Subscribe free to our newsletters via your
. 24/7 Space News .




CYBER WARS
Terrorists yet to turn to cyberattacks
by Austin B. Smith | Laurenne Wallman, Medill News Service
Washington (UPI) Oct 11, 2011


disclaimer: image is for illustration purposes only

Despite their prevalent, tech-savvy online presence, terrorist groups may not have demonstrated the ability -- or even interest in attaining the ability -- to launch cyberattacks, experts said.

National security experts aren't arguing against better security -- they are just noting that while the United States faces many cyberthreats, terrorism may not yet be one of them.

Terrorist groups' use of the Web has proliferated in the past decade and, former CIA Director Gen. Michael Hayden says, they are "cybersmart."

But Hayden said the organizations, perhaps surprisingly, haven't exhibited evidence that terrorists use cyberspace for anything beyond support activities.

"I don't know why. I really don't," he said last week in testimony before the U.S. House of Representatives Intelligence Committee.

Cybersecurity expert James Lewis, of the Center for Strategic and International Studies, said in a telephone interview that causing physical damage and devastation using the Web is far more complicated than the minor attacks terrorist groups may be able to launch.

"They are looking for a splashier event," Lewis said. "They want explosions and things that will play well on the nightly news. Making the traffic lights blink on and off might not do that for them."

A key example of physical destruction caused by a cyberattack is the June 2010 Stuxnet virus, which infected computers at a nuclear reactor in Iran, causing it to malfunction and ultimately break down. The undetected virus caused the closure of the plant and setbacks in Iran's uranium enrichment program.

Experts said that U.S. infrastructure is no better protected than the reactor in Iran was but that terrorist groups aren't likely to have the resources to gain the internal knowledge they would need to infiltrate U.S. systems.

"It's actually a lot harder not because of the technical component, but because of the amount of intelligence required to do it properly," said Allan Friedman of the Center for Technology Innovation at the Brookings Institution, a nonpartisan Washington think tank.

Liam O Murchu, of Symantec Corp., a California software security company, said, Stuxnet "has shown us that you can write a piece of software that will be able to change how a factory works."

To replicate a similar attack -- one focused on a particular target -- would require precise insider intelligence and millions of dollars.

Terrorist organizations could look at Stuxnet as a blueprint, Murchu said in a telephone interview, and they could also look at it to learn certain techniques. However, "the sophistication of the threats would depend on how skilled the attackers were and how much insider information they had," he said.

Lewis, whose research at CSIS focuses on Internet policy and cybersecurity, said the only organizations with the capability to do this -- at the moment -- are nation states.

The U.S. Department of Defense argues that the cyberdomain breaks down the traditional concept that large-scale attacks require equally large-scale operations, which might give attackers a way to exploit U.S. vulnerabilities.

Since much of U.S. critical infrastructure -- a likely target of cyberattacks -- is operated by the private sector, the private sector needs to be involved in security enhancements.

Lewis said he's spoken with companies that see defending against terrorism as a responsibility of the government, not the private sector.

"That's a perfectly reasonable line," he said. "(The Department of Defense) needs to do something. The U.S. government needs to do something."

The Obama administration is pushing Congress to strengthen private sector cybersecurity, which Lewis sees as a positive move. But he added that the Defense Department should also be protecting national security-related interests.

The Department of Defense said it is.

The Defense Department "seeks to mitigate the risks posed to U.S. and allied cyberspace capabilities," a department spokesman said via e-mail, "while protecting and respecting the principles of privacy and civil liberties, free expression and innovation that have made cyberspace an integral part of U.S. prosperity and security."

While Hayden dismissed concerns of cyberterrorism attacks at the moment, he was quick to acknowledge the potential problems, calling U.S. infrastructure vulnerable.

"Eventually they'll get this capability and then they'll use it," Lewis said.

.


Related Links
Cyberwar - Internet Security News - Systems and Policy Issues






Comment on this article via your Facebook, Yahoo, AOL, Hotmail login.

Share this article via these popular social media networks
del.icio.usdel.icio.us DiggDigg RedditReddit GoogleGoogle








CYBER WARS
S. America security fears boost telecoms
Rio De Janeiro (UPI) Oct 10, 2011
Growing Latin American concerns over internal security are drawing more investment into the telecommunications and technology industries in the region, which are enjoying a boom in both private and public sectors. Economic prosperity is driving incentives to build on previous developments in the security and telecommunications sectors that, in most cases in Latin America, are interconne ... read more


CYBER WARS
Subtly Shaded Map of Moon Reveals Titanium Treasure Troves

NASA's Moon Twins Going Their Own Way

Titanium treasure found on Moon

NASA Invites Students to Name Moon-Bound Spacecraft

CYBER WARS
Mars Express: Current flows and 'islands' in Ares Vallis

Opportunity is on the Move Again

Tracing the Canals of Mars

Mars Science Laboratory Meets its Match in Florida

CYBER WARS
UN highlights everyday benefits from space science and technology

Shot US lawmaker honors astronaut husband

U.S. sues astronaut over space camera

AAS Society Members Win 2011 Nobel Prize in Physics

CYBER WARS
China's first space lab module in good condition

Takeoff For Tiangong

Snafu as China space launch set to US patriotic song

Civilians given chance to reach for the stars

CYBER WARS
It's All in the Mix With Fluid Physics in Space

DLR ROKVISS robotic arm returns from space

Commercial space deliveries 'within months': NASA

Private US capsule not to dock with ISS

CYBER WARS
Chinese rocket sends French telecom satellite into space

On-time preparations continue for Soyuz' milestone mission from French Guiana

US telecoms satellite reaches designated orbit

Cape Canaveral continues cleanup efforts

CYBER WARS
Astronomers Find Elusive Planets in Decade-Old Hubble Data

University of Texas-led Team Discovers Unusual Multi-Planet System with NASA's Kepler Spacecraft

Heavy Metal Stars Produce Earth-Like Planets

Doubts Over Fomalhaut b

CYBER WARS
BlackBerry glitches continue for second day

Bangladesh launches $130 laptop for schools

Boeing and Lion Air Pioneer Precision Satellite Navigation Technology

S. Korea's LG unveils ultra-high-speed smartphone




The content herein, unless otherwise known to be public domain, are Copyright 1995-2014 - Space Media Network. AFP, UPI and IANS news wire stories are copyright Agence France-Presse, United Press International and Indo-Asia News Service. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by Space Media Network on any Web page published or hosted by Space Media Network. Privacy Statement