Growing need for cyber terrorism vigilance warn ex-CIA 
      directors
    
   
  London, UK - 14 December 2004, 00:30 GMT - More than three OECD member 
    countries outside the US are embarking on cyber terrorism exercises in December 
    this year and the first quarter of 2005 to test key components of their critical 
    economic infrastructure. These imminent exercises enable those countries to 
    prepare against potential sabotage of critical components and allow the nation 
    states to evaluate their readiness against threats in a controlled environment. 
    The information gathered through those drills sheds new light on the potential 
    impact of cyber-attacks on critical facilities and also allows those countries 
    to enhance their nation-wide emergency operations. Specific techniques used 
    for the drill involve computer and communications hacking, physical attack 
    simulation and media manipulation.
    
    In the last ten days, two former CIA directors, Robert Gates and George Tenet, 
    have warned that a cyber attack could cripple the US economy and stated that 
    foreign intelligence services are far ahead of their US counterparts when 
    it comes to understanding the threat posed by cyber terrorism. "The 
    internet," Tenet claimed at a recent security conference 
    in Washington DC, "represents a potential 
    Achilles heel for our financial stability and physical security if the networks 
    we are creating are not protected." "Efforts at physical security 
    will not be enough," he argued, "because 
    the thinking enemy that we confront is going to school on our network vulnerabilities." 
    He said that there were "known 
    adversaries conducting research on information attacks," including 
     "intelligence services, military organisations 
    and non-state actors."
    
    Mr Tenet, who left the CIA in July after serving as director for seven years, 
    warned that Al-Qaeda - although its primary leadership had been largely destroyed 
    - remained "a sophisticated, intelligent 
    organization with enormous capability." 
    The secondary leadership that was emerging, he added, envisioned 
    "a global, decentralised movement" 
    whose ability to multiply depended crucially on the internet, which enabled 
    them to share information from explosives' recipes to the best ways to get 
    into Iraq undetected. The group, he said, was "undoubtedly 
    mapping vulnerabilities and weaknesses in our telecommunications networks." 
    
    
    Following the earlier drills in 2004, the second set of cyber-terror exercises 
    involve the execution of impact analysis studies on unnamed facilities, co-coordinating 
    planning and logistics as well as assessing current emergency response capability. 
    Through the cyber warfare drills that specific countries are conducting, those 
    nations aim to reach a new level of preparedness against potential attacks. 
    By applying the knowledge gathered through those exercises, they aim to reduce 
    vulnerabilities and improve response time to cyber-attacks. The exercises 
    are essentially benchmarking events that the business and government communities 
    seek to learn from.
    
    Cyber terrorism could be the most devastating weapon of mass destruction yet 
    and could cripple the US economy according to the former CIA Director, Robert 
    Gates who was speaking at the cyber terrorism conference held at Rice University. 
    He said that when a teenage hacker in the Philippines wreaks $10 billion in 
    damage to the US economy in one night by implanting a virus, imagine what 
    a sophisticated, well-funded effort to attack the computer base of the US 
    economy could accomplish. 
    
    The CIA and National Security Agency (NSA) had conducted an exercise six years 
    ago, assigning 50 computer specialists to see how hard it would be to shut 
    down the nation's electric grid. It took only two days for the group to put 
    itself in a position to do so, Mr Gates said. He also referred to the blackout 
    that affected cities from Detroit to New York in August 2003, to illustrate 
    what he meant in terms of the potential scale of a future cyber attack which 
    could bring the US economy to its knees. Terrorism is a global challenge that 
    may take many forms and many years to defeat or contain. He was certain that 
    terrorists would hit America again. Terrorism continued to evolve in the years 
    since he had served as CIA director during the early 1990s.
  In the 1970s and 1980s, most terrorist groups were directed or sponsored 
    by governments such as Iran, Iraq, Libya or Syria, making it easier to gather 
    intelligence. Since they were trying to bring attention to a cause and to 
    win support, they tended to limit the scale of their violence and the number 
    of innocent lives they were prepared to take according to Mr Gates. This is 
    no longer the case. Now terrorists are motivated by religion and are profoundly 
    revolutionary, he said. 
    
    The cyber terrorism exercises are based on the fundamental tenet that the 
    cyber-terrorist is a very real threat to modern information systems according 
    to the US Defense Advanced Research Projects Agency (DARPA). This tenet is 
    based on the following assertions: 
    
    1. Sophisticated terrorist threats still exist against economically powerful 
    countries and their interests abroad;
    2. Information systems that manage those nations' defences and critical infrastructures 
    are vulnerable to cyber attack; 
    3. Terrorists can forward their agenda by attacking the nations' critical 
    infrastructures;
    4. Cyber attack costs - especially in proportion to their perceived relative 
    effectiveness - are asymmetric and favour the cyber-terrorist; and 
    5. The ability for the cyber-terrorist to conduct attacks against nation state 
    assets from foreign shores with little risk of consequence appears to be reality. 
    
    
    In the exercises, the cyber-terrorist is believed to have a level of sophistication 
    somewhere between that of a sophisticated hacker and a foreign intelligence 
    organisation. The cyber-terrorist might even employ sophisticated or professional 
    hackers in their operations. However, this adversary would not have access 
    to any of the very sophisticated attacks that are available to members of 
    the nation state sponsored intelligence community. This cyber-terrorist is 
    believed to have access to all commercial resources that are generally available. 
    These include, according to DARPA:
    
    1. All publicly available information, which includes tools, attack techniques 
    and specific intelligence on a particular target, consultants and other commercially 
    available expertise;
    2. Any commercially available technology such as workstations,software, hardware, 
    and diagnostic tools; 
    3. Software developers, network developers, and other expertise required for 
    developing their own attacks against a particular target;
    4. The adversary is assumed to have limited funding. However, he is assumed 
    to be able to raise funds on the order of hundreds of thousands to a few million 
    dollars, and he is willing to spend those funds to accomplish his mission;
    5. The adversary is assumed to be able to acquire all design information on 
    a system of interest. The assumption is based on the following assertions: 
    Much of the information is publicly available; information that is not generally 
    available is loosely controlled; information that is controlled can be obtained 
    by bribing a trusted insider or through extortion.
    
    "As loathsome as bin Laden and his henchmen are, there is a method to 
    their madness," Mr Gates said. 
    "The primary reason bin Laden attacked the United States three years 
    ago is that dislike and even hatred of the United States is the only point 
    of agreement that cuts across religious, secular and national divisions throughout 
    the Arab Middle East." 
    
    [ENDS]
    
     
    mi2g is at the leading edge of building secure on-line banking, broking 
    and trading architectures. The principal applications of our technology are:
    
    1. D2-Banking; 
    2. Digital Risk Management; and 
    3. Bespoke Security Architecture.
    
    mi2g pioneers enterprise-wide security practices and technology to 
    save time and cut cost. We enhance comparative advantage within financial 
    services and government agencies. Our real time intelligence is deployed worldwide 
    for contingency capability, executive decision making and strategic threat 
    assessment.
    
    mi2g Research Methodology: The Frequently Asked Questions (FAQ) List 
    is available from here in pdf. Please 
    note terms and conditions of use listed on 
    www.mi2g.net
  
  Full details of the November 2004 report are available as of 1st December 
    2004 and can be ordered from here. 
    (To view contents sample please click here).