. Military Space News .
Analysis: Terrorism 2.0

disclaimer: image is for illustration purposes only
by Leander Schaerlaeckens
Brussels (UPI) Feb 20, 2008
Terrorism and wars of the future won't be fought outdoors but from the comfort of our own homes, behind our computer screens. With cyberattacks on the rise and gaining in destructive capability, the threat to the international community is beyond current regulations and defense mechanisms, a panel of experts said last week.

"Cyber-warfare is not becoming the threat of the future, it already is," said Estonian Defense Minister Jaak Aaviksoo. Estonia endured the first publicized high-profile cyberattack during April and May 2007 when hackers crippled the country by attacking government, bank, political party, newspaper and company Web sites, following the move of a famous Soviet monument.

Hackers used a denial-of-service technique that involves using computers that have been infected with a virus to simultaneously request data from a certain Web site, causing that site to break down. They used millions of computers from as far away as the United States, Canada, Brazil and Vietnam, according to an Estonian government official.

The assault, which was originally thought to be carried out by Russia, was eventually traced back to a handful of Estonian students of Russian ethnicity, one of whom was fined $1,620 for his part in the attack last month, a sentence Aaviksoo denounced. "The fine was too much for him," he said. "I understand his emotions."

The Estonian attack raised awareness around the world of a growing problem. Last year the Pentagon drew up a report claiming that China might have a plan in place for a cyberattack that would cripple U.S. aircraft carrier battle troops. China has previously been accused of hacking into U.S. Defense Secretary Robert Gates' computer, other high-level Pentagon computers and the German government's system.

This new breed of crime could also be used to achieve political ends.

"Cyberattacks are analogues to terrorism," Aaviksoo said. "It creates instability or anxiety."

The trouble with battling cybercrime is that a skilled hacker can erase all traces and leave authorities guessing even as to where the attack was executed from. "There are no finger or footprints in cyberspace," Aaviksoo added.

And even if a country does know where it is being attacked from, there is no legislation to shut down the foreign server from which the attack is coming, which is the standard response to a cyber-threat, according to Maj. Gen. Georges D'hollander, head of NATO's C3 unit, which deals with cyberterrorism.

Cyberterrorism, which could be used to not only shut down governments and banks but also hospitals and other civilian infrastructure, can cause many millions of dollars in damages and is, according to Russian Ambassador to the EU Vladimir Chizhov, "a much greater threat than cyberattacks." Although, he added, for now, "it would be a gross exaggeration to speak of a cyberwar."

Two percent of computer owners can, whether knowingly or not, be used as soldiers in a cyberterrorism war as 1 in 50 computers is infected with malware, which is used in DOS attacks. More than 32 percent of those computers are owned by Americans, which makes them the world leader in that regard, followed by the Chinese and the Russians, according to Chizhov.

"If you want to buy a gun, you have to prove that you can keep it safe but when you buy a computer there's no such thing," Aaviksoo said.

In most countries, there is simply no legislation dealing with cybercrime, though some 80 nations are implementing it. Where there is legislation, it lacks harmony. Penalties in different countries range from a maximum of six months to 15 years in prison.

Yet sentencing is often too lenient. The $1,620 fine that was given to the Estonian hacker is unlikely to deter any terrorist seeking to cause serious harm. This creates a new form of terrorism with little to no risk to the perpetrator.

Besides Estonia's counter-cyberterrorism center, which will soon start cooperating with nine NATO member states, there is virtually no international cooperation on cyberterrorism. To its dismay, Estonia received no assistance from Russia in prosecuting its attackers.

Drafting appropriate legislation will be tricky, however, because one does not want to discourage people from using cyberspace. "It presents a paradox because the countries most developed at cyber technology are also the most vulnerable to attacks," Chizhov said.

Community
Email This Article
Comment On This Article

Related Links
The Long War - Doctrine and Application



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Sniffing Out Insider Threats
Washington DC (SPX) Feb 20, 2008
A rapid way to spot insider threats from individuals within an organization such as a multinational company or military installation is reported in the current issue of the International Journal of Security and Networks. The technology uses data mining techniques to scour email and build up a picture of social network interactions. The technology could prevent serious security breaches, sabotage, and even terrorist activity.







  • Walker's World: Putin's heir and rival
  • Analysis: India's Asian Security plan
  • Outside View: Russia, NATO sea moves
  • China tells US to drop Cold War attitude after 'spy' arrests

  • Analysts doubt NKorea nuclear breakthrough on Rice trip to Asia
  • Iran Says UN Nuclear Watchdog Has Enough As IAEA Declines Comment
  • No progress in NKorea nuke talks: US envoy Hill
  • Analysis: Iran, Russia: Friends or rivals?

  • AIM-9X Enters The US Navy's Weapons System User Program
  • India to test submarine-based missile
  • Lockheed Martin Receives New Contract For Army Tactical Missile System
  • France And US Sign Agreement For Sale Of Lockheed Martin Hellfire II Missiles

  • Missile Defense Globally Protects Against Toxic Satellite
  • Raytheon Finishes 2007 With Two Patriot Awards Totaling 377 Million USD
  • Only NKorean missile can 'wake up' Japan, says Tokyo governor
  • MEADS Passes PDR Milestone

  • NASA opens a rotary wing research project
  • All-star line-up at first Singapore Airshow
  • Military Aircraft To Perform Aviation Safety Research
  • Flapping-wing airplanes are envisioned

  • Autonomous Technology Is Cool For CATS
  • Assembly Starts Of Taranis Unmanned Combat Air Vehicle
  • Boeing-Insitu ScanEagle UAV Achieves 10,000 Flight Hours In Support Of Australian Army Operations
  • Northrop Grumman's Global Hawk UAS Surpasses Expectations, Establishes Delivery Record In 2007

  • Thompson Files: Obama is tough
  • Outside View: Beware of Iran's trap
  • Feature: Al-Qaida feels pressure in Iraq
  • Feature: Iraq's sectarian split

  • Successful Fuel Testing Of F-35 Lightning II STOVL
  • Northrop Grumman Unveils Active Electronically Scanned Array For F-16
  • Dogs of War: The pay gap myth
  • BAE Systems Receives Contract Modification For M113 Reset

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement