For the past month or so a curious game has been going on in the world of rumor and uncertainty that passes for the intelligence community. At the heart of it is an attempt to force US President Barack Obama to put cyber security back to the top of his agenda and to usher in increased monitoring of the Internet.
Despite an initial promise of action and a demand for a report on the risks to the US technology infrastructure to be on his desk in 60 days, little in policy terms has been heard since.
Even more frustratingly for the computer-security community, Obama has also not filled the much-trumpeted post of cyber tsar. Melissa Hathaway, the White House’s senior acting director for cyberspace and the author of Obama’s 60-day review of cyber policy, had been widely tipped for the position — but four months ago she resigned, citing personal reasons for her decision.
This appears to have resulted in a turf war between the US department of homeland security, the military and the intelligence community with each competing for responsibility for the issue.
Now, in what is being seen as an attempt to jog Obama’s memory, stories about the US’s vulnerability to cyber attack, the threat it poses to its economy and the potential rise of cyber-terrorism have begun to appear on an almost daily basis.
Senior intelligence officials are suggesting that the US faces a massive risk to its power grid and communications infrastructure — claiming that if current vulnerabilities are exploited there would be enormous economic damage to the US.
“There has been a heightened awareness of our vulnerability to cyber attacks in the US and that has been building for over a year. People are saying: ‘Look at Lehman Brothers’ — if someone had taken out another banking Web site on the same day it would have been the straw that broke the camel’s back,” said Tom Reilly, a US director of ArcSight, a company set up by the investment arm of the CIA.
It draws 30 percent of its revenue from monitoring critical infrastructure for dangerous activity for US federal government agencies and NATO.
On the subject of the cyber tsar, Reilly said: “There is now a lot of impatience ... People are looking for an individual to be appointed to set policy direction and without that framework in place there is the possibility of duplication by agencies.”
The potential for exploiting the fragile confidence in financial institutions has not been lost on businesses.
“The recession has been a driver in awareness,” said William Beer, director of information security practice for PricewaterhouseCoopers. “For the first time, critical infrastructure vulnerability has made it onto the risk register. With Northern Rock we saw a cascade effect occurring as its systems went down ... and the fragility of systems is now seen as important to confidence.”
A particularly audible warning of cyber-terrorism has come from Steven Chabinsky, the deputy assistant director of the FBI’s cyber division. On Nov. 17, he told the Senate judiciary committee that the FBI was now investigating suspected al-Qaeda sympathizers who appear to be interested in launching attacks on critical communications infrastructure.
At the same hearing, US Associate Deputy Attorney General James Baker confirmed the Obama administration had been examining the need to possibly change the laws dealing with both technology and surveillance, in order “to better protect the nation from cyber attacks.”
Stewart Baker (no relation), a former assistant secretary of policy for the department of homeland security, said the concerns were legitimate.
“We have not seen a particular event that has justified this, but the fact is that our exposure to cyber attacks is growing and is growing particularly in power systems because of our move to Internet-based control systems,” said Stewart Baker, who added that the rise in reports was almost certainly an expression of those concerns. “News doesn’t happen without someone wanting it to happen. There is a sense in cyberspace circles that despite the talk that has occurred, and the concerns now being expressed, we are still not addressing the problems.”
Any answer to these problems will come with a hefty political and financial price tag and has no guarantee of eventual success.
“Some of the price will have to be paid in terms of privacy on the Internet, because we are not going to be able to find those wishing to attack us without increased monitoring. That can only be achieved by giving up some of the anonymity that we see on the present Internet,” Stewart Baker said.
Internet monitoring will be difficult to justify politically, because there is little evidence of attacks by terrorists on communications infrastructure — the main use of the Web by terrorist groups to date has been for fundraising, communication and propaganda.
“To attack critical infrastructure, terrorist groups have to have a cyber capability and the terrorists we know don’t,” said Peter Tippett, a noted security threat expert and vice president of intelligence and research for the computer giant Verizon. “Terrorism of cyber quality requires serious skills and another level of sophistication — it’s not just the use of hacking techniques. Our recent data breach survey and all of the information we have shows that in the vast majority of hacking attacks, the bad guys get there by accident.”
“I am confident that most terrorist organizations have a geek somewhere, but the organizations that have the sort of capability necessary to attack infrastructure are the usual suspects — Russia, China and Israel — and they are not the sort of organizations we think of as terrorists,” he said.
This isn’t a position wholly shared by Rohan Gunaratna, head of the Singapore-based International Centre for Political Violence and Terrorism.
“Terrorist groups at the moment prefer to harness the infrastructure, and the capability to mount successful attacks is still within the domain of government, but it is only a question of time before that capability starts to percolate to them,” said Gunaratna, a former White House adviser. “There have been power disruption events in Northern Australia and Canada, where responsibility was claimed by the Abu Hafs [al-Masri] Brigade [though they were not responsible]. The awareness of the vulnerability is being raised because groups are becoming more IT [information technology]-aware.”
Stewart Baker agreed with this possibility, though he also said that IT was treated with suspicion by terrorist groups.
“If a government wanted to experiment with its capability, it might want to use a proxy, but with cyberwarfare you want to have control, and turning over capability to another group is always difficult. This is not like a Stinger missile, you need specialized training — almost a whole career goes into building a cyber warrior,” Stewart Baker said.
“So far, al-Qaeda has been penetrated every time it has used electronic techniques — it knows the network is not your friend,” he said.
Peter Warren is the editor of the Future Intelligence Web site.
Trying to force a partnership between Taiwan Semiconductor Manufacturing Co (TSMC) and Intel Corp would be a wildly complex ordeal. Already, the reported request from the Trump administration for TSMC to take a controlling stake in Intel’s US factories is facing valid questions about feasibility from all sides. Washington would likely not support a foreign company operating Intel’s domestic factories, Reuters reported — just look at how that is going over in the steel sector. Meanwhile, many in Taiwan are concerned about the company being forced to transfer its bleeding-edge tech capabilities and give up its strategic advantage. This is especially
US President Donald Trump’s second administration has gotten off to a fast start with a blizzard of initiatives focused on domestic commitments made during his campaign. His tariff-based approach to re-ordering global trade in a manner more favorable to the United States appears to be in its infancy, but the significant scale and scope are undeniable. That said, while China looms largest on the list of national security challenges, to date we have heard little from the administration, bar the 10 percent tariffs directed at China, on specific priorities vis-a-vis China. The Congressional hearings for President Trump’s cabinet have, so far,
The US Department of State has removed the phrase “we do not support Taiwan independence” in its updated Taiwan-US relations fact sheet, which instead iterates that “we expect cross-strait differences to be resolved by peaceful means, free from coercion, in a manner acceptable to the people on both sides of the Strait.” This shows a tougher stance rejecting China’s false claims of sovereignty over Taiwan. Since switching formal diplomatic recognition from the Republic of China to the People’s Republic of China in 1979, the US government has continually indicated that it “does not support Taiwan independence.” The phrase was removed in 2022
US President Donald Trump, US Secretary of State Marco Rubio and US Secretary of Defense Pete Hegseth have each given their thoughts on Russia’s war with Ukraine. There are a few proponents of US skepticism in Taiwan taking advantage of developments to write articles claiming that the US would arbitrarily abandon Ukraine. The reality is that when one understands Trump’s negotiating habits, one sees that he brings up all variables of a situation prior to discussion, using broad negotiations to take charge. As for his ultimate goals and the aces up his sleeve, he wants to keep things vague for