Experts predict major cyberattack coming
Corporate icons could be targets, and trillions of dollars worth of damage is possible
Computerworld - A terrorist-sponsored cyberattack against major U.S. networks and businesses is no longer a question of if, but when and to what extent, according to former senior intelligence and security officials.
Although the laundry list of warnings surrounding possible attacks has left people confused about what to prepare for, many experts with firsthand experience in counterterrorism said plans should be put in place to respond to a conventional bombing or chemical attack against a prominent private U.S. company, which would be followed closely by a cyber- or physical attack against regional communications and power systems to hamper rescue and recovery efforts.
A former senior intelligence official said companies considered American icons, such as General Electric Co., General Motors Corp. or IBM, could find themselves under siege.
The ex-official, who requested anonymity, said it's urgent that secure communications channels be established between CEOs of large multinational companies and government agencies such as local FBI offices.
Despite reports that Osama bin Laden has ordered the direct targeting of U.S. economic symbols, there has been no evidence to suggest that traditional terrorist groups have abandoned bombs and guns for computers, said Eric Shaw, a former CIA profiler who now works at Stroz Associates LLC, a cybercrime consulting firm in New York.
Plot Against Microsoft?
Global corporations, especially ones with ties to India or Israel, are big targets, Shaw said. In fact, he added, shortly after Indian authorities apprehended an al-Qaeda operative who warned of the December 2001 attack against the Indian Parliament, the suspect reportedly confessed to having knowledge of an infiltration operation against Microsoft Corp.
Microsoft spokesman Matt Pilla said the company hasn't been contacted by Indian authorities. But based on an internal security review and the various claims made by the suspect, the company doesn't consider the threat to be credible. However, Pilla said, Microsoft has beefed up both network and physical security around its corporate offices in the wake of Sept. 11.
Microsoft likely wouldn't be the only company targeted by so-called hackers for hire, experts said.
There are thousands of hackers capable of causing significant regional disruptions of the telecommunications and power grids as a way to amplify the effects of a physical attack, according to Stuart McClure, president and chief technology officer of Mission Viejo, Calif.-based Foundstone Inc.
"It's also safe to say that they have the blueprints for the networks," he said.
Jim Williams, director of security solutions at Omaha-based security services company Solutionary Inc. and a former member of the FBI's San Francisco computer-intrusion squad, said the cyberthreats to the nation's telecommunications, power and emergency services systems are
- Enable secure remote access to 3D data without sacrificing visual perfomance Design and manufacturing companies must adapt quickly to the demands of an increasingly global and competitive economy. To speed time to market for...
- Virtually Delivered High Performance 3D Graphics "A picture is worth a thousand words." That old phrase is as true today as it ever was. Pictures (i.e., those with heavy...
- Best Practices for Securing Hadoop Historically, Apache Hadoop has provided limited security capabilities. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a...
- Top Tips for Securing Big Data Environments: Why Big Data Doesn't Have to Mean Big Security Challenges Organizations must come to terms with the security challenges they introduce. As big data environments ingest more data, organizations will face significant risks...
- What should I look for in a Next Generation Firewall? SANS Provides Guidance With so many vendors claiming to have a Next Generation Firewall (NGFW), it can be difficult to tell what makes each one different....
- Responding to New SSL Cybersecurity Threat The featured Gartner research examines current strategies to address new SSL cybersecurity threats and vulnerabilities. All Security White Papers | Webcasts
Our new bimonthly Internet of Things newsletter helps you keep pace with the rapidly evolving technologies, trends and developments related to the IoT. Subscribe now and stay up to date!