime Minister Andrus Ansip 
featured a counterfeit letter of apology from Ansip for removing the 
memorial statue. Despite speculation that the attack had been 
coordinated by the Russian government, Estonia's defense minister 
admitted he had no conclusive evidence linking cyber attacks to Russian 
authorities. Russia called accusations of its involvement "unfounded", 
and neither NATO nor European Commission experts were able to find any conclusive proof of official Russian government participation.  In January 2008 a man from Estonia was convicted for launching the attacks against the Estonian Reform Party website and fined.
During the Russia-Georgia War, on 5 August 2008, three days before Georgia launched its invasion of South Ossetia, the websites for OSInform News Agency and OSRadio were hacked. The OSinform website at osinform.ru kept its header and logo, but its content was replaced by a feed to the Alania TV
 website content. Alania TV, a Georgian government-supported television 
station aimed at audiences in South Ossetia, denied any involvement in 
the hacking of the websites. Dmitry Medoyev, at the time the South Ossetian envoy to Moscow, claimed that Georgia was attempting to cover up information on events which occurred in the lead-up to the war.  One such cyber attack caused the Parliament of Georgia and Georgian Ministry of Foreign Affairs websites to be replaced by images comparing Georgian president Mikheil Saakashvili to Adolf Hitler.
Other attacks involved denials of service to numerous Georgian and Azerbaijani websites, such as when Russian hackers allegedly disabled the servers of the Azerbaijani Day.Az news agency.
In June 2019, Russia has conceded that it is "possible" its electrical grid is under cyber-attack by the United States. The New York Times reported that American hackers from the United States Cyber Command planted malware potentially capable of disrupting the Russian electrical grid.
Website defacement and denial of service
Even more recently, in October 2007, the website of Ukrainian president Viktor Yushchenko was attacked by hackers. A radical Russian nationalist youth group, the Eurasian Youth Movement, claimed responsibility.
In 1999 hackers attacked NATO computers. The computers flooded them with email and hit them with a denial-of-service attack. The hackers were protesting against the NATO bombings of the Chinese embassy
 in Belgrade. Businesses, public organizations and academic institutions
 were bombarded with highly politicized emails containing viruses from 
other European countries.
In December 2018, Twitter warned of "unusual activity" from China and Saudi Arabia.
 A bug was detected in November that could have revealed the country 
code of users' phone numbers. Twitter said the bug could have had ties 
to "state-sponsored actors".