. Military Space News .




.
CYBER WARS
Terrorists yet to turn to cyberattacks
by Austin B. Smith | Laurenne Wallman, Medill News Service
Washington (UPI) Oct 11, 2011

disclaimer: image is for illustration purposes only

Despite their prevalent, tech-savvy online presence, terrorist groups may not have demonstrated the ability -- or even interest in attaining the ability -- to launch cyberattacks, experts said.

National security experts aren't arguing against better security -- they are just noting that while the United States faces many cyberthreats, terrorism may not yet be one of them.

Terrorist groups' use of the Web has proliferated in the past decade and, former CIA Director Gen. Michael Hayden says, they are "cybersmart."

But Hayden said the organizations, perhaps surprisingly, haven't exhibited evidence that terrorists use cyberspace for anything beyond support activities.

"I don't know why. I really don't," he said last week in testimony before the U.S. House of Representatives Intelligence Committee.

Cybersecurity expert James Lewis, of the Center for Strategic and International Studies, said in a telephone interview that causing physical damage and devastation using the Web is far more complicated than the minor attacks terrorist groups may be able to launch.

"They are looking for a splashier event," Lewis said. "They want explosions and things that will play well on the nightly news. Making the traffic lights blink on and off might not do that for them."

A key example of physical destruction caused by a cyberattack is the June 2010 Stuxnet virus, which infected computers at a nuclear reactor in Iran, causing it to malfunction and ultimately break down. The undetected virus caused the closure of the plant and setbacks in Iran's uranium enrichment program.

Experts said that U.S. infrastructure is no better protected than the reactor in Iran was but that terrorist groups aren't likely to have the resources to gain the internal knowledge they would need to infiltrate U.S. systems.

"It's actually a lot harder not because of the technical component, but because of the amount of intelligence required to do it properly," said Allan Friedman of the Center for Technology Innovation at the Brookings Institution, a nonpartisan Washington think tank.

Liam O Murchu, of Symantec Corp., a California software security company, said, Stuxnet "has shown us that you can write a piece of software that will be able to change how a factory works."

To replicate a similar attack -- one focused on a particular target -- would require precise insider intelligence and millions of dollars.

Terrorist organizations could look at Stuxnet as a blueprint, Murchu said in a telephone interview, and they could also look at it to learn certain techniques. However, "the sophistication of the threats would depend on how skilled the attackers were and how much insider information they had," he said.

Lewis, whose research at CSIS focuses on Internet policy and cybersecurity, said the only organizations with the capability to do this -- at the moment -- are nation states.

The U.S. Department of Defense argues that the cyberdomain breaks down the traditional concept that large-scale attacks require equally large-scale operations, which might give attackers a way to exploit U.S. vulnerabilities.

Since much of U.S. critical infrastructure -- a likely target of cyberattacks -- is operated by the private sector, the private sector needs to be involved in security enhancements.

Lewis said he's spoken with companies that see defending against terrorism as a responsibility of the government, not the private sector.

"That's a perfectly reasonable line," he said. "(The Department of Defense) needs to do something. The U.S. government needs to do something."

The Obama administration is pushing Congress to strengthen private sector cybersecurity, which Lewis sees as a positive move. But he added that the Defense Department should also be protecting national security-related interests.

The Department of Defense said it is.

The Defense Department "seeks to mitigate the risks posed to U.S. and allied cyberspace capabilities," a department spokesman said via e-mail, "while protecting and respecting the principles of privacy and civil liberties, free expression and innovation that have made cyberspace an integral part of U.S. prosperity and security."

While Hayden dismissed concerns of cyberterrorism attacks at the moment, he was quick to acknowledge the potential problems, calling U.S. infrastructure vulnerable.

"Eventually they'll get this capability and then they'll use it," Lewis said.

Related Links
Cyberwar - Internet Security News - Systems and Policy Issues




.
.
Get Our Free Newsletters Via Email
...
Buy Advertising Editorial Enquiries






.

. Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle



CYBER WARS
S. America security fears boost telecoms
Rio De Janeiro (UPI) Oct 10, 2011
Growing Latin American concerns over internal security are drawing more investment into the telecommunications and technology industries in the region, which are enjoying a boom in both private and public sectors. Economic prosperity is driving incentives to build on previous developments in the security and telecommunications sectors that, in most cases in Latin America, are interconne ... read more


CYBER WARS
Raytheon Successfully Test Fires First New-Build Patriot Missile

NATO missile shield 'not targeted at anyone': Spain

THAAD Weapon System Achieves Intercept of Two Targets at Pacific Missile Range Facility

Spain to host ships for NATO missile shield

CYBER WARS
Northrop Grumman Upgrades Enhance Royal Australian Navy Frigate Anti-Ship Missile Defence Systems

Alarm rises over missing Libyan missiles

Thousands of Libya missiles on the loose

Iran equips marine forces with 'cruise' missile

CYBER WARS
Raytheon's Speed-of-Light Protection System Can Shield Unmanned Aircraft Systems

X-47B Demonstrator Flies in Cruise Mode for First Time

Joysticks transform US warfare in Afghanistan

AUVSI Cautions FAA to Stay the Course on UAS Integration into the National Airspace System

CYBER WARS
Elbit Establishes Israeli MOD Comms Equipment Supply Upgrade and Maintenance Project

Boeing FAB-T Demonstrates High-Data-Rate Communications with AEHF Satellite Test Terminal

NRL TacSat-4 Launches to Augment Communications Needs

US Space Completes Study for USAF and Identifies Cost-Effective Ways to Procure MILSATCOM

CYBER WARS
Israel eyes S. Korean T-50 jet trainer

Northrop Grumman Completes Next Generation Automatic Test Station Product Verification Test

Northrop Grumman Patents Improved Design for Cooling Electronic Modules

Northrop Grumman Announces Quantum Cascade Laser-Based Solution for Common Infrared Countermeasures

CYBER WARS
British defence minister's best man quizzed over trips

Trial begins for accused global arms dealer Bout

Israel: Generals say defense cuts perilous

US army fears being loser in American debt crisis

CYBER WARS
Bulgarian candidate says not anti-Russia

Putin visits China in first trip since Kremlin comeback

As China Republic turns 100, centenarians look back

Dalai Lama pokes fun at China slurs, slams censorship

CYBER WARS
Boeing and BAE Systems to Develop Integrated Directed Energy Weapon for US Navy


.

The content herein, unless otherwise known to be public domain, are Copyright 1995-2011 - Space Media Network. AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement