Skip to main content
Cyberterrorism or Cyberhype?

This month, I’ve been asked to research any potential or actual convergence between cybercrime and terrorism. Just back from a short tour of the Middle East, I don’t see any immediate evidence of one touching upon the other but in the coming weeks, I’ll be knocking on the doors of friends at the different law-enforcement and intelligence agencies in a bid to find out.



Georgetown University Professor, Dorothy Denning pointed out as far back as 1999 that the Internet presented a tool for influencing foreign policy. She commented, “What can be said is that the threat of cyberterrorism, combined with hacking threats in general, is influencing policy decisions related to cyberdefense at both a national and international level”

Asking “Who are the cyber terrorists”, Dr. Mudawi Mukhtar Elmusharaf of the computer crime research centre writes, “

“From American point of view the most dangerous terrorist group is Al-Qaeda”. The evidence indicates that the group has scouted systems that control American energy facilities, water distribution, communication systems, and other critical infrastructure. Dr Elmusharaf also points out that in “A study that covered the second half of the year 2002 showed that the most dangerous nation for originating malicious cyber attacks is the United States with 35.4% of the cases down from 40% for the first half of the same year. South Korea came next with 12.8%, followed by China 6.2% then Germany 6.7% then France 4%. The UK came number 9 with 2.2%” – Which should please David Blunkett no end.

Former Middle East war correspondent, Giles Trendle, who aired an ITN documentary with former hostage John McCarthy on Easter Sunday, has visited the Ain il-Hilweh refugee camp in south Lebanon to see how guerrilla leader; 'Colonel' Mounir Maqdah is harnessing the power of Information Technology to grow a networked organisation to extend his strike capabilities beyond all borders.

“Maqdah”, writes Trendle, who also attended this year’s eCrime congress, “Is a bullet-scarred, die-hard guerrilla fighter: a practiced exponent of asymmetric war. For this reason, he is using IT tools to offset his disadvantages and increase his capabilities to strike big against his conventionally more-powerful enemy” which in this case is the state of Israel but he’s prepared to be flexible and last year issued a threat, issued via a local magazine, that should the US attack Iraq then "hundreds of martyrs are ready to send America into hell."

In reality, fears of cyber terrorism may owe more to statistics from leading anti-virus vendors or even press releases from consultancy mi2G, which, in 2002, prompted Richard Forno, security consultant to the US Department of Defense, to launch a broadside against the company, accusing it of spreading fear, uncertainty and doubt over cyberterrorism risks, questioning its estimates of damage caused by cyber attacks and 'cybersecurity ‘intelligence' sources.

The computer crime research centre does however find one statistic that both Symantec and mi2G can agree upon, that “More than half of recorded digital attacks in the past, have been the result of misuse and abuse of networks by employees”. This may tell us that in 2004, we have far more to fear from the people inside the corporate firewall than we have to be concerned with ideologically motivated terrorist attacks from the outside.


Comments

Popular posts from this blog

Civilisational Data Mining

It’s a new expression I haven’t heard before. ‘Civilisational data mining.’

Let me start by putting it in some context. Every character, you or I have typed into the Google search engine or Facebook over the last decade, means something, to someone or perhaps ‘something,’ if it’s an algorithm.


In May 2014, journalists revealed that the United States National Security Agency, the NSA, was recording and archiving every single cell-phone conversation that took place in the Bahamas. In the process they managed to transform a significant proportion of a society’s day to day interactions into unstructured data; valuable information which can of course be analysed, correlated and transformed for whatever purpose the intelligence agency deems fit.

And today, I read that a GOP-hired data company in the United States has ‘leaked’ personal information, preferences and voting intentions on… wait for it… 198 million US citizens.

Within another decade or so, the cost of sequencing the human genome …

The Nature of Nurture?

Recently, I found myself in a fascinating four-way Twitter exchange, with Professor Adam Rutherford and two other science-minded friends The subject, frequently regarded as a delicate one, genetics and whether there could exist an unknown but contributory genetic factor(s) or influences in determining what we broadly understand or misunderstand as human intelligence.

I won’t discuss this subject in any great detail here, being completely unqualified to do so, but I’ll point you at the document we were discussing, and Rutherford’s excellent new book, ‘A Brief History of Everyone.”

What had sparked my own interest was the story of my own grandfather, Edmond Greville; unless you are an expert on the history of French cinema, you are unlikely to have ever hear of him but he still enjoys an almost cult-like following for his work, half a century after his death.

I've been enjoying the series "Genius" on National Geographic about the life of Albert Einstein. The four of us ha…
The Mandate of Heaven

eGov Monitor Version

“Parliament”, said my distinguished friend “has always leaked like a sieve”.

I’m researching the thorny issue of ‘Confidence in Public Sector Computing’ and we were discussing the dangers presented by the Internet. In his opinion, information security is an oxymoron, which has no place being discussed in a Parliament built upon the uninterrupted flow of information of every kind, from the politically sensitive to the most salacious and mundane.

With the threat of war hanging over us, I asked if MPs should be more aware of the risks that surround this new communications medium? More importantly, shouldn’t the same policies and precautions that any business might use to protect itself and its staff, be available to MPs?

What concerns me is that my well-respected friend mostly considers security in terms of guns, gates and guards. He now uses the Internet almost as much as he uses the telephone and the Fax machine and yet the growing collective t…