For the past month or so a curious game has been going on in the world of rumor and uncertainty that passes for the intelligence community. At the heart of it is an attempt to force US President Barack Obama to put cyber security back to the top of his agenda and to usher in increased monitoring of the Internet.
Despite an initial promise of action and a demand for a report on the risks to the US technology infrastructure to be on his desk in 60 days, little in policy terms has been heard since.
Even more frustratingly for the computer-security community, Obama has also not filled the much-trumpeted post of cyber tsar. Melissa Hathaway, the White House’s senior acting director for cyberspace and the author of Obama’s 60-day review of cyber policy, had been widely tipped for the position — but four months ago she resigned, citing personal reasons for her decision.
This appears to have resulted in a turf war between the US department of homeland security, the military and the intelligence community with each competing for responsibility for the issue.
Now, in what is being seen as an attempt to jog Obama’s memory, stories about the US’s vulnerability to cyber attack, the threat it poses to its economy and the potential rise of cyber-terrorism have begun to appear on an almost daily basis.
Senior intelligence officials are suggesting that the US faces a massive risk to its power grid and communications infrastructure — claiming that if current vulnerabilities are exploited there would be enormous economic damage to the US.
“There has been a heightened awareness of our vulnerability to cyber attacks in the US and that has been building for over a year. People are saying: ‘Look at Lehman Brothers’ — if someone had taken out another banking Web site on the same day it would have been the straw that broke the camel’s back,” said Tom Reilly, a US director of ArcSight, a company set up by the investment arm of the CIA.
It draws 30 percent of its revenue from monitoring critical infrastructure for dangerous activity for US federal government agencies and NATO.
On the subject of the cyber tsar, Reilly said: “There is now a lot of impatience ... People are looking for an individual to be appointed to set policy direction and without that framework in place there is the possibility of duplication by agencies.”
The potential for exploiting the fragile confidence in financial institutions has not been lost on businesses.
“The recession has been a driver in awareness,” said William Beer, director of information security practice for PricewaterhouseCoopers. “For the first time, critical infrastructure vulnerability has made it onto the risk register. With Northern Rock we saw a cascade effect occurring as its systems went down ... and the fragility of systems is now seen as important to confidence.”
A particularly audible warning of cyber-terrorism has come from Steven Chabinsky, the deputy assistant director of the FBI’s cyber division. On Nov. 17, he told the Senate judiciary committee that the FBI was now investigating suspected al-Qaeda sympathizers who appear to be interested in launching attacks on critical communications infrastructure.
At the same hearing, US Associate Deputy Attorney General James Baker confirmed the Obama administration had been examining the need to possibly change the laws dealing with both technology and surveillance, in order “to better protect the nation from cyber attacks.”
Stewart Baker (no relation), a former assistant secretary of policy for the department of homeland security, said the concerns were legitimate.
“We have not seen a particular event that has justified this, but the fact is that our exposure to cyber attacks is growing and is growing particularly in power systems because of our move to Internet-based control systems,” said Stewart Baker, who added that the rise in reports was almost certainly an expression of those concerns. “News doesn’t happen without someone wanting it to happen. There is a sense in cyberspace circles that despite the talk that has occurred, and the concerns now being expressed, we are still not addressing the problems.”
Any answer to these problems will come with a hefty political and financial price tag and has no guarantee of eventual success.
“Some of the price will have to be paid in terms of privacy on the Internet, because we are not going to be able to find those wishing to attack us without increased monitoring. That can only be achieved by giving up some of the anonymity that we see on the present Internet,” Stewart Baker said.
Internet monitoring will be difficult to justify politically, because there is little evidence of attacks by terrorists on communications infrastructure — the main use of the Web by terrorist groups to date has been for fundraising, communication and propaganda.
“To attack critical infrastructure, terrorist groups have to have a cyber capability and the terrorists we know don’t,” said Peter Tippett, a noted security threat expert and vice president of intelligence and research for the computer giant Verizon. “Terrorism of cyber quality requires serious skills and another level of sophistication — it’s not just the use of hacking techniques. Our recent data breach survey and all of the information we have shows that in the vast majority of hacking attacks, the bad guys get there by accident.”
“I am confident that most terrorist organizations have a geek somewhere, but the organizations that have the sort of capability necessary to attack infrastructure are the usual suspects — Russia, China and Israel — and they are not the sort of organizations we think of as terrorists,” he said.
This isn’t a position wholly shared by Rohan Gunaratna, head of the Singapore-based International Centre for Political Violence and Terrorism.
“Terrorist groups at the moment prefer to harness the infrastructure, and the capability to mount successful attacks is still within the domain of government, but it is only a question of time before that capability starts to percolate to them,” said Gunaratna, a former White House adviser. “There have been power disruption events in Northern Australia and Canada, where responsibility was claimed by the Abu Hafs [al-Masri] Brigade [though they were not responsible]. The awareness of the vulnerability is being raised because groups are becoming more IT [information technology]-aware.”
Stewart Baker agreed with this possibility, though he also said that IT was treated with suspicion by terrorist groups.
“If a government wanted to experiment with its capability, it might want to use a proxy, but with cyberwarfare you want to have control, and turning over capability to another group is always difficult. This is not like a Stinger missile, you need specialized training — almost a whole career goes into building a cyber warrior,” Stewart Baker said.
“So far, al-Qaeda has been penetrated every time it has used electronic techniques — it knows the network is not your friend,” he said.
Peter Warren is the editor of the Future Intelligence Web site.
Concerns that the US might abandon Taiwan are often overstated. While US President Donald Trump’s handling of Ukraine raised unease in Taiwan, it is crucial to recognize that Taiwan is not Ukraine. Under Trump, the US views Ukraine largely as a European problem, whereas the Indo-Pacific region remains its primary geopolitical focus. Taipei holds immense strategic value for Washington and is unlikely to be treated as a bargaining chip in US-China relations. Trump’s vision of “making America great again” would be directly undermined by any move to abandon Taiwan. Despite the rhetoric of “America First,” the Trump administration understands the necessity of
US President Donald Trump’s challenge to domestic American economic-political priorities, and abroad to the global balance of power, are not a threat to the security of Taiwan. Trump’s success can go far to contain the real threat — the Chinese Communist Party’s (CCP) surge to hegemony — while offering expanded defensive opportunities for Taiwan. In a stunning affirmation of the CCP policy of “forceful reunification,” an obscene euphemism for the invasion of Taiwan and the destruction of its democracy, on March 13, 2024, the People’s Liberation Army’s (PLA) used Chinese social media platforms to show the first-time linkage of three new
If you had a vision of the future where China did not dominate the global car industry, you can kiss those dreams goodbye. That is because US President Donald Trump’s promised 25 percent tariff on auto imports takes an ax to the only bits of the emerging electric vehicle (EV) supply chain that are not already dominated by Beijing. The biggest losers when the levies take effect this week would be Japan and South Korea. They account for one-third of the cars imported into the US, and as much as two-thirds of those imported from outside North America. (Mexico and Canada, while
I have heard people equate the government’s stance on resisting forced unification with China or the conditional reinstatement of the military court system with the rise of the Nazis before World War II. The comparison is absurd. There is no meaningful parallel between the government and Nazi Germany, nor does such a mindset exist within the general public in Taiwan. It is important to remember that the German public bore some responsibility for the horrors of the Holocaust. Post-World War II Germany’s transitional justice efforts were rooted in a national reckoning and introspection. Many Jews were sent to concentration camps not