Wednesday, November 20, 2013

If your bank was hacked, would you move your money?

Is your money as safe as you think?


I have a question for everyone. Let's say you do your banking with Wells Fargo and you have all of your money with them.  Well what if Wells Fargo's main computers were hacked into by a cyber group and they flooded the system with a DDoS attack and the companies website was down for two days. No money was stolen from clients or anything of that sort, but still a vulnerability in the banks system was found and executed upon. Would you keep your money with that bank, or would you go to a new bank due to the fact that it was already proven that someone could hack into even the companies most protected computers? That is a very serious concern for banks these days. Think about all of the clients that would leave if they found out their banks security systems had vulnerabilities that could allow people to steal their personal information and money out of their accounts. In my opinion, bank web security will become the next biggest thing and the best protected banks will be the most successful. 




So tell me... Would you switch banks if yours was hacked into by a cyber group?

Effect of Cyberterrorism on Business

Cyberterrorism and it's Effects on Business.

After doing a fair amount of research on the topic of cyberterrorism, it seems to me that what has the most potential for damage or destruction due to cyberterrorism is the business sector. For example, during a DDoS attack, a corporations entire website could be shut down for a relatively long period of time. This can have disastrous effects on the business, and potentially drive away many customers since it seems the company is weak or has insufficient protection.

One great example of how cyberterrorism has had a strong impact on the private sector is when a cyber group hacked into the twitter account of the Associated Press. The group posted a message saying that the white house had been bombed and Barack Obama was injured. This was only on twitter for two minutes but guess what happened... The stock market plummeted and $150 million in equity vanished momentarily. Luckily, twitter was able to regain control over the AP's account in such a short amount of time, otherwise who knows if it would have made such a swift and complete recovery.

Of all of the potential different ways that cyberterrorism can effect us, I believe it has the potential to have the greatest impact on business.


Respond by telling me if you agree with this, and if not, what is it that you think is the most vulnerable.

Monday, November 18, 2013

DDoS Attacks: Cyberterror or Cyber Warfare?

On of the most common types of cyber attacks occurring today is known as a distributed denial of service attack, or DDoS. Distributed Denial-Of-Service is a form of electronic attack involving multiple computers, which send repeated HTTP requests or pings to a server to load it down and render it inaccessible for a period of time.  The purpose of DDoS attacks are typically most comparable to street protests, so these types of attacks are usually seen as such.  An example of a large DDoS attack was Operation Titstorm, which were a series of denial-of-service attacks conducted by the Anonymous online community against the Australian government in response to proposed web censorship regulations. 

Now let me define both cyberterrorism and cyber warfare.

Cyberterrorism: “A criminal act perpetrated through computers resulting in violence, death and/or destruction, and creating terror for the purpose of coercing a government to change its policies.” (Wilson, 2003)

Cyber Warfare:  "Refers to politically motivated hacking to conduct sabotage and espionage."

At first glance, I would say this is an easy one... a DDoS attack is an example of Cyber Warfare. However, if a successful DDoS attack shuts down a major server in say China, then wouldn't that constitute a form of destruction? Also, the last part of the definition that says "creating terror for the purpose of coercing a government to change its policies" sounds an awful lot like the purpose of a street protest, which is regularly compared to it's virtual version known as DDoS.






Sources: 
http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/
http://en.wikipedia.org/wiki/Denial-of-service_attack

Cyberterrorism vs. Traditional Terrorism: Who is more threatening?

Our government continues to try and reach out to congress about the threat of cyber attacks in the future. I feel like every few articles online speak about how we need to prepare for this new threat.
On November 14, FBI director James Comey testified to Congress that the threat of traditional terrorist attacks on our nation continues to decrease, while the threat of cyber attacks and cyberterrorism continues to rise at a rapid rate. Three national officials all agreed that within the next decade, cyber attacks would be the nations number one domestic threat.




Of the two types of terrorism mentioned, which one do you feel more threatened by? I'll be honest, because cyberterrorism can be a difficult concept to grasp, and the effects of it can be hard to visualize, I still personally feel more threatened by the thought of traditional terrorism. That isn't to say that one is more dangerous than the other, but it is just my gut reaction to the terms.

Tell me which one you feel the most threatened by and why. For me, old fashioned bombings and hijackings are what really gets my pulse going.

Prosecution?

An interesting thought popped into my head today as I sat back and thought about the various cyberterrorist attacks that have taken place over the last few years. Do you think the FBI should attempt to track down anonymous cyberterrorist groups and put a few of the members in jail? Most of these groups act anonymously and lure in hundreds of random citizens to help execute these events, but there has to be a few select leaders in these groups. Are there even specific laws these people are breaking? Do we need to evaluate the laws regarding this topic and potentially pass new ones?

If the FBI tracked down the top dogs of some of these groups, surely it would hinder their ability to pull of future attacks, and also scare others enough to keep them from joining in on these attacks as helpers. Some people may not even feel most of the cyber attacks are worthy of prosecution, that these groups are just using technology as a way of protesting or getting their message out into the world effectively. Where does it cross the line though, that after an attack is executed, somebody needs to go to jail. Should it be if it causes stress to others? Harm to others? Financial loss for others?


I say we need to locate a few of these groups and try to put them away!

Sunday, November 10, 2013

Operation: Titstorm


The cybergroup known as Anonymous conducted a series of attacks in February of 2010 in response to the Australian governments proposed web censorship regulations. Operation Titstorm was the name given to the cyber attacks by the attackers. The attack began as a protest responding to a plan by Australian Telecommunications Minister Stephen Conroy that would require internet service providers to block Australian users from accessing illegal and what the government deemed as "unwanted" content. Websites to be blocked feature pornography showing rape, bestialitychild sex abuse, small-breasted women (who may appear under the legal age), and female ejaculation The proposed filter also includes gambling sites along with others showing drug use. Anonymous conducted a DDoS attack, or Distributed Denial of Service attack that resulted in lapses of access to government websites on the 10th and 11th of February, 2010. This was accompanied by emails, faxes, and phone calls harassing government offices. The actual size of the attack and number of perpetrators involved is unknown but it was estimated that the number of systems involved ranged from the hundreds to the thousands. The amount of traffic caused disruption on multiple government websites.



Do you feel this is a viable form of protest? Would you participate in this form of protesting? Do you think this would be effective?

Sources:
http://en.wikipedia.org/wiki/February_2010_Australian_cyberattacks

"Pure" Cyberterrorism

There is another aspect of cyberterrorism out there that many people aren't familiar with. The concept of "pure" cyberterrorism. Pure cyberterrorism is accomplished by utilizing computer technology and the internet to inflict destruction or damage on tangible property, and even death or injury to individuals.  It is this pure cyberterrorism that most writers mean when they discuss the dangers posed by the cyberterrorist. This separation of the various types of cyberterrorism poses a significant impact on our ability to protect ourselves.


I have yet to find any solid examples where pure cyberterrorism has had any real existence. Most of the cyber attacks happening now create fear and panic, but do not cause damage to tangible property.


Are you more concerned with the fear and panic that cyberterrorism can create, or the possibility of this "pure cyberterrorism" where actual tangible damage can occur as a result? Do you feel that pure cyberterrorism is even possible? 

If you can demonstrate any evidence of pure cyberterrorism occurring in the past (physical property damaged or lives lost),  please list below...





Sources:

http://resources.infosecinstitute.com/cyberterrorism-distinct-from-cybercrime/

Friday, November 8, 2013

Cyber Terrorism Real?



Is the Cyber Terrorism Real?

Many articles and studies underline the problems that have arisen due to cyber terrorism. 
The FBI defines cyber terrorism as a “premeditated, politically motivated attack against information, computer systems, computer programs and data which results in violence against non-combatant targets by subnational groups or clandestine agents.”

If the FBI considers cyber terrorism as a violent crime, then is it a crime if no one is physical harmed.  Most cyber-attacks are nonviolent.  However they are detrimental to an economy or society.

This does not mean that there are no acts of violence being committed by cyber-attacks.  Terrorists organizations try to break down national infrastructures with the intent of harming national citizens or overall governments.

However, by the FBI’s take on cyber terrorism, terrorists organization’s malicious  attempts still wouldn’t fit the FBI’s standards of cyber terrorism.

Where is the line drawn between regular cyber-attacks and cyber-terrorism?

Do you believe Cyber-Terrorism even exists?

 


Work Cited
Singer, Peter W. "The Cyber Terror Bogeyman." The Brookings Institution. Brookings,
Nov. 2012. Web. 08 Nov. 2013.

Cyber Terrorism Affects with Economic Espionage and Intellectual Property



Cyber Terrorism Affects with Economic Espionage and Intellectual Property

The Chinese government is known for engaging in economic espionage in cyberspace. The Chinese are the world’s most active and persistent practitioners of cyber espionage today. Evidence of China’s economically disturbing theft of registered technologies as well as other intellectual property from the United States and other countries. Cyber terrorists from any nation have the ability to cripple our national infrastructures. Over the past few years, our government has revealed that the threat of economic cyber espionage appears even more of a threat than previously discovered. The cyber espionage and theft among companies’ intellectual work has increased in the U.S. economy and globally over the past decade. Evidence shows us that China plans to help build its own economy by the theft of intellectual property. That is easier than creating innovation and investment standards within its research and development fields (Top two fields within US economy). The Chinese steal innovations and intellectual property due to it being less costly and more effective then attaining them by legal courses of action. The Chinese turn the stolen ideas straight into production. This makes them able to create products much quicker and cheaper than other countries’ companies. Cyberspace is a perfect platform for stealing intellectual resources. Hackers can easily breach systems that transfer large amounts of data, while corporations and governments have a very hard time identifying specific criminals.  The cyber threat is very real and detrimental to our nation. 

Do you think the government should step in with more laws to protect intellectual property, or should that be left up to the individual companies?

Works Cited
Chertoff, Michael, William Lynn, and Mike McConnell. "China’s Cyber Thievery Is National Policy—And Must Be Challenged." The Wall Street Journal (2012): n. pag. Web. <http://www.boozallen.com/media/file/WSJ-China-OpEd.pdf>.