Cyber Terrorism: Mass Destruction or 
        Mass Disruption?
    
  
    
       
 
    
  
  
    
      by Vikki Spencer, © 2002 Business Information Group. 
      All rights reserved  
    
  
  Just days after the September 11 terrorist attacks the U.S. Federal Bureau 
    of Investigation began warning the public that the potential for future attacks 
    exist, and among the threats was that of cyber terrorism. The concept is not 
    a new one, such attacks have been taking place between Palestinian and Israeli 
    groups, and between U.S. and Chinese sources, in response to political conflicts. 
    And now, in light of new terrorism and cyber exclusions in insurance policies, 
    commercial insurance buyers are wondering how to protect themselves from the 
    potential threat of today's "hacktivists" becoming tomorrow's cyber terrorists, 
    and weapons of mass disruption turning into weapons of mass destruction.
   
  
February 2002 - Al-Qaida, (the notorious terrorist group formed by 
    Osama bin Laden, has not engaged in computer-based attacks in the past. However, 
    in the wake of the World Trade Center (WTC) attacks, bin Laden has suggested 
    that Al-Qaida has the expertise to use computer technology as a weapon, reports 
    Canada's Office of Critical Infrastructure Protection and Emergency Preparedness 
    (OCIPEP).
   In response to reports from the FBI about the potential threat of cyber 
    attacks in the wake of September 11, OCIPEP began issuing such advisories, 
    and notes that "retaliatory cyber attacks" against coalition countries, primarily 
    in the form of website defacements had already begun. In late November, the 
    Canadian government helped draft the Council of Europe's Convention on Cybercrime, 
    an international effort to deal with issues of terrorist financing, money 
    laundering and cyber terrorism.
   The September 11 terrorist attacks changed perceptions of the world's security 
    infrastructure, and the insurance industry's understanding of risk. What had 
    once been inconceivable was now reality and so began the process of imagining 
    the unimaginable in terms of catastrophic risks. Cyber terrorism, a heretofore 
    unconsidered threat, was suddenly put on the world stage amongst a host of 
    new potential threats.
   Digital Pearl Harbor
   When the U.S. government's new cyber terrorism expert, Richard Clarke, suggested 
    the possibility of a "digital Pearl Harbor", he was greeted with skepticism. 
    The concept of one, large-scale attack on the Internet seems far-reaching, 
    despite the claims of Al Qaida and other Muslim extremist groups who claim 
    to, or are known to, use the Internet as a tool.  
    That said, there is ample evidence that politically motivated hack attacks 
    are on the rise, notes DK Matai, chairman and CEO of the mi2g intelligence 
    unit, which deals in cyber security. 
   Tensions between the U.S. and China following the accidental bombing of 
    the Chinese Embassy in Belgrade led to a cyber conflict. In the U.S., key 
    government sites, including the Energy Department, the Interior Department 
    and even the White House were targeted. The Chinese domain, ".cn", and that 
    of Taiwan, ".tw", became the two most defaced domains behind ".com" last year. 
    India (.in) and Pakistan (.pk) saw similar increases in the number of web 
    site defacements due to political tensions (see Charts 1 and 2).
   Following NATO air attacks on Serbia in 1999, hackers began to tap into 
    U.S. defense computers and those of other defense related businesses. And, 
    since September 11, several high profile U.S. government sites have been defaced, 
    some bearing the Saudi flag and threatening messages aimed at the U.S. The 
    groups involved, sometimes called "cyber mujihadeens", have hit sites including 
    the U.S. Army Waterways Experiment Station and the National Institute of Health's 
    Human Genome Project.
   Striking at .ca
   Canada is not immune to the cyber threat, experts say.  
    Matai points out that the ".ca" domain experienced a similar increase in defacements 
    last year, with 215 hits, up from 59 in 2000 and 52 in 1999. He notes that 
    many Canadian sites bear the ".com" domain, as well as ".org" and ".net", 
    also popular targets. Hits are similarly not aimed solely at government sites, 
    he adds. "Admittedly there is some bias of attacks towards high profile sites 
    such as whitehouse.gov or fbi.gov, however more and more attacks are on commercial 
    web sites." 
   "The 11 September attack had an even deeper ripple effect: the temporary 
    disruption of the entire U.S. financial and transportation infrastructure," 
    notes the OCIPEP report. "If the terrorists did not fully anticipate these 
    aftershocks, they can see them clearly now. This raises the possibility that 
    those responsible may shift their sights away from primarily symbolic targets, 
    such as heavily populated buildings or sports stadiums, toward critical infrastructures."
    There are about 10,000 "serious grade crackers" 
    using original code attack systems, as opposed to what Matai calls "script-kiddies", 
    or hackers who rely on ready-made tools. "In terms of defacement attacks on 
    large corporations, attackers penetrate the systems as multi-level attacks 
    using subterfuge and social engineering," he explains. Criticisms 
    of lax electronic security are still being heard, despite the growing awareness 
    created by large-scale attacks such as the "I Love You" and "Melissa" viruses, 
    and worms like "Nimda" and "Code Red". Criticisms of lax electronic security 
    are still being heard, despite the growing awareness created by large-scale 
    attacks such as the "I Love You" and "Melissa" viruses, and worms like "Nimda" 
    and "Code Red".
   "My own opinion is that the potential is there [for cyber terrorists to 
    attack], everyone's networks are so poorly protected, but no one has taken 
    advantage of it," says Chuck Wilmink, director of the Canadian Center for 
    Information Technology Security (CCITS).
   A study by the U.S.-based Computer Security Institute reports that 85% of 
    companies admit to having their networks breached in 2000, and 64% acknowledge 
    significant financial losses due to those breaches. A recent report by the 
    U.S. Congress gave two-thirds of American's federal agencies failing grades 
    in cyber security, including the departments of Defense, Justice, Energy and 
    Treasury.
   Similarly, in Canada, a 1999 Senate report pointed to the potential for 
    a major cyber attack in Canada, and admitted that the FBI has characterized 
    Canada as a "hacker haven". Perhaps fortunately, Canada is more often a base 
    for hackers to attack other countries, rather than a target itself. "Canadian 
    hackers have traditionally tended to attack outside of Canada as opposed to 
    within," says Matai. He notes that Canada's quieter political demeanor means 
    that it is less often viewed as a target. ".ca Canadian sites are less vulnerable 
    than .com or .uk because Canada is not seen to be so aggressive on the world 
    stage."
   "I really don't think we've ever considered Canada to be at the same threat 
    level (as the U.S.)," says Max London, manager of public affairs for OCIPEP. 
    However, OCIPEP has issued the FBI warnings post-September 11, giving companies 
    advance warning in the event of a cyber attack. Ultimately, London explains, 
    corporations are responsible for their own security systems.
   He notes that OCIPEP is aware of "hacktivist" activity in Canada, specifically 
    "around some of the larger meetings", such as the G-8 Summit or World Trade 
    Organization meetings. However, these are a far cry from the threat by a foreign 
    government or terrorist organization that might harm Canada's critical infrastructure, 
    including systems that support communications, transportation and services 
    such as health care and finance. With the "increasing dependence and increasing 
    interconnectivity" of such systems comes a greater risk, however. In the past, 
    OCIPEP has been involved in public awareness campaigns around threats including 
    the "Code Red" worm, which was viewed as "a very real threat to the Internet", 
    and has worked with the U.S. National Infrastructure Protection Center (NIPC), 
    an FBI operation, to disseminate infornation. The NPIC issued warnings in 
    mid-October of a potential cyber threat aimed at the U.S. power grid, and 
    yet another aimed at online financial sites.
   Insurer reaction
   Canada's insurers have been jumping into the terrorism risk fray since September 
    11, trying to understand what exposures they might face in the future. Just 
    as no one predicted the events that represent the largest insurance loss in 
    history, there is fear of what other unforeseen risks may lie ahead.
   As insurers met through the Insurance Bureau of Canada's (IBC) terrorism 
    task force to discuss the new risk horizon, cyber threats were one possibility 
    on the table, says Anne MacKenzie, assistant vice president, claims technical, 
    at the Dominion of Canada General Insurance Company and a member of the task 
    force. She adds, however, that they did not top the list of concerns for several 
    reasons, including the notion that terrorists generally tend towards visible, 
    high profile acts. "It's usually physical acts of terrorism," she says. "Terrorists 
    like to put the population at fear." OCIPEP also notes that terrorists have 
    traditionally relied on "bombs over bytes" as the weapon of choice.
   Cyber terrorism has not dominated discussion of electronic risks, adds Jennifer 
    Soper, assistant vice president, technology, at St. Paul Canada. Most of the 
    talk seems centered around the major viruses that have plagued companies. 
    This is partly because many companies do not see themselves as targets for 
    such acts. "When you're not in the Fortune 500 or brand name companies, you 
    can get an 'it can't happen to me', almost false sense of security."
   She adds that companies often do not discuss the nature of attacks, and 
    still have a "keep it in the closet" attitude about cyber security breaches. 
    The benefit is that this policy of silence denies attackers the desired result 
    of publicity. However, terrorists may soon find that cyber attacks will gain 
    them the same kind of notoriety as physical attacks, MacKenzie adds. "Nothing 
    would scare people more than to learn that terrorists had hacked into government 
    sites".
   Exclusions, exclusions
   Commercial insurance buyers are no doubt facing a tough market in the post-September 
    11 era, although the situation was already beginning to grow bleak prior to 
    the terrorist attacks. Reinsurers had already stated their intention to introduce 
    cyber exclusions into their treaties, leaving insurers to follow suit.
   However, insurers assert that cyber or "data" coverage was never really 
    part of commercial general liability (CGL) policies. In light of the potential 
    for differing interpretations (such as the U.S. case of Ingram v. Micro, where 
    it was found that business interruption due to computer failure should be 
    included in CGL policies), more specific wording was added to most policies. 
    "The data exclusion was just a clarification to make sure consumers knew what 
    they were buying, there never was coverage for data," explains MacKenzie. 
    This clarification is apparent in most policies as of yearend 2001, adds Dominion 
    president George Cooke. "Our view is that the wordings don't do anything the 
    old wordings didn't do, they're just clearer."
   However, the wordings have left many companies scrambling for coverage, 
    Soper says. "What is available is not widely available." Companies will either 
    have to negotiate coverage as a limited buy-back option in existing policies, 
    or hunt it down as a separate policy from another carrier. "In terms of coverage, 
    if there is anything going on it is on a customer-by-customer level. It has 
    to be." Given the difficulty in quantifying cyber risks, there is no "one 
    size fits all" policy.
   Cooke says he is concerned with the lack of cyber coverage available, but 
    acknowledges that insurers simply are not in a position to offer it. "It's 
    a situation that troubles me. But we can't buy coverage [in the reinsurance 
    market], so it's impossible for us to offer it."
   September 11 did not help the situation either. He predicts that notwithstanding 
    the terrorist attacks, cyber coverage would have been a top issue for insurers, 
    but given the shift in priorities, insurers were unable to come up with private 
    market capital solutions in advance of yearend commercial policy renewals. 
    "September 11 kind of eclipsed concerns over whether we should be developing 
    new products to deal with cyber risks," says MacKenzie. However, she adds, 
    "we will want to revisit it" in the future.
   Overriding concern
   Regardless of new cyber covers, with the current terrorism exclusions being 
    written, any act deemed as "cyber terrorism" would not be covered, as the 
    terrorism exclusion would be overriding. In the wake of September 11, with 
    reinsurers refusing to cover terrorism in their treaties, insurers were forced 
    to either introduce similar exclusions in their policies or to negotiate a 
    deal with the government, which would act as excess of loss reinsurer through 
    a "terrorism pool" arrangement.
   By yearend, no such pool had been devised, despite lengthy discussions between 
    IBC representatives and the government. "The nature of the discussions evolved 
    as the market evolved," says Cooke, who is also chair of the IBC. "The decision 
    was taken to wait. It was probably a smart decision."
   The U.S. government's inability to come to a solution prior to breaking 
    at the end of the year was among the contributing factors. Cooke recognizes 
    that it was "politically difficult" for the Canadian government to come forward 
    with a solution before the U.S., given the fact that the situation was not 
    of the same scale here. This situation may change as the U.S. House reconvenes 
    in late January. "People have said that the government wasn't prepared to 
    act, but I don't buy that," he adds. "Minister Peterson and the staff in Finance 
    were seriously engaged in discussions and are prepared to act if the need 
    arises."
   The need for a solution may not be quite as pressing as originally thought, 
    with renewals moving along despite the lack of a solution, and the fact that 
    many commercial policies on target risks have not yet reached renewal.
   However, Cooke still feels a solution is needed. The government has consulted 
    with other associations, most notably the Canadian Bankers Association (CBA), 
    who claim that there is no need for the coverage. "I think they're wrong," 
    Cooke says, but their resistance makes it difficult for insurers to press 
    for a solution. He is most displeased with the view that insurers are looking 
    for a "bail out". "We are not doing an 'Air Canada' here. We're more than 
    prepared to take our pains for our past sins." But without reinsurance coverage 
    in place, it is not economically feasible for insurers to offer the coverage.
   The terrorism task force was "driven by the sudden recognition that there 
    was now infinite risk and infinite exposure and that wasn't economically sustainable," 
    says MacKenzie. "It [terrorism coverage] isn't anything we could write even 
    if we wanted to."
   With no cap on the exposure, insurers would be leaving themselves open to 
    unquantifiable risks, a situation that extends into the domain of cyber terrorism.
   "Putting a box around the exposure" or quantifying the risk is especially 
    difficult with cyber risks, says Soper.. "The 'net is worldwide. It is difficult 
    to know where it (an attack) is going to come from, and how it's going to 
    come."
   She adds, "It's hard when you're an industry that likes to put dollars and 
    cents to things. There's just no history. You can't go into the archives and 
    pluck out something and say 'this is going to work for me today'." September 
    11 was a "humbling" experience for the industry, says MacKenzie, and as the 
    industry learns more about that event, "we realize we don't know about all 
    the risks". Prior to September 11 "there was a sense that we could talk about 
    100-year events and worst case scenarios...everyone's trying to come up with 
    scenarios, however, the end of the conversation always comes to the same conclusion, 
    we just can't imagine."
   Web Site Defacements, 2001 (increase over 2000)
   Source: mi2g
   
  
  
    
       
        | Location | Domain | Number Incidents
 | Percentage Increase
 | 
       
        | Canada | .ca | 215 | 265 | 
       
        | China | .cn | 1298 | 1326 | 
       
        | Taiwan | .tw | 1355 | 1178 | 
       
        | Israel | .il | 413 | 220 | 
       
        | India | .in | 250 | 205 | 
       
        | pakistan | .pk | 72 | 300 | 
       
        | UK government | .gov.uk | 43 | 378 | 
       
        | UK organisations | .org.uk | 25 | 400 | 
       
        | UK companies | .co.uk | 385 | 181 | 
       
        | US government | .gov.com | 248 | 37 | 
       
        | US military | .mil.com | n/a | 128 | 
    
   
  
    
      