. Earth Science News .
Analysis: Terrorism 2.0

disclaimer: image is for illustration purposes only
by Leander Schaerlaeckens
Brussels (UPI) Feb 20, 2008
Terrorism and wars of the future won't be fought outdoors but from the comfort of our own homes, behind our computer screens. With cyberattacks on the rise and gaining in destructive capability, the threat to the international community is beyond current regulations and defense mechanisms, a panel of experts said last week.

"Cyber-warfare is not becoming the threat of the future, it already is," said Estonian Defense Minister Jaak Aaviksoo. Estonia endured the first publicized high-profile cyberattack during April and May 2007 when hackers crippled the country by attacking government, bank, political party, newspaper and company Web sites, following the move of a famous Soviet monument.

Hackers used a denial-of-service technique that involves using computers that have been infected with a virus to simultaneously request data from a certain Web site, causing that site to break down. They used millions of computers from as far away as the United States, Canada, Brazil and Vietnam, according to an Estonian government official.

The assault, which was originally thought to be carried out by Russia, was eventually traced back to a handful of Estonian students of Russian ethnicity, one of whom was fined $1,620 for his part in the attack last month, a sentence Aaviksoo denounced. "The fine was too much for him," he said. "I understand his emotions."

The Estonian attack raised awareness around the world of a growing problem. Last year the Pentagon drew up a report claiming that China might have a plan in place for a cyberattack that would cripple U.S. aircraft carrier battle troops. China has previously been accused of hacking into U.S. Defense Secretary Robert Gates' computer, other high-level Pentagon computers and the German government's system.

This new breed of crime could also be used to achieve political ends.

"Cyberattacks are analogues to terrorism," Aaviksoo said. "It creates instability or anxiety."

The trouble with battling cybercrime is that a skilled hacker can erase all traces and leave authorities guessing even as to where the attack was executed from. "There are no finger or footprints in cyberspace," Aaviksoo added.

And even if a country does know where it is being attacked from, there is no legislation to shut down the foreign server from which the attack is coming, which is the standard response to a cyber-threat, according to Maj. Gen. Georges D'hollander, head of NATO's C3 unit, which deals with cyberterrorism.

Cyberterrorism, which could be used to not only shut down governments and banks but also hospitals and other civilian infrastructure, can cause many millions of dollars in damages and is, according to Russian Ambassador to the EU Vladimir Chizhov, "a much greater threat than cyberattacks." Although, he added, for now, "it would be a gross exaggeration to speak of a cyberwar."

Two percent of computer owners can, whether knowingly or not, be used as soldiers in a cyberterrorism war as 1 in 50 computers is infected with malware, which is used in DOS attacks. More than 32 percent of those computers are owned by Americans, which makes them the world leader in that regard, followed by the Chinese and the Russians, according to Chizhov.

"If you want to buy a gun, you have to prove that you can keep it safe but when you buy a computer there's no such thing," Aaviksoo said.

In most countries, there is simply no legislation dealing with cybercrime, though some 80 nations are implementing it. Where there is legislation, it lacks harmony. Penalties in different countries range from a maximum of six months to 15 years in prison.

Yet sentencing is often too lenient. The $1,620 fine that was given to the Estonian hacker is unlikely to deter any terrorist seeking to cause serious harm. This creates a new form of terrorism with little to no risk to the perpetrator.

Besides Estonia's counter-cyberterrorism center, which will soon start cooperating with nine NATO member states, there is virtually no international cooperation on cyberterrorism. To its dismay, Estonia received no assistance from Russia in prosecuting its attackers.

Drafting appropriate legislation will be tricky, however, because one does not want to discourage people from using cyberspace. "It presents a paradox because the countries most developed at cyber technology are also the most vulnerable to attacks," Chizhov said.

Community
Email This Article
Comment On This Article

Related Links
The Long War - Doctrine and Application



Memory Foam Mattress Review
Newsletters :: SpaceDaily :: SpaceWar :: TerraDaily :: Energy Daily
XML Feeds :: Space News :: Earth News :: War News :: Solar Energy News


Sniffing Out Insider Threats
Washington DC (SPX) Feb 20, 2008
A rapid way to spot insider threats from individuals within an organization such as a multinational company or military installation is reported in the current issue of the International Journal of Security and Networks. The technology uses data mining techniques to scour email and build up a picture of social network interactions. The technology could prevent serious security breaches, sabotage, and even terrorist activity.







  • Thousands of Hong Kong factories in China may close: report
  • Trailers given to US disaster victims unsafe: CDC
  • 911 Calls Offer Potential Early Warning System
  • Robotic Rats To Aid In Rescue Missions

  • Living Corals Thousands Of Years Old Hold Clues To Past Climate Changes
  • Beavers Can Help Ease Drought
  • Japan doubts climate pledges by US candidates
  • Nitrous Oxide: Definitely No Laughing Matter

  • NASA Extends Mission For Ball Aerospace-Built ICESat
  • CIRA Scientist Among Authors Of Book Celebrating 50 Years Of Earth Observations From Space
  • Indonesia To Develop New EO Satellite
  • Russia To Launch Space Project To Monitor The Arctic In 2010

  • UNEP calls for end to barriers on fast-growing "green economy"
  • Drilling For Science And Exploration
  • New Aluminum-Rich Alloy Produces Hydrogen On-Demand For Large-Scale Uses
  • Global Biopact On Biofuels Can Bring Benefits To Both Rich And Poor Nations

  • Emerging Infectious Diseases On The Rise
  • 72 dead as cholera follows floods in Mozambique
  • China reports bird flu outbreak in Tibet, human death
  • Deadly bird flu strain confirmed in Hong Kong

  • New Method For Measuring Biodiversity
  • Unveiling The Underwater Ways Of The White Shark
  • Ancient Mystery Solved
  • Giant Frog Jumps Continents

  • Turtle Studies Suggest Health Risks From Environmental Contaminants
  • Fish Devastated By Sex-Changing Chemicals In Municipal Wastewater
  • Shipping emissions three times as much as estimated
  • Heavy Manufacturing, Steel, And Coal-Fired Power Stations To Close For 2008 Summer Olympics

  • Ancient Out Of Africa Migration Left Stamp On European Genetic Diversity
  • Human Culture Subject To Natural Selection
  • No Easy Answers In Evolution Of Human Language
  • Scientist Postulates 4 Aspects Of Humaniqueness Differentiating Human And Animal Cognition

  • The content herein, unless otherwise known to be public domain, are Copyright 1995-2007 - SpaceDaily.AFP and UPI Wire Stories are copyright Agence France-Presse and United Press International. ESA Portal Reports are copyright European Space Agency. All NASA sourced material is public domain. Additional copyrights may apply in whole or part to other bona fide parties. Advertising does not imply endorsement,agreement or approval of any opinions, statements or information provided by SpaceDaily on any Web page published or hosted by SpaceDaily. Privacy Statement