Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Commentary: Cyber Pearl Harbor
by Arnaud De Borchgrave
Washington (UPI) Oct 2, 2012


disclaimer: image is for illustration purposes only

A shadowy hacker group in the Middle East has disrupted the electronic banking operations of some of the United States' largest financial institutions, The Seattle Times reported.

But this is hardly new. Five years ago, Goldman Sachs' chief technology officer reported this venerable financial institution had sustained more than 1 million "intrusion attempts in a single day."

A military cybernaut expert, speaking privately, said the Pentagon sustains up to 6 million such probes a day. How many were successful remains highly classified. But one Pentagon cyber expert said the vast building's internal communications system was disrupted once for 48 hours. The number of hostile hacker penetrations remains top secret.

At Wells Fargo, U.S. Bancorp and Bank of America, the Seattle newspaper reported, a group identifying itself as Izz ad-Din al-Qassam Cyber Fighters attacked their websites and "left customers temporarily unable to access their checking accounts, mortgages and other services."

Electronic crime is a fast-spreading plague. In recent years, there have been massive denial-of-service attacks. Computers are flooded with communications demands that cause systems to back up, seize up and shut down.

These Islamist cyber fighters said their attacks would continue until a video that insults Prophet Muhammad and triggered riots from Indonesia to Pakistan to Egypt to Libya is removed from the Internet. The 15-minute video, the work of a rank amateur, went viral several weeks ago and can no longer be deleted.

Cyber terrorists have been lurking the 'Net a lot longer than the offending video. And critical electronic infrastructure -- from valves that regulate water flows from dams to air traffic control and transnational banking systems -- is vulnerable everywhere.

Israel and the United States have been waging electronic warfare against Iran's secret underground uranium enrichment activities. Clearly, Iran is retaliating by using electronic terrorist groups, both homegrown and Middle Eastern.

In mid-September, the FBI warned of "a new trend in which cyber criminal actors are using spam and phishing emails" as weapons to attack the global networks of financial institutions."

This week, speaking at a Woodrow Wilson International Center meeting devoted to the growing cyber threat, U.S. Army Gen. Keith B. Alexander, chief of the U.S. Cyber Command (also head of the National Security Agency), since it was launched two years ago, said the cyber threat has grown in 10 years "from exploitation to disruption to destruction of computer networks."

Russia understood this when the Soviet Union collapsed. The old Soviet Federal Agency for Government Communications and Information quickly became a cyber command as the new Russian leaders gave priority to one area where they could perhaps compensate for U.S. military and economic superiority.

This gave the Kremlin a two-decade lead over the United States. USCYBERCOM under Alexander wasn't activated until September 2010. China activated a cyber command in the mid-1990s.

This week, Alexander said cyber attacks that would crash stock exchanges and markets "are all possible today." He also said "education is the key to understand what's already happening."

At the same event, U.S. Sen. Susan Collins, R-Maine, ranking member and former chairwoman of the Homeland Security Committee, said "over 200 cyberattacks against our national assets, such as critical water treatment and transportation networks are just the tip of the iceberg."

Collins said she was most concerned about an attack on the nation's electric power grid. The electronic stealing of intellectual property is critical and already with us round the clock.

"Imagine," she said, "if someone had stolen iPhone5 information and got to market first."

Some company intrusions simply plant an electronic spy to monitor -- and steal -- proprietary secrets.

Massive electronic threats follow on the heels of massive physical infrastructure threats -- the vast system of highways, bridges, airports, railroads, pipelines, power lines, dams, waterways, water treatment plants, schools and other publicly owned and publicly regulated facilities, all dangerously neglected as hundreds of billions were spent on two wars in Iraq and Afghanistan.

Iraq was a pure waste of $1 trillion with the net result that Iran now has more influence in Baghdad than Washington. Al-Qaida, terminated by the late Saddam Hussein, is also operating and recruiting in Iraq.

And the Afghan War, now opposed by 70 percent of Americans, where Afghans trained by the United States are killing their U.S. advisers and where the tab has reached $600 billion, appears to be headed for a costly and controversial finish.

If the United States under President Obama or President Romney decides to see the Afghan war through the end of 2014, the total tab will be another $1 trillion. And the U.S. deficit, now at $16 trillion, will continue to grow correspondingly.

2015, and hopefully sooner, should see the beginning of a massive home front surge to restore the United States to its once global grandeur.

Infrastructure needs alone are estimated at $3 trillion over five years. Global vision is blurred today. But the United States' needs in Afghanistan aren't. They are to disengage ASAP.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
Hackers shifting to 'destruction': US cyber chief
Washington (AFP) Oct 1, 2012
Hackers are stepping up the intensity of their attacks, moving from "disruption" to "destruction" of key computer systems, the top US cyber-defense official said Monday. General Keith Alexander, who is director of the National Security Agency and commander of the US Cyber Command, told a Washington forum that the new tactics could move beyond mere annoyances and begin causing severe economic ... read more


CYBER WARS
China has no timetable for manned moon landing

Senior scientist discusses China's lunar orbiter challenges

NASA sees 'gateway' for space missions

Protection for Moon, Mars astronauts eyed

CYBER WARS
Rock Grinding Action

Learning to live on Mars

Mars Rover Opportunity Working at 'Matijevic Hill'

Curiosity Completes Longest Drive Yet

CYBER WARS
SciTechTalk: NASA's planetary playbook

Bryan Campen joins XCOR as Director of Media and Public Relations

B612 Wins Funding Support From Prominent Business Leadersy

Cavenauts return to Earth

CYBER WARS
China Spacesat gets 18-million-USD gov't support

Tiangong Orbit Change Signals Likely Date for Shenzhou 10

China Focus: Timeline for China's space research revealed

China eyes next lunar landing as US scales back

CYBER WARS
Space freighter undocking set for Friday

Russia to send all-novice crew to ISS

ATV undocking postponed

Crew Members Prepare for Departure

CYBER WARS
Ariane rocket launches two telecom satellites

Ariane 5 maintains Arianespace's track record of success with the launch of ASTRA 2F and GSAT-10

California Governor Signs the Spaceflight Liability and Immunity Act

Processing is underway with the next Automated Transfer Vehicle to be orbited by Arianespace

CYBER WARS
The Magnetic Wakes of Pulsar Planets

Stagnant Interiors Suppress Chances of Life on Super-Earths

Meteors Might Add Methane to Exoplanet Atmospheres

Two 'hot Jupiters' found in star cluster: NASA

CYBER WARS
HP powers business tablet with Windows 8

'MindMeld' app anticipates people's needs

Search for element 113 concluded at last

Kodak dumps inkjet printers, more jobs




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement